Breaking the channel mould with Firewall Management

A padlock graphic on an abstract digital background
(Image credit: Shutterstock)

A list of rules defining access to and from certain locations or users to specific services or applications is still the basis of operation of all firewalls. Adding, deleting or modifying these rules is the most common change to a firewall. These changes happen at a staggering rate, with enterprises often editing more than 100 rules a week.

However, poor firewall management defeats the purpose of change by ineffectively controlling access and limiting visibility; poor management also increases the cost associated with security management. Changes in general, whether to a firewall, router, application or any other part of the IT infrastructure, and the potential misconfiguration of the equipment, is often the single greatest cause of network outages and data breaches.

The management of a firewall can be addressed with both short-term and long-term activities. Channel partners should position themselves as the experts, advisors and suppliers of solutions in the face of these problems. Customers look to the channel to provide education and guidance and as a result, resellers are well-positioned to provide the products and services to address this burden as a fully managed service and remove this management headache from businesses.

The problem with firewall administration

Managing firewalls configured with thousands of rules places a considerable burden on organisations to make sure that their firewall policies are implemented correctly. With a mix of firewall vendors and different administrators for different business units within the organisation, too often they are faced with poor-quality policies and unused rules, resulting in misconfiguration of network and security systems, errors, downtime, poor device performance, reduced security and increased risk.

Maintaining an effective, efficient and correct firewall policy is a continual process, which requires specialist knowledge and the ability to invest the time into management. There are two key items to consider:

Time / Effort / Cost: With limited time and resources to perform daily responsibilities, care and concern must be paid to how to reduce the effort necessary to achieve the goal of cleaning up the firewall policy.

Business Impact / Risk: Over 80 percent of all network outages are caused by change. Firewall change is particularly risky and has the potential to both open a network up to excessive risk and negatively impact business continuity.

How making changes to your firewall can leave you more insecure

Changes to enterprise firewalls are the result of administrative initiative, and sometimes, malicious intent or mistakes. Each change is an opportunity to improve the integrity of the security policy, but as firewall configurations grow more complex and less understandable, even planned changes are made without sufficient knowledge. That’s when a good change becomes a risky one.

Firewall changes should be managed with a firewall-aware technology and with a partner or specialist that understands the complexity of these systems. The ideal technology solution supports change management by: collecting all configuration changes in real time; offering a change management process specifically for firewalls; providing rule planning, review and verification tools to design and confirm configuration changes; and archiving all configuration changes with supporting documentation. The best solution also integrates into existing enterprise systems intelligently, and enables immediate, incremental documentation of policy changes.

Turning a product into a service

Specialist resellers can benefit from the need for businesses to adopt firewall management processes not only by offering the solution to its enterprise customers but also by recommending it as a managed service. This will unburden the customer from this time-intensive yet vital process of managing the security policies for the growing number and diversity of devices in the corporate network. Businesses are always looking to do more with less, but they can't risk lowering their security and compliance postures. By adopting a managed service offering for its firewall services, they can reduce security and compliance costs without lowering their guard, with the channel benefitting by adding real value to its customers by keeping it one step ahead of its competitors.

Juan Lyall is channel manager EMEA for FireMon

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.

Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?