PUBLICATION & RESEARCH LIBRARY

Authors: Jason Pappalexis, Mike Spanbauer and John Whetstone

Publish Date: November 1, 2017

Stateful firewalls have long been considered by many to be the cornerstone of network architecture. These physical or virtual appliances are largely deployed at the perimeter of an enterprise network to prevent unauthorized access, enable VPN access, and generate valuable logs for administrators. Operating up to layer 4 of the OSI model, this second generation of firewall technology inspects all network traffic (specifically source and destination IP address, port numbers, and protocol information) and checks it against rules defined by network administrators to determine whether traffic should be blocked or allowed to pass through the network perimeter.

Enterprises can use this data to gain critical insights into the purpose of the stateful firewall, including how these appliances are being managed within organizations, where they are being deployed, who is responsible for purchasing decisions, and the extent to which API controls are being used for their management.

ABOUT THIS STUDY: Part of a series on security controls deployed by US enterprises, this brief includes current usage statistics for stateful firewall technology within small and medium-sized enterprises (SMEs), large enterprises (LEs), and very large enterprises (VLEs).