Firewalls infrastructure: Single vendor or multi-vendor?
Cisco defines a traditional firewall as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. In today’s enterprise, there is now a greater adoption rate of next-generation firewalls (NGFWs), which are deep-packet inspection firewalls that move beyond traditional port/protocol inspection and blocking.
Most medium to large businesses will have multiple firewalls to manage, because you have to protect your perimeter, your datacenter, and now even your cloud-based systems. Because of this issue and with the increased adoption of NGFWs, it’s now even more important to consider the question: “Should we use one vendor for all firewalls or multiple vendors?”
In this article let me explain why in the majority of cases this type of thinking is incorrect and can actually increase your risk of a data breach!