{"id":745,"date":"2023-03-08T10:20:37","date_gmt":"2023-03-08T08:20:37","guid":{"rendered":"https:\/\/trustdc.net\/new\/?page_id=745"},"modified":"2023-03-09T08:01:56","modified_gmt":"2023-03-09T06:01:56","slug":"managed-virtual-firewall","status":"publish","type":"page","link":"https:\/\/trustdc.net\/new\/managed-virtual-firewall\/","title":{"rendered":"Managed Virtual Firewall"},"content":{"rendered":"<div id=\"pl-gb745-69e08e60947d4\"  class=\"panel-layout\" ><div id=\"pg-gb745-69e08e60947d4-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-gb745-69e08e60947d4-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-gb745-69e08e60947d4-0-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"pl-w64097652ab60b\"  class=\"panel-layout\" ><div id=\"pg-w64097652ab60b-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-w64097652ab60b-0\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-w64097652ab60b-0-0\"  class=\"panel-grid-cell\" ><div class=\"panel-cell-style panel-cell-style-for-w64097652ab60b-0-0\" ><div id=\"panel-w64097652ab60b-0-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"pl-w64097652ab618\"  class=\"panel-layout\" ><div id=\"pg-w64097652ab618-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64097652ab618-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64097652ab618-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-afc0dec7b224 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tManaged Virtual Firewall\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"sow-sub-headline\">\n\t\t\t\t\t\tA virtual firewall, also known as a cloud firewall, is a virtual appliance designed to provide the same security and inspection capabilities as a physical next-generation firewall (NGFW) appliance. <br \/> <br \/>However, virtual firewalls often have capabilities specifically designed for deployment in the cloud, making an understanding of the benefits of a virtual firewall vs a physical firewall essential for effectively protecting an organization\u2019s virtualized environments\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-w64097652ab618-0-0-1\" class=\"so-panel widget widget_sow-headline\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-ecadcd41d109 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tHow a Virtual Firewall Works\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"sow-sub-headline\">\n\t\t\t\t\t\tVirtual firewalls are commonly deployed as either a virtual machine within a cloud-based environment or via a FWaaS offering. This enables an organization to take advantage of the flexibility and scalability of the cloud in their security as well.<br \/><br \/>Like any firewall, a virtual or cloud firewall needs to be able to inspect the traffic entering and leaving its protected network. A virtual firewall has a couple of options for doing so: \t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-w64097652ab618-0-0-2\" class=\"so-panel widget widget_text panel-last-child\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><ul>\n<li><strong>Bridge Mode:<\/strong>\u00a0A virtual firewall can be deployed like a physical firewall, sitting directly in the path of traffic. This enables it to inspect and allow or block any traffic that is attempting to enter or leave the virtual environment over the bridge.<\/li>\n<li><strong>Cloud-Native APIs:<\/strong>\u00a0Many cloud services offer an API, such as AWS VPC Traffic Mirroring, that provides visibility into traffic flows into an organization\u2019s cloud deployment. Virtual firewalls can also take advantage of this virtual network tap to perform inspection of traffic entering and leaving the protected virtual environment.<\/li>\n<\/ul>\n<p>This visibility enables a cloud firewall to apply its integrated security policies and any built-in security capabilities, such as sandboxed analysis of suspicious content. Depending on the deployment and configuration settings, the firewall can also be configured to block attempted attacks or generate alerts.<\/p>\n<\/div>\n\t\t<\/div><\/div><\/div><div id=\"pg-w64097652ab618-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64097652ab618-1-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-w64097652ab618-1-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-w64097652ab618-1-2\"  class=\"panel-grid-cell panel-grid-cell-empty panel-grid-cell-mobile-last\" ><\/div><div id=\"pgc-w64097652ab618-1-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-w64097652ab60b-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64097652ab60b-0-1-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-8b5b6f678277\"\n\t\t\t\n\t\t>\n\n<div class=\"sow-image-container\">\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/trustdc.net\/new\/wp-content\/uploads\/2023\/03\/Firewall-image.webp\" width=\"517\" height=\"443\" srcset=\"https:\/\/trustdc.net\/new\/wp-content\/uploads\/2023\/03\/Firewall-image.webp 517w, https:\/\/trustdc.net\/new\/wp-content\/uploads\/2023\/03\/Firewall-image-300x257.webp 300w\" sizes=\"auto, (max-width: 517px) 100vw, 517px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-745","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/pages\/745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/comments?post=745"}],"version-history":[{"count":7,"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/pages\/745\/revisions"}],"predecessor-version":[{"id":797,"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/pages\/745\/revisions\/797"}],"wp:attachment":[{"href":"https:\/\/trustdc.net\/new\/wp-json\/wp\/v2\/media?parent=745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}