<s>
A	O
next-generation	B-Protocol
firewall	I-Protocol
(	O
NGFW	B-Protocol
)	O
is	O
a	O
part	O
of	O
the	O
third	O
generation	O
of	O
firewall	B-Application
technology	O
,	O
combining	O
a	O
traditional	O
firewall	B-Application
with	O
other	O
network	O
device	O
filtering	O
functions	O
,	O
such	O
as	O
an	O
application	B-Protocol
firewall	I-Protocol
using	O
in-line	O
deep	B-Application
packet	I-Application
inspection	I-Application
(	O
DPI	O
)	O
,	O
an	O
intrusion	O
prevention	O
system	O
(	O
IPS	O
)	O
.	O
</s>
<s>
Other	O
techniques	O
might	O
also	O
be	O
employed	O
,	O
such	O
as	O
TLS/SSL	B-Protocol
encrypted	O
traffic	O
inspection	O
,	O
website	O
filtering	O
,	O
QoS/bandwidth	O
management	O
,	O
antivirus	B-Application
inspection	I-Application
,	O
third-party	O
identity	O
management	O
integration	O
(	O
i.e.	O
</s>
<s>
NGFWs	B-Protocol
include	O
the	O
typical	O
functions	O
of	O
traditional	O
firewalls	B-Application
such	O
as	O
packet	B-Application
filtering	I-Application
,	O
network	O
-	O
and	O
port-address	O
translation	O
(	O
NAT	O
)	O
,	O
stateful	O
inspection	O
,	O
and	O
virtual	B-Application
private	I-Application
network	I-Application
(	O
VPN	B-Application
)	O
support	O
.	O
</s>
<s>
The	O
goal	O
of	O
next-generation	B-Protocol
firewalls	I-Protocol
is	O
to	O
include	O
more	O
layers	O
of	O
the	O
OSI	O
model	O
,	O
improving	O
filtering	O
of	O
network	O
traffic	O
that	O
is	O
dependent	O
on	O
the	O
packet	O
contents	O
.	O
</s>
<s>
Next-generation	B-Protocol
firewalls	I-Protocol
perform	O
deeper	O
inspection	O
compared	O
to	O
stateful	O
inspection	O
performed	O
by	O
the	O
first	B-Application
-	I-Application
and	I-Application
second-generation	I-Application
firewalls	I-Application
.	O
</s>
<s>
NGFWs	B-Protocol
use	O
a	O
more	O
thorough	O
inspection	O
style	O
,	O
checking	O
packet	O
payloads	O
and	O
matching	O
signatures	O
for	O
harmful	O
activities	O
such	O
as	O
exploitable	O
attacks	O
and	O
malware	O
.	O
</s>
<s>
To	O
secure	O
your	O
company	O
's	O
data	O
,	O
an	O
NGFW	B-Protocol
includes	O
antivirus	B-Application
,	O
ransomware	O
,	O
and	O
spam	O
protection	O
,	O
as	O
well	O
as	O
endpoint	O
security	O
.	O
</s>
<s>
Modern	O
threats	O
like	O
web-based	B-Application
malware	O
attacks	O
,	O
targeted	O
attacks	O
,	O
application-layer	O
attacks	O
,	O
and	O
more	O
have	O
had	O
a	O
significantly	O
negative	O
effect	O
on	O
the	O
threat	O
landscape	O
.	O
</s>
<s>
Stateful	O
firewalls	B-Application
with	O
simple	O
packet	B-Application
filtering	I-Application
capabilities	O
were	O
efficient	O
blocking	O
unwanted	O
applications	O
as	O
most	O
applications	O
met	O
the	O
port-protocol	O
expectations	O
.	O
</s>
<s>
But	O
blocking	O
a	O
web	B-Application
application	I-Application
that	O
uses	O
port	O
80	O
by	O
closing	O
the	O
port	O
would	O
also	O
mean	O
complications	O
with	O
the	O
entire	O
HTTP	B-Protocol
protocol	I-Protocol
.	O
</s>
<s>
NGFWs	B-Protocol
offer	O
administrators	O
a	O
deeper	O
awareness	O
of	O
and	O
control	O
over	O
individual	O
applications	O
,	O
along	O
with	O
deeper	O
inspection	O
capabilities	O
by	O
the	O
firewall	B-Application
.	O
</s>
