{"id":24676,"date":"2019-01-25T19:49:00","date_gmt":"2019-01-25T19:49:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/"},"modified":"2019-01-25T19:49:00","modified_gmt":"2019-01-25T19:49:00","slug":"what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/","title":{"rendered":"What is a firewall? How they work and how they fit into enterprise security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/04\/firewall-100716789-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Firewalls been around for three decades, but they\u2019ve evolved drastically to include features that used to be sold as separate appliances and to pull in externally gathered data to make smarter decisions about what network traffic to allow and what traffic to block.<\/p>\n<p>Now just one indespensible element in an ecosystem of network defenses, the latest versions are known as enterprise firewalls or next-generation firewalls (NGFW) to indicate who should use them and that they are continually adding functionality.<\/p>\n<h2>What is a firewall?<\/h2>\n<p>A firewall is a network device that monitors packets going in and out of networks and blocks or allows them according to rules that have been set up to define what traffic is permissible and what traffic isn\u2019t.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Also see <a href=\"https:\/\/www.networkworld.com\/article\/3236448\/lan-wan\/what-to-consider-when-deploying-a-next-generation-firewall.html#tk.nww-fsb#nww-fsb\">What to consider when deploying a next generation firewall<\/a>. | Get regularly scheduled insights by <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html#nww-fsb\">signing up for Network World newsletters<\/a>. ]<\/strong><\/aside>\n<p>There are several types of firewalls that have developed over the years, becoming progressively more complex and taking more parameters into consideration when determining whether traffic should be allowed to pass. Firewalls started off as packet filters, but the newest do much much more.<\/p>\n<p>Initially placed at the boundaries between trusted and untrusted networks, firewalls are now also deployed to protect internal segments of networks, such as <a href=\"https:\/\/www.networkworld.com\/article\/3223692\/data-center\/what-is-a-data-centerhow-its-changed-and-what-you-need-to-know.html\">data centers<\/a>, from other segments of organizations\u2019 networks.<\/p>\n<p>They are commonly deployed as appliances built by individual vendors, but they can also be bought as virtual appliances \u2013 software that customers install on their own hardware.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<p>Here are the major types of firewalls.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<h2>Proxy-based firewalls<\/h2>\n<p>These firewalls act as a gateway between end users who request data and the source of that data. Host devices connect to the proxy, and the proxy makes a separate connection to the source of the data. In response, source devices make connections to the proxy, and the proxy make a separate connection to the host device. Before passing on packets to a destination address, the proxy can filter them to enforce policies and mask the location of the recipient\u2019s device, but also to protect the recipient\u2019s device and network.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<p>The upside of proxy-based firewalls is that machines outside the network being protected can gather only limited information about the network because they are never directly connected to it.<\/p>\n<p>The major downside of proxy-based firewalls is that terminating incoming connections and creating outgoing connections plus filtering causes delays that can degrade performance. In turn, that can eliminate using some applications across the firewall because response times become too slow.<\/p>\n<h2>Stateful firewalls<\/h2>\n<p>A performance improvement over proxy-based firewalls came in the form of stateful firewalls, which keep track of a realm of information about connections and make it unnecessary for the firewall to inspect every packet. This greatly reduces delay introduced by the firewall.<\/p>\n<p>By maintaining the state of connections, these firewalls can, for example, forego inspecting incoming packets that they identify as responses to legitimate outgoing connections that have already been inspected. The initial inspection establishes that the connection is allowable, and by preserving that state in its memory, the firewall can pass through subsequent traffic that is part of that same conversation without inspecting every packet.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id=\"\"\/>\n<h2>Web application firewalls<\/h2>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3310359\/network-security\/the-waf-backed-by-artificial-intelligence-ai.html\">Web application firewalls<\/a> sit logically between servers that support Web applications and the internet, protecting them from specific HTML attacks such as cross-site scripting, SQL injection and others. They can be hardware- or cloud-based or they can be baked into applications themselves to determine whether each client trying to reach the server should be allowed access.<\/p>\n<h2>Next-generation firewalls<\/h2>\n<p>Packets can be filtered using more than the state of connections and source and destination addresses. This is where NGFWs come into play. They incorporate rules for what individual applications and users are allowed to do, and blend in data gathered from other technologies in order to make better informed decisions about what traffic to allow and what traffic to drop.<\/p>\n<p>For example, some of these NGFWs perform URL filtering, can terminate secure sockets layer (SSL) and transport layer security <a href=\"https:\/\/www.networkworld.com\/article\/2303073\/lan-wan\/lan-wan-what-is-transport-layer-security-protocol.html\">(TLS)<\/a> connections, \u00a0and support <a href=\"https:\/\/www.networkworld.com\/article\/3031279\/sd-wan\/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html\">software-defined wide area networking (SD-WAN)<\/a> to improve the efficiency of how dynamic SD-WAN decisions about connectivity are enforced.<\/p>\n<h2>Firewalls are not enough<\/h2>\n<p>Features that historically were handled by separate devices are now included in many NGFWs and include:<\/p>\n<h2>Intrusion Prevention Systems (IPS)<\/h2>\n<p>Whereas basic firewall technologies identify and block certain types of network traffic, <a href=\"https:\/\/www.networkworld.com\/article\/2335574\/network-security\/what-is-an-ips--anyway-.html\">IPSes<\/a> use more granular security such as signature tracing and anomaly detection to prevent threats from entering networks. Once separate platforms, IPS functionality is more and more a standard firewall feature.<\/p>\n<h2>Deep packet inspection (DPI)<\/h2>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/2256558\/compliance\/forrester--deep-packet-inspection-as-an-enabling-technology.html\">Deep packet inspection<\/a> is a type of packet filtering that looks beyond where packets are coming from and going to and inspects their content, revealing, for example, what application is being accessed or what type of data is being transmitted. This information can make possible more intelligent and granular policies for the firewall to enforce. DPI could be used to block or allow traffic, but also restrict the amount of bandwidth particular applications are allowed to use. It could also be a tool for protecting intellectual property or sensitive data from leaving a secure network<\/p>\n<h2>SSL\/TLS termination<\/h2>\n<p>SSL-encrypted traffic is immune to deep-packet inspection because its content cannot be read. Some NGFWs can terminate SSL traffic, inspect it, then create a second SSL connection to the intended destination address. This can be used to prevent, for instance, malicious employees from sending proprietary information outside the secure network while also allowing legitimate traffic to flow through. While it\u2019s good from a data-protection point of view, DPI can raise privacy concerns. With the advent of <a href=\"https:\/\/www.networkworld.com\/article\/2303073\/lan-wan\/lan-wan-what-is-transport-layer-security-protocol.html\">transport layer security (TLS)<\/a> as an improvement on SSL, this termination and proxying can apply to TLS as well.<\/p>\n<h2>Sandboxing<\/h2>\n<p>Incoming attachments or communications with outside sources can contain malicious code. Using sandboxing, some NGFWs can isolate these attachments and whatever code they contain, execute it and find out whether it\u2019s malicious. The downside of this process is this can consume a lot of CPU cycles and introduce noticeable delay in traffic flowing through the firewall.<\/p>\n<p>There are other features that could be incorporated in NGFWs. They can support taking in data gathered by other platforms an using it to make firewall decisions. For example, if a new malware signature has been identified by researchers, the firewall can take in that information and start filtering out traffic that contains the signature.<\/p>\n<p>Gartner, which once used the term NGFW, now says that previous incarnations of firewalls are outmoded and that they now call NGFWs simply enterprise firewalls.<\/p>\n<h2>Most popular firewall vendors<\/h2>\n<p>According to the latest Gartner ranking of enterprise firewalls, the vendors designated leaders are Checkpoint, Cisco, Fortinet and Palo Alto Networks. Sophos is on the verge of the leader quadrant but falls just shy in both ability to execute and completeness of its vision.<\/p>\n<p>The four leaders in the Gartner Magic Quadrant are also tops when measured by the amount of revenue their products generate, according to IDC. Combined, they controlled more than half the firewall market share in the first quarter of last year, IDC said.<\/p>\n<p>Five years ago, the Gartner firewall leaders included just Checkpoint and Palo Alto, but in 2017 Fortinet broke through, and in 2018 Cisco joined the top category.<\/p>\n<p>Of those vendors, Gartner also awarded Cisco, Fortinet and Palo Alto its Customer Choice Awards, which are based on customer reviews of their products. In all, the customers reviewed 17 vendors and submitted a total of 3,406 reviews, of which 2,943 were about the vendors ranked as leaders.<\/p>\n<p>The other 12 vendors not already mentioned here are AhnLab, Barracuda Networks, Forcepoint, GreyHeller, Hillstone Networks, Huawei, Juniper Networks, New H3C, Sangfor, Sonic Wall, Stormshield and Watchguard.<\/p>\n<p>By contrast, Forrester ranks many of the top firewall vendors not only on their firewalls, but on a framework it designed called Zero Trust, which takes into account all the security components vendors provide and how well they are integrated. Reliance on firewalls alone is history, according to its report \u201cThe Forrester Wave: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018.\u201d In it, Forrester gives its top ranking to just two vendors, Palo Alto and Symantec.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Now read <a href=\"https:\/\/www.networkworld.com\/article\/3276025\/careers\/20-hot-jobs-ambitious-it-pros-should-shoot-for.html\">20 hot jobs ambitious IT pros should shoot for<\/a>. ]<\/strong><\/aside>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3230457\/lan-wan\/what-is-a-firewall-perimeter-stateful-inspection-next-generation.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nFirewalls been around for three decades, but they\u2019ve evolved drastically to include features that used to be sold as separate appliances and to pull in externally gathered data to make smarter decisions about what network traffic to allow and what traffic to block.Now just one indespensible element in an ecosystem of network defenses, the latest versions are known as enterprise firewalls or next-generation firewalls (NGFW) to indicate who should use them and that they are continually adding functionality.What is a firewall?<br \/>\nA firewall is a network device that monitors packets going in and out of networks and blocks or allows them according to rules that have been set up to define what traffic is permissible and what traffic isn\u2019t.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24677,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1186,1061,762,307],"class_list":["post-24676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-firewalls","tag-network-security","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a firewall? How they work and how they fit into enterprise security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a firewall? How they work and how they fit into enterprise security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-25T19:49:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What is a firewall? How they work and how they fit into enterprise security\",\"datePublished\":\"2019-01-25T19:49:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/\"},\"wordCount\":1421,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg\",\"keywords\":[\"Firewalls\",\"Network Security\",\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/\",\"name\":\"What is a firewall? How they work and how they fit into enterprise security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg\",\"datePublished\":\"2019-01-25T19:49:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Firewalls\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/firewalls\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is a firewall? How they work and how they fit into enterprise security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a firewall? How they work and how they fit into enterprise security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/","og_locale":"en_US","og_type":"article","og_title":"What is a firewall? How they work and how they fit into enterprise security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-25T19:49:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What is a firewall? How they work and how they fit into enterprise security","datePublished":"2019-01-25T19:49:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/"},"wordCount":1421,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg","keywords":["Firewalls","Network Security","Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/","url":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/","name":"What is a firewall? How they work and how they fit into enterprise security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg","datePublished":"2019-01-25T19:49:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-is-a-firewall-how-they-work-and-how-they-fit-into-enterprise-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Firewalls","item":"https:\/\/www.threatshub.org\/blog\/tag\/firewalls\/"},{"@type":"ListItem","position":3,"name":"What is a firewall? How they work and how they fit into enterprise security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24676"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24677"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}