Firewalls continuously evolve to remain a staple of network security by incorporating functionality of standalone devices, embracing network-architecture changes, and integrating outside data sources to add intelligence to the decisions they make \u2013 a daunting wealth of possibilities that is difficult to keep track of.\nBecause of this richness of features, next-generation firewalls are difficult to master fully, and important capabilities sometimes can be, and in practice are, overlooked.\nHere is a shortlist of new features IT pros should be aware of.\n\nNetwork segmentation\nPolicy optimization\nCredential-theft prevention\nDNS security\nDynamic user groups\n\n\nNetwork segmentation\nDividing a single physical network into multiple logical networks is known as network segmentation in which each segment behaves as if it runs on its own physical network. The traffic from one segment can\u2019t be seen by or passed to another segment.\nThis significantly reduces attack surfaces in the event of a breach. For example, a hospital could put all its medical devices into one segment and its patient records into another. Then, if hackers breach a heart pump that was not secured properly, that would not enable them to access private patient information.\nIt\u2019s important to note that many connected things that make up the internet of things have older operating systems and are inherently insecure and can act as a point of entry for attackers, so the growth of IoT and its distributed nature drives up the need for network segmentation.\nPolicy optimization\nFirewall policies and rules are the engine that make firewalls go. Most security professionals are terrified of removing older policies because they don\u2019t know when they were put in place or why. As a result, rules keep getting added with no thought of reducing the overall number. Some enterprises say they have millions of firewall rules in place. The fact is, too many rules add complexity, can conflict with each other and are time consuming to manage and troubleshoot.\nPolicy optimization migrates legacy security policy rules to application-based rules that permit or deny traffic based on what application is being used. This improves overall security by reducing the attack surface and also provides visibility to safely enable application access. Policy optimization identifies port-based rules so they can be converted to application-based whitelist rules or add applications from a port-based rule to an existing application-based rule without compromising application availability. It also identifies over-provisioned application-based rules. Policy optimization helps prioritize which port-based rules to migrate first, identify application-based rules that allow applications that aren\u2019t being used, and analyze rule-usage characteristics such as hit count, which compares how often a particular rule is applied vs. how often all the rules are applied.\nConverting port-based rules to application-based rules improves security posture because the organization can select the applications they want to whitelist and deny all other applications. That way unwanted and potentially malicious traffic is eliminated from the network.\n\n\n \n\n\n\u00a0\nCredential-theft prevention\nHistorically, workers accessed corporate applications from company offices. Today they access legacy apps, SaaS apps and other cloud services from the office, home, airport and anywhere else they may be. This makes it much easier for threat actors to steal credentials. The Verizon Data Breach Investigations Report found that 81% of hacking-related breaches leveraged stolen and\/or weak passwords.\nCredential-theft prevention blocks employees from using corporate credentials on sites such as Facebook and Twitter.\u00a0 Even though they may be sanctioned applications, using corporate credentials to access them puts the business at risk.\nCredential-theft prevention works by scanning username and password submissions to websites and compare those submissions to lists of official corporate credentials. Businesses can choose what websites to allow submitting corporate credentials to or block them based on the URL category of the website.\nWhen the firewall detects a user attempting to submit credentials to a site in a category that is restricted, it can display a block-response page that prevents the user from submitting credentials. Alternatively, it can present a continue page that warns users against submitting credentials to sites classified in certain URL categories, but still allows them to continue with the credential submission. Security professionals can customize these block pages to educate users against reusing corporate credentials, even on legitimate, non-phishing sites.\nDNS security\nA combination of machine learning, analytics and automation can block attacks that leverage the Domain Name System (DNS). In many enterprises, DNS servers are unsecured and completely wide open to attacks that redirect users to bad sites where they are phished and where data is stolen. Threat actors have a high degree of success with DNS-based attacks because security teams have very little visibility into how attackers use the service to maintain control of infected devices. There are some standalone DNS security services that are moderately effective but lack the volume of data to recognize all attacks.\nWhen DNS security is integrated into firewalls, machine learning can analyze the massive amount of network data, making standalone analysis tools unnecessary. DNS security integrated into a firewall can predict and block malicious domains through automation and the real-time analysis that finds them. \u00a0As the number of bad domains grows, machine learning can find them quickly and ensure they don\u2019t become problems.\nIntegrated DNS security can also use machine-learning analytics to neutralize DNS tunneling, which smuggles data through firewalls by hiding it within DNS requests. DNS security can also find malware command-and-control servers.\u00a0 It builds on top of signature-based systems to identify advanced tunneling methods and automates the shutdown of DNS-tunneling attacks.\nDynamic user groups\nIt\u2019s possible to create policies that automate the remediation\u00a0of anomalous\u00a0activities\u00a0of workers.\u00a0The basic premise is that users\u2019 roles within a group means\u00a0their network behaviors should be similar to each other. For example, if a worker is phished and strange apps were installed, this would stand out and could indicate a breach.\nHistorically, quarantining a group of users was highly time consuming because each member of the group had to be addressed and policies enforced individually. With dynamic user groups, when the firewall sees an anomaly it creates policies that counter the anomoly and pushes them out to the user group. The entire group is automatically updated without having to manually create and commit policies.\u00a0So, for example, all the people in accounting\u00a0would receive the same policy update automatically, at once, instead of manually, one at a\u00a0time. Integration with the firewall enables the firewall to distribute\u00a0the policies for the user group to all the other infrastructure that requires it including other firewalls, log collectors or applications.\u00a0\nFirewalls have been and will continue to be the anchor of cyber security. They are the first line of defense and can thwart many attacks before they penetrate the enterprise network.\u00a0 Maximizing the value of firewalls means turning on many of the advanced features, some of which have been in firewalls for years but not turned on for a variety of reasons.