RECOMMENDATIONS TO THE SELECTION OF STAKEHOLDERS FOR THE PROTECTION OF CORPORATE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

Authors: Osadcha Olha ,Vialkova Vira,
Affiliation: Faculty of Information Technology Taras Shevchenko National University of Kyiv, Ukraine

Category:

Keywords: next generation firewall, next generation firewall, next-generation firewall, NGFW, policy, ITS, information security management, cybersecurity, threats, network, protection, administration, attacks.
ABSTRACT. With Next-Generation Firewall (NGFW), businesses can quickly create security policies that comply with business policies, are easy to maintain, and adapt to a dynamic enterprise environment. They reduce response time through automated policy-based actions, while the IT department is able to quickly automate workflows by integrating with administration tools.

References:

1. Jithin Aby Alex, Being a firewall engineer: An operational approach: A Comprehensive guide on firewall management operations and best practices, 1st Edition, 2018.
2. Aaron Woland, Vivek Santuka, Mason Harris, Jamie Sanbower, Integrated Security Technologies and Solutions - Volume I, 1st Edition, 2018.
3. What are the advantages of next-generation firewalls? Review of popular NGFW . Access mode: https: // www.ixbt.com / live / market / v-chem-preimuschestva-fayrvolov-sleduyuschego-pokoleniya-obzor-populyarnyh-ngfw.html.
4. Site organization Gartner. Access mode: https: // www.gartner.com / en / information-technology / glossary / next-generation-firewalls-ngfws
5. 5 critical mistakes when evaluating a next-generation firewall . Access mode: https: // www.paloaltonetworks.com / content / dam / pan / en_US / assets / pdf / white-papers / five-critical-mistakes-to-avoid-when-evaluating-a-ngfw.pdf .
6. A. Gagnidze., M. Iavich., G. Iashvili, Analysis of Post Quantum Cryptography use in Practice, Bulletin of the Georgian National Academy of Sciences, vol. 11, no. 2, 2017, p.29-36.
7. A. Gagnidze, M. Iavich, G. Iashvili// Novel Version of Merkle Cryptosystem, BULLETIN OF THE GEORGIAN NATIONAL ACADEMY OF SCIENCES, vol. 11, no. 4, 2017, p. 28-33
8. NGFW or UTM: How to Choose. Access mode: https: // www.watchguard.com / en / wgrd-resource-center / help-me-choose
9. 5 Tips for Choosing a Next-Generation Firewall. Access mode: https: // www.cisco.com / c / dam / en / us / products / collateral / security / next-gen-firewall.pdf.
10. Overview of programs for working with virtual sandboxes . Access mode: https: // www.ixbt.com / soft / sandboxes.shtml
11. Гагнидзе А.Г., Явич М.П., Иашвили Г.Ю. Пост-квантовые криптосистемы // Современные научные исследования и инновации. 2016. № 5 [Электронный ресурс]. URL: http://web.snauka.ru/issues/2016/05/67264