* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Firewall](https://www2.paloaltonetworks.com/blog/category/firewall/) * 10 Things To Test In Your... # 10 Things To Test In Your Future NGFW: Automation [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F03%2F10-things-test-future-ngfw-automation%2F) [](https://twitter.com/share?text=10+Things+To+Test+In+Your+Future+NGFW%3A+Automation&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F03%2F10-things-test-future-ngfw-automation%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F03%2F10-things-test-future-ngfw-automation%2F&title=10+Things+To+Test+In+Your+Future+NGFW%3A+Automation&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2018/03/10-things-test-future-ngfw-automation/&ts=markdown) \[\](mailto:?subject=10 Things To Test In Your Future NGFW: Automation) Link copied By [Eila Shargh](https://www.paloaltonetworks.com/blog/author/eila-shargh/?ts=markdown "Posts by Eila Shargh") Mar 30, 2018 4 minutes [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) [10 things to test](https://www.paloaltonetworks.com/blog/tag/10-things-to-test/?ts=markdown) [dynamic security policies](https://www.paloaltonetworks.com/blog/tag/dynamic-security-policies/?ts=markdown) [next-generation firewall](https://www.paloaltonetworks.com/blog/tag/next-generation-firewall/?ts=markdown) [NGFW](https://www.paloaltonetworks.com/blog/tag/ngfw/?ts=markdown) *This post is part of a [blog series](https://www.paloaltonetworks.com/blog/tag/10-things-to-test/) where we examine the 10 things to test in your future next-generation firewall. These 10 points will help ensure your next firewall matches the needs of your organization in its current and future states.* Lean on Automation to Prevent Difficult to Identify and Fast-Changing Threats With attackers employing more and more automation, security teams are seeing more security events across throughout their organizations every minute. Someone must sift through many security events to identify which are high-risk, determining the point of entry that is likely compromised. Once identified, this information must be turned into an actionable response to mitigate an attack before it succeeds -- and before sensitive data leaves the organization. Why Should You Advocate and Test This Capability? Done manually, the process of analyzing and correlating vast numbers of security events is difficult to scale. Security teams can easily drown in alerts and miss the critical, actionable ones. Even actionable information depends on human intervention, which slows mitigation and increases the likelihood of error. To move quickly enough to mitigate an attack before it succeeds, security tools and services should be able to identify the attack, then generate and distribute protections automatically, as well as integrate with other tools to set off the next action in your workflow. Move Beyond the Status Quo As attacks have become automated, the security tools used to discover them must be agile enough to identify known and never-before-seen threats, as well as prevent them more quickly than they can progress through the attack lifecycle. To do so, every step in the process, from discovery to full prevention, should be automated. Known threats must be pre-emptively blocked without degrading firewall performance or impacting business productivity. Security tools must also analyze and identify malicious behavior -- ideally within a cloud environment in order to take advantage of elastic compute and scalability -- to prevent never-before-seen threats. A secure cloud environment also ensures that new analytics and prevention controls can be rolled out without causing service interruption or requiring new hardware or manual updates across an organization. It centralizes decision support in a way that all firewalls, clouds and endpoints can get the latest data from a single, trusted source. Once a new threat has been identified, protections should be automatically generated and implemented across all technologies to provide consistent coverage across the organization. They should also be distributed to all customers in the shared threat intelligence community to stop the spread of the attack. With knowledge of the malicious behavior of the newly discovered threat, security tools must also use automation to identify potentially infected endpoints within your environment before any sensitive data can be exfiltrated. Using automated data correlation, the tools should identify and surface hosts on your network exhibiting any of the same malicious behavior as the threat. True automation goes beyond providing information and allows you to configure automated actions. Some organizations may want to automate the immediate quarantine of potentially infected hosts. This can be done by moving a host to a policy that denies it access to all parts of the network while retaining connectivity for remediation efforts. Others may take a more nuanced approach by automatically applying multi-factor authentication to a potentially infected host so that, if attackers gain access to it, they cannot access corporate data or applications. Automation enables organizations to act against threats without waiting for human intervention, improving response time and, if implemented appropriately and in conjunction with the right tools, preventing successful attacks. A security vendor that offers automation allows security teams to move away from basic operational tasks and focus on strategic efforts that directly benefit the organization. Reducing human intervention reduces avoidable errors, ultimately enabling a more secure security posture. Recommended RFP Questions *** ** * ** *** * Does your security vendor support the capability to automatically generate prevention signatures across the attack lifecycle for all data relevant to attacks? * Can your firewall correlate and identify infected hosts in the network, and quarantine them to limit their access in the network? * Can your firewall trigger multi-factor authentication to prevent credential abuse and secure critical applications? * Can your firewall correlate the threats seen in the network with information obtained from global threat intelligence? *** ** * ** *** **[Learn more about the 10 things to test for in your future NGFW.](https://www.paloaltonetworks.com/products/secure-the-network/next-generation-firewall/test-your-firewall-overview.html)** *** ** * ** *** ## Related Blogs ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### 10 Things To Test In Your Future NGFW: Dynamic Security Policies](https://www2.paloaltonetworks.com/blog/2018/03/10-things-to-test-in-your-future-ngfw-dynamic-security-policies/) ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### 10 Things To Test In Your Future NGFW: Offer Consistent Protection](https://www2.paloaltonetworks.com/blog/2018/05/10-things-test-future-ngfw-offer-consistent-protection/) ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### 10 Things To Test In Your Future NGFW: Prevent Successful Ransomware Attacks](https://www2.paloaltonetworks.com/blog/2018/04/10-things-test-future-ngfw-prevent-successful-ransomware-attacks/) ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### 10 Things To Test In Your Future NGFW: Incorporate Dynamic Lists and Third-Party Threat Intelligence](https://www2.paloaltonetworks.com/blog/2018/04/10-things-test-future-ngfw-incorporate-dynamic-lists-third-party-threat-intelligence/) ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### 10 Things To Test In Your Future NGFW: Integration Into Your Security Ecosystem](https://www2.paloaltonetworks.com/blog/2018/04/10-things-test-future-ngfw-integration-security-ecosystem/) ### [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### 10 Things to Test in Your Future NGFW: Prevent Credential Abuse](https://www2.paloaltonetworks.com/blog/2018/03/10-things-test-future-ngfw-prevent-credential-abuse/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language