1272 Bond Street, Naperville, IL 60563 630-505-7500

Next-Gen Firewall Management, Maintenance, and Reporting in the Cloud

Understanding Managed Firewall

A majority of companies have some sort of firewall. Many feel a false sense of protection and don’t even know the potential risks of insufficient armor.

As the first required building block for an overall network security posture, a firewall is designed to block unauthorized traffic from penetrating the network. In addition to a vast array of security policies a company should employ,maintaining a firewall can stretch far beyond a full-time job and ties up a lot of IT resources.

Having a firewall alone is not enough. A firewall does not prevent viruses or malware from entering the network, it cannot detect intruders nor can it monitor network traffic. Managed Firewalls are the evolution of the enterprise firewall coupled with a number of network devices filtering and security features to protect customers.

Verizon’s DBIR reports more than 2,100 data breaches in 2014 alone.


It takes most companies more than 200 days to detect a data breach.

  • Text Hover
  • Text Hover
Managed Firewall [Whitepaper]

Understanding Next-Gen Firewall

It's estimated that it takes most companies more than 200 days to detect a data breach. To minimize this delay we have Next-Gen Firewalls; the evolution of the enterprise firewall coupled with a number of network devices filtering and security features to protect customers. In this whitepaper you'll learn about:

  • The Device, Maintenance, and Portal

  • Managed Firewall Add-Ons

  • Fee Structure

  • Points to Consider

Managed Firewall Components

Traditional firewalls include: Packet Filtering, Network Address Translation, URL Blocking, & Virtual Private Networks.
A managed firewall solution takes on management, maintenance and reporting. It includes:

A centralized virtual or physical appliance (usually an enterprisegrade Palo Alto or Fortinet device) now part of a monthly contract moving it from CapEx to OpEx. As needs grow and a larger device is required, scale the solution without having to purchase a new device.


Updates, patch management, change management and other maintenance is handled 24x7x365 by the vendor. This service will occur within an agreed upon SLA to ensure needs are met in an acceptable time-frame.


Continuous visibility into perimeter security for monitoring, logging and reporting, all done through a cloud-based portal. View data and analytics, assess trends, utilize logs for audits and compliance requirements.

Intrusion Detection System

IDS identifies malicious traffic targeting the network and provides alerts. Activity  is logged to provide an audit trail available for review in a portal.

Intrusion Prevention System

IPS works in conjunction with IDS to block malicious traffic and quarantine  suspicious traffic. Parameters can be set through the cloud-based portal.


Antivirus software/applications protects inbound and outbound traffic against  viruses, worms, trojans and other malware. Protection is at the edge of the network and in real time. Threats are logged in the same SIEM portal.

Content Filtering/URL Filtering

Often the last piece of the security puzzle, content filtering protects your  internal network. This web filtering blocks access to web sites outside of a company’s Internet “Acceptable Use Policy”, ranging from social media sites and YouTube to gambling and drugs.

Deep Packet Inspection

DPI grabs pieces of each packet to thoroughly inspect and identify anomalies or violations of normal protocol/communications.

Application Awareness

Log and track application use throughout the network to create a baseline and use these parameters to set policy around which users can access what.

Active Directory/LDAP Integration

This integration allows a higher level of content/URL filtering based on the  user’s roles within Active Directory.
Fee Structure
$ 5,000

Monthly (Starts at)

  • Hardware - Included
  • Staff - Included
  • Training - Included
  • Availability - 24x7x365
$ 150,000


  • Hardware - CapEx
  • Staff - $80-150k/emp
  • Training - Cert. Costs
  • Availability - Weekdays

Points To Consider

When considering a new or upgraded solution, assess your entire security policy, upcoming needs and how you plan to evolve their security posture in our ever changing, high threat environment.

Do you have a security policy?

What does it include?

  • Acceptable use policy?

  • Password policy?

  • Data protection policy?

  • Data destruction policy?

  • Security reporting procedure?

  • Are you compliant with any additional regulatory and compliance standards?

Do you employ any security staff currently? How many employees? Are they trained on the security measures in place?

What are your security challenges?

Do you have an incident response plan?

Do you have a disaster recovery or business continuity plan?

Do you run audits on your security?

  • Do your auditors rotate or do you always use the same auditors?

  • When was your last audit?

  • When was the last time you completed a security assessment?

  • Where are your biggest security risks within your network?

  • Text Hover

Current Firewall EOL

Reason 1 to Switch to Managed Firewall

Upgrading Firewall

Reason 2 to Switch to Managed Firewall

Device Consolidation

Reason 3 to Switch to Managed Firewall

Realign IT Staff to More Strategic Projects

Reason 4 to Switch to Managed Firewall

Contact ATI

Want to get a quote or learn more about Managed Firewall? Dont hesitate to fill out the form below.


Not Ready to Buy? Teach Me Till I'm Ready.

Not an urgent need, but would still like to learn more for future initiatives? No problem. Click the “Learn More” link below to sign up for periodical whitepapers, case study’s, infographics, and videos. on the product of your choice.