{"id":73052,"date":"2023-10-27T20:45:25","date_gmt":"2023-10-27T12:45:25","guid":{"rendered":"https:\/\/version-2.com\/?p=73052"},"modified":"2023-10-17T20:48:13","modified_gmt":"2023-10-17T12:48:13","slug":"nordlayer-features-in-review-cloud-firewall","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/10\/nordlayer-features-in-review-cloud-firewall\/","title":{"rendered":"NordLayer features in review: Cloud Firewall"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"73052\" class=\"elementor elementor-73052\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">There was a time when on-premises hardware took care of your company\u2019s cybersecurity. Most workers heard there was some kind of firewall behind those server room doors but never got to see it. Now, these rooms are getting smaller, and there are fewer and fewer doors to open.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Today, <b>hardware-heavy businesses are steadily declining<\/b> while the on-cloud sector goes the opposite way. This doesn\u2019t come as a surprise, given that buying solutions from the vendor is cheaper and doesn\u2019t require a significant IT workforce. Following the trend, we at NordLayer further expanded our cybersecurity feature selection with a Cloud Firewall.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">While we already had options like ThreatBlock or Deep Packet Inspection Lite (DPI Lite) next to the VPN, <b>Cloud Firewall will further strengthen your multi-layered network protection<\/b>. Also, let\u2019s not forget that a firewall is a must for Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Whether you\u2019re moving to the cloud or looking for ways to strengthen your company\u2019s cybersecurity, continue reading to learn how NordLayer\u2019s Cloud Firewall can assist.<\/p><h2 id=\"cloud-firewall-solution-using-nordlayer\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Cloud Firewall solution using NordLayer<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Cloud Firewall is <b>very easy to deploy<\/b> as it doesn\u2019t require extra hardware that would also need constant supervision. That means you won\u2019t have issues integrating it into your existing network and fitting the company\u2019s infrastructure. In fact, the whole network access management process becomes streamlined and effortless.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As noted earlier, you can install a firewall on your hardware, <b>choose a cloud-based option<\/b>, such as NordLayer, or use both options. The Cloud solutions are also known as <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/cloud-firewall\/\">Firewalls as a Service (FWaaS)<\/a>. They require no local hardware\u2014just a web-based Control Panel for controlling access to your data.<\/p><h2 id=\"benefits-of-cloud-firewall-vpn\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Benefits of Cloud Firewall VPN<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s FWaaS can benefit you in many ways beyond firewall protection. Here are just some of the examples.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Granular network segmentation<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The main benefit of NordLayer\u2019s Cloud Firewall is <b>granular network segmentation<\/b>. It means you can choose which departments, teams, or employees can access particular in-house resources. This makes creating new workflows easier and existing business processes more secure.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Moreover, network segmentation reduces the attack surface inside the organization. It\u2019s always easier to detect a possible threat in a subnet compared to the whole network.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Let\u2019s also not forget about the increased performance. The bigger the network, the higher the risk of a slowdown. With network segmentation, you\u2019ll avoid bandwidth throttling because one subnet\u2019s load won\u2019t affect the other.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Centralized security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The firewall is on the cloud, meaning it can easily protect both your office and remote workers. That means it works both for your cloud and on-premises environments. The same applies to enforcing policies on all endpoints.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Centralized security means that your IT admins have more control over network security. What\u2019s more, they can customize security controls for each segment.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">One control panel to rule them all<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">One of the main goals of NordLayer is simplicity and ease of use. That\u2019s why we put all controls in one panel without cluttering it. Even if you\u2019re not an IT expert, you\u2019ll be able to create new rules, which will be automatically applied to anything added to the Gateway.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">And in case there was a rule for one employee only, it will automatically become disabled if the worker is removed from a Team. However, if you decide to remove a Gateway or a dedicated server, you\u2019ll have to turn off the firewall first.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Optimized maintenance<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud firewalls are easily updated, and the process can be automated. There\u2019s no need to visit every office with a server to install the latest firmware updates and patches.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6ueDksjtXkvvdm7I0rqq1S\/e64d07d459b4ebfe42ada78718e64a23\/5_1400x1000.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"591\" \/><\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Increased speed<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Traditional firewalls are not always ready to handle cloud applications and may require extra expenses for them to work. In contrast, NordLayer\u2019s Cloud Firewall won\u2019t become a choke point in your network.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">And the best thing is you won\u2019t be sacrificing security for the sake of performance. It\u2019s always easier to avoid bandwidth throttling when you have your network segmented.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Flexible scaling<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">No need for extra hardware means your Cloud Firewall will expand together with your business. And this can happen without overly complicating the process.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A new department in your company? Simply add another rule for them. With NordLayer\u2019s Cloud Firewall, you can focus on your business instead of worrying about its cybersecurity.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Additionally, it doesn\u2019t matter what kind of work model your company uses. NordLayer fits in-house, cloud, and hybrid environments. So, if you\u2019re planning to switch from one to another in the near future, you don\u2019t need to worry about changing your firewall.<\/p><h2 id=\"how-does-nordlayers-fwaas-feature-work\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How does NordLayer\u2019s FWaaS feature work?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Cloud Firewall works a bit like a border guard, <b>scanning incoming and outgoing data packets<\/b>. It checks if you can pass the border into a specific country.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Just like a firewall examines the content of the data packet, the border guard inspects your ID to see if it\u2019s really you and whether you\u2019re on a list of allowed travelers. But how does that actually happen?<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2blMz1FoMQ460nUXUaBfmT\/d8baa0560332c6751c8e54ff59092d27\/Screenshot_2023-10-16_at_11.35.33.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"282\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The first and most important step is <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/firewall\/configuration\/\">configuring the firewall<\/a> according to your business needs. That means creating rules defining who will access which resources and who will be blocked. A rule can be applied to the whole company or just one employee.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">When it comes to traffic destinations, your Cloud Firewall can work with standalone IPs, IP lists, or entire subnets. These options give you the freedom to customize to your heart\u2019s content.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Once you&#8217;re past this stage, the only thing left is enabling NordLayer\u2019s Firewall, which in turn starts filtering data packets passing through the gateway.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Now, no matter your or your employee\u2019s location, this Cloud Firewall will protect your company as the bouncer protects the nightclub by doing face control. He won\u2019t let the dodgy-looking fellas in and won\u2019t explain the reasons why. And you, as the club manager, can overrule the bouncer\u2019s decision anytime.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">You can also <b>customize NordLayer\u2019s Firewall<\/b> to fit your company. No matter if your workplace is on-site, hybrid, or remote \u2013 you\u2019ll still be getting top-notch threat prevention and access control.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">What\u2019s more, you don\u2019t have to be an IT specialist to tweak your Cloud Firewall. You can <b>apply different rules to your employees<\/b> right in NordLayer\u2019s Control Panel. No more financial data for Mark? Bam, it\u2019s done. Sales team newbies need access to Salesforce? Bam, it\u2019s done.<\/p><h2 id=\"how-to-use-nordlayers-cloud-firewall\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How to use NordLayer\u2019s Cloud Firewall?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This section describes the key actions you can take with our FWaaS without needing an IT specialist. We\u2019ll look at <b>Default Firewall Action, creating new Firewall rules, and managing rule hierarchy<\/b>. We also want to remind you that if you\u2019re having trouble with any of the steps, contact our 24\/7 customer support \u2013 they will be glad to help.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">What is a Default Firewall Action?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Default Firewall Action <b>controls what happens to the traffic<\/b> when it does not meet any of the firewall rules defined by the organization. However, new employees who are yet to be assigned to a Team won\u2019t see any Virtual Private Gateways, just the shared ones. This means neither firewall rules nor the Default Firewall Action applies to them.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">There are two Default Firewall Actions available:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Allow<\/b>. The firewall allows all network traffic by default unless a rule prohibits the traffic.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Deny<\/b>. The firewall disallows all network traffic by default unless a rule permits the traffic.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This means you can\u2019t have both actions active, just like the border guard can\u2019t let and not let you through at the same time.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Creating new Cloud Firewall rules<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Firewall rules are the backbone of the firewall itself<\/b>. Without rules, the Cloud Firewall is basically not doing anything. So, your first step should be deciding on the exact policies and the resources or services you want to have controlled access.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"396\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/440XuCqELG5zDWMjaT1cjj\/6d46cfeea95a84480d7ef54f0421b8c4\/5_1400x670.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"5 1400x670\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Creating a new rule starts with naming it, followed by <b>choosing the traffic source<\/b>. It can be any traffic from any Team or a specific Team or employee. When you have the traffic source set, you can <b>determine the traffic destination<\/b>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Once again, it can be any network address or a custom one. You can choose from predefined addresses or a new entry.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Finally, you get to <b>define network services such as protocols and ports<\/b>. Each new rule is added to the top of the priority list. Rule priority can be adjusted by dragging and dropping separate rules.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">NordLayer\u2019s FWaaS statuses and rule hierarchy<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As mentioned above, firewall rules have a hierarchy that helps control your network. So when a firewall sees that the traffic meets the criteria of a certain rule, it ignores the others with lower priority.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Every rule can have one of the three statuses \u2013 <b>Enabled, Disabled, or Deleted<\/b>. All are self-explanatory, but the latter status will change only when you apply the rule changes.<\/p><h2 id=\"nordlayers-fwaas-vs-traditional-firewall\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">NordLayer\u2019s FWaaS vs traditional firewall<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Traditional firewall requires you to have the necessary hardware in your office. Then, you need IT managers to install the firewall, maintain it, and extend its coverage.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This can be a good option if you don\u2019t have remote workers, including yourself. But that\u2019s highly unlikely, isn\u2019t it? In contrast, as the name implies, <b>NordLayer\u2019s Cloud Firewall is deployed in the cloud<\/b> and efficiently protects your workforce around the world. Moreover, this helps to cut your cybersecurity costs.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Also, if you\u2019re working with cloud-based services, there are <b>no extra investments to protect the remote workforce<\/b>. Since the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/firewall\/virtual\/\">firewall is virtual<\/a>, it stands between the user and the service. If you had an on-premises firewall, a remote worker would need to backhaul the traffic to the hardware infrastructure first, which is neither easy nor practical.<\/p><h2 id=\"should-you-get-nordlayers-cloud-firewall\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Should you get NordLayer\u2019s Cloud Firewall?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Gone are the days when cybercriminals would target only big corporations like Google or Amazon. According to IT Governance, <b>more than 40% of data breaches and ransomware attacks hit SMBs<\/b>, and over 50% of companies plan to increase cybersecurity spending (IBM). The most targeted industries are Manufacturing, Finance &amp; insurance, and Professional business &amp; consumer services.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In short, <b>every company that uses the internet should get a solid firewall<\/b>. And if at least one employee will work remotely, a cloud version is the easiest and cheapest path to enhanced cybersecurity. For that, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/cloud-firewall\/\">we recommend NordLayer\u2019s Cloud Firewall<\/a>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Our FWaaS gives you IaaS, PaaS, and SaaS app protection, granular access control, and secure packet filtering. It combines well with DNS filtering by category or our DPI capabilities. Managing and centralizing your network won\u2019t be a trouble, and when your business is ready to scale, your Cloud Firewall will follow side-by-side.<\/p><h2 id=\"faq\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">FAQ<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">What is a cloud firewall?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A cloud firewall is a specialized <b>security solution designed to restrict unauthorized access<\/b>. Unlike traditional firewalls operating on-premises, cloud firewalls are situated and managed within the cloud. This modern firewall deployment approach is often called Firewall-as-a-Service (FWaaS).<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">What is the difference between a cloud firewall and FWaaS?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>All Firewall-as-a-Service (FWaaS) are cloud firewalls, but not all cloud firewalls are FWaaS<\/b>. Cloud firewall protects cloud-based resources by restricting unauthorized access. FWaaS delivers these capabilities as a managed service, eliminating the need for on-premises hardware or dedicated firewall appliances.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">What is the difference between a cloud firewall and a hardware firewall?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A <b>cloud firewall, such as <\/b><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/cloud-firewall\/\"><b>NordLayer FWaaS<\/b><\/a><b>, operates in a cloud environmen<\/b>t, focusing on data-centric protection strategies. In contrast, a hardware firewall is a physical device that guards the perimeter of a local network, using both hardware and software to filter and monitor incoming and outgoing traffic.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>There was a time when on-premises hardware took care of [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[974,1076,1132],"class_list":["post-73052","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NordLayer features in review: Cloud Firewall - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NordLayer features in review: Cloud Firewall - Version 2\" \/>\n<meta property=\"og:description\" content=\"There was a time when on-premises hardware took care of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-27T12:45:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/10\\\/nordlayer-features-in-review-cloud-firewall\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"NordLayer features in review: Cloud Firewall\",\"datePublished\":\"2023-10-27T12:45:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/10\\\/nordlayer-features-in-review-cloud-firewall\\\/\"},\"wordCount\":1972,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/13yxDCxCBkvdlQ3iSptfiY\\\/4e95ca2bd95dd77b9d46d77cef246994\\\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/10\\\/nordlayer-features-in-review-cloud-firewall\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/\",\"name\":\"NordLayer features in review: Cloud Firewall - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/13yxDCxCBkvdlQ3iSptfiY\\\/4e95ca2bd95dd77b9d46d77cef246994\\\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2023-10-27T12:45:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/13yxDCxCBkvdlQ3iSptfiY\\\/4e95ca2bd95dd77b9d46d77cef246994\\\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/13yxDCxCBkvdlQ3iSptfiY\\\/4e95ca2bd95dd77b9d46d77cef246994\\\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/features-in-review-cloud-firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NordLayer features in review: Cloud Firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NordLayer features in review: Cloud Firewall - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/","og_locale":"en_US","og_type":"article","og_title":"NordLayer features in review: Cloud Firewall - Version 2","og_description":"There was a time when on-premises hardware took care of [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/","og_site_name":"Version 2","article_published_time":"2023-10-27T12:45:25+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/10\/nordlayer-features-in-review-cloud-firewall\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"NordLayer features in review: Cloud Firewall","datePublished":"2023-10-27T12:45:25+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/10\/nordlayer-features-in-review-cloud-firewall\/"},"wordCount":1972,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/10\/nordlayer-features-in-review-cloud-firewall\/","url":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/","name":"NordLayer features in review: Cloud Firewall - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2023-10-27T12:45:25+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/13yxDCxCBkvdlQ3iSptfiY\/4e95ca2bd95dd77b9d46d77cef246994\/NordLayer_features_in_review__Cloud_Firewall_cover_web_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/features-in-review-cloud-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"NordLayer features in review: Cloud Firewall"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-j0g","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=73052"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73052\/revisions"}],"predecessor-version":[{"id":73056,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73052\/revisions\/73056"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=73052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=73052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=73052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}