This whitepaper describes 10 Things mentioned in the paper your Next Firewall Must Do validates the fact that the best location to execute secure application enablement is at the firewall by using the application identity and traditional positive control model (firewall) policies that allow administrators to define, based on the business, which applications are enabled and which are denied.