UNDERSTANDING AND DEPLOYING HOST-BASED INTRUSION PREVENTION TECHNOLOGY

Size: px
Start display at page:

Download "UNDERSTANDING AND DEPLOYING HOST-BASED INTRUSION PREVENTION TECHNOLOGY"

Transcription

1 UNDERSTANDING AND DEPLOYING HOST-BASED INTRUSION PREVENTION TECHNOLOGY SESSION 1 Agenda Defining Host-Based Intrusion Prevention Host-Based Intrusion Prevention Components and Capabilities Cisco Security Agent Components and Capabilities Case Studies Deployment Process Integration with Network-Based Security Technologies 2 Printed in USA.

2 Associated Sessions SEC-2006 Managing Security Technologies SEC-2030 Deploying Network-Based Intrusion Detection and Prevention Systems SEC-2040 Understanding and Deploying Network Admission Control SEC-3030 Troubleshooting Intrusion Detection Systems 3 DEFINING HOST-BASED INTRUSION PREVENTION 4 Printed in USA.

3 Defining Host-Based Intrusion Prevention (HIPS) Software installed on endpoints desktops and servers as opposed to network appliances Successor to host-based intrusion detection and an attempt to make up for its deficiencies: Information overload Reactive with little in the way of remediation capabilities Difficult to manage and keep up-to-date in dynamic environments Can require expert log analysis 5 Defining Host-Based Intrusion Prevention (HIPS) Developed in Response to the Following Challenges: The network perimeter is no longer static 2500 Proliferation of encrypted network traffic Safeguards that rely only on attack signatures are under stress Application-layer attacks are more prevalent, fast-moving, sophisticated, target common applications, and target required services Vulnerability to exploit window is shrinking Number of reported Vulnerabilities Source: CERT 6 Printed in USA.

4 HIPS Capabilities Increase system availability Provide data integrity Act as enforcement tool for corporate computer security policy Corporate Security Policy 7 Host-Based Intrusion Prevention Capabilities This technology can apply policies based on predefined rules or learned behavior analysis to block malicious server or PC actions. Host-based intrusion prevention can stop attackers from implementing buffer overflow strikes, changing registry keys, overwriting Dynamic Link Libraries or engaging in other approaches to obtain control of the operating system. J. Pescatore, R. Stiennon Gartner Group Research Note 29 May Printed in USA.

5 Host Intrusion Prevention Requirements 1. Must be able to block malicious code actions 2. Must not disrupt normal operations 3. Must be able to know the difference between attack events and normal events 4. Must be able to stop previously unknown attacks 5. Must protect flaws in permitted applications 6. Should be centrally managed 9 HOST-BASED INTRUSION PREVENTION COMPONENTS AND CAPABILITIES 10 Printed in USA.

6 Typical HIPS Components Management Server Deploys Security Policies to Endpoints, Receives and Stores Events, Sends Alerts to Administrators, May Deploy Software Endpoint Agents Enforces Security Policy Received from Management Server, Sends Events, Interacts with User (If Necessary), Protects Itself Management Console Administrative Interface, Policy Configuration Tool, Provides Event Views 11 HIPS Implementation Approaches Endpoint software implementation approaches: Intercept system calls between applications and the operating system Apply kernel modifications that apply stringent security controls Security policy approaches: Pre-defined rules Learned behavior Signatures Heuristics Combination of methods 12 Printed in USA.

7 HIPS State Approaches System State Approaches: Location Where is the system within the network? Examples: Remote office, VPN, corporate network User context Who is using the system? Examples: Power user, call center agent, administrator, helpdesk Application behavior What are the running applications doing? Examples: network applications, server applications Compliance query Does this system have an approved security posture? Examples: Operating system version, patch levels, anti-virus signatures 13 HIPS Functional Aggregation Security Application Network Interceptor File System Interceptor Configuration Interceptor Execution Space Interceptor Distributed Firewall Host Intrusion Detection Application Sandbox Network Worm Prevention File Integrity Monitor 14 Printed in USA.

8 Common Security Functions System hardening Syn-flood protection Malformed packet protection Restart of failed services Resource protection File access control Network access control Registry access control COM component access control Control of executable content Protection against worms Protection against automatic execution of downloaded files or ActiveX controls Application-related Application run control Executable file version control Protection against code injection Protection of process memory Protection against buffer overflows Protection against keystroke logging Detection Packet sniffers and unauthorized protocols Network scans Monitoring of OS event logs Network firewalling 15 Security Architecture Security Management: Event Reporting and Correlation Intelligent Investigation, Validation, and False Alarm Reduction Endpoint Protection (Anti-Virus, HIPS, Host Firewalls) Server Protection Network Protection Firewall Appliance Desktop Protection Firewall Switch Blades Network IDS Switch Blades Network IDS Appliances 16 Printed in USA.

9 CISCO SECURITY AGENT COMPONENTS AND CAPABILITIES 17 Cisco Security Agent (CSA) Components Management Server deploys Security Policies, Receives and Stores Events in SQL Database, Alerts Administrators, Deploys Software, Part of Cisco VPN and Security Management System Cisco Security Agents Enforce Security Policy Received from Management Server, Sends Events Immediately, Interacts with User (If Necessary), Protects Itself, Poll for Policy Updates, Run on Windows and Solaris CSA Management Console Web Browser Interface, Policy Configuration Tool, Provides Event Views and All Access to 18 Printed in USA.

10 Management Architecture Remote Users or Branch Offices Management Server Events are pushed to it Configuration is pulled from it DMZ Campus 19 CSA Communications Requirements Agent to MC TCP/5401, TCP/5402 CSA profiler to MC TCP/5402 Administrator to MC TCP/1741 and TCP/1742 (SSL) Agents MUST be able to resolve fully qualified domain name of MC Depending on deployment, firewall rules or ACLs may have to be modified 20 Printed in USA.

11 Cisco SA Management Model: Groups Used to Organize Logical Collections of Hosts e.g. IIS Servers, Executive Desktops, or SQL Servers 21 Cisco SA Management Model: Policies Are attached to zero or more groups Are composed of logical collections of rules 22 Printed in USA.

12 Cisco SA Management Model: Rules Are attached to policies Are where security functions are specified May enable specific heuristics 23 Agent Management Model Diagram GROUP Web Servers HOSTS Web1.cisco.com Web2.cisco.com POLICIES IIS Module Windows Module 24 Printed in USA.

13 CSA Implementation Approach Endpoint software implementation approaches: Intercept system calls between applications and the operating system Security policy approaches: Pre-defined rules Heuristics Combination of methods System state approaches: Application behavior What are the running applications doing? 25 System Call Interceptors System Call Interceptor Web Server Client Web Browser Host Operating System File System Access Registry Access COM Object Access HTTP Access Memory Access Code Execution Network Protocol Stack Network Interceptor Inbound Packets Outbound Packets 26 Printed in USA.

14 CSA Functionality Intercept requests to access key resources File system, network, packet, COM, registry, key system functions and interprocess communication calls Keystroke logging, code injection, buffer overflow detection, memory modification, detection on network scans, OS and AV event log monitoring Real-time decision to: Allow, deny, query, change internal state Done efficiently with little performance impact Not just traditional static ACLs due to state change 27 Performance Impact Windows CPU usage: 1-5% Solaris CPU usage: 3-10% Memory usage: 7 10MB, up to 20 Network impact: Policy download: 35-70k Event: ~3k Poll: ~2.5k Polling interval change: ~3k Software update: Varies Transactions per second is a very good way to measure latency 28 Printed in USA.

15 Performance: Transactions per Second Note: Performed on W2K SP3 Running IIS 5.0; Single 2Ghz P4 CPU, 1Gbps NIC, Non-hyperthreaded, 533Mhz System Bus 29 CSA Policy Approach Endpoint software implementation approaches: Intercept system calls between applications and the operating system Security policy approaches: Pre-defined rules Heuristics Combination of methods System state approaches: Application behavior What are the running applications doing? 30 Printed in USA.

16 Example Pre-Defined Rules Web servers can only write log and temp files Office applications cannot read or write executables clients or their descendents should not be able to invoke installer applications SendMail application can only receive protocol connections Only system applications may make changes to windows registry run keys 31 Example: Worm Heuristic Files written by network applications are considered downloaded content Files written by applications which read downloaded content are also tagged Applications which access downloaded content are placed in a less trusted class When an application in this class tries to: Access mail COM objects, mail dlls, files used by mailers, an IRC client, or the TCP SMTP port The user is queried An event is sent to management console 32 Printed in USA.

17 CSA System State Approach Endpoint software implementation approaches: Intercept system calls between applications and the operating system Security policy approaches: Pre-defined rules Heuristics Combination of methods System state approaches: Application behavior What are the running applications doing? 33 State Change Examples An application that has accessed a restricted document should not be able to connect to the network Applications that have received a network connection cannot create command shells Network servers are not allowed to invoke applications Processes executing downloaded content should not access outlook using COM 34 Printed in USA.

18 CASE STUDIES: HIPS IN ACTION 35 CSA in Action: Protection Against MYdoom Persist Phase N/A Arrived as Attachment Edit shimgapi.dll Modify Taskmon.exe System Is Compromised, Worm Spreads Access.wab Address Book File Attempts to Open TCP Port Printed in USA.

19 CSA in Action: Protection Against MYdoom Persist Phase: Part 1 N/A arrived as attachment Edit shimgapi.dll Modify Taskmon.exe Access.wab address book file. attempts to open TCP port Any3127 Time an RULE: Ask the User System is Applicationcompromised, AttemptsWorm to Modify a System spreadsor Executable Library, Driver, 37 CSA in Action: Protection Against MYdoom Persist Phase: Part 2 N/A arrived as attachment Edit shimgapi.dll Modify Taskmon.exe Access.wab address book file. attempts to open TCP port Any3127 Time an RULE: Ask the User System is Applicationcompromised, AttemptsWorm to Modify a System spreads Library, Driver, or Executable Printed in USA. 38

20 CSA in Action: Protection Against MYdoom Propagate Phase N/A Arrived as Attachment Edit shimgapi.dll Modify Taskmon.exe Access.wab Address Book File Attempts to Open TCP Port 3127 System Is Compromised, Worm Spreads 39 CSA in Action: Protection Against MYdoom Propagate: Phase Part 1 N/A arrived as attachment Edit shimgapi.dll Modify Taskmon.exe Access.wab address book file. attempts to open TCP port 3127 System is compromised, Worm HEURISTIC: Network Worm spreads Printed in USA. Propagation 40

21 CSA in Action: Protection Against MYdoom Propagate: Phase Part 2 N/A arrived as attachment Edit shimgapi.dll Modify Taskmon.exe Access.wab address book file. attempts to open TCP port 3127 System is compromised, Worm spreads STATE CHANGE: Recently Downloaded Content Should Not Modify the Registry 41 DEPLOYMENT PROCESS 42 Printed in USA.

22 Step 1: Install Management Console CSA MC Is Part of VMS 2.2 Prepare target system Install CiscoWorks common services reboot Install Microsoft SQL server reboot BEST PRACTICE: Install MSDE if under 500 agents, SQL server standard if over 500 Install management center for Cisco security agents reboot Installation should take minutes in total 43 Step 2: Configure Groups Use default server and desktop groups These groups offer most bang for buck Default groups should be left intact BEST PRACTICE: Make copies of default desktop and server groups (e.g. CSCO default desktops ) BEST PRACTICE: Put groups in TESTMODE so that invalid policy assumptions do not prevent applications from operating normally 44 Printed in USA.

23 Step 3: Configure Policies Default policies should be left intact if possible Make copies of default policies and attach to new groups (e.g. CSCO common security module ) 45 Step 4: Build and Deploy Agent Kits Create agent kits associated with copied groups (e.g. CSCO default desktops kit ) Deploy agent kits to pilot group 1 10% of your ultimate agent population Representative of the whole based on application package Agents can be deployed using almost any method link to installation package, login scripts, SMS, Radia, Altiris, ZenWorks, etc. 46 Printed in USA.

24 Step 5: Collect Data in Pilot At least 2 weeks of TESTMODE operation is recommended Good time to begin operational discussions and involve desktop/server teams How will backups be handled? Log archive procedure? Event handling? Change management? 47 Step 6: Tune Policies Assuming pilot systems are not compromised, almost all events will be normal activity Some events will require corporate policy decisions Are users allowed to install software? Are instant messengers prohibited? Use Event management wizard to make exceptions BEST PRACTICE: Put exception rules in exception policies Goal: Tune 95% of legitimate events, many will be repetitive 48 Printed in USA.

25 Step 7: Collect More Data Another 2 weeks of TESTMODE operation is recommended Questionable events should be discussed with desktop/server teams This step is to be sure that nothing was missed during the first tuning phase 49 Step 8: Tune Policies Goal: 1 2 events per host per day on average Good time to determine pilot user perception Are there too many queries? What has been your experience with the product? 50 Printed in USA.

26 Step 9: Move Out of Pilot Move pilot users out of TESTMODE Deploy agents on all remaining hosts in TESTMODE Implement all operational steady state procedures 51 Step 10: Finalize Deployment Perform any final rule tuning as a result of new users in TESTMODE This phase lasts as long as necessary to feel comfortable with tuning effort Move all remaining users out of TESTMODE 52 Printed in USA.

27 INTEGRATION WITH NETWORK-BASED SECURITY TECHNOLOGIES 53 VPN Are You There Validates that CSA is running before tunnel is established Available now Refer to chapter 1 of VPN Client Administrator Guide Requires version 4.0 of Cisco VPN client and concentrator Also supported in Checkpoint VPN-1 54 Printed in USA.

28 Network Access Control Functionality Part of the self-defending network initiative Will be available in NAC phase 1 1HCY 04 CSA posture credentials Installed service packs Installed hotfixes CSA version CSA operational state (enabled or disabled) FQDN of MC this agent is assigned CSA status Time since agent last polled into the CSA-MC Supported in CSA version Network Intrusion Detection Complementary technology Naming the attack Combining signature detection at the network and behavioral protection on the endpoint provides best of breed identification, protection and analysis Layered defense requires different technologies at different layers in order to achieve optimum security If signatures fail at the network, alternative protection is required on the endpoint Behavioral protection on the endpoint will speed the development and deployment of new network signatures 56 Printed in USA.

29 Anti-Virus Also complementary technology Most HIPS products do not have the ability to eradicate a virus, worm, or trojan Excellent first line of defense, especially at the network gateways Again, layered defense with multiple technologies and vendors Multiple safeguards means better chance of success 57 Log Collectors and Correlators Integrates directly with CiscoWorks SIMS (NetForensics OEM) using agent on the CSA management console to forward events to collectors Can integrate with most other collectors using flat log file, , or SNMP Events can be forwarded to SecMon along with all other Cisco security events 58 Printed in USA.

30 Summary How does HIPS fit into the big picture? Last line of defense against first strike malicious code Enforcement of corporate security policy Potential reduction in patch management costs Where should I put it first? Remote desktops and laptops Critical DMZ servers Operational systems like kiosks, call center desktops 59 Q AND A 60 Printed in USA.

31 Reference Materials Training course Securing Hosts Using Cisco Security Agent (HIPS) 1.0 Whitepaper Cisco Security Agent with Intrusion Protection for Remote Corporate Users Download CSA software 61 Recommended Reading Host Intrusion Prevention Software Server Shields, by Mike Demaria Network Computing Magazine showitem.jhtml?docid=1508f2 Defining Intrusion Prevention, by J. Pescatore and R. Stiennon Gartner Research Note 29 May 2003 Host Intrusion Prevention is the Last Line of Defense for Networks, by Eric Ogren CSO Magazine Available on-site at the Cisco Company Store 62 Printed in USA.

32 Deployment Best Practices Install MSDE if under 500 agents, SQL server standard if over 500 Make copies of groups and policies before using them so that defaults are left intact Put groups in TESTMODE so that invalid policy assumptions do not prevent applications from operating normally Put exception rules in exception policies 63 Complete Your Online Session Evaluation! WHAT: WHY: Complete an online session evaluation and your name will be entered into a daily drawing Win fabulous prizes! Give us your feedback! WHERE: Go to the Internet stations located throughout the Convention Center HOW: Winners will be posted on the onsite Networkers Website; four winners per day 64 Printed in USA.

33 65 Printed in USA.

Cisco Security Agent (CSA) Network Admission Control (NAC)

Cisco Security Agent (CSA) Network Admission Control (NAC) Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1 Agenda CSA

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Integrated Protection for Systems. João Batista Joao_batista@mcafee.com Territory Manager

Integrated Protection for Systems. João Batista Joao_batista@mcafee.com Territory Manager Integrated Protection for Systems João Batista Joao_batista@mcafee.com Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

6WRUP:DWFK. Policies for Dedicated SQL Servers Group OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific

More information

Securing the University Network

Securing the University Network Securing the University Network Abstract Endpoint policy compliance solutions take either a network-centric or device-centric approach to solving the problem. The body of this paper addresses these two

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

The Challenge of a Comprehensive Network Protection. Introduction

The Challenge of a Comprehensive Network Protection. Introduction Index Introduction...3 Corporate Network Security Management Challenge...5 Multi-layers and heterogeneous network...5 Roaming Clients...5 Control of unproductive and restricted applications...5 Securing

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Towards End-to-End Security

Towards End-to-End Security Towards End-to-End Security Thomas M. Chen Dept. of Electrical Engineering Southern Methodist University PO Box 750338 Dallas, TX 75275-0338 USA Tel: 214-768-8541 Fax: 214-768-3573 Email: tchen@engr.smu.edu

More information

SELF-DEFENDING NETWORKS

SELF-DEFENDING NETWORKS CISCO SYSTEMS USERS MAGAZINE SECOND QUARTER 2005 SELF-DEFENDING NETWORKS Network Security Evolves to Eradicate Attacks at Their Source 26 Designing the Data Center Access Layer 57 Wideband Protocol for

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Intelligent. Data Sheet

Intelligent. Data Sheet Cisco IPS Software Product Overview Cisco IPS Software is the industry s leading network-based intrusion prevention software. It provides intelligent, precise, and flexible protection for your business

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Training Course on Network Administration

Training Course on Network Administration Training Course on Network Administration 03-07, March 2014 National Centre for Physics 1 Network Security and Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Crafting a Secure

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information

Host-based Intrusion Prevention System (HIPS)

Host-based Intrusion Prevention System (HIPS) Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively

More information

OLD DOMINION UNIVERSITY 4.3.4.1 - Firewall Best Practices (last updated: 20080303)

OLD DOMINION UNIVERSITY 4.3.4.1 - Firewall Best Practices (last updated: 20080303) OLD DOMINION UNIVERSITY 4.3.4.1 - Firewall Best Practices (last updated: 20080303) Introduction One of the information technology priorities for Old Dominion University (ODU) is to provide and maintain

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

CIO Update: Enterprise Security Moves Toward Intrusion Prevention

CIO Update: Enterprise Security Moves Toward Intrusion Prevention IGG-06042003-03 J. Pescatore, R. Stiennon Article 4 June 2003 CIO Update: Enterprise Security Moves Toward Intrusion Prevention As targeted hacker attacks increase, intrusion prevention is gaining importance

More information

Gateway Security at Stateful Inspection/Application Proxy

Gateway Security at Stateful Inspection/Application Proxy Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing

More information

An Analysis of the Capabilities Of Cybersecurity Defense

An Analysis of the Capabilities Of Cybersecurity Defense UNIDIRECTIONAL SECURITY GATEWAYS An Analysis of the Capabilities Of Cybersecurity Defense Michael Firstenberg, Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices WHITE PAPER Best Practices for Securing Remote and Mobile Devices Table of Contents Executive Summary 3 The Rise of Mobile and Remote Computing 3 Risks from Remote Computing 3 Risks for Mobile Workers

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2

More information

Nessus and Antivirus. January 31, 2014 (Revision 4)

Nessus and Antivirus. January 31, 2014 (Revision 4) Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014 Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2 Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's

More information

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

Simple Steps to Securing Your SSL VPN

Simple Steps to Securing Your SSL VPN Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than

More information

Virus Protection Across The Enterprise

Virus Protection Across The Enterprise White Paper Virus Protection Across The Enterprise How Firewall, VPN and /Content Security Work Together Juan Pablo Pereira Sr. Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

ATM END-POINT PROTECTION MONITORING

ATM END-POINT PROTECTION MONITORING ATM END-POINT PROTECTION MONITORING GENERAL PROVISION Service Activation. To activate the ATM End-Point Protection Monitoring Service it may be necessary to install hardware and/or software components.

More information

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

Firewalls and Network Defence

Firewalls and Network Defence Firewalls and Network Defence Harjinder Singh Lallie (September 12) 1 Lecture Goals Learn about traditional perimeter protection Understand the way in which firewalls are used to protect networks Understand

More information

Mobile Network Access Control

Mobile Network Access Control Mobile Network Access Control Extending Corporate Security Policies to Mobile Devices WHITE PAPER Executive Summary Network Access Control (NAC) systems protect corporate assets from threats posed by devices

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Next Generation Firewalls and Sandboxing

Next Generation Firewalls and Sandboxing Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing?

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Importance of Web Application Firewall Technology for Protecting Web-based Resources Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information