ZSCALER CLOUD SERVICES AND INFRASTRUCTURE: A TECHNICAL OVERVIEW
|
|
|
- Lorena Stevens
- 10 years ago
- Views:
Transcription
1 DATA SHEET ZSCALER CLOUD SERVICES AND INFRASTRUCTURE: A TECHNICAL OVERVIEW Introduction As the leader in SaaS web security, Zscaler s focus is to provide policy-based secure web access for any device, anywhere. Through ground-breaking innovations in its massively scalable cloud architecture, Zscaler Web Security Cloud provides an ultra-low latency SaaS security solution that needs no hardware and no software. Three major factors are driving organizations around the world to adopt Zscaler: Mobility: Laptops, road warriors and home offices are impossible to protect with appliances in the enterprise DMZ. Rather than having a perimeter around the office, Zscaler creates a global perimeter around the Internet. Employees must be able to be online risk-free anywhere and on any device. Complex Threat Environment: Employees cannot be protected from Web threats with just a URL filter. Active content, Social Networks, and Ad Networks have resulted in every major site hosting malware at some point in time. Web 2.0 risk mitigation requires a technology that can do inline scanning of every page for complex threats, and blocks sensitive content from leaving the organization. It is impossible for IT to keep up with constantly evolving threats. A managed security service that can shield vulnerabilities and block zero day exploits is essential. Consolidation, Simplification, and Reduced Cost: Powered by unique technologies like NanoLog, PageRisk, ByteScan and a true multi-tenant architecture, Zscaler s comprehensive cloud service offers advanced security, Web 2.0 controls and data leakage prevention (DLP). Enterprises can simply point their traffic to any of Zscaler s 40+ data centers and be risk free. Administrators have a single console to mange policy and analyze any transactions in real-time for all offices as well as the mobile work force. There is no hardware or software to deploy, and no agents to install. Simplification and economies of scale enable IT to mitigate risk at half the price. Figure 1: Zscaler Architecture for Comprehensive Web Security and Management This document provides a technical overview of the Zscaler infrastructure, enabling technologies, services, unified policy and reporting capabilities, as well as traffic forwarding and authentication methods. Copyright Zscaler 1
2 Zscaler Infrastructure Legacy vendors offer security as a cloud service by creating data centers that host racks of appliances traditionally used within enterprise perimeters. This is not only costly, but the enterprise is bound to only a few data centers of the provider where their policy is hosted. With each appliance capable of handling only one enterprise, latency and performance in a multi-tenanted environment depend on how many organizations share the appliance. In addition, transaction logs are spread across many data centers making it difficult to see details in real-time. Zscaler s greatest achievement is the architecture that was created from scratch to take advantage of being a pure cloud provider, while delivering a truly multi-tenant and highly scalable platform for deep security. The fundamental innovation is in functionally distributing components of a standard proxy to create a giant global network that acts as a single virtual proxy so that any user can go to any gateway at any time for policy-based secure internet access. Zscaler infrastructure comprises three key components; Zscaler Enforcement Node (ZEN), Central Authority (CA) and Nanolog (Transaction Log) Servers as shown below. Figure 2: User-policies stored in the CA are enforced on ZEN with logs stored on Nanolog An enterprise forwards all web traffic to the nearest enforcement node. Policies governing the user s access to any website are served by the CA, and enforced on the ZEN. All transaction logs are stored in a centralized Nanolog server for real-time retrieval. Any user can access any ZEN, and all components have multiple levels of redundancy to ensure high availability. Zscaler Enforcement Node (ZEN) Powered by over thirty patents, each ZEN is a fully featured inline proxy that enforces corporate Secure, Manage and Comply policies at user-level granularity. The ZEN incorporates a hardened custom-built OS and a custom TCP/IP stack to deliver 90% of transactions in less than 90 microseconds. Zscaler s ByteScan technology enables each ZEN to scan every byte of the web-request, content, responses and all related data for inline blocking of threats like viruses, cross site scripting (XSS), and botnets. This capability also enables Dynamic Content Classification (DCC) of unknown sites. By scanning each page the ZEN computes a PageRisk index for every page loaded and enables administrators to control content served to their users based on acceptable risk. Copyright Zscaler 2
3 The ZEN also incorporates Zscaler s unique authentication and policy distribution mechanism that enables any user to connect to any ZEN at any time. This enables enterprises to simply point traffic to any ZEN and ensure full policy enforcement while getting all reports back in real-time. Central Authority (CA) The Central Authority complex is the brain of the Zscaler cloud. The CA manages and monitors all nodes and ensures that they are always up-to-date with the latest real-time feeds, software and synchronized for cloud- wide intelligence of threats. The CA directs users to the closest ZEN through DNS and PAC file resolution to ensure minimum latency when users are on the road. Through its multitenant architecture, the CA provides each organization with its own portal to self manage their policy. Any change to the policy is communicated to the ZENs within seconds. The CA provides an end user authentication framework through integration with Secure LDAP or ID Federation systems. The Central Authorities are a globally distributed peer-to-peer cluster with an automatically elected master. This ensures all cloud components can always talk to a Central Authority even if there are major internet outages that isolate an entire region. Nanolog Severs Backed with multiple patents, Zscaler s Nanolog technology enables administrators to access any transaction log almost instantly. Each ZEN uses the Nanolog technology to perform lossless compression of logs by a factor of 50:1. These logs are transmitted every second to the Nanolog servers over secure connections. Logs are multicast to multiple Nanolog servers for redundancy. Through an innovative reporting and database framework created specifically for web logs, the Nanolog server can support 15 million logs per second. This technology provides an administrator with real-time reports and the capability to query (within seconds) complete transaction level details for any user, department or location at any time. Each server has over 16 Terabytes of capacity enabling Zscaler to provide multi-year data retention. Zscaler Cloud Services Zscaler offers four cloud-based subscription services that help customers secure and manage every aspect of their employees web usage. Zscaler Secure, Manage, Comply and Analyze are offered in Basic, Advanced and Premium price-bundles, and can be deployed without any new hardware or software. Zscaler delivers wire-rate performance with microsecond latencies with all four services enabled concurrently. Zscaler customers can focus on creating their security and web usage policies, while Zscaler executes their policies at the finest level of granularity across the enterprise. HQ Users Caching + URL 1 AV Appliances have limited functionality Botnets + Malware Defines company policy Forward traffic to cloud 4 CLEAN traffic to user Data Leakage Secure Directory Web 2.0 Webmail, Control IM Web Logs Bandwidth Control Zscaler Utility Manage Comply Analyze 2 Inspect & enforce policy Consolidated Reporting?? 3 Inspect pages being returned Remote Office(s) Road Warrior Mobile User Bypass appliances & policy (VPN???) Copyright Zscaler 3
4 Secure Zscaler Secure services consist of Zscaler Anti-virus and Anti-spyware, File Type Blocking, Advanced Security, and Web Access Control. Zscaler Anti-virus and Anti-spyware (AV/AS) Zscaler provides an inline, ultralow latency AV/AS solution that protects users from file based attacks. Files of any size including multi-level archives are scanned in real-time. Blocking malware in the cloud is instantaneous and universal, saves bandwidth costs, and obviates the need to patch endpoints or multiple appliances to effectively protect users. Zscaler s enforcement nodes also scan every web page for embedded viruses, malicious javascript or advertisements that may lure users to download fake AV software. Compared to an inline UTM, IPS or firewall, Zscaler being a true proxy provides superior protection because the entire file is downloaded, assembled, uncompressed and scanned for millions of viruses before it is delivered to the end user. By sharing intelligence of infected as well as clean content across the entire cloud, the ZENs are able to deliver fully scanned files without the user noticing any latency. In addition to its inline AV/AS, Zscaler also uses multiple commercial AV/AS engines concurrently in an offline mode, to uncover any additional threats. Zscaler also offers granular file-type control that is based on true file type detection for over 300 file-types rolled up into classes and sub-classes. Web Access Control Old browsers and plug-ins with known vulnerabilities are the easiest attack vector. Zscaler allows administrators to be proactive with security by enforcing users to use only acceptable browser types and versions. Zscaler also warns users when they are using browsers or plug-ins with older patch levels if the versions they are using have known exploits in the wild. Advanced Security (Zero-Day, Botnets, Phishing, P2P, Browser Vulnerabilities) Web has become dynamic with active content on every site, and well reputed sites sourcing content from various sites including numerous advertisement networks. Hackers now use SQL injection attacks not to deface websites, but to surreptitiously insert hidden iframes that infect unsuspecting users through drive by downloads. It is impossible for administrators to block bad sites, because most of the reputed sites have served malware at some point in the recent past either by getting compromised or using an infected advertisement network. Most websites serve dynamic content that changes based on the user s login or surfing history. The only way to protect the user is to really inspect exactly the content they are being served EVERY TIME, and not rely on content scanned by a crawler in the cloud. Asking another appliance to scan content doesn t work because the appliance does not have the user s password. Zscaler s advanced security uses the ByteScan technology to scan every byte of all requests and responses. This enables Zscaler to detect hidden iframes, cross site scripts, signs of phishing attempts, cookie stealing, and botnet command and control traffic. This unique capability also enables Zscaler to block anonymizers hosted in Facebook even if Facebook itself is allowed. For each page served, Zscaler computes a PageRisk Index that takes into account use of suspicious techniques like javascript obfuscation and zero pixel images. This information is correlated with other factors such as GeoIP-based location of the website and its reputation to compute a dynamic risk index. Administrators can then define a policy to block content beyond their acceptable risk level. Manage Zscaler s Manage services consist of URL Filtering, Web 2.0 Application Control and Bandwidth Control. URL Filtering Zscaler s URL filtering leverages multiple databases to ensure global coverage. Organizations have complete flexibility to override any classification done by Zscaler. You can add/remove URLs from Zscaler s predefined 90 categories, 30 super categories and 6 classes to keep reporting and rules consistent. The three level hierarchy makes it easy to create rules and look at reports at the appropriate granularity. Web access policy Copyright Zscaler 4
5 can be set for specific users, groups, and locations or any combination. Actions include the ability to block, caution, allow, or provide time-based access and quotas in terms of time or volume. Zscaler s inline Dynamic Content Classification (DCC) engine ensures pages are classified by their content if the URL is not sufficient. Web 2.0 Application Control Web 2.0 is changing how enterprises do business. The challenge with Web 2.0 is to ensure it helps business, but does not hinder productivity. For example, it is desirable that marketing can post a video on YouTube, while others can only view the posts. Zscaler provides granular control over Web 2.0 applications like webmail, streaming media, social networking and instant messaging. Zscaler understands the protocols used by individual Web 2.0 applications to provide granular control over actions such as posting an update to LinkedIn. The administrators can configure policies by users or groups to enable organizations to take advantage of the latest Web 2.0 platforms without compromising productivity or security of critical data. Bandwidth Control 90% of enterprise traffic is on HTTP/HTTPS. The web is used for business as well as recreation. A few users watching a movie excerpt on Hulu can completely disrupt a customer presentation on Webex. IT administrators need the ability to control bandwidth by specific web applications rather than ports and protocols. Zscaler supports bandwidth control by application class. Administrators can define a transaction to fall in a bandwidth class based on a diverse set of criteria. Large file transfers from any fast website can clog bandwidth. Depending on the size of file being transferred, the transaction can be put in a bandwidth constrained bucket. The same policy can be applied to streaming media sites. On the other hand, transactions to business applications such as Webex, LiveMeeting, SalesForce or Netsuite can have a minimum reserved bandwidth regardless of other web traffic. Bandwidth control policies can be set per application class, in terms of the maximum sessions as well as maximum and minimum bandwidth per class, location, and time of day. Bandwidth policy is enforced without dropping any packets, by leveraging Zscaler s custom TCP/IP stack that enables modulating the throughput on each side of the ZEN proxy. Comply Zscaler is the industry s first fully integrated cloud based web DLP solution. Employees can now send out data over webmail, social networks, blogs, or instant messaging. Zscaler s enforcement nodes scan every byte leaving an organization to look for sensitive data. It provides a variety of dictionaries and engines so that enterprises can enforce compliance policies and protect its Intellectual Property (IP). DLP Dictionaries Zscaler provides three forms of dictionaries; special dictionaries that identify a specific type of number or content type, Artificial Intelligence (AI) engine based dictionaries that identify types of documents, and phrase based dictionaries. Special Dictionaries: Special numbers such as credit cards (with full checksum validation), social security numbers (SSN), Singapore NRIC, Canadian Social Insurance Numbers, etc. AI Dictionaries: Types of documents such as financial statements (balance sheets, cash flow statements, income statements, etc.), medical statement, source code (C, Java, etc), documents saved from SalesForce. Phrase Based Dictionaries: Custom dictionaries created by administrators containing company specific keywords (e.g., Zscaler Confidential ). Zscaler s dictionaries use fuzzy matching techniques to ensure phrases match regardless of capitalization, spacing and noise words. DLP Engines and Rules A DLP engine combines one or more dictionaries to match specific compliance requirements. Zscaler provides sample templates for HIPPA, GLBA and PCI. Administrators can create their own engines by combining dictionaries. For example, a DLP Engine containing dictionary for Source Code with custom phrases for copyright notices can prevent Intellectual Property leakage. Copyright Zscaler 5
6 All content leaving the organization is scanned. In addition to HTTP postings, Zscaler can decode all Microsoft documents, PDFs and content inside a zipped file. Granular rules can be specified for applying specific DLP Engines to a group of users, web application types or locations. Analyze Nanolog technology enables administrators to get complete transaction level detail in real-time for any user located anywhere and on any device. Zscaler s unique real-time reporting capability enables administrators to instantly drill into any sequence of events as they unfold. For forensic investigations, administrators can instantly access specific transactions that occurred at any time in the past, filtering by user, time, location, url categories, malware types, transaction size, and a number of other parameters. Zscaler s base package provides six months of detailed log storage and two years of summary data at individual user granularity, and over 1500 different views. Traditional web filtering solutions require administrators to install databases or third party correlation tools to manage their web logs. Zscaler s cloud service takes away the burden of log management by providing detailed log archiving capability that can be expanded to as long as 10 years. Unified Policy and Reporting Zscaler s policy and reporting does not require training. Zscaler offers diverse functionality and granular policy control with a web-based self managed interface that is designed to be intuitive for administrators and easy to read for auditors. Changes to policy can be tracked at the individual rule level. Administrators can create checkpoints to be able to roll back to an earlier state of the policy with a click of a button. As a cloud service, the administrator simply defines a policy for the entire organization in one place and it is applied to all users regardless of whether they are in the office or on the road. This policy can encompass all aspects of web access: Security, Access Management, and Data Leakage. The policy can be applied at the granularity of groups, users, locations, time of day, and daily bandwidth or usage quotas. Leveraging the Nanolog technology, Zscaler offers administrators a real-time view into every transaction done by enterprise users regardless of where they are in the world. Logs are available a few seconds after the actual transaction takes place. This enables administrators to resolve in real-time any Internet surfing concerns a user may have even if the administrator is in a coffee shop in Singapore and the user is in a flight over the Atlantic. Zscaler s reporting is organized to help administrators easily navigate and locate interesting patterns or behaviors to help in policy formulation. Through over 1500 unique views into the data, administrators can also quickly perform forensic investigations to find offending transactions. Deploying Zscaler Zscaler s solution is a true SaaS offering making deployment easy: No Hardware, No Software, No Agents. The administrator uses existing network equipment to forward traffic and secure the enterprise. It is literally that simple. Zscaler supports diverse set of traffic forwarding mechanisms that include GRE tunnels, firewall port forwarding, proxy chaining, or PAC Files. Zscaler is unique in the Security as a Service space by allowing administrators to enforce user-level policies without requiring any software or hardware deployment. Zscaler s patent-pending authentication mechanism identifies users through browser tokens and enables enforcement of a consistent policy regardless of whether the user is at office or on the road, and what type of device they are using. Copyright Zscaler 6
7 Administrators can synchronize users, groups and departments from Microsoft Active Directory, OpenLDAP, iplanet, Novell edirectory or any other directory that supports secure LDAP. Zscaler also offers a full featured hosted-directory option. For enterprises that have deployed ID Federation, users do not need to authenticate to the service as Zscaler supports SAML version 2.0 based authentication and authorization. Mitigate Risk for Web with Zscaler Web Security Cloud Consolidate and simplify enterprise Web security Advanced Security for Web 2.0 automatically mitigates latest threats with no IT overhead Eight fully integrated modules to cover security, liability and data leakage risks Real-time reporting and instant access to any log, freeing IT from mundane chores Ultra-low latency security for any employee, any device, anywhere in the world Largest web security cloud in the world -- customers in 140 countries High availability and failover local, regional and inter-continental redundancy Multitenancy at the user level. Any user can go to any data-center and stay secure on the Internet. Cost Savings No appliances, no software, no desktop clients No upfront capital expenditure No buying excess capacity cloud scales as you need capacity One subscription covers all offices as well as employees on the road Stay Ahead Securing mobile workforce is not an option anymore. Zscaler can cover employees anywhere in the world. Cloud does not mean latency. Zscaler s purpose built architecture provides seamless experience to users. Don t lose control of your logs. Nanolog gives you instant access to any transaction across the world. Only From Zscaler Traditional security vendors will tell you they ve embraced the cloud, but look deeper. Building and running a cloud is complicated. Zscaler is the largest company in the world focused solely on cloud security. Our R&D centers span three continents, our cloud operates at four 9s availability and our cloud specific patents stand at 30 and growing. Join the companies from 140 countries, who have thrown away their hardware and software, and moved to the Zscaler Web Security Cloud. Security made simple! Zscaler, Inc. 392 Potrero Avenue, Sunnyvale, CA USA [email protected] Zscaler, and the Zscaler Logo are trademarks of Zscaler, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners. Copyright Zscaler 7
How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware
DATA SHEET ZSCALER WEB SECURITY CLOUD FOR SMALL BUSINESS OVERVIEW In today s competitive world, Small and Medium Businesses (SMB) are focusing their discretionary resources on growing revenue and increasing
ZSCALER WEB SECURITY CLOUD FOR LARGE & MEDIUM ENTERPRISE
THE LEADER IN CLOUD SECURITY ZSCALER SECURITY CLOUD FOR LARGE & MEDIUM ENTERPRISE OVERVIEW I have literally thrown away all my hardware and software by moving to the Zscaler Web Security Cloud - IT Director
ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
Top 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
Cloud-Based Content Security Service (CSS)
Whitepaper Cloud-Based Content Security Service (CSS) A Technical Overview September 2010 Table of Contents Cloud-Based Content Security Service (CSS) A Technical Overview 1 Introduction...2 2 Aruba Content
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Seven for 7: Best practices for implementing Windows 7
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
February 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
Web Security Gateway Anywhere
Web Security Gateway Anywhere The Web Security Challenge Web Technology Trends Dynamic, interactive Web 2.0 technologies have transformed the Web into a core business application platform Customer relationship
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
Uncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
IBM Security Network Protection
IBM Software Data sheet IBM Security Network Protection Highlights Delivers superior zero-day threat protection and security intelligence powered by IBM X- Force Provides critical insight and visibility
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.
Page 1 of 9 Overview Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Security risks for email, web, and data are no secret. Most people
Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.
Guest Speaker Michael Sutton Chief Information Security Officer Zscaler, Inc. Michael Sutton has dedicated his career to conducting leadingedge security research, building world-class security teams and
ADVANCED SECURITY How Zscaler Tackles Emerging Web Threats with High Speed, Real- Time Content Inspection in the Cloud
WHITE PAPER ADVANCED SECURITY How Zscaler Tackles Emerging Web Threats with High Speed, Real- Time Content Inspection in the Cloud A Zscaler ThreatLabZ Report ADVANCED SECURITY ABSTRACT Leveraging a purpose
Putting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Key Findings. Websense Triton Security Gateway Anywhere
Websense Triton Security Gateway Anywhere A Usability Study and Performance Evaluation Executive Summary In today s global economy the ways in which businesses use the Internet have changed dramatically
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Mobile Security Solution BYOD
Mobile Security Solution BYOD 1 Blending boundaries between devices, apps and users Personal Mobile Devices Unknown Mobile Apps Corporate data on public cloud apps Zscaler Secure Cloud Gateway Business
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect
Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
SafeNet Content Security Product Overview. Protecting the Network Edge
SafeNet Content Security Product Overview Protecting the Network Edge From idea to action, SafeNet smartly protects information as it moves through its lifecycle. With data encryption and control solutions,
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Moving Beyond Proxies
Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence. June 2010 Version 1.0 PAGE 1 PAGE 1
Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence June 2010 Version 1.0 PAGE 1 PAGE 1 Contents Introduction... 3 Fidelis XPS Feed Manager... 4 Fidelis XPS Policy: A Primer...
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Comprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
