Forcepoint Firewall Management
|
|
|
- Pauline Mason
- 10 years ago
- Views:
Transcription
1 Datasheet Forcepoint Firewall Management Comprehensive visibility, control, and reporting, plus streamlinedand intuitive rule management to simplify next-generation firewall management The more complex your organization, the more value you gain from visibility, control, and efficiency in firewall management. Forcepoint includes powerful, easy-to-use management software with every Forcepoint Firewall Enterprise to help you know who is doing what when and be confident that firewall activities are not getting in the way of business. Optional Forcepoint Firewall Enterprise Control Center and Forcepoint epolicy Orchestrator (Forcepoint epo ) software share information to minimize the complexity and compliance challenges of enterprise and multitenant installations. Available appliances ensure that protection and troubleshooting scale without impairing network traffic. Next-generation firewalls allow IT to permit safe, liberal use of social media and web applications while retaining visibility and fine-grained policy control for compliance. However, as organizations introduce more security such as identity and application-aware rules, content inspection, antivirus (AV), and intrusion prevention system (IPS) these overlays can add complexity to firewall management unless firewall administrators also adopt more efficient management processes and tools. With conventional firewalls, management has been the largest factor in the cost of ownership. Routine tasks consume endless hours. When there s a network outage, teams frantically piece together what happened, often striving to simply prove the firewall was not at fault. As organizations take advantage of the security controls in nextgeneration firewalls, integrated tools and automation should reduce rule-set complexity and streamline incident response. Our Forcepoint firewall management solutions can help ensure your next-generation policy enforcement controls have the appropriate impact on your network, enabling valuable business services without hindering users or overwhelming operations. More confidence, lower cost The Forcepoint firewall management solution combines management, reporting, and analytic tools for better visibility, effective security, and streamlined operations, including intuitive rule management. Solution components work together to lower firewall management effort and costs. Forcepoint covers the crucial facets of firewall management: Firewall administration Enable fine-grained rules, audit operations, and centrally manage policies and configurations all with highly intuitive management capabilities. Trending, visualization, and analytics Monitor your firewall day to day, correlate data, and analyze real-time information flows within one environment. Historic analysis and reporting Handle the long-term retention of firewall audit data and streamline compliance with 550+ reports. Host integration Leverage Forcepoint epo software to share host and firewall data. 1
2 the problem 60% to 70% of all firewalls are misconfigured, rendering them worse than useless. Chris Christiansen, IDC the solution Forcepoint Firewall Enterprise Highlights Centralized policy and device management based on users and applications. Intuitive, reusable policies and tools that spotlight rule interactions, overlaps, gaps, and chances for optimization. Integrated dashboards, correlated and custom alerts, and real-time log viewing. Role-based administration and change controls. Logical separation of policies and configuration domains. Forensics and reporting included at no extra charge. Enterprise scalability and reliability. Log trending and analytics. Data sharing with endpoint systems through Forcepoint epolicy Orchestrator software. More than 550 out-of-the-box reports. does your current firewall management help you? Quickly identify who used what application. Write policies to control user access to applications. See rule interactions in advance. Easily identify rules that match traffic. Design and validate appropriate rules. Enable real-time content and security controls with a few clicks. Write fine-grained rules in your business language: Users and apps. Maintain threat visibility as attacks emerge. View analytics, trending, and visualization of log data in a single environment. Quickly identify problems and find resolutions. Reduce policy size and complexity. Share data between network and host. Automate everyday workflows. Streamline compliance reporting. Optimize policies and clean up rules. Integrate the firewall with existing IT infrastructure, change processes, and organizational structures. Forcepoint Sandbox module enhances defense in five areas: 1. File Sandboxing for Web Monitor Web traffic for real-time code analysis in a behavioral sandbox for Advanced Threat identification. 2. File Sandboxing for Intercept attachments in real-time for additional threat analysis in a behavioral sandbox. 3. URL Sandboxing Have suspicious links in reassessed when they are accessed, not just when the arrives. 4. Detailed Forensic Reporting Use sandbox results to guide any necessary response or proactive measures against future attacks. 5. Phishing Education and Reporting Increase phishing awareness at both the user and network levels to drive effective change. firewall administration Forcepoint provides both local and centralized options for configuring, monitoring, and maintaining firewall devices and capabilities. Local Administration The Forcepoint Firewall Enterprise Admin Console offers a basic environment for connecting to and managing one or more firewalls. This console makes it easy to implement policies that take advantage of all the options of the nextgeneration Forcepoint Firewall Enterprise. In one view, you enable granular, targeted security controls, constructing a single rule for each policy using the business language of applications and users. A monitoring dashboard and one-click access to powerful network tools such as TCPdump, ARP, Ping, and nslookup bring together the core processes for managing individual firewalls. Full configuration and management capabilities are available at the command line as well. Fine-grained control of applications and defenses For each rule, a few clicks within one graphical user interface activate rich security controls, such as IPS, AV, geo-location, decryption, or reputation. You can permit use of potentially risky applications but impose protections that match the application s threat vectors. For example: 2
3 command line controls With Forcepoint, advanced users have the option of broad command line control: Full Unix shell and tool access. View all firewall log files, historic or real time. Fully configure or import policy. Access command line interface (CLI) at console or over SSH. Forcepoint firewall enterprise control center advantages Quickly search for rules and objects to reuse in existing or new firewalls. Define packet filtering and application-layer rules quickly and efficiently in a graphical, object-based environment. Use wizards to reduce the size and complexity of your rule base, reduce overlaps and duplications, and simplify common tasks like VPN deployments. Receive, consolidate, and display customized alerts from managed firewalls through a secure channel. Validate policy consistency and understand rule interactions prior to distribution. Import firewall configurations, make changes, and then export back to all devices, saving significant time and effort. Backup and restore firewall configurations to recover from configuration errors, or replicate a trusted configuration on a new system quickly and easily. Control individual or groups of firewalls by re-initializing the network or rebooting. Cost-effectively manage multiple entries, organizations, or configuration domains (for managed services) or organizations. Track all user actions in a session by associating them with a change ticket. Support audit and regulatory compliance by viewing all changes in the audit trail with the change ticket number. Automatically update all firewalls with the latest software releases and patches. Right-click on a firewall in Forcepoint Firewall Enterprise Control Center and launch immediate command line access via SSH. Apply AV and IPS to web conferencing. Limit use of SSH and SSH tunneling to specific users and block port forwarding to prevent malicious traffic. Use geo-location to disallow and IPS to scan traffic to and from a dark portion of the web. Decrypt inbound traffic for content inspection, exempting based on policy, and re-encrypt. As you draft each rule, you can control subcapabilities of applications, such as games on websites, and restrict access and capabilities at the user level to match roles. Rules stay up to date as users change roles or leave the company. A search option helps you find applications, categories, and capabilities that your policy should reflect. To reduce complexity and troubleshooting, this console presents rule interactions on a tab. The display highlights the rules and areas of each rule that could cause potential problems. You can immediately identify conflicts that could prevent your new rule from taking effect. FIGURE 1. Forcepoint Firewall Enterprise Admin Console provides quick access and complete control over your firewalls. Intuitive Dashboard and Real-Time Audit Viewer The firewall dashboard provides quick details on system status, allows simple confirmation and updating of security services, and highlights the latest number of applications discovered and policies in use over your chosen time span. Additionally, the real-time audit viewer within the console helps you keep abreast of active rules and troubleshoot issues. You can filter audit logs using predefined or custom filters, color code the results to accentuate threat events, and schedule automatic exporting of data to reporting systems, 3
4 be the who on your network Forcepoint firewalls leverage Forcepoint Logon Collector which simplifies discovery, logon, and authentication processes across all Forcepoint firewall management tools as well as Forcepoint Data Loss Prevention. This non-invasive process maps IP addresses to users for all types of traffic to enable user-based policies without requiring the user to authenticate to the firewall or use a protocol that supports authentication. Quickly discover who is using which application and check authentication status. Enforce user-based access control policies without a separate authentication step. Leverage users and groups in your Microsoft Active Directory. Enforce additional active authentication for users not logged in to the domain. Authenticate using captive portal, NTLM, Radius, LDAP, and Active Directory. cost effectively manage multiple organizations Forcepoint Firewall Enterprise Control Center helps managed service providers and organizations with multitenant management or reporting requirements administer the firewalls of multiple customers or separate entities. Create domains or zones that act as separate Forcepoint Firewall Enterprise Control Center instances administrators only see the firewall and policies for their particular customer or entity. Separate configurations for several enterprises and hide information about an enterprise from administrators of other enterprises. Keep configuration simple and save time and effort with common rule objects; crossenterprise policy objects can still be shared or reused by all domains. Role-based access control helps enforce change-control policies. profiler advantages Profiler features a next generation web UI viewable from any web enabled device, or from within Control Center to integrate monitoring with other workflows and assist incident response. Forcepoint epo platform integration allows the opening of tickets and other actions based on changing behaviors sent from Forcepoint Firewall Enterprise Profiler. like Forcepoint Firewall Reporter or Forcepoint Security Innovation Alliance partner products. Central Administration In environments with multiple firewalls, firewall administrators can use the local firewall administration console for full policy and device configuration, to set up and monitor dashboards, and to perform troubleshooting by viewing packet captures and logs in real time. But how do you see the big picture? How do you capture economies of scale and reduce overlaps in rules, policies, and operations? The optional Forcepoint Firewall Enterprise Control Center dedicated or virtual appliance centralizes firewall management across multiple firewalls, boosting consistency and slashing maintenance effort. Forcepoint Firewall Enterprise Control Center helps you implement firewall security configuration settings, policies, and policy changes quickly, easily, and accurately across your entire firewall infrastructure. This integrated environment unites all of the Forcepoint firewall management tools. Powerful yet Simple Rule Creation, Validation, and Distribution An enterprise security policy may require hundreds of rules deployed across a fleet of firewalls. Large policies with many rules are harder to manage and increase the chance of user error, which puts the network at risk. The Forcepoint Firewall Enterprise Control Center environment helps you construct and optimize policies to minimize the number of rules, streamlining execution for better firewall performance. You can allow the traffic and inspections that you need, without extra checks that slow it down. Forcepoint Firewall Enterprise Control Center includes graphical, fully integrated policy management tools that handle your entire enterprise network from the edge to the core. The single rule policy concept available for local administration is enriched here to match the challenges of managing multiple systems, handling complex network topologies, and reusing rules. As you define powerful rules to take full advantage of filtering and protection features and act on applications and users, Forcepoint Firewall Enterprise Control Center helps you leverage these rules across your firewall infrastructure. Drag-and-drop rule objects make it easy to configure, reuse, merge, optimize, troubleshoot, and clean up (remove unused) policies as you create specific configurations for each appliance in a multifirewall environment. To control access to specific systems, such as database servers, you can search by rules within objects, such as IP address or port. Just drag and drop the resulting rule objects to the correct rule fields to create or update access controls. Before you update the rule, 4
5 just click to see if there are overlaps and confirm that the rule will fire. Visualization of all firewall actions in terms of who/what/ where improves diagnosis and provides guidance into needed rule changes. Correlates 30 days worth of firewall actions to network users and roles in real-time to quickly validate impact of changes. On-demand access to Forcepoint epo platform asset directory confirms that the right countermeasures are active on a host, such as AV and endpoint encryption. Identify root cause categorizations for denied traffic. Pulls firewall policy and rule objects to show the details of the rule and also provides reports in terms of firewall policy objects. Timeframe comparison and prioritized visualization for detecting important changes in access patterns. Create reporting objects to improve or focus analysis in particular areas of the network. Use graphical reports to convey situational awareness, threats by geographic location, applications traversing the firewall, and other information to those who need to know. Can be deployed quickly and leverages existing network devices and infrastructures. Intercepts login authentications without host agents or additional inline devices. Enables trending and analysis without manually intensive, after-the-fact log collection and review. available as a virtual or dedicated appliance A virtual Firewall EnterpriseProfiler is included with every Forcepoint Firewall Enterprise product. In addition, many customers choose to purchase our dedicated Profiler appliance running on Forcepoint Linux. By operating on a dedicated appliance, out of band, the Forcepoint Firewall Enterprise Profiler can handle larger data sets, display real-time events, run troubleshooting queries, and let you explore rule sets without affecting on-going firewall or network performance. FORCEPOINT epo platform integration enables visibility into Firewall alerts. Firewall health statistics. Historical performance trends. Tracking of version and patch levels. Hosts and endpoints used in policies. Host profile information directly from analytical tools. FIGURE 2. Forcepoint Firewall Enterprise Control Center centralizes and eases management of multiple firewalls. Search filters let you selectively view the rules for a particular firewall, firewall group, or the entire organization, and then easily modify those rules. Once defined, you can distribute rules to hundreds of firewalls, sharing them across logical enterprise groups, such as global, group, cluster, or local domains, or configuration domains, such as those offered by managed-service providers. Optimized Policies Deliver Better Firewall Performance and Better Security Over time, rule sets tend to grow, overlap, and become ineffective, making it easier to make mistakes. To reduce the number of rules, our tools automate clean up. Wizards help you scan for, identify, and merge similar rules (a common set of parameters) and delete duplicate or unused rules to keep rule sets manageable. For example, multiple administrators might create separate objects that have different names, but perform the same function. The merge objects command will look for this situation and clean it up with a single common object. Fewer rules to consider equals better performance. Adaptive Objects Allow Rule Grouping and Reuse Administrators implement policies by defining intelligent objects once, and then reusing them whenever and wherever they make sense. With object grouping, you can do much more with a single rule and consolidate rule sets. Forcepoint Firewall Enterprise Control Center supports many types of objects, including firewalls and firewall groups, hosts, networks, address ranges, applications, endpoint groups, and services, including geo-location objects. Forcepoint Firewall Enterprise Control Center also gives you visibility into rule usage. You can identify the most used rules, least used rules, and rules that have not been matched by firewall traffic in the last 30 days. This real-world data lets you: Move most-used rules to the top of the rule list so traffic can be processed quickly. Investigate least-used rules to see if they are working as intended. Delete or disable unused rules that must be justified during audits. 5
6 You can even compare policy configurations on all of your Forcepoint Firewall Enterprise Control Centermanaged devices to ensure consistency across your network. Robust configuration management lets you centrally track, trace, and validate all policy changes. Manage and Monitor Firewall Software For efficient and consistent updates, Forcepoint Firewall Enterprise Control Center can automatically detect when new releases and firmware are available on the Forcepoint site. Simply download the files you need and store them on Forcepoint Firewall Enterprise Control Center s Management Server for manual or automated installation. When you are ready to install, you can push new releases to one system or to hundreds simultaneously. Forcepoint Firewall Enterprise Control Center displays the installation history for all managed firewalls along with the progress of the current deployment. If needed, you can restore a trusted device configuration in seconds with a few clicks of the mouse. Complete Access Control with Role-Based Administration and Configuration Domains Some configuration changes are routine, while others are farreaching. Role-based access allows you to exert centralized, consistent, policy-based control over distributed teams, determining which management functions can be viewed or changed based on each person s responsibilities. Rolebased access can also ensure that only approved users create or validate rules, reducing the risk of unauthorized changes or rule conflicts breaking the firewall. Customers subject to Payment Card Industry Data Security Standard (PCI DSS) often employ role-based access to enforce change controls. You can create any number of roles to address each organization s needs and privileges, associate rules with roles (to limit modifications), and establish priority protections for rules. Different roles could be defined to: Change only domain name system (DNS) entries. View event or audit logs. Create rules associated with a specific network service or protected server. You might dictate that certain rules must always be at the top of the policy list and moved only by certain privileged users. Roles, like the rules you build, link to users and groups in LDAP and Active Directory so the system can auto-create or auto-deactivate users as they connect to Forcepoint Firewall Enterprise Control Center for the first time. trending, visualization, and analytics After you have configured your firewalls, use your Forcepoint Firewall Enterprise Profiler for situational awareness about changing usage and threats and at-a-glance monitoring day to day. It helps you discover, visualize, and monitor application usage by user group and risk level. With Forcepoint Firewall Enterprise Profiler s graphical displays, you spend minutes rather than hours planning changes, optimizing rules, and troubleshooting firewall-related network or application outages. Forcepoint Firewall Enterprise Profiler helps replace substantial manual effort and log viewing with a few simple clicks. This software, included with your Firewall purchase or available in a dedicated appliance, takes feeds from the firewall, analyzes the data for visibility into how the firewall rules are affecting the network, and helps you detect changes in access patterns in real time. Application Discovery and Real-Time Usage Visualization While Forcepoint Firewall Enterprise discovers the applications traversing the network, Forcepoint Firewall Enterprise Profiler visualizes those applications, both inbound and outbound. It also shows you how bandwidth is being used, by risk level and user group. Dynamic displays highlight changes on the network, comparing timeframes and prioritizing events to help you detect alterations in access patterns that could signal a problem. You can track what happens for any time period at the firewall, characterizing users and assets based on real-time network activity and visualizing firewall deny/allow actions in context. This clarity lets you determine which applications are required and which are not, and create policies in the firewall that control access to applications. With data to back up decision-making, you can reduce cost in terms of bandwidth use, improve productivity, and tune rules or educate users to ensure usage matches organizational policies. Threat and Geographic Visualization Since many attacks are targeted and subtle, Forcepoint Firewall Enterprise Profiler gives you tools to determine if the systems protected by your firewalls are under attack, identify threats, confirm countermeasures are in place, and prioritize risks. The system highlights changes in risk so you can quickly take action and it dynamically adjusts risk ratings according to asset value, application risk, and identified threats. 6
7 Rapidly Diagnose Outages During an application outage, filters help you quickly identify and scope the problem, digging into the root cause without leaving the firewall environment. You can drill down within bubble charts to understand what users or specific applications are involved, for example TeamViewer or WebEx, and click through directly to investigate further. Drill downs show users, countries involved, applications, usage levels, and the firewall rules that are allowing or blocking the particular applications. As you implement fixes, the real-time monitoring allows you to validate instantly that the rule set change had the desired effect on traffic, applications, or users. FIGURE 3. Since crises seem to hit most often when you re away from the office, you can troubleshoot firewall events from any web browser. Forcepoint Firewall Enterprise Profiler presents events correlated against firewall policy in the context of all firewall actions. To speed assessment, you see details for each event, including users, geographic location, and source and destination IP addresses and ports. The display lets you drill down to show specific users within the user group and look at the rule and the reason for a deny action. To verify that protective measures are working, you can see a report that shows security countermeasures applied by application. Geo-location can be a strong indicator of risk. Forcepoint Firewall Enterprise Profiler can tell you the locations and sources of traffic and threats. Are you getting BitTorrent traffic from countries or regions where you do not do business? Are your hosts connecting to risky neighborhoods on the web? You can determine both the source and the destination of traffic internal, external, or through a partner searching by application and user group. You can drill into usage bubbles to see rules, IP addresses, users, and more and determine if traffic is business- or non-business-related. Quick and Direct Reporting Forcepoint Firewall Enterprise Profiler s graphical reports and reusable reporting objects help you convey information to others within your organization to guide actions and explain events or new requirements. Built-in reports cover predefined application and user-based topics, which let you document events and activities without going into another tool. Reports can reflect any level and any filtered or specific view in Forcepoint Firewall Enterprise Profiler. You can print, save, or export reports into PDF or CSV formats. Proacitve Support to Validate Changes Visibility into users, applications, and trends makes it possible to profile the impact of infrastructure changes. Forcepoint Firewall Enterprise Profiler lets you confirm that systems and traffic are back to normal and users have appropriate access to applications. broad, Exhaustive reporting Application and Identity-Based Reports Global Threat Intelligence Reputation Report Protocol and Web Usage Bandwidth Usage Regulatory Compliance Configuration Management Reports identify the top applications going through the firewall and spotlight the individuals who are using those applications. Graphically see the spam that has been dropped at the network edge using reputationbased filtering. Provides a clear picture of protocol and web usage by user, department, and/or device. Identifies inappropriate usage including user activity associated with security appliance URL filtering. View bandwidth utilization by department, client, and application. Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, PCI, Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), and the Federal Information Security Management Act (FISMA). Document configuration change detail to prove that corporate networks are configured to government requirements. 7
8 event analysis and Reporting Administrators use Forcepoint Firewall Enterprise Profiler daily to understand changing situations. They turn to Forcepoint Firewall Reporter to see the larger landscape of historical events and aggregate data for audit and compliance activities. Viewed within Forcepoint Firewall Enterprise Forcepoint Firewall Enterprise Control Center or from its own web-based GUI, Forcepoint Firewall Reporter centralizes audit streams, correlates alerts across devices, handles the longer-term retention of firewall audit data, and streamlines compliance. Operator-Focused Reports More than 550 reports cover all areas of the firewall including application and user based reports by geo-location, security zone, system health, and many other areas that provide comprehensive, device-specific information on individual or groups of firewalls. Reports are operator-focused to help you identify, investigate, correct, and close any issue. Visibility helps you secure the network, manage bandwidth requirements, and ensure appropriate usage. Forcepoint Firewall Enterprise Forcepoint Firewall Enterprise Control Center, Forcepoint Firewall Enterprise Profiler, and Forcepoint epo software can correlate host and firewall health data within the firewall management console. You can view top-level data for multiple firewalls or drill down for detailed data on a firewall or the Forcepoint Firewall Enterprise Control Center or Profiler appliance that monitors it. Forcepoint Firewall Enterprise Profiler can obtain host information from an event s drill down to comprehend the situation more quickly. get started By integrating, automating, and centralizing management activities throughout the firewall management workflow, Forcepoint offers crucial tools that will help you extract the maximum protection and compliance value out of your firewall investment, with the minimum of time and tedium. The Forcepoint firewall management tools work together to maximize operational efficiency, simplify policy control, and demonstrate regulatory compliance, while driving down management costs. Learn more at Identity and application-based reports unlock the capabilities of your next-generation firewall, augmenting existing regulatory reports. Historical attack reports can show events categorized by hour, day, week, month, quarter, or current comparisons by each device, as well as across all devices. Integrated and Scalable Forcepoint Firewall Reporter integrates with Forcepoint Firewall Control Center and is included with Forcepoint Firewall Enterprise. It scales to the largest environments to generate a complete picture of enterprise security events with no hours wasted in manual analysis of individual device logs forcepoint epolicy orchestrator platform integration Several Forcepoint firewall management tools integrate with the Forcepoint epo platform to help network managers collaborate with enterprise security administrators, helpdesk teams, and auditors. For instance, the Forcepoint Firewall Enterprise Profiler sends trend and change data to Forcepoint epo software that can trigger a helpdesk ticket. Integrations like these make it easier to understand the context of events for faster resolution and uncover the most pressing issues that require intervention. 8
9 technical specifications Hardware specs c1015 c2050 c3000 p1000 Form Factor 1U 1U 1U 1U Management Capability 15 Firewalls 50 Firewalls 100 or Unlimited* Firewalls N/A Network Interfaces (10/100/1000 copper) Hard Drive 1 x 500GB SATA 7.2K 2 x 300GB SAS 10K 4 x 300GB SAS 10K 2 x 300 GB SAS 10K RAID N/A RAID 1 RAID 5 RAID 1 Optical Drive None 8x DVD-ROM 8x DVD-ROM 8x DVD-ROM Out of Band Mgmt Yes Yes Yes Yes Remote Access No Yes Yes Yes Power Supply Single 350W Dual 650W Dual 650W Dual 650W Power Consumption** 306W, 2.8A, 110/220V 306W, 3.3A, 110/220V 381W, 3.5A, 110/220V 360W, 3.3A, 110V Dimensions (HxWxD) 1.69 x17 x x16.9 x x16.9 x x16.9 x27.19 Weight 22 lbs. 31 lbs. 32 lbs. 31 lbs. MTBF 130,494 hours 66,531 hours 61,423 hours 66,531 hours * C3000 features a license upgrade to allow management of an unlimited quantity of firewalls. ** Power supplies are global power auto-sensing for V. VMware Plater, VMware Server, or VMware Workstation Software is required to host the Profiler virutal appliance. contact /contact ABOUT FORCEPOINT Forcepoint is a trademark of Forcepoint, LLC. SureView, ThreatSeeker, Triton, Sidewinder, and Stonesoft are registered trademarks of Forcepoint, LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks and registered trademarks are property of their respective owners. [datasheet_firewall_management_en] FED
McAfee Firewall Management
Comprehensive visibility, control, and reporting, plus streamlined and intuitive rule management to simplify next-generation firewall management The Problem 60 to 70 percent of all firewalls are misconfigured,
Forcepoint Stonesoft Management Center
Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT Your business and its data
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations
PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
PANORAMA Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. Web Interface HTTPS Panorama SSL View a graphical summary of the applications
Panorama. Panorama provides network security management beyond other central management solutions.
Panorama Panorama provides network security management beyond other central management solutions. Headquarters PANORAMA Simplified Powerful Policy Enterprise Class Management Unmatched Visibility Data
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,
Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. View a graphical summary of the applications on the network, the respective users, and
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
McAfee Security. Management Client
Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
LogInspect 5 Product Features Robust. Dynamic. Unparalleled.
LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
FireMon Security Manager Fact Sheet
FireMon Security Manager Fact Sheet Table of Contents Introduction to FireMon Security Manager... 2 Architecture... 3 Change Management... 4 Policy Cleanup & Optimization... 5 Business Continuity Policy
Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF
NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser
Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,
Cisco IPS Manager Express
Cisco IPS Manager Express Product Overview Intrusion prevention systems (IPSs) are critical to protecting your network and assets against worms, Trojans, and other malicious attacks. Cisco IPS Manager
Reports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM
The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
Reports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
Introduction to Junos Space Network Director
Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
McAfee Next Generation Firewall (NGFW) Administration Course
McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,
SOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS
TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS From a damaged reputation to regulatory
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
What s New Guide. Active Administrator 6.0
What s New Guide Active Administrator 6.0 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
Cyber Security RFP Template
About this document This RFP template was created to help IT security personnel make an informed decision when choosing a cyber security solution. In this template you will find categories for initial
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
Sponsored by McAfee Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2 May 2013 A SANS Whitepaper Written by Dave Shackleford The ESM Interface Page 2 Rapid Event
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Unicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Cisco UCS Central Software
Data Sheet Cisco UCS Central Software Cisco UCS Manager provides a single point of management for an entire Cisco Unified Computing System (Cisco UCS) domain of up to 160 servers and associated infrastructure.
CA Service Desk Manager
PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
How To Use Ibm Tivoli Monitoring Software
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by
HP PCM Plus v4 Network Management Software Series
HP PCM Plus v4 Network Management Software Series Data sheet Product overview HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network
Server Monitoring: Centralize and Win
Server Monitoring: Centralize and Win Table of Contents Introduction 2 Event & Performance Management 2 Troubleshooting 3 Health Reporting & Notification 3 Security Posture & Compliance Fulfillment 4 TNT
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Comprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Security Administration R77
Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check
Secret Server Splunk Integration Guide
Secret Server Splunk Integration Guide Table of Contents Meeting Information Security Compliance Mandates: Secret Server and Splunk SIEM Integration and Configuration... 1 The Secret Server Approach to
OBSERVEIT 6.0 WHAT S NEW
OBSERVEIT 6.0 WHAT S NEW ObserveIT 6.0 extends ObserveIT s industry leading session recording solution to a complete Insider Threat Platform that detects and mitigates the risk of insider threats across
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Better protection for customers, and recurring revenue for you!
AVG AntiVirus Better protection for customers, and recurring revenue for you! Offer your customers the latest protection without draining your resources. A single, central management platform alerts when
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time
Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1
QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features
Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides
Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT
CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT CMX100 centralized management appliances allow customers to monitor and manage up to 100 Array Networks APV or AG appliances
SolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
FIREMON SECURITY MANAGER
FIREMON SECURITY MANAGER Regain control of firewalls with comprehensive firewall management The enterprise network is a complex machine. New network segments, new hosts and zero-day vulnerabilities are
Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.
Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
February 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
