McAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution
|
|
|
- Nickolas O’Brien’
- 9 years ago
- Views:
Transcription
1 Data Sheet McAfee Network Protection Solutions McAfee Network IPS Sensor Network Intrusion Prevention Solution The Challenge The risks to enterprise and service provider security continue to grow, as the number of new vulnerabilities and the speed and sophistication of attacks seeking to exploit those vulnerabilities increase every year. The evolution of new hybrid attacks that use multiple vectors to breach the security infrastructure means that enterprises must defend themselves against a constantly shifting threat. Dynamic Security Risks The dynamic nature of today s security threats means that new, hybrid attacks are increasing at an unprecedented pace. Network security gaps leave critical assets vulnerable and increase enterprise and service provider security risks Inadequate Protection with Traditional Security Technology Despite significant security investments, enterprises remain vulnerable to sophisticated and zero-day attacks due to the inadequate ability of traditional technology to provide proactive threat detection and prevention The Need for Proactive Risk Prevention Unfortunately, there is no single product that protects against all threats. To ensure comprehensive security, service providers and enterprises need to adopt a layered approach that delivers proactive risk prevention to accurately detect and block known and zero-day attacks before they inflict damage The pioneering and proven McAfee network intrusion prevention (IPS) solution delivers the most comprehensive, accurate, and scalable threat protection, helping enterprises and service providers assure the availability and security of their critical network infrastructure through proactive risk prevention. The McAfee Solution McAfee network IPS delivers advanced realtime protection against known, zero-day (unknown), and encrypted attacks, as well as spyware. delivers the most comprehensive, accurate, and scalable network IPS solution for a broad range of mission-critical environments. As part of the McAfee Protection-in-Depth Strategy, it delivers comprehensive and proactive intrusion prevention to protect business availability and critical network infrastructure by detecting and blocking attacks before they inflict damage. Through a full suite of aggregated platforms and solutions that scale from hundreds of Mb/s to multi-gigabit bandwidth rates, its broad protection extends from the network core to the edge and the branch office, and provides enterprise and carrier-class scalability in both large and small enterprise environments. The innovative architecture integrates patented signature, anomaly, and Denial of Service (DoS) analysis techniques, enabling highly accurate and intelligent attack detection and prevention up to multi-gigabit speeds. This unprecedented harnessing of innovative technologies protects even the most demanding networks from the threat of known, zero-day (unknown), and DoS attacks, as well as spyware. IntuShield s next-generation technology delivers industry-first encrypted attack prevention and network IPS and internal network firewall integration, offering the most accurate and comprehensive protection available in the industry. The product family includes the 4010, 4000, 3000, 2700, 1400, and 1200 six powerful and purpose-built network IPS appliances that provide the performance and functionality required to protect high-availability networks and the Security Management (ISM) system, a powerful and scalable security management solution. Features and Benefits Comprehensive Protection Realtime Encrypted Attack Prevention Industry s first and only network IPS to protect against both clear-text and encrypted attacks, as well as spyware Signature, Anomaly, and DoS Analysis Protects against known, zero-day, and DoS attacks IPS and Internal Firewall Unprecedented internal system and network infrastructure threat protection and policy enforcement through converged network IPS and internal firewall capabilities Integrated Network and Host IPS Protection Provides breakthrough integration by enabling host (McAfee Entercept ) and network () IPS security event aggregation and coordination on a single Manager console High-Availability Deployment Options Enables virtualization and unmatched proactive IPS protection for broad range of high-availability environments
2 Page 2 Accurate Protection Depth-of-Analysis s purpose-built platform enables stateful traffic analysis by providing thorough parsing of more than one hundred protocols, over 3,000 high-quality multi-token/multi-trigger signatures, and advanced evasion resistance to deliver unmatched accuracy for mission-critical, in-line prevention Virtual IPS and Internal Firewall s unique virtualization capability extends to both IPS and internal firewall, enabling highly customized and granular security policies for a dramatic reduction in false positives Intrusion Intelligence Powerful capabilities provide detailed, accurate, and reliable information related to intrusion identification, relevancy, direction, impact, and analysis Scalable and Manageable Enterprise-Wide Scalability Through a full suite of solutions that scale from hundreds of Mb/s to multigigabit bandwidth rates, s broad protection extends from the network core to the edge and the branch office and provides mission-critical solutions with proven scalability for all enterprise environments Flexible Deployment Unprecedented flexibility of IPS or IDS deployment including In-Line, Port Clustering, high-availability, Span, and Tap Modes to suit any network security architecture Automated Realtime Threat Updates Innovative, automated process delivers realtime, enterprise-wide signature updates without requiring sensor reboots and provides protection against newly discovered vulnerabilities while eliminating manual updates and network downtime Comprehensive Threat Prevention As part of the McAfee Protection-in-Depth Strategy, delivers comprehensive intrusion prevention solutions that protect both internal and external network infrastructure from a broad range of threats and attacks spanning from the network core to the edge and the branch office. By combining broad network environment protection with unprecedented threat prevention technologies including encrypted attack prevention and internal firewall integration redefines intrusion prevention with the most comprehensive protection from known, zero-day, and encrypted attacks, as well as spyware. Encrypted Attack Prevention Information that requires protection via SSL is critical by nature. In today s dynamic threat environment, HTTP is The 4010 The 4010 (I-4010) is suited for deployment at the core of large enterprise, data center, or service provider networks. The high port-density Gigabit Ethernet interfaces provide the performance and operational redundancy required to secure a high-availability network infrastructure, along with economies-of-scale needed by large enterprises, data centers, and service providers. Twelve Gigabit Ethernet detection ports Optional redundant hot-swappable power supply Up to 2Gb/s performance The 4000 The 4000 (I-4000) is suited for deployment at the core of enterprise, data center, or service provider networks. The Gigabit Ethernet interfaces provide the performance and operational redundancy required to secure a high-availability network infrastructure. Four Gigabit Ethernet detection ports Optional redundant hot-swappable power supply Up to 2Gb/s performance The 3000 The 3000 (I-3000) is suited for deployment at the core of large enterprise, data center, or service provider networks. The high port-density Gigabit Ethernet interfaces provide the performance and operational redundancy required to secure a high-availability network infrastructure, along with economies-of-scale needed by large enterprises, data centers, and service providers. Twelve Gigabit Ethernet detection ports Optional redundant hot-swappable power supply Up to 1Gb/s performance
3 Page 3 one of the most popular protocols for attackers due to its open availability. Not only is it important to protect the sensitive data that resides on the Web server itself, but modern e-commerce sites typically access information stored on database servers that live at the very core of the network. Protecting SSL-enabled infrastructure is critical in order to safeguard local Web server data and help prevent potential attack channels into the heart of the trusted network. s breakthrough intrusion prevention technology provides comprehensive network protection against both clear-text and encrypted attacks. Its revolutionary ability to decrypt and inspect SSL traffic dramatically increases network security coverage by proactively detecting and blocking encrypted threats. SSL Traffic Inspection s hardware-accelerated SSL inspection technology allows the sensor to copy, decrypt, and inspect the SSL data stream using the securely stored SSL private key. After converting the SSL data stream into clear text within the sensor, traffic is inspected by s protocol and application anomaly, statistical DoS, and signature matching engines. If an alert is not triggered, the original encrypted packet is forwarded with minimal delay SSL Encrypted Attack Prevention s encrypted threat protection proactively blocks encrypted threats by dropping malicious packets upon detection of an attack SSL Security Forensics The sensor can be configured to capture and store clear text copies of SSL alert packets on the manager. Captured packets are transmitted between the sensor and the manager via an encrypted connection Uncompromising SSL Key Security Protection of the SSL private key is vital. In order to ensure private key confidentiality and integrity, the key is securely exported to the Manager in encrypted format. The Manager re-encrypts the private key with the sensor s public key for local storage. While performing SSL traffic inspection, the sensor securely stores the SSL private key in volatile memory, ensuring that no unencrypted copies of the key are permanently stored on the system IPS and Internal Firewall Today s firewalls offer perimeter protection. pioneers next-generation technology by integrating internal firewall capabilities and network IPS on a single purposebuilt platform to deliver industry-first internal network protection. The integration of IPS and internal firewall allows The 2700 The 2700 (I-2700) offers a flexible IPS for enterprise perimeter deployment. Multiple Fast Ethernet and Gigabit Ethernet interfaces provide effective protection for multiple network segments. Two Gigabit Ethernet and six Fast Ethernet detection ports Built-in Fast Ethernet network taps and low latency Up to 600Mb/s performance The 1400 The 1400 (I-1400) offers a cost-effective IPS deployment for mid-size, remote/branch office networks, or at the perimeter of enterprise networks. Centralized Web-based management for enterprise-wide IPS deployments dramatically reduces operational costs. Four Fast Ethernet detection ports Built-in Fast Ethernet network taps Up to 200Mb/s performance The 1200 The 1200 (I-1200) offers a cost-effective IPS deployment for mid-size or remote/branch office networks. Centralized Web-based management for enterprise-wide IPS deployment dramatically reduces operational costs. Two Fast Ethernet detection ports Built-in Fast Ethernet network taps Up to 100Mb/s performance
4 Page 4 for a higher level of protection, while delivering unmatched control, flexibility, and reduced cost of ownership. s virtualization technology extends to both network IPS and internal firewall capabilities. This enables customers for the first time to implement a virtual perimeter around critical resources, delivering an added layer of protection to guard against attacks that successfully penetrate perimeter firewalls or that originate internally. Highly granular virtual perimeters can protect a network segment, a collection of hosts, or even a single system with a unique policy. Signature, Anomaly, and DoS Analysis s patented and integrated signature, anomaly, and DoS analysis delivers anti-spyware and broad protection against known, zero-day, and DoS attacks. The Depth-of- Analysis section provides additional details on this topic. Integrated Network and Host IPS Protection McAfee s IPS provides unprecedented integration of its network IPS and Entercept host IPS products. Integrated host and network IPSs provide the most comprehensive IPS protection available in the industry, encompassing servers, desktops, and laptops, as well as the network core and edge. Unprecedented Detection Accuracy In today s dynamic threat environment, detection accuracy is critical to network operators. Although false positives from a network IDS may result in unnecessary alerts and create an annoyance for operators, false positives from a network IPS are more critical due to the fact they can result in the blocking of legitimate network traffic. s highly accurate attack detection forms the foundation for the most accurate attack prevention solution for today s demanding, missioncritical, in-line IPS deployments. Depth-of-Analysis delivers unparalleled protection against spyware, as well as known, zero-day, and DoS attacks by integrating stateful signature, anomaly, and DoS statistical analysis for both clear-text and encrypted malicious traffic. s stateful traffic analysis and session state maintenance for up to 1 million sessions, as well as its thorough parsing for over one hundred protocols, form the foundation for comprehensive signature, anomaly, and DoS analysis. Signature Detection and Prevention sensors offer powerful signature analysis to accurately guard against known attacks. Over 3,000 signatures are written to protect against known vulnerabilities. By focusing on vulnerabilities as opposed to individual exploits, can often detect variations of attacks without requiring new signatures. Stateful Signature Detection Engine sensors employ a patented stateful signature detection engine. This enables context-sensitive signature detection, leveraging state information within data packets, utilizing multiple token matches, and detecting attack signatures that span packet boundaries or are in an out-of-order packet stream Signature Specification Language sensors utilize a proprietary, high-level Signature Specification Language. The architecture de-couples signatures from the sensor software, enabling quality signatures to be made available with a quicker turnaround Realtime Signature Updates sensors benefit from an innovative realtime signature update process, where new signatures are automatically pulled by the Manager software at the customer site. Based on policy configuration, these signatures can be pushed from the Manager to sensors automatically in real time. sensors dynamically utilize the latest signatures without requiring reset or reboot for uninterrupted attack protection User-Defined Signatures Sensors also leverage custom signatures that users can easily create through Manager s intuitive graphical user interface Anomaly Detection and Prevention s anomaly detection functionality can identify sophisticated zero-day and unknown attacks, significantly improving attack detection rates. Statistical, Protocol, Application Anomalies Sensors offer comprehensive anomaly detection by employing statistical, protocol, and application anomaly detection techniques Buffer Overflow Detection More than half of new exploits today are buffer overflow attacks. s anomaly detection techniques are effective in protecting against this major threat source Denial of Service Detection and Prevention offers unprecedented accuracy and granularity for DoS detection and delivers the response actions needed to proactively block attacks. Self-Learning Profiles and Threshold-Based Detection Sensors offer threshold-based detection
5 Page 5 as well as self-learning, profile-based DoS detection that uses a patented algorithm to separate even low volumes of attack traffic from large volumes of legitimate traffic Highly Granular DoS Detection Sensors deliver unparalleled granularity in DoS detection using profilebased techniques. A profile can be created for a range of IP addresses or even an individual host, and the architecture supports several hundred profiles per sensor. Any deviation from normal traffic behavior flags a DoS condition. If a single host/subnet downstream to a gigabit network link comes under attack with even a couple of Mb/s of traffic a sensor s granular DoS detection can spot the attack Virtual IPS and Internal Firewall sensors support an innovative and powerful virtualization concept to segment a single sensor into and up to 1,000 virtual sensors, each of which can be completely customized with a granular security policy including individualized attack selection and associated response actions. A virtual sensor can be defined based on a block of IP addresses, one or multiple VLAN tags, or by specific port(s) on a sensor. Virtualization is available for both IPS and internal firewall functionality. The breakthrough integration of virtual IPS and internal firewall capabilities empowers enterprises to extend perimeter-grade protection internal to the network. enables highly granular security policies for individual network segments, a collection of hosts, or even singular hosts. This allows for the creation of a Virtual Perimeter for protected segments or hosts. s Virtual Perimeter technology delivers the industry s first internal network security solution. It mitigates security risks and delivers unprecedented protection for those internal networks that are often left vulnerable due to no or limited security policy enforcement. Virtualization capability allows security professionals to implement and enforce a heterogeneous set of security policies with a single sensor. Such flexibility allows organizations to effectively meet differing security needs, or allows service providers to offer customized security solutions and SLAs to multiple customers. As well, virtualization further reduces the total number of devices required for a network-wide deployment and reduces total cost of ownership. Intrusion Intelligence The dynamic nature of today s security threats means that new, hybrid attacks are increasing at an unprecedented pace. In order to detect and block known and zero-day attacks before they inflict damage, enterprises and service providers need to adopt a strategy of proactive risk prevention. s Intrusion Intelligence delivers unique features to analyze key characteristics of known and zero-day threats and intrusions. This unprecedented set of features delivers detailed, accurate, and reliable information related to intrusion identification, relevancy, direction, impact, and analysis. This allows carriers and enterprises to migrate from reactive intrusion detection to proactive intrusion prevention to stop attacks before they reach their intended targets. Enterprise-Wide, Carrier-Class Scalability and Manageability provides unparalleled scalability and manageability to meet the needs of diverse enterprise, carrier, and service provider environments. Through a full suite of aggregated platforms and solutions that scale from hundreds of Mb/s to multi-gigabit bandwidth rates, s broad protection extends from the network core to the edge and the branch office and provides mission-critical solutions with proven scalability in all network environments. Enterprise-Wide Protection The multi-gigabit performance of the 4010 and 4000 appliances makes them suitable for deployment at logical traffic aggregation points at the core of the enterprise network, in data centers or at service provider networks. By deploying sensors in front of the server farm, users can leverage the Virtual IPS capability to monitor each aggregation point with multiple customized security policies. What s more, the sensor s high-availability deployment option using stateful failover between two sensors without requiring any external hardware provides operational redundancy, prevents any single point of failure, and offers uninterrupted IPS delivers unprecedented virtual IPS capabilities. A B C
6 Page 6 protection. The 3000, with up to 1Gb/s performance, also provides a compelling price-performance solution for core network, carrier, and service provider deployments. Both the 3000 and 4010 offer the industry s highest Gigabit portdensity network IPS appliance. The 2700, with its Fast and Gigabit Ethernet interfaces, offers a flexible solution for the perimeter of enterprise networks. The 1400 delivers a scalable solution for mid-size, branch, and remote offices and the perimeter of enterprise networks. The 1200 delivers a scalable solution for mid-size, branch, and remote offices of enterprise networks. Multi-Gigabit Performance sensors are powered by programmable security-focused hardware. Intrusion detection and prevention are extremely computing-intensive applications, requiring eight to ten times the processing power of a firewall. Specialized silicon is used to speed up almost every function with orders of magnitude improvements in repetitive tasks such as protocol analysis, statistical analysis, string matching, and virtualization. As a result, sensors can support thousands of signatures at wire-speed traffic rates without any packet loss, while protecting against known, zero-day, and DoS attacks, as well as spyware. delivers compelling price/performance for bandwidth needs ranging from tens of Mb/s to 2Gb/s. Flexible Deployment s flexible network deployment enables unmatched threat protection for a broad range of missioncritical network environments, including In-Line, Port Clustering, high-availability, SPAN, and TAP modes. In addition, IntuShield delivers comprehensive infrastructure protection for network routers, switches, VPNs, and gateways. In-Line Mode sensors sit in the data path with active traffic passing through them, mediating the flow of traffic, and dropping malicious packets based on granular policy before they reach their intended targets. Wire-speed performance and highly reliable operation prevent sensors from becoming bottlenecks Port Clustering Port Clustering, or interface grouping, enables traffic monitored by multiple ports on a single system to be aggregated into one traffic stream for stateful intrusion analysis using stateful sensor failover between two sensors, avoiding a single point of failure SPAN and Tap Modes The sensor can monitor hubs or the SPAN ports of multiple switches and can inject several response actions, such as TCP resets to terminate malicious connections through the monitoring port itself. In Tap Mode, full-duplex monitoring allows a complete direction-sensitive view of network traffic, enabling stateful analysis of traffic. Dedicated response ports enable indirect response actions, such as initiating TCP resets to terminate malicious connections INTERNET Public SPAN Mode Interface 3A FireWall 2700 Private Tap Mode Interface 2A/2B DMZ Realtime Intrusion Prevention No security solution is complete unless it can actually stop attacks in real time. Accurate detection is the foundation for the complete set of realtime intrusion prevention options available with sensors. These attack response options enable sensors to be integrated into network environments with a full spectrum of security policies, ranging from realtime notification to complete blocking of attacks in progress. Upon detecting an attack, sensors can: thwart an attack in progress by dropping or blocking a single packet or session; initiate TCP resets or ICMP unreachable message through response ports; reconfigure firewalls to block offending traffic; trigger an alert to the Manager; notify security professionals via , pager, and script alerts; and capture and log packets for detailed analysis. offers a full spectrum of security policies even from a single sensor. Integrated detection and prevention in a single product enable the flexibility to migrate from intrusion detection to intrusion prevention at a user-selected pace, while preserving enterprise and service provider technology investments. High Availability with Stateful Failover sensors support high-availability IPS deployments
7 Page 7 Branch Office INTERNET Firewall Headquarters Firewall 1400 SPAN Mode Tap Mode In-line Mode 2700 Failover Link 4010 G (Sales) H (Database) I (Operations) Virtual IPS 4010 C (Engineering) B (Database) F (Manufacturing) A (Finance) E (Database) D (Administration) provides unprecedented deployment flexibility and scalability.
8 Page 8 Sensor Specifications Sensor Hardware Components I-4010 I-4000 I-3000 I-2700 I-1400 I-1200 Network Location Core Core Core Perimeter Branch Branch Office Office/Perimeter PerformanceThroughput Up to 2Gb/s Up to 2Gb/s Up to 1Gb/s Up to Up to Up to 600Mb/s 200Mb/s 100 Mb/s Maximum Concurrent Connections 1,000,000 1,000, , ,000 80,000 40,000 Ports Gigabit Ethernet Detection Ports Fast Ethernet (FE) Detection Ports Dedicated Fast Ethernet (FE) Response Ports Dedicated Fast Ethernet (FE) Management Port Yes Yes Yes Yes Yes Yes External Fail-Open Control Ports Console and Aux Ports Yes Yes Yes Yes Yes Yes Built-in Network Taps No No No Yes Yes Yes (for FE Ports) Fail-Open Optional Optional Optional Yes Yes Yes (for FE Ports) Fail-Close Yes Yes Yes Yes Yes Yes Mode of Operation SPAN Port Monitoring Yes Yes Yes Yes Yes Yes Tap Mode Optional Optional Optional Yes Yes Yes (for FE Ports) In-Line Mode Yes Yes Yes Yes Yes Yes Port Clustering Yes Yes Yes Yes Yes Yes No. of Virtual IPS Systems 1,000 1,000 1, Traffic Monitoring on Active-Active Links Yes Yes Yes Yes Yes Yes Traffic Monitoring on Active-Passive Links Yes Yes Yes Yes Yes Yes Monitoring of Asymmetric Traffic Routing Yes Yes Yes Yes Yes Yes High Availability Redundant Power Yes Yes Yes Yes No No (Optional) (Optional) (Optional) (Optional) Device Failure Detection Yes Yes Yes Yes Yes Yes Link Failure Detection Yes Yes Yes Yes Yes Yes Physical Dimensions 2RU 2RU 2RU 2RU 1RU 1RU Rack- Rack- Rack- Rack- Rack- Rack- Mountable Mountable Mountable Mountable Mountable Mountable (W) x (W) x (W) x (W) x (W) x (W) x 3.44 (H) x (D) 3.44 (H) x (D) 3.44 (H) x (D) 3.44 (H) x (D) 1.65 (H) x10.5 (D) 1.65 (H) x10.5 (D) Weight 47lbs. 47lbs. 47lbs. 47lbs. 17lbs. 15lbs. Power VAC Same for Same for Same for Same for Same for (50/60Hz) All Models All Models All Models All Models All Models Power Consumption 350w 350w 350w 250w 100w 100w Temperature 0 to 40 C (Operating) Same for Same for Same for Same for Same for -40 to 70 C (Non-operating) All Models All Models All Models All Models All Models Relative Humidity Operational: 10% to 90% Same for Same for Same for Same for Same for (non-condensing) Non-operational: 5% to 95% All Models All Models All Models All Models All Models Altitude 0 10,000 feet Same for Same for Same for Same for Same for All Models All Models All Models All Models All Models Safety Certification UL 1950, CSA-C22.2 Same for Same for Same for Same for Same for No. 950, EN-60950, All Models All Models All Models All Models All Models IEC 950, EN 60825, IEC 60825, 21CFR1040 CB license and report covering all national country deviations. EMI Certification FCC Part 15, Class A Same for Same for Same for Same for Same for (CFR 47) (USA) All Models All Models All Models All Models All Models ICES-003 Class A (Canada), EN55022 Class A (Europe), CISPR22 Class A (Int l)
9 Page 9 Sensor Software Components I-4010 I-4000 I-3000 I-2700 I-1400 I-1200 Stateful Traffic Inspection IP Defragmentation and TCP Stream Reassembly Yes Yes Yes Yes Yes Yes Detailed Protocol Analysis Yes Yes Yes Yes Yes Yes Asymmetric Traffic Monitoring Yes Yes Yes Yes Yes Yes Protocol Normalization Yes Yes Yes Yes Yes Yes Advanced Evasion Protection Yes Yes Yes Yes Yes Yes Forensic Data Collection Yes Yes Yes Yes Yes Yes Protocol Tunneling Yes Yes Yes Yes Yes Yes Protocol Discovery Yes Yes Yes Yes Yes Yes Signature Detection User-Defined Signatures Yes Yes Yes Yes Yes Yes Realtime Signature Updates Yes Yes Yes Yes Yes Yes Anomaly Detection Statistical Anomaly Yes Yes Yes Yes Yes Yes Protocol Anomaly Yes Yes Yes Yes Yes Yes Application Anomaly Yes Yes Yes Yes Yes Yes DoS Detection Threshold-Based Detection Yes Yes Yes Yes Yes Yes Self-Learning Profile-Based Detection Yes Yes Yes Yes Yes Yes Maximum DoS Profiles 5,000 5,000 5, Intrusion Prevention Stop Attacks in Progress in Real Time Yes Yes Yes Yes Yes Yes Drop Attack Packets/Sessions Yes Yes Yes Yes Yes Yes Reconfigure Firewall Yes Yes Yes Yes No No Initiate TCP Reset, ICMP Unreachable Yes Yes Yes Yes Yes Yes Packet Logging Yes Yes Yes Yes Yes Yes Automated and User-Initiated Prevention Yes Yes Yes Yes Yes Yes Encrypted Attack Protection Stops Encrypted Attacks in Real Time Yes Yes Yes Yes No No Internal Firewall Blocks Unwanted and Nuisance Traffic Yes Yes Yes Yes Yes Yes Granular Security Policy Enforcement Yes Yes Yes Yes Yes Yes High Availability Stateful Failover Yes Yes Yes Yes Yes Yes (for FE Ports) Management Command Line Interface (Console) Yes Yes Yes Yes Yes Yes Manager Communication Secure Channel Same for Same for Same for Same for Same for All Models All Models All Models All Models All Models McAfee, Inc Freedom Circle, Santa Clara, CA 95054, , McAfee,, Protection-in-Depth, Entercept, and Intrusion Intelligence, are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners McAfee, Inc. All Rights Reserved. 1-sps-ins
McAfee Network Security Platform I-Series
The industry s most advanced and proven intrusion prevention solution Faster time to protection. Faster time to resolution. Faster time to confidence. Key Advantages Enterprise-wide coverage A single industry-proven
McAfee Network Security Platform A uniquely intelligent approach to network security
McAfee Network Security Platform A uniquely intelligent approach to network security Key Advantages Unparalleled threat prevention Next-generation architecture. Advanced botnet and malware callback detection.
McAfee Intrusion Prevention System
McAfee Protection-in-Depth Strategy Internal Use Only IntruShield 1200 and 1400 Appliances Pioneering and Industry-Leading, Next-Generation s Features and Details What Is Intrusion Prevention? Intrusion
McAfee Network Security Platform A uniquely intelligent approach to network security
McAfee Network Security Platform A uniquely intelligent approach to network security Key Advantages Unparalleled Advanced Threat prevention Signature-less, advanced malware analysis. Inline Browser and
McAfee Network Security Platform A uniquely intelligent approach to network security
McAfee Network Security Platform A uniquely intelligent approach to network security Key Advantages Unparalleled Advanced Threat prevention Signature-less, advanced malware analysis. Inline Browser and
Cisco IPS 4200 Series Sensors
Cisco IPS 4200 Series Sensors In today s busy network environments, business continuity relies on effective network intrusion prevention to stop malicious attacks, worms, and application abuse before they
Cisco ASA 5500 Series IPS Solution
Cisco ASA 5500 Series IPS Solution Product Overview Network threats and security compliance mandates continue to increase in number. The Cisco ASA 5500 Series Intrusion Prevention System (IPS) solution
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Cisco Intrusion Detection System Services Module (IDSM-2)
Data Sheet Cisco Intrusion Detection System Services Module (IDSM-2) Cisco integrated network security solutions enable organizations to minimize risk and maximize business continuity. The Cisco IDSM-2
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
CaptIO Policy-Based Security Device
The Leader in Denial of Service Prevention CaptIO Policy-Based Security Device The CaptIO Policy-Based Security Device automatically detects, identifies, validates, and stops Denial of Service attacks
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
Network Intrusion Prevention Systems Justification and ROI
White Paper October 2004 McAfee Protection-in-Depth Strategy Network Intrusion Prevention Systems 2 Table of Contents Are My Critical Data Safe? 3 The Effects and Results of an Intrusion 3 Why the Demand
The Application Front End Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module
Networking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
Cisco IPS 4200 Series Sensors
Data Sheet Cisco IPS 4200 Series Sensors Cisco IPS 4200 Series Sensors are a core component of the Cisco Self-Defending Network. In today s busy network environments, business continuity relies on efficient
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
McAfee Total Protection Reduce the Complexity of Managing Security
McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.
Cisco SR 520-T1 Secure Router
Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success
Database Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers
Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module
WATCHGUARD FIREBOX VCLASS
FIREBOX VCLASS WATCHGUARD FIREBOX VCLASS ENTERPRISE-LEVEL SECURITY The Firebox Vclass brings high-speed network security to enterprise-class businesses, remote offices, service providers, and data centers.
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Performance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Cisco ASA 5500 Series Advanced Inspection and Prevention Security Services Module
Cisco ASA 5500 Series Advanced Inspection and Prevention Security Services Module The Cisco Advanced Inspection and Prevention Security Services Module (AIP-SSM) for the Cisco ASA 5500 Series Adaptive
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
How To Design An Intrusion Prevention System
INTRUSION PREVENTION SYSTEMS (IPS): NEXT GENERATION FIREWALLS A Spire Research Report March 2004 By Pete Lindstrom, Research Director SP i RE security Spire Security, LLC P.O. Box 152 Malvern, PA 19355
How To Use The Cisco Wide Area Application Services (Waas) Network Module
Cisco Wide Area Application Services (WAAS) Network Module The Cisco Wide Area Application Services (WAAS) Network Module for the Cisco Integrated Services Routers (ISR) is a powerful WAN optimization
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION
QuickSpecs. Models HP S110 100Mbps IPS
Overview Models HP S10 20Mbps IPS HP S110 100Mbps IPS HP S330 300Mbps IPS JC184A JC186A JC187A Key features Industry-proven proactive network security Up-to-date and broad IPS protection Industry-leading
Deliver More Applications for More Users
HARDWARE DATASHEET Deliver More Applications for More Users F5 BIG-IP Application Delivery Controller (ADC) platforms can manage even the heaviest traffic loads at both layer 4 and layer 7. By merging
Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.
Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware
Symantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking
Any-to-any switching with aggregation and filtering reduces monitoring costs
Any-to-any switching with aggregation and filtering reduces monitoring costs Summary Physical Layer Switches can filter and forward packet data to one or many monitoring devices. With intuitive graphical
Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. View a graphical summary of the applications on the network, the respective users, and
HP S Intrusion Prevention System (IPS) Series
HP S Intrusion Prevention System (IPS) Series Data sheet Product overview The HP S Intrusion Prevention System (IPS) Series is optimized for performance and reliability at 20, 100, and 300 Mbps with very
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC
Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
IBM Security Network Intrusion Prevention System
IBM Security Network Intrusion Prevention System Comprehensive protection from today s evolving threats Highlights Achieve unmatched levels of performance without compromising breadth and depth of security
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Network Security Firewall
DFL-210 Multi-Function Security + Network Firewall + VPN Server + Content Manager + Bandwidth Manager + Transparent Firewall Mode Ports + 1 Ethernet WAN + 4 Ethernet LAN + 1 Ethernet DMZ/WAN2 Advanced
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
PANORAMA Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. Web Interface HTTPS Panorama SSL View a graphical summary of the applications
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Simplify Data Management and Reduce Storage Costs with File Virtualization
What s Inside: 2 Freedom from File Storage Constraints 2 Simplifying File Access with File Virtualization 3 Simplifying Data Management with Automated Management Policies 4 True Heterogeneity 5 Data Protection
Cisco ACE 4710 Application Control Engine
Data Sheet Cisco ACE 4710 Application Control Engine Product Overview The Cisco ACE 4710 Application Control Engine (Figure 1) belongs to the Cisco ACE family of application switches, used to increase
IBM Security Network Intrusion Prevention System
IBM Security Network Intrusion Prevention System Comprehensive protection from today s evolving threats Highlights Unmatched levels of performance without compromising breadth and depth of security Protect
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
The Alteon isd SSL Accelerator, V2.0
F E AT U R E S The Alteon isd SSL Accelerator, V2.0 FEATURES Hardware offload for compute-intensive encryption, secure key exchange, and certificate validation A cluster of SSL Accelerators can process
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Security Information & Event Manager (SIEM)
DATA SHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Benefits Enables NOC and SOC staff to
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System
The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System Top Layer Networks, Inc. Enterprises without a sound intrusion prevention strategy across the three threat
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
ForeScout CounterACT Edge
ForeScout is a high performance security appliance that protects your network perimeter against intrusion. Unlike traditional IPS products, ForeScout is extremely easy to install and manage. It does not
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere
Protecting Databases from Unauthorized Activities Using Imperva SecureSphere White Paper As the primary repository for the enterprise s most valuable information, the database is perhaps the most sensitive
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
Efficient Network Monitoring Access
Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
APV9650. Application Delivery Controller
APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
