How to Gain Visibility and Control of Encrypted SSL Web Sessions >
|
|
|
- Shanon Nash
- 10 years ago
- Views:
Transcription
1 White Paper How to Gain Visibility and Control of Encrypted SSL Web Sessions >
2 Executive Summary Web applications (and their derivatives IM, P2P, Web Services) continue to comprise the overwhelming majority of new applications being deployed across today s distributed enterprises. Much of the new growth in Web application development is focused on business-critical applications. Furthermore, many of these applications and related components are hosted by 3rd parties or accessed over public infrastructure. Not surprising, the criticality and confidentiality of Internet-accessible applications has caused organizations to rely more heavily on SSL encryption. Unfortunately, as organizations increase the amount of encrypted traffic coming in to the enterprise, IT becomes increasingly blind to their traffic particularly SSL interactions between enterprise users and external applications. This blind spot raises many security, control, and performance questions. Can threats move within these tunnels? Can users subvert enterprise control? Can encrypted applications be accelerated for optimized performance? > While SSL offload or SSL VPN technologies can help organizations manage SSL traffic for applications that they control, there has not been a practical solution for inside-out SSL. If an organization were to adopt a solution to resolve these issues, it would need to understand native SSL traffic flowing to external applications, be operationally affordable, not impede business (neither performance nor privacy), and be extensible and adaptable. Unfortunately, past technology efforts to resolve these issues for unencrypted traffic have proved inadequate none can see the encrypted traffic. While SSL offload or SSL VPN technologies can help organizations manage SSL traffic for applications that they control, there has not been a practical solution for inside-out SSL. In other words, traditional security and networking solutions cannot effectively protect users inside the corporate network from safely accessing applications and information outside the corporate network (e.g., Salesforce.com, employee benefits providers, and the wide variety of non-business-related applications their employees use). Blue Coat s new SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic both internal and external. Because this is a proxy, traffic is terminated enabling unprecedented visibility and context and then reinitiated, according to the policies set by IT. Termination by a proxy is the only way to gain visibility and control of SSL communications. It provides a critical 1 < >
3 control point for protection (against viruses, worms, spyware, and phishing), policy (manage the who, what, where, when, and how of user/application interaction), and performance (cache, compress, and prioritize traffic). This new functionality is part of Blue Coat s market-leading proxy appliance, Blue Coat SG, which means that organizations benefit from the deployability of the Blue Coat solution using an appliance form factor, single operating system, and single enterprise management platform all with a track record of thousands of enterprise deployments. Organizations need to take care in deploying SSL proxy functionality. Enterprises should ensure that their acceptable use policies incorporate the appropriate language, and that they take advantage of Blue Coat SG s granular controls to mitigate any potential privacy concerns. SSL Traffic on the Rise Organizations continue to implement Web model applications (Web apps, Web 2.0, XML, Web services, etc.). This has comprised the overwhelming majority of new application development for the last several years. As enterprises become more comfortable with Web technologies, and more adept at deploying (or buying) them quickly, Web technologies are being used for business-critical applications. With that criticality, however, security issues associated with Web technologies become more important. Indeed, to a large degree, enterprise Web applications must be deployed with the assumption that they will be accessed over public infrastructure (i.e., the Internet) whether that is because the application is hosted by a third party, or simply because users are accessing the application that is based outside the enterprise. This assumption dictates that most enterprise Web applications are typically accessed over an encrypted channel Secure Sockets Layer (SSL) to increase confidentiality and integrity. In fact, some leading edge organizations have adopted an all-ssl approach for their networks in an effort to protect the privacy of all their communications. Additionally, enterprise users are relying on SSL to access partner applications (e.g., suppliers, researchers) Finally, consumers continue to conduct more of their personal business online which further adds to the growth in SSL traffic. All of these dynamics contribute to massive growth in SSL-encrypted traffic where enterprises are 2 < >
4 experiencing double the amount of SSL traffic they had a year ago (7-10% growing to 14-20%), and expecting SSL to comprise 30% of Web traffic next year. (source: Blue Coat SG customer logs and projections). IT is Blind to Encrypted Traffic SSL encryption was designed to create a trusted class of Web traffic when the little padlock shows up in a browser, the traffic is deemed secure. This confidentiality has enabled businesses and consumers to take advantage of anywhere, anytime, any user encrypted connection to drive tremendous commercial exploitation of the Web. There is, however, a downside: encryption, the very thing that keeps prying eyes from SSL traffic, also makes it nearly impossible to see, understand, or manage that traffic. Indeed, in most organizations, port 443 (the designated port for SSL traffic) is completely unscrutinized traffic freely and blindly flows in and out of the enterprise. This raises three sets of issues: first, IT lacks any control over this traffic; second, IT has no ability to protect itself from threats flowing in the encrypted traffic stream; and third, IT cannot prioritize and accelerate encrypted traffic some of which may be mission-critical. Lack of Policy Control Driven by security, regulatory, and liability concerns, a growing number of organizations are attempting to manage enterprise Web traffic (witness the growth in URL and content filtering). The growth in SSL traffic, however, means that IT s ability to manage and control user/application interaction is declining. So the IT budget spent on URL filtering is dwindling in effectiveness, as SSL communication offers an easy way to circumvent corporate policy. Additionally, rogue applications like Skype, peer-to-peer file sharing applications, and IM all use port 443 (some encrypt, some do not) since they know that IT has no ability to examine such traffic. Lack of Protection Information security threats increasingly use SSL to propagate, hide, and increase effectiveness. Some of these threats (viruses, worms, Trojans) use SSL inadvertently via Web mail (e.g., Gmail over HTTPS which does not have virus scanning) or collaborative extranet applications. 3 < >
5 Threats can also encrypt with SSL deliberately some examples: -> Secured phishing, where the attack is performed over SSL to escape detection, and to increase the appearance of authenticity -> Secured spyware or researchware (e.g., Marketscore), where all user traffic is run through Marketscore s servers via SSL -> Guardster, s-tunnel, JAP and other anonymizing services designed to circumvent controls. -> Viruses and worms that leverage encryption have been predicted, and remain on the horizon For most organizations, the information security group is chartered to manage risk which they cannot do if a significant percentage of user/ application communications is invisible to them. Lack of Performance Given the importance of many of the business applications using SSL, it is obvious that SSL-enabled enterprise applications should be afforded the highest performance. They are typically applications that need acceleration technologies (caching, compression) most. Unfortunately, because of the encrypted nature of this user/application interaction, acceleration is impossible with today s dedicated network acceleration gear. If the traffic is invisible, it cannot be compressed, cached, or accelerated in any fashion. As a result, performance of critical applications may suffer. What Does The Ideal Solution Look Like? For organizations that elect to address this blind spot, what is the right solution? First, the solution must understand and control native SSL traffic. Second, business performance and processes cannot be impeded. Third, nobody wants to pay more for the solution than the problem costs so it must be operationally affordable. Fourth, the solution cannot be a dead end, single capability that requires more hardware for every feature it must be extensible and adaptable. 4 < >
6 Natively understand and control SSL who, what, where, when, how? Any solution deployed for this purpose should be able to fully understand SSL not just a few parameters of its packet stream. Fundamentally, this means the ability to grasp, and govern user-application interaction including who (e.g., actual end user), what (e.g., application type, actual app), where (e.g., where is the user, where is the application coming from), when (e.g., priority, time of day, quota), and how (e.g., protocol, method, user agent). Given the encrypted nature of SSL traffic, there is only one way to understand all of these attributes a solution must terminate SSL traffic and become part of the tunnel. Doesn t Impede Business The solution cannot impede the flow of business. There are several requirements that can be extrapolated from this statement. First, given the criticality of (some) SSL traffic, the solution cannot introduce significant latency into the enterprise network up to very high (100s of Mbps) throughputs. Second, given the sensitive nature of SSL, the solution should have the flexibility of being able to pass-through certain known, appropriate traffic, while examining and controlling other traffic. This granularity should extend to any caching functionality as well. Finally, logging and auditing must be flexible and thorough, to prevent any opportunity for abuse. Operationally Affordable Any solution should be manageable across a large enterprise. This translates to something that is easily deployed in large numbers, and furthermore, can be efficiently managed across those large numbers. Typically, this means that the solution is ideally delivered in an appliance form factor, involving as simple a deployment as possible. Additionally, large enterprises will require centralized enterprise management capabilities deployment, configuration, monitoring, and reporting. Extensible and Adaptable Enterprises are always trying to increase predictability in cost, in vendor management, and in integration and operations. The last thing most organizations want is yet another single-purpose box. Generally, organizations want best-of-breed functionality, yet integrated into a solution that covers a class of problems. 5 < >
7 Can Current Technologies Alleviate The Problem? Unfortunately, existing technologies mostly attempt to inspect the few unencrypted elements around the interaction (port, IP address), but are hardly able to understand the nature of the traffic, let alone that of the user-application interaction. Routers, firewalls, and intrusion detection/ prevention systems cannot inspect encrypted traffic. Similarly, URL filtering databases can help a bit in that they can categorize IP addresses, but operate from the same limitations they can t see the nature of the traffic or the interaction because the traffic remains encrypted, so even the hostname is typically obscured. URL filtering databases are becoming more popular, but alone their effectiveness is waning with the growth in SSL traffic. HTTP proxies are often used to increase control over an organization s Web traffic. Due to the nature of proxies (i.e., they terminate the protocols that they proxy), they offer a higher degree of control than simple URL filtering databases. Even so, simply proxying HTTP doesn t help with the SSL issue. SSL-offload and SSL VPN solutions have often been placed in front of application servers to help scale Web servers making heavy use of SSL or, in the case of SSL VPN, to provide a cost-effective mobile remote access solution. Unfortunately, these solutions aid IT only in managing SSL that they already control they cannot help organizations control inside-out SSL traffic from external sites. The Power of the Proxy Because a proxy is an active device (i.e., it terminates traffic), it acts as both the server to the client, and the client to the server. Thus, it has a native understanding of both the user and the application. For many organizations, users will only connect to the Internet via a proxy because of the control it affords an enterprise. Because a proxy terminates connections, it offers a critically important control point for policy, performance, and protection of all Web-enabled user and application interactions. Blue Coat SG is the leading secure proxy appliance, offering enterprises the power of the proxy in a broad range of sizes. Blue Coat extends that leadership by offering SSL proxy functionality on its market-leading proxy appliance. 6 < >
8 Protection Blue Coat s protection capabilities include components built into Blue Coat SG that guard against spyware, phishing, and pharming via Blue Coat SG s native understanding of applications, content, protocols, and users. Furthermore, Blue Coat AV appliances integrate with Blue Coat SG to scan Web traffic for threats, without negatively impacting application performance. Blue Coat s protection extends from HTTP-based applications to any application or exploit that uses Web protocols including IM-based threats and exploits that target specific browsers. Policy Because Blue Coat SG terminates and reissues all supported application traffic (HTTP, SSL, FTP, streaming, P2P, IM, telnet, DNS, etc.), it has native understanding of application and user interactions. This also enables finegrained, policy-based control Blue Coat SG has over 500 different triggers and actions it can automatically apply to govern interactions between applications and users managing who, what, where, when, and how. Some examples include: -> Who: Blue Coat SG integrates with all major authentication systems and user stores, so identifying a user and mapping his credentials back to a group, locating the role he plays in the organization, and the access rights afforded to him are possible all from within the proxy appliance. -> What: Blue Coat SG understands the different types of applications running over the Web e.g., static and dynamic Web pages, instant messaging, peer-to-peer, , Web mail, FTP. Blue Coat SG also understands which individual application, and what kind of transaction (protocol, method, etc.) is underway. -> Where: Blue Coat SG s ability to run the broadest possible set of filtering databases enables organizations to exert control over where applications come from both from types of servers and applications, and from specific sources. -> When: Blue Coat SG s controls extend to time enterprises can enforce policies about when users can get to a specific application and how much they can do, as well as enforce priority over different types of application traffic (e.g., Web mail can only take up 5% of bandwidth). 7 < >
9 -> How: Finally, Blue Coat SG can govern how users and applications interact which user agents (clients), which protocols and methods, and what modes of interaction (e.g., no javascript). All of the above controls incorporate a variety of different actions including the ability to allow the transaction, advise or coach the user, deny the interaction, strip offending content, modify to comply with policy, and throttle application traffic by any of the aforementioned variables. Performance Again, because a proxy acts as both client and server, and has full visibility and context of the user-application interaction, it is uniquely suited to apply acceleration techniques including bandwidth management (i.e., limit the unimportant traffic so business-critical traffic flows unimpeded), compression, and a variety of caching techniques. Blue Coat SSL Proxy Blue Coat has introduced additional functionality to Blue Coat SG an SSL proxy. In addition to proxying encrypted traffic, there are several SSLspecific features that enable organizations to exert more flexible control over encrypted traffic. They are described below in the context of the solution criteria laid out earlier in this paper. Natively Understand and Control SSL Blue Coat SG s SSL proxy functionality terminates SSL traffic. It can exert policy control at the initiation of the SSL session (i.e., on client connect, and on server response) and throughout the session because there are two separate SSL connections: one between the client and the proxy, and another between the proxy and the server see Figure 1. This enables all of the proxy controls laid out in the previous section, but also some SSL specific controls. First, Blue Coat SG can make gateway trust decisions meaning that organizations can decide whether or not they will accept secure connections from servers with questionable certificate (e.g., the certificate is out of date, or issued by an untrusted party, or doesn t match the server name), instead of trusting their users to make that determination. This has tremendous anti-phishing benefits most of the servers used in phishing and pharming attacks depend on users blithely clicking yes to certificate warnings. Second, Blue Coat SG s SSL proxy functionality can proxy SSL, hand off any HTTPS to the HTTP proxy, and manage traffic tunneling through 8 < >
10 SSL (typically rogue applications like Skype, Peer-to-peer, or IM) differently deciding whether or not to pass that traffic which has significant benefits for security groups trying to manage vulnerabilityprone consumer applications. Figure 1 Blue Coat SG provides critical check points during SSL session initiation and management, including checking policies on users accessing external Web content, checking certificates used in the SSL connection, and ensuring inbound/ outbound information does not compromise security or compliance policies. Will Not Impede Business Blue Coat customers have deployed Blue Coat SG to manage Web traffic in some of the largest organizations in the world. For some customers who deploy Blue Coat SG for security and control reasons, the surprise is that application performance improves as a result of the integrated acceleration techniques (compression and caching). Correctly sized, Blue Coat SG will handle any size network, and accelerate overall session performance. The other important aspect to note is the flexibility of the SSL proxy functionality organizations can, based on a variety of criteria (e.g., user, application, source): -> Pass-through SSL traffic untouched, -> Make some initial judgments about where the traffic is coming from and going to, then pass it through, or -> Fully proxy the SSL connection. 9 < >
11 These three options are represented in the three diagrams in Figure 2. Figure 2 Blue Coat enables IT organizations to apply varying levels of SSL proxy management, from simply passing through traffic to full proxy enabling policy-based SSL control. In the latter two of the above scenarios, organizations can also warn endusers of what is going on (e.g., a splash page that lets users know that some monitoring is going on, and remind them of the acceptable use policy). This flexibility extends to caching, logging, and administrative functions as well. Using Blue Coat SG s SSL proxy capabilities, organizations can be selective about what they cache perhaps only caching certain elements that do not contain sensitive data (e.g, GIFs and JPEGs). Similarly, logging can be equally selective, and organizations can send the logs off to a secure server to ensure auditability. Deployability and Management As stated above, Blue Coat SG is deployed in many of the world s largest enterprises. This is not a coincidence: Blue Coat SG is an appliance, and has one operating system (SGOS) regardless of which models an organization chooses. SGOS has grown organically, not through mergers and acquisitions. Furthermore, Blue Coat s Director and Reporter products enable organizations to manage and report across an enterprise of many Blue Coat SGs. 10 < >
12 Extensible and Adaptable Blue Coat proxy appliances are a foundation for making the Web work for business. Blue Coat SG s capabilities solve the gamut of Web security and performance issues, and are not a one-off, single-purpose solution. Whether threats materialize as spyware, phishing, viruses, worms, productivity-sapping rogue applications, or liability-inducing inappropriate content, Blue Coat SG prevents them from entering enterprises all while accelerating legitimate application traffic. Conclusion SSL traffic is growing into a significant amount of enterprise network traffic. For inside-out SSL interactions between users inside the enterprise and applications outside it, this is a significant blind spot for IT. IT is unable to secure, control, or accelerate this traffic. Blue Coat s new SSL proxy removes IT s blinders, enabling organizations to establish a critical control point for policy, performance, and protection of users and applications using SSL. While enterprises should update acceptable use policies, Blue Coat s solution affords the appropriate flexibility and controls to mitigate any potential privacy concerns within the enterprise. 11 < >
13 Blue Coat Systems, Inc BCOAT Direct Fax Copyright 2007 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use, Blue Coat is a registered trademark of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners.
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity
ProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
Masters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
E-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Secure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.
SafeNet Content Security esafe SmartSuite - Security that Thinks Real-time, Smart and Simple Web and Mail Security Solutions Product Overview Malware CONTENT SECURITY Antivirus Malware A secure Web gateway
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
ProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
WAN Optimization for Microsoft SharePoint BPOS >
White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
Reverse Proxy for Trusted Web Environments > White Paper
> White Paper ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
Filling the Threat Management Gateway Void with F5
Filling the Threat Management Gateway Void with F5 With the discontinuation of Microsoft Forefront Threat Management Gateway, enterprises need to find a replacement. F5 Secure Web Gateway Services offer
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
Gateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
Contact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4
Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected] http://www.bluecoat.com For concerns or feedback
Assuring Your Business Continuity
Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600
MX Sizing Guide MARCH 2014 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway
TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Controlling SSL Decryption. Overview. SSL Variability. Tech Note
Controlling Decryption Tech Note Overview Decryption is a key feature of the PA-4000 Series firewall. With it, -encrypted traffic is decrypted for visibility, control, and granular security. App-ID and
Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network
Protecting a Corporate Network with ViPNet Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Introduction Scope ViPNet technology protects information systems by means
Still Using Proxies for URL Filtering? There s a Better Way
Still Using Proxies for URL Filtering? There s a Better Way October 2013 The Arrival of Proxies Firewalls enforce network access via a positive control model, where only specific traffic defined in policies
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE (Updated April 14, 2008) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600
MX Sizing Guide DECEMBER 2015 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations
Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
Internet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Cisco ASA 5500 Series Content Security Edition for the Enterprise
Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
athenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
Presented by Philippe Bogaerts Senior Field Systems Engineer [email protected]. Securing application delivery in the cloud
Presented by Philippe Bogaerts Senior Field Systems Engineer [email protected] Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
