1 Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc.
2 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson Business Development Global Account Manager Actual work: Installation / Configuration Design Support Product development / POC Audit Penetration testing Sales / BD
5 Firewalls The Firewall was adopted to protect corporate networks from would-be Internet attackers. Firewalls, deployed in-line, typically use a set of network layer rules to determine what traffic can enter/leave the network. Improvements to Firewall technology have been largely limited to performance. As bandwidth increased, Firewalls had to process faster. (Some FW companies have increased app visibility) New technologies are increasing FW capability to inspect traffic faster and more intelligently
6 Anti-Virus Anti-Virus provides software / desktop level risk management for workstations in the enterprise. Uses malicious code signature database to determine whether workstation was being attacked/compromised. Enterprise solutions evolved to provide central management and enhanced capability for workstation control. (McAfee Enterprise Policy Orchestrator.) As larger AV vendors acquire new technologies, feature set improves (DLP, Encryption, Config Management)
7 VPN VPN (Virtual Private Networking) was adopted to provide secure remote access to corporate networks. Provides remote access via IPSEC or SSL to the corporate network Enhanced features can include workstation integrity checks and role based access control Also is often used to provide connectivity between networks for business to business transactions.
8 Intrusion Detection / Prevention IDS was developed to detect attacks on the network and alert the security administrator IPS, typically inline, added the capability to stop the attack automatically or manually IDS/IPS originally relied entirely on signatures, but evolved to include clever behavioral, heuristic-based algorithms to detect threats
9 Content Filtering Content Filtering/Web Filtering emerged to increase worker productivity and reduce workplace risk. Monitors web surfing and other application use leaving the corporate network. Manages which websites each department can use/see. Leverages policy to reduce risk of malicious injection of code into the network/users browser. Some systems provide value added functions such as web acceleration / caching.
10 Data Loss Prevention Data Loss Prevention (DLP) technology was developed as a direct result of lost corporate information from inside the network. DLP Technology uses a multi-faceted approach to solving the Data Leak problem, including network bases sensors, workstation software, and complex policy management The technology is largely developed to keep corporate intellectual property and finance data from being distributed. Also used to maintain compliance initiatives around SOX, HIPAA; showing due diligence toward securing patient / customer data
11 Threat Evolution Malicious code exposing confidential data has increased significantly Multi and Blended attacks are now a common practice. is the most common delivery mechanism. The motive and intent is changing Moving from notoriety to financial gain. Theft of financial and personal information. Traditional security isn't enough
12 The Traditional Approach to Network Security First you buy routers, firewalls, VPNs, server load balancers Then you buy network intrusion prevention, antivirus, anti-malware, antispyware, anti-spam, antietc Then you buy proxies, web filtering, instant messaging security, data loss prevention, tomorrow s security product, and on and on. Impact High integration effort with multiple products and vendors Weak security due to lack of integration and unified configuration Operationally expensive to manage and operate Impractical and too expensive
13 A New Security Architecture Is Required Firewall Antivirus IPS Defend against intrusions Protect and web applications from virus infection Protect against malicious attacks Antispam Reduce unwanted Web filters Eliminated unproductive web-browsing VPN Delivering secure remote access VPN IPS Firewall Servers Antivirus Antispam URL Filters Users
14 Multiple Point Solutions Add Complexity Perceived Advantages Comprehensive security approach Quickly react to individual threats Real Disadvantages Requires multiple products that don t talk to each other Increases network complexity and operational cost Non optimal security implementation VPN IPS Firewall Servers Antivirus Antispam URL Filters Users
17 UTM - Best treatment for Appliancitis From: Single hardware platform Unified management interface One vendor contract / contact Single licensing agreement (..sometimes) Reduced data center footprint Power consumption reduction Minimized point of failure/latency Simplified network security architecture Speeds and simplifies support and problem resolution Allows for more accurate policy development Quickly correlates events between components Blended threat protection! To:
18 UTM Box (Small enterprise)
19 UTM Box for MSS and Clouds
20 Managed Security Services
21 What is/are MSS? Wikipedia defines Managed Security Services as simply network security services that have been outsourced. A company providing such a service is a Managed Security Service Provider (MSSP) Typical reasons for engaging an MSSP to manage your IT Security Improve IT Security and Compliance Reduce Security Capex and Opex expenditures Focus on core business intitiatives and competances
22 MSS Value Added Services Services that MSSPs typically offer: Vulnerability Assessments Penetration Tests FW Management IDS Management VPN Management Event Mitigation Services Data Archival Managed UTM
23 Traditional MSS - Customer Premise Equipment (CPE) Internet Content Filtering AV Firewall IPS NOC/SOC Facilitates Logical and Physical Segmentation Facilitates the addition of non security services such as Dial Back Up, WiFi LAN, Dual / Redundant WAN, 3G connectivity options and rate shaping / QoS
24 MSS benefits / concerns Who sees my data? Compliance responsibilities? I want access to my FW/Logs! Will people lose their jobs? Reduced CAPEX Economies of Scale around security services Top security analysts reviewing log material Enhanced correlation and automated security intelligence available All updates and patches done!
25 Cloud Security Services
26 What is Cloud Security Provider Edge Internet Legend Clear / Clean Traffic Potentially Bad Traffic Security Scanning Cloud security is essentially the concept of delivering security services without CPE. This means that the services are typically provisioned at the other end of the transport medium. End Users X/DSL / T 1
27 UTM in the Cloud Many carriers and cloud services companies are offering Managed Security in the Cloud via Unified Threat Management platforms. Why? Rapid Portfolio Creation Seamless Provisioning Increased Operational Efficiencies Single Vendor Contract Simple Licensing Easy correlation and alerting VIRTUALIZATION! Value Added Services Delivery Model Customer Wins!
28 Delivering Clean Pipe with UTM
29 Virtualization Providing virtual UTM services from a single platform to multiple customers and applications.
30 Cloud Computing Security These companies want to deliver your: Applications Desktops Storage High Powered Computing (HPC) Services from the internet to your office. And well they should but how do we secure it?
31 Cloud Computing Security Architecture Example Virtualized VDOM VDOM Virtual Machine Virtual Machine Virtualized Virtualized VDOM VDOM Virtual Machine Virtual Machine Virtualized Manager Manager DB Provisioning Analyzer Policy and Event Information Shared
32 Cloud benefits / concerns Who sees my data? Compliance responsibilities? Internet reliable? Reduced OPEX/CAPEX 0 point of failure Disaster recovery / business continuity outsourced! Infinitely and instantly scalable Supports burst Scales down for economy
33 About Fortinet
34 Company Overview Leading provider of ASIC-accelerated Unified Threat Management (UTM) Security Solutions Company Stats Founded in 2000 Silicon Valley based with offices worldwide Seasoned executive management team 1,000+ employees / 500+ engineers 300,000+ FortiGate devices shipped worldwide Strong, validated technologies and products 11 patents; 80+ pending Six ICSA certifications (first and only security vendor) Government Certifications (FIPS-2, Common Criteria EAL4+) Virus Bulletin 100 approved (2005, 2006, 2008)
35 The Integrated Security Platform Integrated Network Security Appliance Application Aware, Identity Based Firewall Routing, Traffic Shaping, Quality of Service, Server Load Balancing IPSec VPN & SSL VPN Termination Network Application Control & Recording Network Anti-Virus Anti-Malware Anti-Spyware Network Intrusion Prevention Network Data Loss Prevention Web URL & Content Filtering Vulnerability Management Appliance Auditing Patch Management Reporting and Compliance Smart Automation Security Appliance Anti-spam, anti-malware Server, gateway & transparent Quarantine, user self service Archiving, logging & reporting Database Security Appliance Database vulnerability assessment Security monitoring & auditing Monitor all access, users, methods Compliance reporting Web Application Firewall Appliance XML router & accelerator XML firewall & intrusion prevention XML denial of service protection SQL injection & malware protection Security Research & Development Streaming security updates for appliances Worldwide deployment infrastructure All original security research & development Updates for application intelligence, web filtering, intrusion prevention, anti-virus, anti-malware, antispyware, vulnerability assessment & database security Worldwide Update Service
37 Thank You. Kurtis E. Minder CISSP kurtisminder (skype)
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words
Security Models for Cloud Kurtis E. Minder, CISSP 1 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson Business
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Solving the Enterprise Information Security Problem Common Approaches Kurtis E. Minder Mirage Networks Topics Introduction Who, What, etc. Ubiquitous Technologies Developing Technologies The Gap Network
IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP email@example.com Security Security is recognized as essential to protect vital processes and the systems that provide those
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012
Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past
Solution Overview Cisco ASA 5500 Series Anti-X Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions.
FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 Course Overview Through this 2-day instructor-led classroom or online virtual training, participants
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Learn More: Call us at 877.634.2728 www.megapath.com Executive Summary Protecting Your Network and
I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000
Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business
Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
IBM Global Services IBM Internet Security Systems Norberto Gazzoni Italy Channel Manager firstname.lastname@example.org +39 347 3499617 IBM Internet Security Systems Ahead of the threat. 2006 IBM Corporation
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Partner with the UK s leading Managed Security Service Provider The Talk Straight Advantage Established in 2007, Talk Straight is an ISP with a difference, and is at the forefront of a revolution in cloud
Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
IBM Global Services ISS X-Force Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems Internet Security Systems, an IBM Company Security Market Overview Companies face sophisticated
Fortinet Overview Real Time Network Protection Stefano Chiccarelli Consultant Engineer EMEA email@example.com Company Overview First and only maker of ASIC-accelerated Multi-Threat Security Solutions
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud
Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions. The
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Total Network Security Advantage BSNL IDC India s first Uptime Institute Certified Tier-III data centres with combined connectivity and IT services availability from BSNL Low latency Internet Data Centres
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls