Intrusion Defense Firewall
|
|
|
- Anissa Nelson
- 10 years ago
- Views:
Transcription
1 Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008
2 I. EXECUTIVE SUMMARY Mobile computers that connect directly to the Internet outside of a company s firewall can introduce risk into the corporate network and thus require a higher level of security to protect against network intrusions. Host intrusion defense systems combine intrusion detection and prevention capabilities, and run on the host itself. There are two main approaches to host intrusion defense: 1) system execution control; or 2) a network approach. The network approach offers several advantages by blocking malicious code before it impacts the host, targeting potential vulnerabilities and known exploits, in addition to providing proactive vulnerabilityfacing network inspection. Using multiple techniques to filter both inbound and outbound traffic insures optimal efficiency and effectiveness. This blended approach includes deep packet inspection, exploit and vulnerability filters, and custom filters to protect custom applications. A tunable, flexible solution insures delivery of business-critical communications while protecting against unwanted network traffic. This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques. II. THE TWO APPROACHES TO HOST INTRUSION DEFENSE Host intrusion defense systems combine intrusion detection and prevention capabilities, and run on the host itself. They complement existing network security mechanisms, acting as another layer of protection against attacks that now routinely bypass or penetrate perimeter defenses, and target vulnerabilities in software on the host. Although there are many different host intrusion defense systems available to enterprises, there are two main styles or approaches. These two approaches are fundamentally different but share the same objective of keeping malware off the host. The challenge for any system is to achieve a high degree of accuracy by minimizing the number of false positives (blocking good data) and false negatives (allowing bad data). There is a certain amount of tuning that is necessary to make sure the system is operating optimally. Style 1: System Execution Control System execution control is often referred to as a behavior-based approach. These systems learn what the normal behavior is for a host, and then they can identify and block strange or anomalous behavior. Typically, this approach uses techniques such as system call interception, which monitors the interaction between application software and the operating system. Most first-generation host intrusion detection and prevention systems (IDS/IPS) tend to use the system execution control approach. 1 White Paper Intrusion Defense Firewall
3 The advantage of this approach is that it provides a broad protection umbrella that covers any operational anomaly. These systems can, for example, protect more than just the network interface and can cover attacks launched from portable storage devices and the keyboard. System execution control systems, by design, also do not need signature updates since they provide zero-day protection once they are trained on normal behavior. The disadvantage of system execution control systems is that they have relatively high care and feeding requirements. Each host must be trained to establish the rule set and continuously be retrained as software (including operating systems and enterprise and web applications) is updated. Another maintenance issue is the removal of malicious code. Even though malicious code might have been blocked from executing, the infected machine still needs to be cleaned. Style 2: Network Approach A different approach to solving the same problem is the data network style. This approach uses traditional, proven network perimeter defenses such as firewall, IDS and IPS, but applies them at the network layer on the host. The enforcement point is typically kernel mode based. Although this approach has a smaller coverage umbrella compared to system execution control, it does cover the network interface, which is the attack vector of greatest concern, especially with today s increase in blended web threats. In many cases, especially with mobile laptops, it is the highest priority concern. In contrast to system execution control, the network approach is also more proactive: it stops malicious code before it gets on the host. It can, however, be challenging to understand the packet stream in enough detail to make accurate decisions on whether the data should be allowed or blocked. Instead of training, these systems are tuned with rule updates to control the blocking. These rules and signatures are different than malware signatures used by Trend Micro s virus and spyware scan engines. They are proactive by covering the vulnerability, rather than individual exploits. III. ADVANTAGES OF THE NETWORK APPROACH There are many trade-offs in determining the defense approach that is not only appropriate for your environment, but also for the risks and threats you face. The two main business drivers for host intrusion defense are, however, quite universal: 1) to protect particularly exposed endpoints; and 2) to provide protection until you can patch vulnerabilities. This is becoming more and more urgent in today s world of fast moving attacks that hit before patches, assuming they re available, can be downloaded, tested, and deployed. The bulk of malicious code and targeted attacks now occur soon after a software vulnerability becomes known. The vendor s announcement of the patch update itself may start the race. You have to shield or patch as soon as possible. The vulnerability-shielding aspect of host intrusion defense offers immediate value since the shields can be updated without a system re-boot or the extensive testing required by a bundled patch update. 2 White Paper Intrusion Defense Firewall
4 In short, a network approach to host intrusion defense with vulnerability-facing signature updates is an effective, proactive solution. Just having this host intrusion defense agent on exposed endpoints or on endpoints regularly handling compliance-relevant data can make your audit compliance negotiations much simpler. Logs that show blocking of specific attacks on critical and vulnerable applications are a fundamental part of demonstrating that your operations are secure, and they help justify the investment in host intrusion defense. IV. TREND MICRO S BLENDED APPROACH TO HOST INTRUSION DEFENSE The Trend Micro Intrusion Defense Firewall plug-in for OfficeScan Client/Server Edition 8.0 is an advanced host intrusion defense system that uses multiple techniques to filter malware from the incoming and outgoing traffic stream (figure 1). It is the blending of multiple filters that offers an extremely efficient and broad range of protection against malware. The layered approach can be compared to sifting gravel through a series of increasingly finer grained screens. You don t start with the fine screen because it would immediately get clogged up with larger stones. Stateful Inspection Host Firewall Deep Packet Inspection Block all unwanted protocols Protect against Denial of Service Find bad data in allowed protocols Exploit Filters Block known exploits Vulnerability Shielding Smart Filters Protect before it can be patched Protect what cannot be patched Stop zero-day attacks Policy enforcement Custom Filters Legacy and custom applications Figure 1: Trend Micro s Blended Approach 3 White Paper Intrusion Defense Firewall
5 Step 1 Stateful Firewall A stateful inspection packet filtering firewall allows traffic that is known to be good, and blocks everything else. This step dramatically reduces the attack surface area, as all ports are closed by default, and the firewall rules open up the specific ports required by the applications on the host. Step 2 Deep Packet Inspection Next, the traffic that goes through the firewall is examined with deep packet inspection technology that looks for patterns in the payload. Each byte of the packet is examined just once to minimize performance impact, and the sequence of rule sets that control deep packet inspection filtering follow in parallel. While these steps execute in parallel, they follow the logical order shown in figure 1. Step 3 Exploit Filters Here, known malware is efficiently detected and filtered out with exploit filters that use signatures for individual exploits that are well-known and widespread. This is similar to antivirus signature updates. A long list of specific malware signatures is not required, but selected high runner exploits get their own filter. In addition to efficiency in detection, this allows very specific reporting in the logs since the originating IP address and specific exploit can be recorded. Step 4 Vulnerability Filters Vulnerability-facing filters have the greatest business benefit, as one filter will shield a particular vulnerability from an unlimited number of exploits. It may turn out that a new exploit can evade a current vulnerability signature, but if that ever happens, an updated exploit filter or vulnerability filter can be deployed. The update mechanism allows revised or new filters to be pushed out automatically whenever necessary. Step 5 Smart Filters Smart filters provide enterprises with the ability to enforce corporate network policies for the use of certain applications. For example, administrators can control whether Instant Messaging applications are allowed, and if so, designate which Instant Messaging clients are supported. Administrators can also use smart filters to block peer-to-peer applications such as Skype and BitTorrent, and media streaming applications such as YouTube. In addition, smart filters can help determine which browsers such as Internet Explorer, Safari, Firefox, and Opera are supported in the enterprise. Mitigating actions include dropping the connection or selectively blocking or even modifying offending bytes in the packet. Step 6 Custom Filters Custom filters can be developed to provide additional protection for specific protocols, and custom and legacy applications. They can also be designed to log application security events. Unlike behavior-based systems, which often have a closed design that does not allow for customization, the Intrusion Defense Firewall s open design allows third parties and customers to create their own custom filters. 4 White Paper Intrusion Defense Firewall
6 V. BENEFITS OF INTRUSION DEFENSE FIREWALL S BLENDED APPROACH All intrusion defense systems need to be tuned for optimal operation in order to reduce false negatives and false positives. The firewall blocks a lot of traffic, but opening the door for port 80, for example, results in false negatives as malware embedded in HTTP traffic now gets a free ride into the network. Custom filters that are designed to lock down one particular application for example, can result in false positives. As the controls get tightened to only allow specifically formatted data, there would be little chance of missing exploit code, but a greater chance of rejecting good data. Exploit filters that stop a particular exploit specimen and vulnerability filters that shield a known vulnerability offer a good balance between the two error types. The error trade offs between a false positive and false negative also track the order in figure 1. As we move from Step 1 to Step 6, the chances of a false positive increase. As we move up from Step 6 to Step 1, the chances of a false negative increase. This again illustrates the importance of, and flexibility in, tuning. Using the right mix of filters is the secret to finding the optimal balance point. The Intrusion Defense Firewall is bi-directional; it allows different rules to be applied to data entering or leaving the endpoint. This allows you to deal with both incoming attacks and outbound compliance issues. For example, in an e-health patient record application, a custom rule could block a specific message type containing personal information from leaving the endpoint if it is not encrypted. In normal operation these messages should be encrypted, but maybe a configuration problem on a backend system allowed this data to go out unencrypted anywhere on the Internet, instead of being encrypted for only a select set of trusted endpoints. The Intrusion Defense Firewall plug-in for OfficeScan is unique in that it not only can allow or block data, it can also modify data. Data modification rules are used sparingly, but they can be quite effective in neutralizing potentially malicious code without taking down the session and creating a false positive. One example of a simple data modification rule is to alter the response to banner scans. This can deflect some automated attacks that are looking for the signature of a particular system. The operation and flexibility of the different filter types is explained in more detail, with examples, in the next section. 5 White Paper Intrusion Defense Firewall
7 VI. FILTERING STEPS IN ACTION Firewall There are two important considerations when implementing a host-based firewall: 1) having comprehensive controls over inbound and outbound traffic; and 2) making it manageable. By controlling which traffic is allowed to access and leave a host, the attack surface of the host is minimized. Implementing this with a relatively small rule set is essential to reducing management overhead and the chance of configuration errors. The Intrusion Defense Firewall rules employ an object re-use paradigm for rule construction, which allows the rule set to be compact. Restrictions on source and destination MAC and IP addresses can be used to ensure traffic is only coming from trusted hosts. An example to consider for rule changes is the following: imagine you have two separate network segments (A and B) each containing 100 endpoints. Firewall restrictions in each zone allow each host to talk to hosts within its segment while outside connections are restricted to a limited number of hosts. Now you want to move five endpoints from segment A to segment B. In many systems this would represent up to 10 rule changes at up to 200 different hosts. However, with Trend Micro s centrally managed system, this can be accomplished with as little as two rule changes, along with a new segment B policy change to the five servers. Firewalls are a commodity today, and many host firewalls that are included with the operating system, such as IPTables, provide excellent protection. However, they do not provide centralized management, which is required to make them cost-effective to operate and maintain. When you consider the scale that is implied with host-based firewalls, ease of management is essential. Exploit Filters Exploit filters provide protection based on the characteristics of a known exploit against a known vulnerability. In some cases, an exploit may be unique in its method of attack on a vulnerability. In this case, exploit filters are simply the most efficient way to detect and block it. In addition, exploit filters can support reporting and audit requirements by providing information on how many times a particular attack has been launched against the organization. Vulnerability Filters Vulnerability filters shield known vulnerabilities from unknown exploits. This is the filtering step that currently provides the maximum business benefit for the Intrusion Defense Firewall. An example of a vulnerability that is best addressed by this type of filter is the Windows Metafile (WMF) vulnerability in the Windows Graphics Rendering Engine, which allows for arbitrary code execution (MS06-001). 6 White Paper Intrusion Defense Firewall
8 Figure 2: Windows Metafile Integer Overflow Vulnerability Filter A Windows Metafile is a standard Windows image file format. It consists of a set of graphics functions and parameters that describe the steps for rendering an image. A WMF has a 16-bit format that can contain both vector and bitmap information. A WMF file contains a header followed by one or more records of data. Each record is a binary-encoded function call to the Microsoft Windows Graphics Device Interface (GDI). The data from each record is passed to the respective GDI functions as a parameter to render the desired image. One such function is the SETABOPRTPROC function, which sets the application-defined abort function that allows a print job to be cancelled during spooling. The second argument expected by the function is a pointer to an arbitrary function. When a WMF file calls this function, the function code is directly supplied as the last parameter. The first parameter is skipped due to the defined calling convention for WMF format. The vulnerability in this case exists in the Microsoft Windows operating system core graphics component. The vulnerability can be exploited by the unlimited access to GDI functions provided to WMF files. Specifically, the ability to invoke the SETABORTPROC GDI function allows a WMF file to deliver arbitrary code that is called by the operating system. To exploit this vulnerability, an attacker may deliver a malicious WMF file, and once the target user is persuaded to open the malicious resource, the vulnerability is triggered. The code (malicious payload) delivered is used when the abort procedure is called either because an error occurs during the processing of the WMF file or as a result of an explicit GDI call. 7 White Paper Intrusion Defense Firewall
9 Unlike an exploit filter approach that would focus on identifying known malicious payloads, a vulnerability filter approach looks for specific start and end patterns that indicate the presence of a Windows Metafile and then checks for calls to SETRBABORTPROC or MFCOMMENT, which would indicate that the vulnerability is being targeted. Smart Filters Smart filters are designed to provide network-based application control to help enforce corporate network policies. Smart filters can be deployed in either detect mode or in prevent mode (for blocking). For example, the Application Control for Opera Web Browser filter could be configured to generate an alert whenever Opera browser traffic is detected on the network, but to allow the user to continue to use the Opera browser. These alert intervals can be configured to an optimal timeframe, such as alerting once a day. Alternatively, the Application Control for YouTube filter could be configured to block any media streaming requests from the YouTube website so that users cannot view video clips when at work. Custom Filters Custom filters are smart filters that are tailored for a specific application, rather than distributed as a generic package. Because the Intrusion Defense Firewall plug-in provides an open design, these filters may be created by customers. In many cases they are simply modifications of existing filters that accommodate something unique for an application. VII. CONCLUSION Any host intrusion defense system requires precise balancing between false positives and false negatives for optimal operation. Trend Micro s approach is unique because of the multiple filtering techniques applied at the network layer. Intrusion Defense Firewall Plug-In for OfficeScan enhances endpoint security with a Host Intrusion Prevention System (HIPS) designed to protect applications and systems from vulnerability exploits, and shield vulnerabilities from threats before patches can be deployed. The extensible plug-in architecture literally extends the OfficeScan lifecycle, requiring less administrative effort than full product updates. As a simple plug-in, it is easily deployed and managed within the existing infrastructure. The solution s highperformance, deep-packet inspection engine monitors incoming and outgoing traffic for network protocol deviations, suspicious content that signals an attack, or security policy violations. The result is an extremely effective solution consisting of a firewall and five types of complementary filters with tuning flexibility by Trend Micro, Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. [WP02_IDF_080902US] 8 White Paper Intrusion Defense Firewall
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
New possibilities in latest OfficeScan and OfficeScan plug-in architecture
New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 What is Trend Micro OfficeScan? Trend Micro OfficeScan Corporate Edition protects campus networks from viruses, Trojans, worms, Web-based
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
CA Host-Based Intrusion Prevention System r8.1
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8.1 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS ENDPOINT FIREWALL, INTRUSION DETECTION,
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device
Ch.9 Firewalls and Intrusion Prevention Systems Firewalls: effective means of protecting LANs Internet connectivity is essential for every organization and individuals introduces threats from the Internet
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems
Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
