Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
|
|
|
- Jonas Hodge
- 10 years ago
- Views:
Transcription
1 Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA
2 Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE SECURIY NETWORK EQUIPMENT $9,209M FIREWALL/VPN EQUIPMENT $6,721M SECURE ROUTERS $968M INTRUSION PROTECTION SYSTEMS (IPS) $1,520M Source: Gartner Trends Telecom Forecast (March 2014) 2
3 yet Breaches Continue to Proliferate 3
4 Why Are Secured Networks So Exposed? Reactive vs. proactive security Attacks from multiple sources Threats from inside and at perimeter Advanced tools needed to meet advanced threats 4
5 Visibility Is the Key to Comprehensive, Cost-effective Network Security YOU CAN T SECURE WHAT YOU CAN T SEE 5
6 Multi-Tiered Security Specialized security tools Analytics and Heuristics Backed by Signatures and Policies Parallel deployments Inline, Out-of-band, Flow-based Protect against known attacks (signatures) Detect potential unknown threats (heuristics) Deployed throughout the network Not just at the edge (castle-moat is dead) Security tools externalize network complexity Risk-driven, maps into corporate risk and compliance frameworks Security Analytics and Heuristics Governance Risk and Compliance Inline: Firewall, WAF, IPS, Proxy, Anti-Malware, Anti-DDoS, DLP OOB: DLP, SIEM, DAM, FAM, IDS 6
7 Multi-Tiered Security Challenges Inline tools can be a single point-of-failure or bottleneck Critical links have tight maintenance windows Edge Router High-end tools require high-end processing Inline (Firewall, IPS, etc.) SPAN ports limit tool access and visibility Security tools are expensive Out-of-Band (IDS, anti-malware, etc.) Core Switch 7
8 Active Visibility for Multi-Tiered Security BEST PRACTICES Manage Unified Visibility Fabric with GigaVUE-FM Add non-security tools to maximize ROI Connect out-of-band security tools & leverage GigaSMART Connect inline security tools TAP all critical links (including virtualized infrastructure) 8
9 Active Visibility for Multi-Tiered Security Intrusion Prevention Systems Internet NetFlow Collector Intrusion Detection System Edge Routers NetFlow Generation SSL Decryption GigaStream Inspection Data Loss Prevention Core Switches Out-of-Band Malware 9
10 Inline Bypass Options: Physical & Logical GIGAVUE-HC2 Physical Bypass Protection Physically forwards packets in the event of a Gigamon power failure Can also be triggered with software command Ideal for deployments without redundant network paths Requires BPS module Logical Bypass Protection Inline tool failure detection: Loss of Link: the inline tool goes offline Loss of Heartbeat: the inline tool stops forwarding traffic Software Control: safely remove or upgrade inline tool without disrupting network Bypass options: Fail close: drop packets Fail open: forward traffic to network Failover to redundant network path: bring down network links Works with any standard interface module X24, GigaSMART-Front, Q06, and the BPS module Not supported on TAP modules (which can only receive traffic) 10
11 Active Visibility for Multi-Tiered Security ONE-TO-ONE AND ONE-TO-MANY Port A1 Port B1 Increase scale by distributing load across multiple inline tools Inline traffic can also be inspected by out-of-band tools 11
12 Active Visibility for Multi-Tiered Security MANY-TO-ONE AND MANY-TO-MANY TRAFFIC CONSOLIDATION Port A1 Port B1 Port A2 Port B2 VLAN 101 VLAN 101 VLAN 102 VLAN 102 Consolidate traffic from multiple network links to one (or more) inline security appliances VLAN tagging used to return packet to correct network link 12
13 Active Visibility for Multi-Tiered Security APPLICATION AWARE BYPASS AND SERIAL INLINE TOOLS Application Aware Bypass Serial Inline Tools A1 B1 A2 B2 A3 B3 A1 B1 A2 B2 A3 B3 Select traffic to be sent to inline security tools based on applications of interest Apply Flow Mapping to inline traffic Create L2-L4 profiles for each type of tool Bypass traffic that does not need inspection Improve network latency, app performance Send traffic to multiple serially connected tools Bypass unhealthy tools without bringing down network All serial tools are bypassed if one goes down Add/Remove/Upgrade tools easily 13
14 Active Visibility for Multi-Tiered Security INLINE TOOL GROUPS AND N+1 REDUNDANCY Inline Tool Groups Distribute traffic across multiple tools Parallel processing: Improved performance, inherent protection If inline tool goes down, traffic is redistributed across group If entire group goes down, bypass traffic (fail open / fail closed) Inline Tool Redundancy: N+1 Reserve tool in standby mode When a tool goes down, traffic is redirected to standby tool Maintains sessions across tool group 14
15 BPS Module for the GigaVUE-HC2 PROTECTING THE GATES Physical Bypass Protection for inline tool deployments 3 Models: Multimode 50 µm Multimode 62.5 µm Singlemode 10 µm 24 total ports 4 BPS port pairs supporting 4 inline network links 16 SFP/SFP+ cages 1Gb and 10Gb supported on all models Selectable per network link 15
16 1Gb Copper Bypass Directions BYPASS PROTECTION FOR 1000BASE-T NETWORK LINKS Software Upgrade to Existing 1Gb Copper Tap Module (TAP-HC0-G100C0) No license required just upgrade to v4.3 Same Module, Same SKU, Same Price Up to 12 Inline Networks Individually configure ports as TAP or BPC (BPS has 4 fixed Inline Networks per module) Tools Require Separate Module: X24 or X16 GigaSMART Tools 16
17 Active Visibility to Any Traffic Anywhere INLINE With Bypass module Inline Tools IPS Remote Site Leaf Core Spine Leaf Core Spine Leaf Leaf OUT-OF-BAND Deduplication Masking NetFlow Generation Header Adaptive Stripping Packet Filtering GigaVUE-OS on white box Anti- Malware Out-of-Band Tools File Activity CEM SIEM DLP NPM GigaVUE-VM GigaVUE-VM GigaVUE-VM GigaVUE-VM APM 17
18 Use Cases: Decrypt Anywhere for Any Tool ONE COMMON VISIBILITY FABRIC SERVING MULTIPLE USE CASES IDS at the Perimeter Router Firewall with SSL Proxy TAP Switch Server Rack APM at the Server Rack Router Firewall with SSL Proxy Switch SSL Decryption IDS SSL Decryption APM Anti-Malware for Web Apps SSL Decryption Anti- Malware DLP at Remote Sites Router SSL Decryption DLP Firewall with SSL Proxy LAN Workstations HQ TAP Database Router Branch 18
19 SSL Decryption on GigaSMART: How It Works SSL DECRYPTION FOR OUT OF BAND MONITORING 1 1. Tap SSL traffic and deliver to Visibility Fabric Use Flow Mapping to define flows to be decrypted Selected flows sent to GigaSMART 2. GigaVUE identifies exchange of public keys 3. Administrator uploads private keys Up to 64 private keys are encrypted locally Protected by separate password Restricted by RBAC privileges 4. Apply keys to decrypt traffic Not restricted to port 443 Can change port to 80 if desired 5. GigaVUE forwards clear packets to tools and/or GigaVUE applies intelligence to decrypted traffic Flow Mapping Other GigaSMART operations
20 Service Chain with Other GigaSMART Apps DELIVER RELEVANT TRAFFIC AFTER DECRYPTION Physical Web Server Connect Requests to NPM / CEM Virtual GigaVUE-VM GigaVUE-VM Tunnel Termination Flow Mapping SSL Decryption Adaptive Packet Filtering Remote site traffic to DLP East-West traffic between virtual workloads to IDS Service chain multiple GigaSMART applications before / after SSL decryption Flexible definition of service chains based on flows of interest Benefit: multiple operational and security tools can share common access to the Visibility Fabric ; each can customize flows of interest to that tool 20
21 Service Chain with Other GigaSMART Apps MASK / SLICE OFF SENSITIVE DATA TO ENSURE VISIBILITY WITH CONFIDENTIALITY Physical Virtual GigaVUE-VM GigaVUE-VM Tunnel Termination Flow Mapping SSL Decryption Packet Slicing Packet Masking Web Server Connect Requests to NPM / CEM Remote site traffic to DLP East-West traffic between virtual workloads to IDS Use Packet Slicing to deliver only portion of traffic without sensitive information Use Packet Masking to mask out sensitive information in a packet - for example: credit card info, called party, etc. Supports PCI compliance in e-commerce without compromising visibility for security 21
22 Unified Visibility Fabric Applications Third Party Applications, SDN Controller Integration, etc Applications & Tools Infrastructure, User Community API API API Fabric Control (Management) GigaVUE-FM API API Fabric Services Flow Mapping Traffic Intelligence FlowVUE De-duplication GTP Correlation NetFlow Generation SSL Decryption Clustering Inline Bypass Packet Slicing Masking Header Stripping Tunneling Adaptive Packet Filtering Visibility Fabric Nodes (Pervasive visibility across physical, virtual, remote sites, and future SDN production networks) H Series GigaVUE-HC2 GigaVUE-HD8 GigaVUE-HD4 GigaVUE-HB1 TA Series GigaVUE-TA1 GigaVUE-OS on white box Virtual Visibility GigaVUE-VM TA Ps G-TAP G-TAP BiDi G-TAP A Series Embedded TAPs G Series GigaVUE-2404 GigaVUE-420 G-SECURE-0216 * APIs: Future 22
23 Bridging the Gap 23
24 Build from Previous Slide VISIBILITY FABRIC ECOSYSTEM PARTNERS Network Security and Vulnerability Management 24
25 Summary: Best-in-Class Security Deployment RECOMMENDATIONS TO MAXIMIZE ENVELOPE OF THREAT PROTECTION Maximize tool efficacy Increase scale of security monitoring Add, Remove, and Upgrade tools seamlessly Consolidate multiple points of failure into a single, bypass-protected solution Integrate Inline, Out-of-Band, and Flow-based tools into a multi-tiered, zero-trust security strategy 25
26 Active Visibility for Multi-Tiered Security The changing nature of cyber threats requires a fundamentally new security delivery architecture GigaVUE-TA + GigaVUE-VM for reach and location independence SSL to decrypt masquerading malware NetFlow to reduce large volumes of traffic to intelligent data Inline bypass for actionable security Gigamon provides a security delivery platform that is essential for comprehensive security! 26
Whitepaper Unified Visibility Fabric A New Approach to Visibility
Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.
Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security
Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security Faced with a landscape of dynamic and expanding threats, many organizations today are compelled to take a multi-tiered approach to
In-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot
Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot Since the mid-90 s, users transacting on the internet have been assured of security by the lock icon displayed on their browser and
Solutions Guide End-to-End Visibility for Your Cisco Infrastructure
Solutions Guide End-to-End Visibility for Your Cisco Infrastructure Table of Contents Introduction 3 Overview of Cisco Technologies 3 Monitoring Cisco Centric Infrastructure (ACI) 3 CISCO 40Gb BiDi Links
Enhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
Secure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
Visibility in the Modern Data Center // Solution Overview
Introduction The past two decades have seen dramatic shifts in data center design. As application complexity grew, server sprawl pushed out the walls of the data center, expanding both the physical square
Whitepaper Software-Defined Visibility (SDV): The New Paradigm for IT
Whitepaper Software-Defined Visibility (SDV): The New Paradigm for IT We live in a world evolving to require any machine-to-any machine communication. All parts of today s digital business infrastructure
VSS - Game Changing Technology
VSS - Game Changing Technology Dean Beaver Vice President of Sales Danaher Business Platforms Test & Measurement $3.0B Environmental $3.3B Dental $2.1B Life Sciences & Diagnostics $6.8B Industrial Technologies
End-to-End Visibility
End-to-End Visibility for Your Cisco Infrastructure SOLUTIONS GUIDE GIGAMON TABLE OF Contents Introduction... 1 Overview of Cisco Technologies... 1.Monitoring Cisco Application Centric Infrastructure (ACI)...
Intelligent Data Access Networking TM
Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate
Premier Partner Technology Dinner
Premier Partner Technology Dinner Aruba Networks, Gigamon, NetApp, & Palo Alto Networks Fogo De Chao, Baltimore, MD September 25 th, 2014 Key Take Away s Headquartered in Malvern, PA with offices in NYC
SSL Inspection Step-by-Step Guide. June 6, 2016
SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Whitepaper Addressing the Threat Within: Rethinking Network Security Deployment
Whitepaper Addressing the Threat Within: Rethinking Network Security Deployment Introduction Cyber security breaches are happening at an industrial scale. The unabated volume of cyber breaches along with
Out-of-Band Security Solution // Solutions Overview
Introduction A few years ago, IT managed security using the hard outer shell approach and established walls where traffic entered and departed the network assuming that the risks originated outside of
Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon
Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to
Enhancing Cisco Networks with Gigamon // White Paper
The Smart Route To Visibility Enhancing Cisco s with Many Fortune 000 companies and beyond implement a Cisco switching architecture. When implementing a large scale Cisco network, the infrastructure to
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
EVOLVED DATA CENTER ARCHITECTURE
EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper
Deploying Blue Coat and FireEye Inline with Gigamon
Deploying Blue Coat and FireEye Inline with Gigamon COPYRIGHT Copyright 2015 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Ixia xstream TM 10. Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks. Aggregation and Filtering DATA SHEET
Ixia xstream TM 10 Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks The Ixia xstream 10 is a network packet broker for monitoring high-speed network traffic, letting you share the network
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures
Firewall Agenda Unit 1 Understanding of Firewall s definition and Categorization Unit 2 Understanding of Firewall s Deployment Architectures Unit 3 Three Representative Firewall Deployment Examples in
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
Pervasive Security Enabled by Next Generation Monitoring Fabric
Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever
Network Packet Monitoring Optimizations in Data Centre
March 2014, HAPPIEST MINDS TECHNOLOGIES Network Packet Monitoring Optimizations in Data Centre Author Dharmraj B Jhatakia 1 Copyright Information This document is an exclusive property of Happiest Minds
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
Visibility into the Cloud and Virtualized Data Center // White Paper
Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Network Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Hillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
Packet Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring
Packet Optimization & Visibility with Wireshark and PCAPs Gordon Beith Director of Product Management VSS Monitoring 1 Market Trends - Innovation MOBILE LTE INFRASTRUCTURE COMPLEXITY BIG DATA BUSINESS
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Affording the Upgrade to Higher Speed & Density
Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%
Open SDN for Network Visibility
SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
GigaVUE HD Series // Data Sheet
Product As enterprises, data centers and service providers respond to the ever-increasing volume of network traffic and the need to effectively and efficiently manage their environment, they look to for
Internet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection
DATA SHEET Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection HIGHLIGHTS Delivers superior zero-day threat
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Application Defined E2E Security for Network Slices. Linda Dunbar ([email protected]) Diego Lopez (diego.r.lopez@telefonica.
Application Defined E2E Security for Network Slices Linda Dunbar ([email protected]) Diego Lopez ([email protected] ) Into the Inter-connected World Internet Mobile Internet Internet of
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
GigaVUE-420. The Next Generation. Data Access Switch. Gigamon Systems. Intelligent Data Access Networking
GigaVUE-420 The Next Generation Data Access Switch Gigamon Systems Intelligent Data Access Networking GigaVUE is a Data Socket Part of the Reliable Network Infrastructure Plug-in multiple out-of-band tools
Avaya P333R-LB. Load Balancing Stackable Switch. Load Balancing Application Guide
Load Balancing Stackable Switch Load Balancing Application Guide May 2001 Table of Contents: Section 1: Introduction Section 2: Application 1 Server Load Balancing Section 3: Application 2 Firewall Load
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
Five Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
QRadar Security Management Appliances
QRadar Security Management Appliances Q1 Labs QRadar network security management appliances and related software provide enterprises with an integrated framework that combines typically disparate network
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
The Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
How OpenFlow-based SDN can increase network security
How OpenFlow-based SDN can increase network security Charles Ferland, IBM System Networking Representing the ONF [email protected] +49 151 1265 0830 Important elements The objective is to build SDN networks
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway
TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3
Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper
Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Market Cloud provider landscape and challenge As a Cloud Service (CSP) there are many services that you can offer. Based on your core
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
IBM Security Network Protection
IBM Software Data sheet IBM Security Network Protection Highlights Delivers superior zero-day threat protection and security intelligence powered by IBM X- Force Provides critical insight and visibility
Axial, Gigamon and Forescout Value Proposition
Axial, Gigamon and Forescout Value Proposition 05/2015 Pa ge 1 Joint Axial/Gigamon/Forescout Value Proposition Only we (Axial/Gigamon/Forescout) can provide the recognised leading solution for access control,
Net Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
