How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
|
|
|
- Rolf Russell
- 10 years ago
- Views:
Transcription
1 How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper
2 How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity is an essential resource for all types of organizations. Utilization of the Internet for research, communications and other mission-critical activity for transacting business, increases daily. Unfortunately, utilization of the Internet for noncritical and detrimental activities outpaces critical activity substantially1. This increase of both types of traffic creates a significant challenge for Network Managers; how to limit non-critical and detrimental traffic to ensure mission-critical traffic has the resources it needs. To complicate the matter, the various traffic types are created by both web browsing activity and application activity. While there are many solutions that address controlling browsing activity, and a few that address application activity, there are very few that handle both well. Finally, in addition to sorting out mission critical and non-critical traffic generated by both applications and browsing activity, Network Administrators must control the impact of secured browsing traffic. Critical applications are moving to the Internet. Organizations manage contacts with online CRM tools, bank, purchase equipment and perform a myriad of other activities online. Because of the sensitive nature of the data, this type of traffic is often secured. Although encryption provides a tremendous benefit to organizations that want to keep data traveling over the Internet secure, it also adds to the challenge of prioritizing resources for mission critical activity. Because the traffic is encrypted, Network Administrators have no way to determine if the data being transmitted is critical, non-critical or even malicious creating a virtual blind spot in security protection, risk mitigation and Internet usage policy enforcement. Implications Resource Management Network Administrators are held responsible for timely application delivery, whether the application is local, hosted remotely or being served from the Internet. Although bandwidth continues to drop in price and is more readily available, Administrators continue to face overloaded circuits. This occurs most often due to cluttered and un-prioritized Internet data streams meaning, all users and applications compete for the same resources with little or no prioritization whatsoever. For example, user abuse of encrypted traffic for inappropriate browsing sessions or proxy anonymizing applications can eat up resources that should be used for mission critical activity. Risk Mitigation Traffic passing through secured browsing sessions goes unchecked. While this works well for keeping data private, it can be abused by users and sites attempting to infiltrate the network. users that download information over a secured connection prevent spyware and virus scans from verifying the safety of the content. When content is downloaded without these safety precautions, Administrators find their data and overall safety of the network at risk. Internet Usage Policy Enforcement In addition to preventing spyware and virus scans, users that download content over secure connections can easily bypass traditional content filtering controls. While all organizations face tremendous risk of litigation for not maintaining safe access to the Internet, lack of filtering controls is specifically problematic for educational institutions. Schools must maintain CIPA compliance to qualify for funding and to limit the liability of potentially exposing children to inappropriate material. When gaps result from such at tremendous lack of control, compliance and user safety are lost. Approaches Due to the tremendous risks associated with encrypted Internet content, organizations must implement a solution that provides full visibility and control over secure traffic. The new Secure Web traffic visibility feature from Cymphonix allows Network Managers the same visibility and control for secure web traffic as they have for unsecured web traffic. Implementing a solution that addresses both application traffic and secured/unsecured browsing traffic will make it possible for Administrators to maintain Internet usage guidelines across all web traffic. Secure Web Traffic The most prevalent form of encryption used is Secure Socket Layer (SSL). SSL allows for a secure tunnel to be established between the user (client) and the web site (server). Secure web traffic is referred to in many ways with the most common being HTTPS and SSL web traffic. HTTPS utilizes SSL encryption to create a secure tunnel between the client and server to transmit website content through the tunnel. Cymphonix Corporation, Cymphonix, Network Composer, Cross-Layer Intelligence, Li and the Cymphonix Logo are trademarks of Cymphonix. All other trademarks are property of their respective owners. All rights reserved.
3 SSL CGI Proxy This type of proxy has the user enter the URL they want to browse into a web form. The CGI script processes the request and fetches the page on behalf of the user. The CGI script changes the links and image references in the web page to point to the URL of the CGI script. All the web requests are going to and from the CGI script so that in most cases URL database categorization cannot be accurately done. All the web requests go to the host of the CGI proxy even if in the original HTML went to many different servers. Tradiditional Content Filtering solutions are blind to the content inside the SSL tunnel Why does Secure Web Traffic cause problems? The benefits of SSL are what cause the problems for traditional content filtering solutions. With an HTTPS web connection the contents of the web traffic are contained within the SSL tunnel and are not visible to the external filtering devices that would normally enforce Internet usage policies. Traditional web filters are designed to filter based on being able to read URL data. Because HTTPS requests contain only a very limited amount of data (which may be spoofed or inaccurate if provided by an anonymous proxy) relating to the destination and the contents of the request, filters cannot identify the content and are unable to filter. Client URL Content Filter Internet SSL Tunnel Web traffic is transmitted within the SSL tunnel SSL provide protection against data theft SSL Anonymous Proxies Because it works so well, filter avoidance solutions commonly leverage SSL to allow users to bypass content filters. They do this primarily with three methods; SSL CGI Proxy, SSL Full Proxy and Application-Based networks across SSL like the Tor Network and Socks 4&5. Web Server Some solutions rely on their maintenance of a database of URL s and IP addresses of these sites to prevent filter subversion. Due to the simplicity of setting up sites to bypass filters in this manner, it is very difficult to keep up with the number of IP addresses and URL s as they can change hourly. Anyone on the Internet with a public IP address can easily setup a proxy like this. There are even Windows versions that can be easily installed on a student s home machine for example allowing them to use their home computer to bypass the school s content filter while using the school s network. Users can also sign up for mailing lists to receive hundreds of available IP s daily to get around content filters. Because URL database maintenance works so poorly in this case, the only way to effectively stop this type of inappropriate use is to perform full content analysis. Network Composer s SSL Full Content Filtering allows it to analyze the content of the web site so if an IP or URL is accessed that does not get filtered by the database, it will be filtered by content analysis. Then, if a URL or IP address is not presently found in the Network Composer database, it is sent to Cymphonix automatically to be categorized and added to the URL database. This approach ensures content is filtered regardless of URL or SSL encryption. SSL Full Proxy This method requires the user to modify their browser settings to use a proxy server. Since this method requires the user to change their browser settings it is less popular, but nonetheless is a very effective way to bypass content filters. Often, these proxy server sites use non-standard, unchecked port numbers to bypass content filtering. Traditional filters cannot even see the traffic and therefore are unable to filter it. Because Network Composer identifies application traffic regardless of port or protocol, it can identify web browsing activity and ensures HTTP, HTTPS and Cymphonix Corporation, Cymphonix, Network Composer, Cross-Layer Intelligence, Li and the Cymphonix Logo are trademarks of Cymphonix. All other trademarks are property of their respective owners. All rights reserved.
4 SSL traffic are filtered according to policy. Application-based Networks across SSL Tor Network is on example of an SSL based network built to allow users to anonymize their web browsing and bypass content filters. Tor normally uses non standard port numbers to avoid detection, encrypts traffic via SSL connections and can be run from an external memory device such as a UBS thumb drive. This combination of filter avoidance tactics makes it, and applications like it, a very effective way to get around content filters. Even on PCs with application installation controls in place, users can easily run the application from an external device, connect via SSL and browse without controls. Network Composer is one of the only solutions that can block and control traffic from these types of applications. Because Network Composer includes deep-packet scanning and layer 7 identification capabilities, it can identify these applications and apply policy to prevent the risks associated with them. SSL Filtering Methods: SSL Certificate Filtering This is the most common form of SSL filtering offered by content filtering appliances. This method attempts to validate the host name or CN from the server certificate. Once the host name is obtained it is categorized by a URL database. Advantages A CA certificate does not need to be installed on the client web browser Basic filtering works if the host name is known in the URL database Disadvantages The user cannot be presented with a denied access page. Typically the user will see the Page could not be displayed browser error. The user has no way of knowing if his page request was blocked by a content filter or because of network connectivity problems Only a URL database check can be done. Since the content of an allowed connection is encrypted, the HTTP data cannot be used for categorization. This is specifically problematic with new websites that have not yet been categorized. Downloads cannot be scanned for viruses Spyware MD5 sum checks cannot be performed Spyware Class ID checks cannot be performed Streaming media traffic cannot be properly identified and controlled MIME and file types cannot be logged or specifically blocked SSL anonymous proxies can be used if the IP or URL is not in the database. SSL Full Content Filtering This method is the most robust and complete of the three discussed methods. With this method there is a secure connection between the Network Composer and the user, and a separate secure connection between Network Composer and the server. The Network Composer is acting as an SSL proxy. Because Network Composer can terminate the SSL connection, data can be fully inspected. The Network Composer generates and sends the browser a CA-signed certificate for the host name that was requested. This certificate is installed on the client s browser via a download URL or optionally distributed via Active Directory. And finally, the customer provides the data for the CA certificate to make know who is inspecting and filtering the encrypted data. With SSL Full Content Filtering strict checking of the certificate from the server can be performed. The certificate is validated by checking the issuer against a list of trusted CA s and verifying that the certificate is not expired. If the certificate cannot be validated then the network administrator can block this request. This is especially effective against SSL anonymous proxies that use self generated and signed certificates. Advantages Content analysis can be done on the content of the web site Virus scanning can be completed Spyware MD5 sum matching can be completed Spyware Class ID matching can be completed Streaming media is properly identified and can be bandwidth-controlled File and MIME type extraction and filtering can be completed SSL anonymous proxies that are not caught by the database are filtered by content analysis for categorization and logging Cymphonix Corporation, Cymphonix, Network Composer, Cross-Layer Intelligence, Li and the Cymphonix Logo are trademarks of Cymphonix. All other trademarks are property of their respective owners. All rights reserved.
5 Reverse DNS lookups are done for IP address URL s It is very difficult to circumvent filtering using anonymous proxies Moves the SSL security decisions out of the hands of the user and to the network administrator Disadvantages A CA certificate needs to be installed in the browser to prevent an SSL warning The not all of the original certificate issuer information is viewable by the user High performance cost SSL Filtering Method Feature Matrix Cymphonix solution Both of the above methods are available in Network Composer version 8.0. SSL Full Content Filtering is the recommended method to use to prevent possible circumvention of the filtering. Feature URL Database C ategorization Spyw are URL Database URL Keyw ord Search Denied Access Page More vulnerable to SSL proxies Virus Scanning Spyw are M D5 Sum Spyw are Class ID lookup Reverse DNS Lookup Content Analysis File Type Filtering M IM E Type Filtering Streaming M edia Control View original certificate CA C ertificate install needed CA C ertificate Verification SSL Certificate Filtering SSL Certificate Filtering with Denied Access Page SSL Full Content Filtering Conclusion With the increase in Secure Web Traffic (HTTPS) and growing number of 3rd party sites that allow users to bypass current content filtering solutions the ability to have FULL visibility and control over HTTPS traffic is paramount. Any organizations, especially highlyregulated organizations (e.g., education, government, and healthcare) owe it to their users to provide the most robust technology available to ensure ALL web traffic is being filtered and controlled. The Version 8.0 release from Cymphonix provides complete visibility into HTTPS traffic. References: 1. SSL Traffic Clogs WANS, PC World, 03/07/2007, This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( Cymphonix Corporation, Cymphonix, Network Composer, Cross-Layer Intelligence, Li and the Cymphonix Logo are trademarks of Cymphonix. All other trademarks are property of their respective owners. All rights reserved.
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
Filter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
C YMPH O N IX NET W O R K C OMPO SER. Reveal. Optimize. Protect.
C YMPH O N IX NET W O R K C OMPO SER Reveal. Optimize. Protect. Take Control of Your Internet Connection Internet content and applications have become indispensible, mission-critical tools for nearly every
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
How to Gain Visibility and Control of Encrypted SSL Web Sessions >
White Paper How to Gain Visibility and Control of Encrypted SSL Web Sessions > Executive Summary Web applications (and their derivatives IM, P2P, Web Services) continue to comprise the overwhelming majority
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Deploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Controlling SSL Decryption. Overview. SSL Variability. Tech Note
Controlling Decryption Tech Note Overview Decryption is a key feature of the PA-4000 Series firewall. With it, -encrypted traffic is decrypted for visibility, control, and granular security. App-ID and
Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
How To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
Automatic Hotspot Logon
WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
Still Using Proxies for URL Filtering? There s a Better Way
Still Using Proxies for URL Filtering? There s a Better Way October 2013 The Arrival of Proxies Firewalls enforce network access via a positive control model, where only specific traffic defined in policies
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace
efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace December 2014 Copyright 2014, efolder, Inc. Introduction Bring your own device (BYOD) has been on the rise as employees
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
SSL Decryption: Benefits, Configuration and Best Practices
SSL Decryption: Benefits, Configuration and Best Practices Websense Support Webinar January 2013 1 Presenter Matt Bruce Title: Sr. Technical Support Specialist Accomplishments: Backline Support Linux and
Pre-Installation Instructions
Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
WebMarshal User Guide
WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Palo Alto Networks Gets Top Marks for Solving Bandwidth and Security Issues for School District
Palo Alto Networks Gets Top Marks for Solving Bandwidth and Security Issues for School District BACKGROUND Located in British Columbia, Canada, the School District of Chilliwack is a learning community
ISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
How to Optimize MS Outlook Exchange Traffic Over SSL
How to Optimize MS Outlook Exchange Traffic Over SSL All Silver Peak appliances are equipped with patented Network Memory TM technology for WAN deduplication. Network Memory inspects all inbound and outbound
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Secure Traffic Inspection
Overview, page 1 Legal Disclaimer, page 2 Secure Sockets Layer Certificates, page 3 Filters, page 4 Policy, page 5 Overview When a user connects to a website via HTTPS, the session is encrypted with a
Proxy Services: Good Practice Guidelines
Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Inside-Out Attacks. [email protected]. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL
Inside-Out Attacks [email protected] Covert Channel Attacks Inside-out Attacks Seite 1 Goals of this presentation! Responses to the following questions! What are inside-out attacks! Who will use this
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
SSL EXPLAINED SSL EXPLAINED
1 Table of Contents Introduction... 3 What is SSL?... 4 How does SSL work?... 7 Google & SSL... 11 SSL/TLS... 13 Web Filtering SSL... 14 About Lightspeed Systems... 26 2 Introduction SSL is a challenge
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
How To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
AccessEnforcer. HTTPS web filter overview
AccessEnforcer HTTPS web filter overview A web filter is essential to keeping hazards and distractions away from businesses. To stay safe, productive, and compliant, every organization must block certain
Enterprise Toolbar User s Guide. Revised March 2015
Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered
