Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption
|
|
|
- Cornelia Walters
- 10 years ago
- Views:
Transcription
1 Technology Blueprint Protect Your VoIP/SIP Servers Insulating your voice network and its servers from attacks and disruption
2 LEVEL SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL Security Connected The Security Connected framework from McAfee enables integration of multiple products, services, and partnerships for SECURITY CONNECTED centralized, efficient, and REFERENCE ARCHITECTURE effective risk mitigation. Built on LEVEL more than two 1decades 2 3 of 4 5 proven security practices, the Security Connected approach helps organizations of all sizes and segments across all geographies improve security postures, optimize security for greater cost effectiveness, and align security strategically SECURITY with business CONNECTED initiatives. The REFERENCE Security Connected ARCHITECTURE Reference Architecture provides a concrete LEVEL path from 1 ideas 2 3 to 4 5 implementation. Use it to adapt the Security Connected concepts to your unique risks, infrastructure, and business objectives. McAfee is relentlessly focused on finding new ways to keep our customers safe. Insulating your voice network and its servers from attacks and disruption The Situation Did the appeal of voice over IP (VoIP) savings get ahead of your security controls? Has your network been brought down by a VoIP vulnerability? Most organizations fail to realize the security implications of replacing an isolated voice network with a VoIP infrastructure integrated with the rest of their critical network and Internet infrastructures. Voice over Internet Protocol (VoIP) and Session Initiation Protocol (SIP) both provide a means to establish communication channels over an IP network. You may have a typical voice call one on one with a colleague at work or perhaps a multi-cast conference call where various team members around the world are discussing some new product or service that can change the market. Could sensitive information be discussed in these conversations? Could a hacker eavesdrop on these conversations? Having improper security controls around VoIP/SIP can compromise the voice network and put your organization at risk. Driving Concerns Because they enable cost savings over traditional PBX telephony systems, VoIP/SIP servers have been widely adopted in many organizations. A VoIP server is like any server or PC with an Internet connection: it can be the target or unwitting accomplice of a hacker attack. Many VoIP systems are improperly segmented from the data network. The VoIP and session initiation protocol (SIP) servers themselves are poorly secured against network attacks, network eavesdropping, or denial of service attacks. If someone can access one of these servers, they can move on to other assets around the network in search of data and disruption. Organizations that rely on VoIP systems without a proper security plan in place find themselves at risk of serious network downtime and loss of the critical communication infrastructure connecting employees with the outside world including customers. Each organization must account carefully for VoIP and SIP risks including: Denial of Service Attacks (DoS/DDoS). DoS/DDoS attacks to a VoIP server can bring the data network as well as the servers that host it to a crashing halt, with devastating effects on all network and voice traffic SIP Vulnerabilities. The SIP protocol is used to set up and tear down phone calls. Some SIP Server vulnerabilities can allow attackers to hijack SIP sessions as part of a man in the middle attack. In addition, buffer overflow attacks can target vulnerabilities that exist within the SIP protocol. Malware. Malware, such as a worm, can spread through open ports on VoIP/SIP Servers, infecting other servers and critical points of the infrastructure Improperly Secured VoIP Servers. Unpatched software or unnecessary and open ports and services on a VoIP server can allow network attacks that use these servers as a stepping stone to other corporate assets Eavesdropping. Hackers can intercept VoIP packet streams and interpret phone conversations on the fly, violating confidentiality and leaving your company open to a data loss or regulatory disclosure Unauthorized VoIP server access. Administrators can inadvertently disrupt servers or compromise their integrity with unapproved software or configuration changes 2 Protecting VoIP/SIP Servers
3 Solution Description You can implement stronger VoIP and SIP security in stages, pursuing a multi-pronged strategy. This approach allows IT security administrators to fine-tune their implementations based on organizational needs. The steps below show the steps to take, from basic to advanced: Malware Protection. Deploy an antivirus solution that can not only scan for malware in real time, but provide real-time heuristics detection of zero-day malware Protection against Vulnerabilities/Exploits. McAfee recommends reviewing open ports and running services on VoIP/SIP servers and disabling or closing any unneeded ports and services. This precaution can reduce the risk of attack. In addition, provide basic firewall functionality to block access to typical open ports on VoIP/SIP servers. Intrusion Prevention (IPS) technology on the server can assist in protecting unpatched VoIP/SIP Servers against exploitation. Host IPS technologies have built-in mechanisms that can protect against zero-day vulnerabilities or exploits. This protection can work in either a signature or heuristic based fashion where anomalies are queried to a database to validate whether that action is malicious or benign. Protection against Denial of Service Attacks. Since VoIP/SIP servers are considered critical communication infrastructure, they are susceptible to denial of service attacks from the network layer as well as buffer overflow exploits at the system layer. Implement intrusion detection and memory protection that can find, analyze, and prevent these types of attacks. Blocking installation and execution of unauthorized applications or processes. To protect the integrity of VoIP/SIP servers against inadvertent or malicious installation or execution of software, install a whitelisting technology VoIP Server Auditing. VoIP/SIP servers have a specific purpose. It is recommended that organizations implement a server auditing strategy around these servers. Auditing should include monitoring of changes to operating system, registry, or critical application files. In addition, monitor administrators who have access to these servers and ensure they follow proper change management processes before changes are conducted on this critical infrastructure. Secure the perimeter. Many organizations choose to segment their VoIP/SIP servers and voice network from the rest of their main IP network. These organizations can benefit from networkbased intrusion prevention technology that can continuously monitor the packets that traverse the voice network. This extra layer can filter out any data packets that should not be traveling over the voice network. Decision Elements These factors could influence your architecture: Are your VoIP Servers centrally managed? What operating systems are your VoIP servers running? What is your change management process for adding new VoIP servers on the network? Is your voice network segmented from the data network? Do you allow communication tools on your network such as Skype or Google voice? Do you have appliance based VoIP/SIP servers? Protecting VoIP/SIP Servers 3
4 Technologies Used in the McAfee Solution McAfee provides several solutions that can help organizations achieve total VoIP/SIP server and network protection. No two VoIP/SIP environments are ever the same, so McAfee offers an array of solutions that can help administrators secure their voice networks and voice servers to meet organization-specific needs. The solution includes advanced technologies such as McAfee Application Control and McAfee Change Control that can lock down the VoIP/SIP Servers to run only processes that are deemed trusted. McAfee VirusScan Enterprise and McAfee Host Intrusion Prevention help administrators protect their servers from malware and zero-day vulnerabilities through use of signature and heuristics-based detections. Furthermore, organizations that choose to segment their voice network may want to secure that perimeter with McAfee Network Security Platform (NSP), which has signature and heuristics-based detections for VoIP/SIP vulnerabilities. Some of these mechanisms include detections of DoS/DDoS attacks at the network level. NSP can detect anomalous behavior, perhaps misused or exploited VoIP/ SIP protocols, as well as backdoor intrusions into the voice network. Through integration with the reputation systems of McAfee Global Threat Intelligence, NSP can help organizations profile and block the malicious external IP addresses that are attempting to perform these denial of service attacks. NSP can accomplish this inspection and blocking without introducing any additional latency, a crucial requirement for voice traffic. The technologies working on the server and in the network can be centrally managed and reported via the McAfee epolicy Orchestrator (McAfee epo ) console. With new visibility into threats and relevant actions, your organization can close the security gaps that exist on the voice network and VoIP/SIP server infrastructure. Service Provider (Internet/PSTN) Firewall McAfee Network Security Platform Enterprise Network McAfee epo VoIP Devices VoIP phone Videoconferencing Fax VoIP/SIP Server McAfee Application Control McAfee Change Control McAfee Host IPS McAfee VirusScan McAfee products help insulate your voice network and its servers from attacks and disruption. 4 Protecting VoIP/SIP Servers
5 McAfee VirusScan Enterprise McAfee VirusScan Enterprise combines antivirus, antispyware, firewall, and intrusion prevention technologies to stop and remove malicious software on VoIP/SIP servers. McAfee VirusScan Enterprise is available for both Windows and Linux servers. McAfee VirusScan Enterprise protects VoIP/SIP servers with heuristics and signature based malware detection. In addition, VirusScan Enterprise includes: Access Protection Rules. Prevents unwanted changes to your VoIP/SIP servers by restricting access to specified ports, files, shares, registry keys, and registry values. In addition, it includes the ability to prevent unauthorized changes to VirusScan Enterprise policies and configurations. Buffer Overflow Protection. Protection against memory-based exploits that can impact VoIP/SIP servers Global Threat Intelligence (GTI). McAfee GTI has the ability to provide real time file reputation of suspicious files on a system to determine if that file is malicious McAfee Application Control McAfee Application Control lets IT administrators prevent the unauthorized installation of software on VoIP/SIP servers. Administrators define a standard list of which processes and applications are allowed to run, and a dynamic trust model allows controlled, automated updating of this software by trusted updaters. In addition, Application Control can prevent malicious code execution on servers. System protection. Extends coverage to Java, ActiveX controls, scripts, batch files, and specialty code for greater control over application components Multi-server support. Application Control has support for Linux, AIX, Solaris, and Windows-based VoIP servers Advanced Memory Protection. Buffer overflow detection and exploit blocking guard all running processes on VoIP/SIP servers McAfee Change Control Hardening VoIP/SIP servers is one of the most effective methods of protecting these servers. However, without proper monitoring and enforcement of any security implementation put in place, changes can be made without your organization s knowledge. Tamper-proof technologies can prevent unauthorized changes to VoIP/SIP servers. McAfee Change Control delivers continuous detection of system-level changes being made across the server and prevents unauthorized changes to critical system files, directories, and configurations. Change Control tracks and validates every modification to the VoIP/SIP server. McAfee Change Control has the ability to integrate with common ticketing systems such as BMC Remedy to log, approve, and monitor change requests for server changes. McAfee Host Intrusion Prevention McAfee Host Intrusion Prevention protects VoIP/SIP servers against zero-day vulnerabilities on the server as well as providing comprehensive protection against the most common exploits out today. McAfee Host Intrusion Prevention (Host IPS) also includes full desktop firewall functionality. Host IPS can protect VoIP/SIP servers that are not up to date on patches by blocking exploits triggered from vulnerabilities within the operating system or software used by the VoIP/SIP system. These detections are signature, behavioral, and heuristics-based. These features include enveloping and shielding that protect the VoIP/SIP software processes from executing outside of their own memory space and also stop outside processes attempting to interfere with that memory space. Protecting VoIP/SIP Servers 5
6 McAfee Network Security Platform (NSP) VoIP servers and networks are especially prone to attacks such as eavesdropping, man in the middle, or DoS attacks. An intruder may use these attacks to either disrupt communication services or gather information. McAfee Network Security Platform (NSP) provides intrusion prevention technologies (IPS) that can detect and block these threats before they can cause damage to your VoIP/SIP systems. NSP can help secure the VoIP/SIP server and voice network perimeter by filtering traffic before it reaches the VoIP/ SIP servers. NSP includes signatures specific to detection of VoIP vulnerabilities and attacks. NSP can also analyze traffic through its threat analyzer and assist administrators in determining if there are any anomalies in their voice networks. This can also help administrators decide if rogue devices have connected to the voice network that can pose a risk to the network. NSP can accomplish this protection at wire speed, without introducing any latency to the VoIP/SIP server infrastructure. McAfee epolicy Orchestrator (McAfee epo) McAfee epolicy Orchestrator enables the automatic software distribution and policy management of McAfee VirusScan Enterprise, McAfee Host Intrusion Prevention, McAfee Application Control, and McAfee Change Control, as well as reporting for McAfee Network Security Platform. McAfee epo Extension provides the interface for configuration, scheduling, and security reporting for VoIP/SIP servers McAfee epo agent acts as an intermediary between the agents installed on the VoIP/SIP servers and the McAfee epo console and database McAfee epo itself provides a single pane of glass for managing VoIP/SIP server security McAfee epo can provide reporting functionality for network-based appliances Impact of the Solution Layered protections will help insulate your VoIP/SIP servers from the malware, vulnerabilities, and attacks that threaten the availability of your critical communication infrastructure. McAfee VirusScan Enterprise can reduce the amount of malware that can infect VoIP/SIP servers by scanning files and directories on those servers. Its buffer overflow protection combats memory based exploits that are targeted at VoIP/SIP Servers. McAfee Application Control can prevent the installation of unauthorized software on VoIP/ SIP servers. Using Application Control, you can harden these servers and the VoIP software by preventing any unauthorized execution of software or other code that could adversely affect functionality or availability. McAfee Change Control can prevent unauthorized system changes to the file system, registry, or dll s of VoIP/SIP servers that lead to unnecessary server downtime McAfee Host Intrusion Prevention can assist administrators in protecting servers from vulnerabilities introduced by missing server patches. Furthermore, Host IPS can protect against vulnerabilities that exist within the SIP and VoIP protocols. Host IPS also includes a firewall to prevent malware from spreading over open ports on VoIP/SIP Servers. McAfee Network Security Platform can assist in preventing DoS, man in the middle, and eavesdropping attacks at the network layer before the attack can reach the servers As your business increases its reliance on a VoIP voice network, these protections will help ensure that network is both available and secured against digital eavesdropping. 6 Protecting VoIP/SIP Servers
7 Optional Integrations McAfee Network Security Platform (NSP) has great flexibility in integrating with various McAfee technologies. To help achieve complete protection and visibility for VoIP/SIP Servers, NSP can integrate with McAfee Host Intrusion Prevention at the endpoint. Integrated data can help the administrator correlate events received from both NSP and HIPS. This will provide a complete view of protection both at the network and endpoint level from within the NSP console. In addition, McAfee NSP can integrate with epo to provide a single reporting console for NSP events and endpoint events using the power of epo reporting and dashboards by rolling up the data from NSP to the epo console using a data rollup task with the epo configuration. Q&A What types of executable files can be whitelisted? McAfee Application Control can whitelist a variety of executables including.exe,.dll, and scripts such as.js,.vbs, and.bat for Windows. Can McAfee Application Control and McAfee Change Control be tampered with? McAfee has built controls into both products that prevent users from disabling either McAfee Application Control or McAfee Change Control. This includes users with administrator rights to a server. What if certain IT administrators need to make changes to servers locked down with McAfee Application Control? In the Application Control policy, you can leverage your Active Directory to define trusted users, those authorized to make changes to a server. Used in combination with Change Control, the activity conducted by each administrator can be monitored to ensure that no administrator is making system level changes that can have an adverse effect on the VoIP/SIP server. Does McAfee Network Security Platform need to be deployed in-line on a network? NSP can be deployed in several ways. If your organization simply wants to monitor but not block any events discovered by NSP, you can simply deploy it in a SPAN or TAP configuration. However, if your organization wants to enforce the full blocking and mitigation functionality, then the device would need to be deployed in-line. All NSP appliances include full Fail-Open Kit support and High Availability configurations. How is Host Intrusion Prevention different from Application Control? Host Intrusion Prevention actually compliments Application Control. Application Control is a whitelisting technology where you define what applications/processes are allowed to run and includes advanced memory protection. HIPS can provide signature and behavioral Intrusion Prevention on zero day vulnerabilities as well as provide enveloping and shielding protection against processes running on the VoIP/SIP server. Furthermore, HIPS includes a connection and location aware firewall. How does McAfee GTI work in McAfee VirusScan Enterprise? McAfee Global Threat Intelligence file reputation service will perform a DNS Query of a hash of the suspicious item. If that hash matches the GTI checks in the cloud, the appropriate action will take place to either allow or block the malicious entity depending on policy configurations. Protecting VoIP/SIP Servers 7
8 Additional Resources QuickTip Videos: White Paper: Making VoIP Secure For more information about the Security Connected Reference Architecture, visit: About the Author Joseph Fiorella is a Senior Systems Engineer at McAfee and based in New York City. Joseph has been involved in the information security field for the past 8 years. Since Joseph joined McAfee in 2009, he has been implementing and supporting security technologies for some of the largest Public Sector organizations in the North East. Joseph holds a Bachelor s degree from Pace University, as well as numerous certifications, such as Certified Information Systems Security Professional (CISSP), Security+, and Certified Information Security Manager (CISM). Joseph is an active member of (ISC)2 and the New York Chapter of ISACA. Joseph is currently in the process of completing his Master s Degree at New York University. The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided AS IS without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance Mission College Boulevard Santa Clara, CA McAfee, McAfee Application Control, McAfee Change Control, McAfee epolicy Orchestrator, McAfee epo, McAfee Global Threat Intelligence, McAfee Host Intrusion Prevention, McAfee Network Security Platform, McAfee VirusScan Enterprise, VirusScan, and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications, and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2011 McAfee, Inc bp_protecting-voip-L3_1011
Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes
Technology Blueprint Protect Your Application Servers Preserve uptime by blocking attacks and unauthorized changes LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse
Technology Blueprint Defend Against Denial of Service (DOS and DDOS) Attacks Protect each IT service layer against exploitation and abuse LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Endpoint Security for DeltaV Systems
DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security
McAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Solutions Brochure. Security that. Security Connected for Financial Services
Solutions Brochure Security that Builds Equity Security Connected for Financial Services Safeguard Your Assets Security should provide leverage for your business, fending off attacks while reducing risk
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time
Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Database Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
SIEM Orchestration. How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness
SIEM Orchestration How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness Scott Taschler, Solution Architect, McAfee Table of Contents Introduction
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
Protecting the un-protectable Addressing Virtualisation Security Challenges
Protecting the un-protectable Addressing Virtualisation Security Challenges Paul Hogan, Technical Director, Ward Solutions November 11, 2010 Top Cloud Security Challenges Secure Virtualisation Need secure
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
McAfee Total Protection Reduce the Complexity of Managing Security
McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.
How To Protect Your Data From Attack
Solutions Brochure Situation Under Control Security Connected for the Public Sector 2 Security Connected for the Public Sector Increase Availability. Strengthen Resiliency. Government entities face pressure
Network Intrusion Prevention Systems Justification and ROI
White Paper October 2004 McAfee Protection-in-Depth Strategy Network Intrusion Prevention Systems 2 Table of Contents Are My Critical Data Safe? 3 The Effects and Results of an Intrusion 3 Why the Demand
Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices
Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices McAfee* application whitelisting combined with Intel vpro technology can improve security, increase
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
GOOD PRACTICE GUIDE 13 (GPG13)
GOOD PRACTICE GUIDE 13 (GPG13) GPG13 - AT A GLANCE Protective Monitoring (PM) is based on Good Practice Guide 13 Comprises of 12 sections called Proactive Monitoring Controls 1-12 Based on four Recording
Technology Blueprint. Secure Your Point-of-Sale. Lock down point of sale/service (POS) systems
Technology Blueprint Secure Your Point-of-Sale (POS) Systems Lock down point of sale/service (POS) systems LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected The
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Technology Blueprint. Protecting Intellectual Property in Email. Guarding against information-stealing malware and outbound data loss
Technology Blueprint Protecting Intellectual Property in Email Guarding against information-stealing malware and outbound data loss LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Xerox Next Generation Security: Partnering with McAfee White Paper
Xerox Next Generation Security: Partnering with McAfee White Paper 1 Background Today s MFPs are complex embedded systems. They contain, among other things, full scale operating systems, embedded web servers,
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Technology Blueprint. Enforcing Endpoint Compliance on the network. Police your managed and unmanaged systems with Network Access Control (NAC)
Technology Blueprint Enforcing Endpoint Compliance on the network Police your managed and unmanaged systems with Network Access Control (NAC) LEVEL 2 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide
VoIP: The Evolving Solution and the Evolving Threat Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat An ISS Whitepaper 2
Not All Database Security Solutions Are Created Equal
Solution Brief Not All Database s Are Created Equal Compare solutions from different vendors Databases: The Top Regulatory Compliance Challenge In January 2012, Evalueserve surveyed 438 IT decision makers,
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
The Value of QRadar QFlow and QRadar VFlow for Security Intelligence
BROCHURE The Value of QRadar QFlow and QRadar VFlow for Security Intelligence As the security threats facing organizations have grown exponentially, the need for greater visibility into network activity
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
McAfee Network Security Platform A uniquely intelligent approach to network security
McAfee Network Security Platform A uniquely intelligent approach to network security Key Advantages Unparalleled threat prevention Next-generation architecture. Advanced botnet and malware callback detection.
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System
The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System Top Layer Networks, Inc. Enterprises without a sound intrusion prevention strategy across the three threat
McAfee Intrusion Prevention System
McAfee Protection-in-Depth Strategy Internal Use Only IntruShield 1200 and 1400 Appliances Pioneering and Industry-Leading, Next-Generation s Features and Details What Is Intrusion Prevention? Intrusion
IBM Internet Security Systems
IBM Global Services IBM Internet Security Systems Norberto Gazzoni Italy Channel Manager [email protected] +39 347 3499617 IBM Internet Security Systems Ahead of the threat. 2006 IBM Corporation
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Technology Blueprint. Essential Protection for PCs. Match your endpoint protection with today s risks
Technology Blueprint Essential Protection for PCs Match your endpoint protection with today s risks LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected The Security
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
CA Host-Based Intrusion Prevention System r8.1
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8.1 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS ENDPOINT FIREWALL, INTRUSION DETECTION,
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
