HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking rgeorgiev@hp.com



Similar documents
(S2.1) The importance of security intelligence in choosing a network protection system. Johannesburg

Решения HP по информационной безопасности

QuickSpecs. Models HP TippingPoint S8010F Next Generation Firewall Appliance

SourceFireNext-Generation IPS

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Changing the Enterprise Security Landscape

The Hillstone and Trend Micro Joint Solution

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

IDS or IPS? Pocket E-Guide

Security Operation Centre 5th generation

Next Generation IPS and Reputation Services

Non-Geeks Guide to. Network Threat Prevention

Limiting the Spread of Threats: A Data Center for Every User

HP S Intrusion Prevention System (IPS) Series

Complete Protection against Evolving DDoS Threats

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

QuickSpecs. Models HP S Mbps IPS

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

How To Sell Security Products To A Network Security Company

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Enterprise Security and Risk Management

Firewall Testing Methodology W H I T E P A P E R

Fighting Advanced Threats

Networking for Caribbean Development

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

How To Prevent Hacker Attacks With Network Behavior Analysis

Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance

On-Premises DDoS Mitigation for the Enterprise

HP ESP 2013 Solution Roadmap

Cisco Advanced Services for Network Security

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

10 easy steps to secure your retail network

TIME TO RETHINK NETWORK SECURITY

Requirements When Considering a Next- Generation Firewall

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

The Global Attacker Security Intelligence Service Explained

Intro to Firewalls. Summary

Cisco ASA und FirePOWER Services

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Skybox Security Survey: Next-Generation Firewall Management

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

IBM Security Network Protection

Securing Cloud-Based

USG6600 Next-Generation Firewall

Network Security Solution. Arktos Lam

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Next-Generation Firewalls: Critical to SMB Network Security

DNS Server Security Survey

HP Security Research Tour 2014 If you want better security, think like a bad guy.

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Reduce Your Network's Attack Surface

McAfee Intrusion Prevention System

Unified Threat Management, Managed Security, and the Cloud Services Model

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Security Services. 30 years of experience in IT business

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Efficacy of Emerging Network Security Technologies

Total Business Continuity with Cyberoam High Availability

Chapter 11 Cloud Application Development

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

VSS - Game Changing Technology

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

Injazat s Managed Services Portfolio

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

AppGuard. Defeats Malware

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

In-Band Security Solution // Solutions Overview

Simple security is better security Or: How complexity became the biggest security threat

Cyberoam Perspective BFSI Security Guidelines. Overview

Internal Network Firewall (INFW) Protecting your network from the inside out

IBM Security Network Protection

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

A Layperson s Guide To DoS Attacks

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Transcription:

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking rgeorgiev@hp.com

The Network Infrastructure Has Revolutionized Mainframe Client/Server Web Computing Mobile & Cloud Computing 2

The Network Security Industry Is Falling Short Mainframe Client/Server Web Computing Mobile & Cloud Computing 3

Your User Is the Biggest Risk for Infiltration 4

Historically, TippingPoint Has Protected your Apps and Data in your Data Center in your Campus Network in your Branch Office 5

Now, TippingPoint Protects Users, Apps and Data 6

What is a NGFW?

Evolution of the Firewall Why HP TippingPoint NGFW Stateful Firewalls NGFW UTM HP TippingPoint NGIPS NGIPS & NGFW 2001 Today 8

What is Next-Generation Firewall? Next Gen IPS Enterprise Firewall Integrated Policy DVLabs research and feeds 9 User and app policy

Why the HP TippingPoint Next-Generation Firewall?

The Value HP TippingPoint Provides Simple Effective Reliable Easy-to-use, configure and install with centralized management Industry leading security intelligence with weekly DVLabs updates NGIPS with 99.99999% network uptime track record 11

Simplicity Matters Deploys in minutes Easy-to-manage graphical user interface Single enterprise management solution for NGIPS and NGFW devices Set and forget security 60% of customers deploy with recommended settings. Frost & Sullivan 12

Effectiveness Matters Over 8,100 filters of network protection right out of the box Over 3,000 security researchers focused on emerging threats ~3,000+ independent researchers Proven accuracy with no false positives Optimize network performance and protect business critical applications2,000+ customers participating DVLabs Research & QA 13 0 false positives since being enabled 15 months ago. Sr. Network Security Engineer from Financial Services Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan

Exploit of Vulnerable Application HP TippingPoint Vulnerability Filter Term Definition Vulnerability Exploit B (missed by Exploit Filter A) HP TippingPoint Vulnerability Filter Exploit A False Positives Standard IPS Exploit Filter for Exploit A Vulnerability Exploit Exploit Filter Vulnerability Filter Security flaw in a software program Attack on a vulnerability to: Gain unauthorized access Create a denial of service Stops a single exploit Easy to produce Typically produced due to IPS engine performance limitations Results in missed attacks and false positives Stops all exploits attacking the vulnerability 14

Our Zero-day Coverage Compared to Competition Compiled from publicly verifiable data at http://www.microsoft.com/technet/security/current.aspx 15

Reliability Matters 99.99999% highly reliable NGIPS engine Inline deployment without affecting network performance 2 reliable modes of deployment Routing Active-Passive high availability Transparent with bypass Resilient hardware 16

Thank you