Dell Security Next-Generation Firewalls



Similar documents
Applications erode the secure network How can malware be stopped?

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Next-Generation Firewalls: Critical to SMB Network Security

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Application Intelligence, Control and Visualization

Network Security Solution. Arktos Lam

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Dell SonicWALL Portfolio

Simple security is better security Or: How complexity became the biggest security threat

Achieve Deeper Network Security

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Achieve Deeper Network Security and Application Control

SonicWALL Unified Threat Management. Alvin Mann April 2009

What to Look for When Evaluating Next-Generation Firewalls

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Content-ID. Content-ID URLS THREATS DATA

Jort Kollerie SonicWALL

Networking for Caribbean Development

Network protection and UTM Buyers Guide

Move over, TMG! Replacing TMG with Sophos UTM

How to Build a Massively Scalable Next-Generation Firewall

Secure Cloud-Ready Data Centers Juniper Networks

Huawei Eudemon200E-N Next-Generation Firewall

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Unified Threat Management, Managed Security, and the Cloud Services Model

Superior protection from Internet threats and control over unsafe web usage

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

The Hillstone and Trend Micro Joint Solution

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance

Next-Generation Firewall Overview

Why Protection and Performance Matter

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

IBM Advanced Threat Protection Solution

Using Palo Alto Networks to Protect the Datacenter

McAfee Network Security Platform

Astaro Gateway Software Applications

Advantages of Managed Security Services

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Next-Generation Firewalls: CEO, Miercom

The Cisco ASA 5500 as a Superior Firewall Solution

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

The Benefits of SSL Content Inspection ABSTRACT

SuperMassive E10000 Series

Dell SonicWALL report portfolio

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

NetDefend Firewall UTM Services

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

USG6600 Next-Generation Firewall

SonicWALL ECLASS Netw

Types of cyber-attacks. And how to prevent them

Why protection & performance matter

Clean VPN Approach to Secure Remote Access for the SMB

Security Services. 30 years of experience in IT business

Firewall Feature Overview

NGFWs will be most effective when working in conjunction with other layers of security controls.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Moving Beyond Proxies

Next Generation Enterprise Network Security Platform

Next-Generation Firewall Overview

USG6300 Next-Generation Firewall

Cisco Small Business ISA500 Series Integrated Security Appliances

WildFire. Preparing for Modern Network Attacks

SonicWALL Content Security Manager Integrated Solutions Guide

Palo Alto Networks. October 6

Devising a Server Protection Strategy with Trend Micro

Chapter 9 Firewalls and Intrusion Prevention Systems

Clean VPN Approach to Secure Remote Access

Inspection of Encrypted HTTPS Traffic

Unified Security, ATP and more

Best Practices in Deploying a Secure Wireless Network

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

NetDefend Firewall UTM Services

Cisco Advanced Malware Protection

Devising a Server Protection Strategy with Trend Micro

Palo Alto Networks Next-Generation Firewall Overview

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Securing the Small Business Network. Keeping up with the changing threat landscape

Introducing IBM s Advanced Threat Protection Platform

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Next Gen Firewall and UTM Buyers Guide

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

The Challenge of a Comprehensive Network Protection. Introduction

Transcription:

Dell Next-Generation Firewalls

Agenda Evolution of Threats Next-Generation Firewall Features Multi-Core, Parallel Processing Reporting Tools Industry Reports Demo Q&A 2 Confidential

The security threat continues to evolve The virtual era requires we Notoriety Money-making business Strategic, wellplanned attacks The future Hackers used to just want their name in lights Usually an individual operating by oneself All aspects of a normal business exist Social media and virtual era aid this business plan Highly coordinated & motivated will keep at it Well-funded? 3 Confidential

Vulnerabilities Will Continue to Persist LANDesk ThinkManagement File Deletion (April 27, 2012) Vulnerabilities in the software everyone uses everyday New ZBot variant discovered in the wild (Apr 26, 2012) IBM Tivoli ActiveX Buffer Overflow (April 20, 2012) Fire Safety emails lead to Gamarue Worm (Apr 18, 2012) AryaN Botnet analysis - Part 2 (April 13, 2012) Zeus Wire Transfer targeted attacks (April 12, 2012) It s Human Nature Programmers make mistakes Malware exploits mistakes Microsoft Bulletin Coverage (April 10, 2012) Stiniter Android Trojan uses new techniques (Mar 28, 2012) AryaN IRC Botnet discovered in the wild (April 5, 2012) Oracle JRE Sandbox Restriction Bypass - Flashback Trojan (Apr 5, 2012) Microsoft Bulletin Coverage (March 14, 2012) IBM Tivoli Provisioning Manager Express SQL Injection (Mar 29, 2012) VideoLAN VLC Media Player mms Buffer Overflow (Mar 23, 2012) Wells Fargo Account Update Downloader Trojan (Mar 21, 2012) New LockScreen Ransomware Trojan in the wild (Mar 15, 2012) Oracle Java Runtime TTF BO (March 9, 2012) 4 Confidential

Seemingly Safe Applications Adobe PDF Reader Adobe Download Manager http://www.zdnet.com/blog/security/another-day-another-adobe-pdfreader-security-hole/769download-manager.html http://glanceworld.com/the-worst-security-flaw-in-adobe- 5 Confidential

Is my firewall good enough? 6 Confidential

Traditional Firewalls Stateful Firewall Web Traffic 80 = HTTP 443 = HTTPS To a traditional firewall, all web traffic looks legitimate 7 Confidential

Next-Generation Firewall Services 8 Confidential

Next-Generation Firewall Features First-Generation Firewall Capabilities Supports Stateful Packet Inspection, NAT, Routing, & IPSec VPNs Application Visibility and Control Real-time visualization & granular control of applications running Integrated IPS Protects against a comprehensive array of network-based threats and vulnerabilities SSL Decryption and Inspection AD/LDAP Integration (SSO) Bump-In-the-Wire Deployment Anti-Malware & Content Filtering Decrypts and inspects SSL traffic for threats, applies application, URL and content control policies User identification and activity are made available through seamless AD/LDAP SSO Transparent mode deployment, in addition to Layer-3 Gateway & Cloud AV, Anti-Spyware, Anti-Spam, & URL/Content Filtering 9 Confidential

By User/Group -Not by IP By Content Inspection By Destination Block Apps by Policy Application By Content Visualization Detect and Block & Malware Control By User/Group Detect & Prevent Intrusion Attempts -Not by Filename Users/Groups Policy Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Ingress Massively Scalable Next-Generation Platform Acceptable Apps Managed Bandwidth Egress High Performance Multi-Core Re-Assembly Free DPI Unacceptable Apps Blocked Malware Blocked Cloud-Based Extra-Firewall Intelligence Visualize & Manage Policy Visualization Identify 5000+ Application Signatures By Application By User/Group LDAP/SSO By Content Inspection Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Manage network bandwidth 10 Confidential

Intrusion Detection & Prevention Detect & Prevent Software vulnerabilities such as buffer overflows, peer-topeer and instant messaging exploits, backdoor attacks, and other malware. Comprehensive Pure Pattern Matching Buffer Overflow Detection Botnet detection & blocking DoS / Flood detection Geo IP monitoring & blocking SSL decryption & inspection Reporting On-box reporting IPfix / Netflow exporting 11 Confidential

SSL Decryption and Inspection Deep Packet Inspection of Secure Socket Layer (DPI-SSL) SSL traffic decrypted, inspected, then re-encrypted Client DPI-SSL and Server DPI-SSL Inspects SSL sessions on all ports independent of protocol Content can be scanned as well as injected (e.g. HTTP/S block pages) Supports all Services Extends Inspects Granular Control Deep Packet inspection to SSL traffic scanning both LAN and WAN traffic for threats and vulnerabilities Inspects SSL traffic across other security mechanisms, such as URL filtering, IPS & Gateway AV Inclusion/Exclusion list to customize which traffic DPI- SSL inspects, which allows better management of CPU resources 12 Confidential

Gateway Anti-Virus and Anti-Spyware Scans & Prevents Installation of malicious spyware and disrupts background communications from existing spyware programs that transmit confidential data 10M+ Signatures detecting millions of pieces of malware and intelligent enough to detect new variants providing effective zero-day protection Unlimited Dell SonicWALL Reassembly- Free Deep Packet Inspection engine scans analyze all files in real time regardless of file size or compression. 13 Confidential

Web Content Filtering Dynamically updated rating architecture Application traffic analytics Web-based management Enforced CFS Clients. 16M+ Website rating database used to block inappropriate and illegal content, reduces organizational liability and increases productivity 56+ Granular level blocking based on pre-defined categories. IP-based HTTPS content filtering to control user access to web sites over encrypted HTTPS Report & Analyze Application traffic analytics suite - integration with Dell SonicWALL GMS, Analyzer & Scrutinizer provides realtime and historic analysis of data transmitted through the firewall. 14 Confidential

Single Sign-On Radius, AD, & LDAP Authentication Transparent User Authentication Per-Group Policies Per-User Policies Use Cases Visibility & Reporting CFS and Application Policies Firewall Policies SSO Agent The Directory Connector SSO agent uses NetAPI, WMI, Domain Controller Logs, and the LogWatcher agent to identify users based on the workstation IP address TSA Agent The Terminal Services Agent (TSA) provides user-specific information required by the firewall for users accessing the network from multi-user systems RADIUS Accounting The Next-Generation Firewall appliances can function as a RADIUS accounting server, which enables RADIUS accounting message to be used for single sign-on 15 Confidential

Multi-Core Parallel Processing Technology 16 Confidential SonicWALL

Single-Pass RFDPI Engine Reassembly Free Deep Packet Inspection Low-Latency Ultra-Scalable Single Pass Deep Packet Inspection Engine Stable Throughput vs. Buffering Proxy Engines Input Packet Signature Signature Output Packet TCP Reassembly Pattern Definition Language Interpreter Postprocessors Preprocessors Deep Packet Inspection Engine Policy Decision API Linearly Scalable on a Massively Multi-Core Architecture 1 Core 96 Cores 17 Confidential

Dell Global Response Intelligent Defense (GRID) 100% IP ownership of all signatures World-wide Intelligence from +2m end-points Advanced Tracking & Detection 94% effectiveness rating from NSS for IPS and ICSA for Anti-Virus Industry Leading Responsiveness (MAPP leader) Same day signatures, 1000 s new/month Proactive Anti-Malware protection In-house security research team since 1999 Active participant in leading research organizations (WildList, AVIEN, PIRT, APWG and more) Member of the Microsoft Active Protections Program (MAPP) 18 Confidential

Industry Reports 19 Confidential SonicWALL

Industry Reports Dell - Internal Use - Confidential NSS Labs Results Recommended NGFW 2012 & 2013 Recommended IPS 2012 & 2013 Network World Firewall Challenge Dell SonicWALL made the Cover of Network World as the Winner Best Overall Performance for NGFW Best Overall Performance for UTM Best Overall Performance for SSL Decryption 20 Confidential SonicWALL

Dell Next- Generation Firewall Appliances 21 Confidential SonicWALL

Dell Next-Generation Firewalls Enterprise, Data Center SuperMassive Series TZ Series SMB/Campus/Branch NSA Series SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 SuperMassive E10800 SuperMassive E10400 SuperMassive E10200 NSA 6600 NSA 5600 TZ 215/W TZ 205/W TZ 105/W NSA 4600 NSA 3600 NSA 2600 NSA 220/250M 22 Confidential SonicWALL

Dell Management & Reporting 23 Confidential SonicWALL

Global Management System (GMS) Dell Policy Management, Analytics, and Reporting Issues High cost of managing complex security networks. Difficulty capturing data Hard to identify disruptive users. Cumbersome license management Solution Centralized console for managing, monitoring, and reporting. Integrated features incl. logging, analytics, change control, license tracking, and historical reporting. Benefits Greater efficiency via a streamlined console. Accurate compliance reports Higher productivity via user activity reporting. 24 Confidential SonicWALL

Analyzer Dell SonicWALL Analytics and Reporting Issues Difficulty capturing data for regulatory compliance audits. Hard to identify disruptive users. Hard to prove SLA levels. Solution Centralized console that is easy-to-use and affordable. Integrated features incl. logging, analytics, and historical reporting. Benefits Greater efficiency via a streamlined console. Accurate compliance reports via relevant data. Higher productivity via user activity reporting. (1) IDC's Worldwide Mobile Worker Population 2009-2013 Forecast (2) Cisco Connected World Technology Report, 2011 25 Confidential SonicWALL

Scrutinizer Multi-vendor IP Data Flow Analytics and Reporting Issues Identify 5000+application signatures Imprecise By Application isolation of network Not by performance Port & Protocol issues Untraceable By User/Group breaches LDAP/SSO from within Not a by corporate IP data network. By Content Inspection Non-business Not by Filename data traffic Categorize Solution By Application Uncover By Application bottlenecks Category and optimize By Destination network design By Content Identify infected hosts By User/Group Deliver granular reports of user, website, and application usage activity. Control Benefits Prioritize Apps by Policy Lower Manage network Apps by Policy costs via Block Apps by Policy optimized, bandwidth Detect and Block Malware utilization. Detect & Prevent Intrusion Attempts Proactive mitigation of Manage security network threats bandwidth Higher productivity by managing user activity. 26 Confidential SonicWALL

Contacts 27 Confidential SonicWALL

Dell Contacts Dell Account Executive Peyton Biggs peyton_biggs@dell.com Sales Executive David Koch david_koch@dell.com Sales Engineer Rapatrick Murrell rapatrick_murrell@dell.com

Dell Resources Next-Generation Firewall Live Demo Site livedemo.sonicwall.com Demos on Demand www.demosondemand.com/it/vendors/sonicwall.asp Dell Next-Generation Firewalls www.sonicwall.com

Q&A 30 Confidential SonicWALL