FireSphere Advanced APT Defense Web and Application Security Mobile Security



Similar documents
Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud

Meeting the Challenges of the Borderless Network: The Six Do s and Don ts of Effective Mobile Security

February Considerations When Choosing a Secure Web Gateway

Content-ID. Content-ID URLS THREATS DATA

Managing SSL Traffic: An examination of SSL and how to secure it

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

McAfee Network Security Platform

Compliance Ready Mobile Device Management (MDM)

Concierge SIEM Reporting Overview

Networking for Caribbean Development

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WildFire. Preparing for Modern Network Attacks

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Cisco Advanced Malware Protection

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

isheriff CLOUD SECURITY

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Analyzing HTTP/HTTPS Traffic Logs

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Secure Your Mobile Workplace

Secure Cloud-Ready Data Centers Juniper Networks

APPLICATION PROGRAMMING INTERFACE

Fighting Advanced Threats

Mobile in the Classroom: How to secure the borderless school network

Unified Security, ATP and more

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Mobile Security and Management Opportunities for Telcos and Service Providers

Content Security: Protect Your Network with Five Must-Haves

The Evolution of the Enterprise And Enterprise Security

Providing Secure IT Management & Partnering Solution for Bendigo South East College

End-user Security Analytics Strengthens Protection with ArcSight

Enterprise Buyer Guide

Using Palo Alto Networks to Protect the Datacenter

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

V1.4. Spambrella Continuity SaaS. August 2

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Network Performance + Security Monitoring

Cisco Advanced Malware Protection for Endpoints

Securing enterprise collaboration through and file sharing on a unified platform

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Comprehensive real-time protection against Advanced Threats and data theft

DUBEX CUSTOMER MEETING

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Simple security is better security Or: How complexity became the biggest security threat

Superior protection from Internet threats and control over unsafe web usage

On-Premises DDoS Mitigation for the Enterprise

AppGuard. Defeats Malware

High End Information Security Services

Websense Data Security Solutions

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Firewall Feature Overview

Achieve Deeper Network Security and Application Control

4 Steps to Effective Mobile Application Security

Next-Generation Firewalls: Critical to SMB Network Security

Secure Networks for Process Control

Cisco Cloud Web Security

Zscaler Internet Security Frequently Asked Questions

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Securing the Borderless Enterprise

The Hillstone and Trend Micro Joint Solution

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Automate your IT Security Services

Clavister InSight TM. Protecting Values

Buyers Guide to Web Protection

Next-Generation Firewall Overview

Securing enterprise collaboration through and file sharing on a unified platform

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Advantages of Managed Security Services

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Inspection of Encrypted HTTPS Traffic

Endpoint protection for physical and virtual desktops

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

INTRODUCING isheriff CLOUD SECURITY

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Next-Generation Firewall Overview

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Achieve Deeper Network Security

PacketTrap One Resource for Managed Services

How To Manage Sourcefire From A Command Console

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Cisco Advanced Malware Protection for Endpoints

NetDefend Firewall UTM Services

BYOD: BRING YOUR OWN DEVICE.

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Defending Against Cyber Attacks with SessionLevel Network Security

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

ENABLING FAST RESPONSES THREAT MONITORING

Chapter 9 Firewalls and Intrusion Prevention Systems

STEALTHWATCH MANAGEMENT CONSOLE

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

How To Protect Your Mobile Device From Attack

Transcription:

FireSphere Advanced APT Defense Web and Application Security Mobile Security

Comprehensive Security Solutions Built for Today s Networks The mobile revolution has connected organizations and their employees globally, enhancing communications, increasing productivity and lowering costs. But these revolutionary technologies and services have also given rise to complex APTs and sophisticated targeted attacks that many standard security solutions weren t designed to handle. iboss Network Security offers comprehensive, integrated solutions created from the ground up to meet the complex challenges of today s new threat landscape. Unlike standard security products, iboss solutions offer patented, innovative technology that maximizes your network defenses and prevents costly data loss no matter where, when or how your network is being accessed. iboss Advanced Security Solutions The powerful iboss Network Security solutions secure all your Internet traffic, protect against APTs and data loss and encompass your mobile users via an integrated cutting-edge management platform. iboss solutions are easy to deploy and manage and offer unrivalled protection and low TCO: FireSphere Advanced Defense Against APTs and Evasive Infections Threat and Event Console Reporting with Advanced Threat SIEM The iboss Threat and Event Console is integrated across iboss Network Security solutions to deliver powerful insight into all your Internet traffic. With advanced threat SIEM reporting that stores over a year and a TB Flexible Deployment Options of dynamically indexed data logs, iboss combines real-time threat dashboards, forensic-level intelligence, geomapping, dynamic bandwidth reporting and more, to help you detect and respond to threats and generate the detailed reporting you need to ensure regulatory compliance and enforce your AUP. Web and Application Security Mobile Security for the Borderless Network On-Premises Cloud Hybrid

Advanced Defense Against APTs and Evasive Infections As countless high-profile data breaches demonstrate, stopping 100% of advanced malware is unrealistic. That s why iboss created FireSphere, the ground-breaking APT and evasive infection defense that not only secures organizations against APTs, criminal malware, botnets, and other advanced threats, it also detects and responds to infections on your network in real-time to prevent data loss. No other Web security solution combines FireSphere s six advanced features including, Behavioral Sandboxing, Signatureless Infection Monitoring, Network Baselining for Anomaly Detection, Intrusion Detection and Prevention, High-Risk Device Quarantine and Signature/Heuristic AV. Malware Sandboxing FireSphere Sandboxing isolates and executes suspicious files in a safe environment to deliver in-depth analysis of complex malware and polymorphic viruses. With unique features that include Full System Emulation and File Baiting, FireSphere quickly detects and analyzes malware created to evade standard sandboxing technology. Continuous Infection Monitoring FireSphere leverages iboss unrivalled visibility across all 131 thousand data channels, to find malware already on your network quickly, and notify you so you can remediate problems before data loss occurs. This feature shortens malware dwell time and speeds the interval between infection and detection to reduce data loss. Network Baselining Data Anomaly Detection Using continuous monitoring and historical data logs, FireSphere helps establish your network baseline to analyze outbound traffic against it to detect anomalies. This prevents data loss by stopping suspicious data transfers and provides unique protection against signatureless C&C callbacks, which other solutions can t detect. Auto-Quarantine FireSphere contains the spread of infections by scanning for infected machines and high-risk user behavior. Machines harboring malware or users engaged in risky behavior are instantly quarantined and alerts sent. Intrusion Detection and Prevention (IDPS) FireSphere offers content-aware data inspection, DNS scanning and SSL anomaly detection to find intrusion attempts and block them in real time. FireSphere Highlights Both signatureless malware defense and infection detection at the gateway* Stream based APT defense with layer 7 visibility across the full web stream not just ports 80 and 443* Integrated advanced threat SIEM for effective infection investigations and forensics* Blended Signature/ Heuristic Scan Engines Using multiple feeds from a wide range of sources including best-of-breed signature/heuristic AV databases, and proprietary Sandboxing and Baselining, this features delivers continuous, immediate malware and virus updates via our exclusive database cloud synchronization. Advanced Threat SIEM Reporting * iboss is the ONLY Web Security Solution with these features iboss Advanced Threat SIEM allows you store a year of dynamically indexed data logs and over a TB of data for instant forensic-level intelligence. It protects against inbound APTs and detects and responds to active infections in real time. Detection of infections masking C&C communications with Network Baselining* Shortened time from infection to detection with Continuous Infection Monitoring Unrivaled security for BYOD and heterogeneous device environments by quarantining high-risk devices and users

Web and Application Security Outbound Visibility across All Ports Traditional Web security solutions were designed to focus on HTTP/ HTTPS traffic across ports 80 and 443, but cybercriminals are using hidden UDP channels to distribute data-stealing malware. Only iboss technology gives you visibility and control over all inbound/outbound data channels and all protocols on your network, including streaming data across all 65,535 UDP ports that other solutions can t see. And iboss technology has the capability of stopping UDP data transfers mid-stream, preventing dangerous malware from reaching your network. No other solutions offer this level of advanced Web and Application protection. Watching only standard ports creates a blind spot for outbound data loss Port 80 Port 443 HTTPS/SSL Traffic Scanning Organizations depend on HTTPS/SSL encryption to protect sensitive data as it leaves and enters the network, but today s advanced threats are often hiding in SSL traffic. Most security solutions that claim they scan and decrypt SSL, do so at the gateway, which can create latency, open security holes and leave you vulnerable to man-in-the-middle (MiTM) attacks. iboss proprietary technology scans SSL traffic at the individual workstation, which retains data integrity throughout the transmission, while eliminating network bottlenecks and preventing dangerous MiTM attacks. In addition, the iboss proprietary approach allows you to set policies to enable selective SSL decryption, offering the advantage of letting innocuous transmissions pass-by, while decrypting suspicious or sensitive data transfers as needed. Advanced Application Organizations rely on a wide range of applications to conduct business, but some applications may introduce advanced malware, botnets or other threats that can lead to data loss. iboss proprietary application scanning with deep packet inspection secures the gateway from unwanted applications and threats, with multi-layered security that includes torrent and file-sharing protection, dynamic proxy circumvention detection, advanced protocol management and trigger-based alerts. iboss advanced signatures and heuristics combined with stream-based blocking capabilities assure that even complex applications running on stateless UDP protocols are inspected and blocked at the gateway. Intelligent Bandwidth /QoS Web Security Highlights Unrivalled data protection with visibility into hidden ports standard solutions don t see Protection from circumvention attempts and MiTM attacks with advanced SSL defenses including selective decryption Superior protection with granular, content-aware application management Optimal network availability with Intelligent Bandwidth Borderless network protection with BYOD controls Integrated single pane-of-glass reporting across all devices and users on or off-premises iboss Intelligent Bandwidth assures maximum network efficiency with flexible stream-based technology that is directory-aware, enabling granular control of bandwidth during peak usage hours. Unlike standard stateful shaping technology, which continuously applies policy per domain or IP, iboss binds directory services to bandwidth policies, enabling dynamic throttling that supports critical business processes while maintaining optimal network performance. BYOD (bring your own device) The iboss Secure Web Gateway integrates BYOD management to extend advanced threat protection and DLP to all the BYOD users on your network, while assuring that increases in bandwidth demand don t affect mission critical traffic. iboss also identifies BYOD users not using a NAC and provides a captive portal that binds them to your network directory or LDAP automatically, assuring accurate policy enforcement across all users, whether on wired or wireless devices. iboss BYOD tools include advanced application controls and High Risk Auto Quarantine, enabling you to lock users engaged in high-risk online behavior such as illegal file downloads or circumvention attempts.

Mobile Security for the Borderless Network The evolution of mobile connectivity has changed the modern workplace, creating more productivity and business efficiency, but also increasing IT security challenges. iboss Mobile Security combines cloud Web security with full-featured mobile device management to extend threat and data protection across all mobile users whether on or off the network. Mobile Security Suite The iboss Mobile Security Suite is seamlessly integrated with the core iboss Web Security solution to extend protection across your organization, with no manual proxy settings to a third party solution, which can undermine network security. Unrivalled ease-of-enablement and centralized management keep TCO low. Mobile Security Highlights Fast and easy to enable, it extend comprehensive Web security via the cloud with one click Full-featured proprietary MDM protects your sensitive data and devices SSL traffic scanning eliminates threat blind spots and protects data No-touch enrollment of all Apple mobile devices into your security policies, with DEP integration Comprehensive granular reporting across all users and devices with real-time alerts Seamless user-based authentication and reporting extends accurate policy enforcement to all devices Provides SSO transparent authentication of Chromebooks and Android BYOD Supports all mobile platforms including Mac, ios, Android, Windows, Google Chrome Cloud Web Security iboss enables mobile devices in the workplace with robust cloud Web security that protects all your mobile users whether on- or off-premises. With dynamic content awareness and aggregate reporting features, iboss extends security and data protection across the organization, so you can assure regulatory compliance and enforce your corporate security and acceptable use policies. MobileEther iboss Mobile Device (MDM) iboss proprietary MDM, MobileEther, is a full-featured solution that provides traditional MDM capabilities but extends protection beyond standard MDM with features that include HTTP/S Web filtering, intrusion detection and prevention, data loss protection, Malware and advanced threat defense, email security, and integrated compliance-ready reporting. MobileEther s fully cloud-based technology allows organizations to push, wipe, confi gure and provision devices instantly, over the air. In addition, streamlined directory services integration allow secure, non-proxy authentication that closes security holes and accurately applies policies. BYOD (bring your own device) Personally-owned mobile devices in the workplace (BYOD) can introduce threats and hamper bandwidth availability. As part of the iboss Web Security Suite, our BYOD management solution extends comprehensive security and data protection to include all users in your organization whether on corporate-owned or personal mobile devices. iboss BYOD is integrated with iboss advanced threat protection capabilities to protect your organization from BYOD data loss while assuring accurate policy enforcement of all users.

Threat and Event Console Reporting with Advanced Threat SIEM The exclusive iboss Threat and Event Console offers capabilities that are integrated across all iboss Web Security, FireSphere Advanced APT Defense and Mobile Security solutions. It boasts a highly-responsive, intuitive interface, guided interactive wizards, and customizable reporting templates. Within seconds, go from organization-wide visibility, to a 360-degree view of each network user, including Web activity, application use, bandwidth consumption, threats and more. Includes Advanced Threat SIEM for unrivalled forensic-level intelligence that enables you to detect and respond to advanced threats and data loss in real time. Live Threat Dashboard GeoMapping/Global HeatMap Web Security Reporting The iboss Live Threat Dashboard gives you immediate insight into advanced threats, suspicious events, and liability risks that can result in costly data loss. It provides an instant snapshot of trouble spots as they occur and before they can cause serious damage. iboss offers location-aware technology that allows you to track bandwidth usage on a global map determine where and with whom your network is connecting, in real time. Desktop Monitor/Control/ Record (DMCR) iboss Reporting and Log tools go beyond standard static reporting, to deliver proactive, dynamic indexing and archiving that enable instant drill-down access to user activity, threats and bandwidth consumption. PB-US-10/14 Live Bandwidth Dashboard and Dynamic Plotter iboss provides granular visibility and control over bandwidth consumption, with features such as geotagging, reverse-geomapping of IP address to organization and user, and map overview. Threat and Event Console Highlights Real-time intelligence with Live Threat Dashboard Optimal network performance with Live Bandwidth Dashboard and Dynamic Plotter Location-aware visibility with GeoMapping and HeatMap Technology iboss patented technology delivers actionable intelligence on suspicious events with trigger-activated recordings of user desktops. Monitor and record up to 10 desktops at once. Advanced Threat SIEM Provides instant forensic-level intelligence enabling organizations to protect against inbound APTs, and detect and respond to infections on the network in real-time. Validation of policy violations with unique Desktop Activity Recorder Accurate compliance and AUP enforcement with comprehensive Web Security reporting About iboss Network Security iboss Network Security protects today s borderless networks against malware, advanced threats and data loss with innovative Web Security, Mobile Security and Fire- Sphere Advanced APT defense. Backed by patented technology, iboss stream-based approach delivers unparalleled visibility across all inbound/outbound data channels and port-evasive applications, with technology that offers infinite scalability to handle the largest bandwidth demands. iboss outbound data defense includes best of breed AV, sandboxing, data anomaly detection, and Advanced Threat SIEM reporting, to better detect and respond to infections already on your network. Leveraging leading threat protection and unsurpassed usability, iboss is trusted by thousands of organizations and millions of users globally. www.iboss.com or call 877-742-6832 for more information.