VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION



Similar documents
Virtualized Security: The Next Generation of Consolidation

SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES

Decrypt Inbound SSL Traffic for Passive Security Device (D-H)

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Blue Coat Security First Steps. Solution for HTTP Object Caching

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

Blue Coat Security First Steps Transparent Proxy Deployments

Blue Coat ICS PROTECTION Scanner Station Version

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

Blue Coat Security First Steps Solution for Controlling HTTPS

Check Point taps the power of virtualization to simplify security for private clouds

Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015

Web Application Classification Feature

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES

Blue Coat Security First Steps Solution for Streaming Media

BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES

Enabling the High-Performance Next Generation Firewall

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Blue Coat Security First Steps Solution for Controlling Web Applications

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM

Business Case for Data Center Network Consolidation

VMware vcloud Networking and Security

Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity

Appliance Comparison Chart

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

Networking and High Availability

The Cisco ASA 5500 as a Superior Firewall Solution

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

VMware vcloud Networking and Security Overview

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Clustering and Queue Replication:

HP Private Cloud Solutions

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Deliver More Applications for More Users

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP

Private cloud computing advances

SECURITY ANALYTICS FOR SECURITY OPERATION CENTER 2.0 A TECHNICAL OVERVIEW

Cisco for SAP HANA Scale-Out Solution on Cisco UCS with NetApp Storage

Open Source Software for Cyber Operations:

Imperva SecureSphere Appliances

Solution Brief. Secure and Assured Networking for Financial Services

IBM Enterprise Linux Server

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Deploying Firewalls Throughout Your Organization

Business Case for a DDoS Consolidated Solution

Server Consolidation with SQL Server 2008

The On-Demand Application Delivery Controller

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment

Cisco Integrated Services Routers Performance Overview

IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform

IBM Security Intrusion Prevention Solutions

Cisco Advanced Services for Network Security

Introducing IBM s Advanced Threat Protection Platform

Crossbeam Security Services Switch X45. Safer, simpler networks.

Get More Scalability and Flexibility for Big Data

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Achieve Deeper Network Security and Application Control

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E

IBM QRadar Security Intelligence Platform appliances

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

White Paper. Complementing or Migrating MPLS Networks

IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Virtual Connect

Achieve Deeper Network Security

Getting More Performance and Efficiency in the Application Delivery Network

Consolidating Multiple Network Appliances

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Networking and High Availability

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

VCStack - Powerful Simplicity. Network Virtualization for Today's Business

PRODUCTS & TECHNOLOGY

SecureSphere Appliances

High performance security for low-latency networks

Reasons Enterprises. Prefer Juniper Wireless

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

ScaleN: Elastic Infrastructure

Reasons to Choose the Juniper ON Enterprise Network

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Symantec Messaging Gateway 10.6

The Trellis Dynamic Infrastructure Optimization Platform for Data Center Infrastructure Management (DCIM)

QRadar Security Intelligence Platform Appliances

Transcription:

WHITEPAPER A consolidated security infrastructure is more than just an idea; in today s world of increasingly diversified threats and associated rising costs, it s imperative that organizations adopt a scalable and dynamic, yet cost-effective, solution to protect their business-critical resources. Blue Coat makes a consolidated and robust security infrastructure quite practical with patented technology that virtualizes network security into a high-performance, integrated security platform. This paper takes you through the components that comprise the Blue Coat X-Series integrated security platform and its best-in-class security applications, and illustrates how Blue Coat uniquely protects and simplifies your virtualized environment. Virtualization Adoption It is logical that IT departments focus attention on cost reduction programs to manage their increasingly diverse operations, including cloud-computing initiatives. These programs include an increasing number of management technologies and tools designed to reduce such operational expenses as energy consumption, cooling costs, and travel. Consolidation of the infrastructure has successfully contained costs, but consolidation of the network security infrastructure is more difficult and has more business-critical ramifications. Virtualization technologies deployed across the data center have been successfully reducing costs while maximizing server and storage workloads. But the security infrastructure has been largely excluded from this effort due to the added burden of creating and managing virtual security appliances and the associated risk of accidental or malicious virtual machine mapping. Many network and security architects have struggled to find the right technologies to both provide the strongest protection against network security threats, and still guarantee network availability and performance within these dynamic, virtualized environments. Virtualized Comes of Age Due to the geometric expansion of financially driven threats, increased traffic bandwidth, and a growing diversity of users accessing data, IT departments have resorted to creating hundreds of security segments with ever decreasing perimeters. Although this model reduces risk and helps provide visibility between segments, it has the negative effect of dramatically increasing the number of network and security devices and their security rules; which leads to both appliance sprawl (See Figure 1) and operational complexity. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. L2 - load balancer - intrusion prevention system - firewall L2 - switch - web application firewall Figure 1 - Appliance Sprawl L2 Corporate Systems & Assets 1

In order to achieve the goal of a virtual security infrastructure and accompanying cost reduction, two important components are needed to create this system: 1. The ability for a security application to run on specific hardware, such as a hardware-based Application Processor Modules (APMs) but still act as a single entity for resiliency and performance scalability (see Figure 2). In this case, several APMs may provide security functions as part of one Virtual Application Processor (VAP) group. Figure 2 2. The ability for a security application to work as multiple independent security instances on a single APM (see Figure 3). Using a virtual infrastructure, network managers can create hundreds of firewall () or intrusion prevention system () instances with distinct policies per segment on a single security platform while significantly reducing the number of network and security devices. For instance, one could apply specific firewall policies and rules to the print server connection, and another set of rules and firewall protection Figure 3 for the financial database zone, insuring appropriate access to both these resources. Large data centers can use this technology to collapse disparate firewalls, s and Web Application Firewalls (s) from remote locations into just one platform in the data center, but maintain unique security segmentation and rules for each location as represented in Figure 4. Figure 4 The Blue Coat X-Series Integrated Platform The underlying platform that enables these capabilities is the Blue Coat X-Series integrated security platform. The Blue Coat solution delivers best-of-breed security applications and services, and virtualizes them onto the X-Series platform, consolidating network and security infrastructure with significant cost advantages. This approach not only significantly reduces the amount of equipment required to support thousands of users in a multi-domain environment, but also delegates administrative control to the individual network zone and automates failover and load balancing across a series of application modules in the platform. The Blue Coat X-Series architecture provides carrier class resiliency and performance. Completely redundant hardware modules, switching fabrics, and control planes enable complete Single Box High Availability (SBHA) and Dual Box High Availability (DBHA) modes in configurations that scale up to 640Gbps of full duplex network connectivity, throughput up to 140Gbps of Internet Mix (IMIX) real-world traffic, and up to 100 million concurrent connections. X-series platforms can utilize up to 14 slots for module expansion and are available in the following range of chassis types. 2

The Blue Coat X20, X30, X50, X60, and X80-S Integrated Platforms X20 The X20 provides enterprise customers with a flexible 4-Slot 5Gbps network security platform pre-configured for one security application. The chassis can be easily expanded to increase the performance of one application, or add a second application. The X20 can be field upgraded to a fully modular X60. X30 The X30 provides enterprise customers with a flexible 4-Slot 10Gbps network security platform pre-configured for one security application. The chassis can be easily expanded to increase the performance of one application, or add a second application. The X30 can be field upgraded to a fully modular X60. X50 The X50 provides Enterprise customers with a flexible 4-Slot network security platform pre-configured for one security application. The chassis can be easily expanded to increase the performance of one application, or add a second application. The X50 provides real-world application performance scalability to 18Gbps. X60 The X60 provides enterprise & service provider customers with a fully modular 7-Slot network security platform that can be used to deploy best-in-class security applications. The chassis is fully modular and can support a variety of Network and Application Processor modules to fit the necessary application and environment. The X60 provides real-world application performance scalability to 70Gbps. X80-S The X80 provides enterprise & service provider customers with the highest possible performance scalability, with a fully modular 14-Slot network security platform that can be used to deploy best-in-class security applications. The chassis is fully modular and can support a variety of Network and Application Processor modules to fit the necessary application and environment. The X80-S provides real-world application performance scalability to 140Gbps. 3

The X-Series Processor Modules There are three types of modules available to support a virtualized next generation firewall, or other security applications: Network Processor Modules (NPM), Application Processor Modules (APM), and Control Processor Modules (CPM). Complete flexibility for module configuration is supported to insure a stable configuration for the security workloads. The NPM The Network Processor Module (NPM) provides the switching fabric, physical interfaces, load balancing, and routing functions for the X-Series platform. The NPM can effectively consolidate networking gear, and fully enables next generation Ethernet networks. The NPM is designed to perform deep packet inspections, classifying them into flows that are switched through the system to the virtualized security applications. The flow switching mechanism is based on Blue Coats load balancing algorithms and Blue Coat Secure Flow Processing. These technologies provide system network managers power and control to manage many virtual security domains - matching individual policies and rules to the appropriate entity. The APM Up to ten slots in an X-Series platform are reserved for Application Processor Modules (APM). These APMs manage the virtualized security applications applied to the traffic flows as they are switched through the system. Blue Coat Secure Flow Processing logically sequences network flows from one application to another using the application to manage Virtual application processor (VAP) groups run security applications such as firewall and, and can be reconfigured on the fly to accommodate different physical APM permutations since the license, configuration and application data is on the CPM. In the event of an APM failure, the application can be automatically moved to a standby blade and re-combined with the VAP group, without affecting service. Figure 5 The Blue Coat NPM, APM, and CPM Blades the individual rules and polices set for each virtual firewall and. This secure flow processing is managed at wire speeds regardless of the number of firewalls managed. A key capability of the APM is the Virtual Application Processor (VAP) technology. A VAP (See Figure 2 and Figure 5) clusters security applications, networking functions, and connections, allowing the XOS operating system to dynamically distribute the virtualized firewall and applications to these processors. The security applications managing the virtual firewalls are automatically distributed and intelligently load balanced based on usage metrics. The result is an on-demand dynamic resource allocation for easy scaling, application redundancy, and self healing capabilities that enables redundancy inside the chassis. If one blade should fail, the system will automatically fail over to a second single or cluster of blades, insuring that all firewall entities are secured. The CPM The health and management of the X-Series chassis falls to the Control Processor Module (CPM). On the CPM, a virtual representation of the chassis is created, blade services are assigned, and chassis management policies are governed. The CPM manages failover policies, service priority, and service preemption rights. For example, one entity s firewall service may be provisioned so it automatically shares processing resources from a lesser used blade if data throughput should spike - insuring that all entities are always protected from attacks. 4

The X-Series system decouples network and security service processing to allow customers to take advantage of price/ performance improvements and innovation curves within each technology. The system offers significant consolidation of security equipment while preserving security policies, resulting in a safer and simpler network for a Virtualized System. Blue Coat Management Solution Consisting of the X-Series Management System (XMS), Greenlight Element Management (GEM), and Command-line Interface with Automated WorkflowSystem (AWS), the Blue Coat Management System provides visibility and control across the entire X-Series infrastructure allowing. This visibility extends from the entire solution, to individual platforms, to modules, to flows and the applications that IT needs to quickly and effectively recognize, diagnose, and remediate performance-impacting issues. Having a comprehensive view minimizes operational costs, reduces downtime, and improves efficiency, freeing personnel to focus on managing the network and not the infrastructure. Certified Applications A key benefit of the Blue Coat security solution is the ability to choose best-in-class security applications that fit your company s needs, and integrate them with the Blue Coat security infrastructure, giving you the best of both worlds. The applications listed below can be serialized in any combination on the Blue Coat X-Series platform using our Secure Flow Processing technology. For example, the Check Point Gateway can be combined with Sourcefire 3D Sensor or a Check Point firewall with a McAfee firewall. The choice is yours. SECURITY GATEWAY R77, R76, R75.40, R75.20, R75, R71, R70 IPV6 PACK, R70 HCC, AND R70 VPN-1 POWER, VSX R65, R67, & R68 FIREWALL-1 GX 4.0, 5.0 Check Point s Gateway on Blue Coat offers a very unique approach to tailoring solutions to meet your exact business security needs. The software blade architecture provides the ability to easily add security services as new threats emerge, such as adding the Application Control blade to help identify block and limit usage of thousands of applications based on user identity. The Blue Coat X-Series hardware bladed platform adds to the approach by being able to quickly adapt and scale the performance of these security services, as well as create a very robust and self-healing system. VPN-1 Power VSX on Blue Coat provides a virtualized security gateway that can be used to create up to hundreds of individual security systems per APM or across multiple APMs depending upon performance needs. This allows the consolidation of hundreds of individual appliances into a single X-Series platform. Based on the proven VPN-1 Power software, VSX on Blue Coat provides best-in-class firewall, URL filtering, VPN and intrusion prevention technology for each security instance. Check Point VSX enables organizations to consolidate multiple instances of firewalls, VPNs, URL filtering and on a single Blue Coat APM. This ability allows organizations to maximize their processing resources and minimize total cost of ownership and effectively consolidate the data center. Check Point VSX enables organizations to consolidate multiple instances of firewalls, VPNs, URL filtering and on a single Blue Coat APM. This ability allows organizations to maximize their processing resources and minimize total cost of ownership and effectively consolidate the data center. SOURCEFIRE 3D SENSOR (IDS//RNA) V4.10 Built on the de-facto industry standard for, (SNORT), Sourcefire 3D Sensor on Blue Coat delivers a scalable and powerful solution - with the fastest throughput on the market. Couple Sourcefire 3D Sensor and Sourcefire RNA with a best of breed firewall from Check Point and you have the world s hottest Next Generation Firewall only from Blue Coat. 5

IMPERVA SECURESPHERE V10.0.1, V9.0 SecureSphere on Blue Coat delivers the full SecureSphere web application, database, and file security feature set in a very high performance, self-healing and scalable platform. SecureSphere Data Suite is the market leading data security and compliance solution that protects sensitive data from hackers and malicious insiders, provides a fast and cost-effective route to regulatory compliance and establishes a repeatable process for data risk management. MCAFEE FIREWALL ENTERPRISE V8.3.1, 8.2.1 McAfee Firewall Enterprise on Blue Coat delivers the world s most powerful and scalable application-aware firewall ideal for large Enterprise and Government deployments. This Next Generation Firewall on Blue Coat provides the latest high performance Identity and Application Awareness, Global Threat Intelligence and integrated Web filtering, A/V, and SSL Encryption all on one platform. Summary Blue Coat empowers organizations to safely and quickly choose the best applications, services, devices, data sources, and content, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. With the company s unique Assurance Technology solution set, Blue Coat assists organizations in unlocking their potential and achieving their business goals. Blue Coat, along with partners such as Check Point, Sourcefire, Imperva, and McAfee, has developed a comprehensive, highperformance security solution for effectively enabling consolidated and virtualized security within large enterprises and service providers. The X-Series integrated security platform provides the highest hardware scaling and high availability solutions for a growing list of state-of-theart security applications, including load balancing, firewalls, intrusion prevention systems and more. The end result is an industry-leading, high performance, extensible virtual security service platform that reduces the total time and cost of deployment and management of the infrastructure within enterprises, while providing competitive revenuegeneration and cost-reduction opportunities for qualified service providers. 6

Blue Coat Systems Inc. www.bluecoat.com Corporate Headquarters Sunnyvale, CA +1.408.220.2200 2013 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter, CacheEOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, Mach5, Packetwise, Policycenter, ProxyAV, ProxyClient, SGOS, WebPulse, Solera Networks, the Solera Networks logos, DeepSee, See Everything. Know Everything.,, and BlueTouch are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. Blue Coat products, technical services, and any other technical data referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you. v.wp-virtualized-security-en-v2e-0913 EMEA Headquarters Hampshire, UK +44.1252.554600 APAC Headquarters Singapore +65.6826.7000 7