Security F5 SECURITY SOLUTION GUIDE



Similar documents
F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

F5 and Microsoft Exchange Security Solutions

Post-TMG: Securely Delivering Microsoft Applications

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

Achieve Unified Access Control and Scale Cost-Effectively

Achieve Unified Access Control and Scale Cost-Effectively

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

F5 and VMware. Realize the Virtual Possibilities.

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

The F5 Intelligent DNS Scale Reference Architecture.

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Business Case for a DDoS Consolidated Solution

Achieve Unified Access Control and Scale Cost-Effectively

Deliver Secure and Accelerated Remote Access to Applications

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Filling the Threat Management Gateway Void with F5

The State of Application Delivery in 2015

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Optimize Application Delivery Across Your Globally Distributed Data Centers

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

Dynamic Attack Protection and Access Control

Achieve Unified Access Control and Scale Cost-Effectively

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

F5 White Paper. The F5 Powered Cloud

Deploying F5 to Replace Microsoft TMG or ISA Server

Availability Acceleration Access Virtualization - Consolidation

Deliver Secure and Fast Remote Access to Anyone from Any Device

Secure iphone Access to Corporate Web Applications

Protect Your Business and Customers from Online Fraud

Datacenter Transformation

Business Case for Data Center Network Consolidation

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

Deploying F5 Application Ready Solutions with VMware View 4.5

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Integrating F5 Application Delivery Solutions with VMware View 4.5

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

High-Performance DNS Services in BIG-IP Version 11

Application Security in the Cloud with BIG-IP ASM

Intelligent, Scalable Web Security

INFORMATION PROTECTED

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Achieving PCI Compliance Using F5 Products

VMware vcloud Networking and Security Overview

Firewall and UTM Solutions Guide

Chapter 9 Firewalls and Intrusion Prevention Systems

Optimize Application Delivery Across Your Globally Distributed Data Centers

Protecting Your Organisation from Targeted Cyber Intrusion

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Securing Your Business with DNS Servers That Protect Themselves

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Fight Malware, Malfeasance, and Malingering with F5

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Advantages of Managed Security Services

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

Getting More Performance and Efficiency in the Application Delivery Network

Zone Labs Integrity Smarter Enterprise Security

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Deliver More Applications for More Users

F5 NETWORKS, INC. Secure Your Applications, Simplify Authentication, and Optimize Critical System

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Deployment Guide. Deploying F5 BIG-IP Global Traffic Manager on VMware vcloud Hybrid Service

V1.4. Spambrella Continuity SaaS. August 2

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Securing enterprise collaboration through and file sharing on a unified platform

How To Make A Cloud Bursting System Work For A Business

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

Cisco Cloud Web Security

F5 and Secure Windows Azure Access

Workshop VLAB WMWARE. F5 Networks : Nicolas BERTHIER WestconSecurity : Romain MOREL 11 / 1 / 2010

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

IBM QRadar Security Intelligence April 2013

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Symantec Messaging Gateway 10.5

Transcription:

F5 SECURITY SOLUTION GUIDE Security Protect your data center and application services, improve user access, optimize performance, and reduce management complexity. 1

WHAT'S INSIDE Data Center Firewall Services Application Security DNS Security Unified Access Accelerated Remote Access Protocol Enforcement Services Protection for Enterprise Email 3 5 7 9 11 13 15

F5 Security Solutions: Flexible, Efficient, Cost-Effective Keeping your data center services secure, fast, and available is crucial for business success. Security breaches and multi-layer cyber attacks can result in lost productivity, missed opportunities, and higher costs for your organization. These harmful situations can also damage your organization s reputation and deteriorate customer trust. With F5 security solutions, you can provide data center firewall services, simplify and unify access control, secure and accelerate remote access, and protect email all while enhancing network and application performance. Your organization will have the tailored security it needs, and your users will enjoy the reliable, flexible access they demand. 2

Data Center Firewall Services Protect the data center services that power your business THE CHALLENGES KEY BENEFITS Reduced costs and complexity Improved business integrity Faster response to business risks High performance and scalability Internet threats are widely varied and multi-layered. As these threats evolve, organizations find that traditional firewalls lack the intelligence and the scalability needed to stay effective and responsive under distributed denial-of-service (DDoS) and a whole range of other sophisticated attacks. The result is a failure to protect the business from the loss of information or interruption of service delivery. 3

THE SOLUTION F5 BIG-IP Local Traffic Manager (LTM) offers native, high-performance data center firewall services to protect the entire infrastructure. From network and application DDoS protection to SSL visibility, BIG-IP LTM offers a suite of security services to protect your business applications. BIG-IP LTM can help halt attacks that take advantage of application layer protocols and behaviors. Because BIG-IP LTM is fluent in application protocols, it can monitor and act on behavior, not just specifications and standards. BIG-IP LTM decodes IPv4, IPv6, TCP, HTTP, SIP, DNS, SMTP, FTP, Diameter, and RADIUS communications. The programmatic ability of the F5 irules scripting language provides a flexible means of dynamic threat defense. Using irules, BIG-IP LTM can be directed to enforce protocol compliance and perform rate limiting, response injection, and traffic steering and related actions. Security teams are finding that the flexibility of irules enables them to mitigate a broad range of security threats. 4

Application Security Defend against web attacks and achieve regulatory compliance THE CHALLENGES KEY BENEFITS Protection from attacks from any location Reduced costs of security compliance Combined network security and data center firewall Out-of-the-box application security policies with minimal configuration Virtual and private cloud environment deployment With the continued growth of web application traffic, an increasing amount of sensitive data is exposed to potential theft, security vulnerabilities, and multi-layer attacks. The resulting financial hit from recovery processes, legal fees, and loss to intellectual data can be significant. Many administrators think their networks are safe because they have network firewalls in place, but attackers are more likely to target the application layer, where greater vulnerability exists. Recent studies show: Most websites were exposed to at least one serious vulnerability every day of 2010. 1 During 2010, the average website had 230 serious vulnerabilities. 2 Once a breach occurs, the total average cost of a data breach is $214 per record compromised. 3 1 WhiteHat Security. Website Security Statistics Report, 11th Edition. Winter 2011. 2 WhiteHat Security. Website Security Statistics Report, 11th Edition. Winter 2011. 3 Ponemon, Larry. Cost of a data breach climbs higher. Ponemon Institute. March 2011. 5

BIG-IP Local Traffic Manager Virtual Edition + Application Security Manager Public/Private Cloud Apps Vulnerability Scan Cenzic Qualys IBM WhiteHat Web App Clients Data Center Internet BIG-IP Local Traffic Manager BIG-IP Application Security Manager Web Apps Botnet/Attacker Network Firewall THE SOLUTION F5 BIG-IP Application Security Manager (ASM) is a flexible web application firewall that secures web applications in traditional, virtual, and private cloud environments. BIG-IP ASM provides unmatched web application and website protection. It protects from the latest web threats like layer 7 DDoS, helps secure deployed applications against unknown vulnerabilities, and enables compliance for key regulatory mandates all on a platform that consolidates application delivery with data center firewall capabilities and network and application access control. With BIG-IP ASM, your organization benefits from a complete solution that reduces the need for multiple appliances, lowers maintenance and management costs, and increases the confidentiality, availability, and integrity of your critical business applications and processes. BIG-IP ASM is available as a product module on the flexible, multi-solution BIG-IP LTM platform, as a standalone device, or as a virtual edition.. 6

DNS Security Control and secure DNS and ensure high availability for globally distributed applications THE CHALLENGES KEY BENEFITS Strong DNS infrastructure security Compliance with government DNSSEC regulations Website protection Simplified implementation and reduced management costs Many of the attacks in the news are from automated bots causing DNS DDoS attacks that overload servers and cause website queries to go unanswered. The Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn t working, then it s likely your business isn t working either. Furthermore, DNS cache poisoning and other DNS attacks can compromise local DNS servers and make it possible for attackers to hijack DNS responses, redirect clients to malicious sites, and access private information. Secure your business and web presence with DNS DDoS attack protection and Domain Name System Security (DNSSEC) as a part of DNS firewall services. High global application availability and performance 7

Public/Private Cloud Attackers Client example.com LDNS example.com BIG-IP Global Traffic Manager Virtual Edition Data Center 123.123.123.123 + Public Key 123.123.123.123 + Public Key BIG-IP Global Traffic Manager with DNSSEC Attacker DNS Firewall DNS Servers THE SOLUTION BIG-IP Global Traffic Manager (GTM) enables DNS firewall services that secure the DNS infrastructure, protecting applications and enabling global high performance. By providing protection against DNS-based attacks, BIG-IP GTM adds an extra layer of security and availability for your applications. BIG-IP GTM enables multiple devices to receive queries using the same IP address; scales DNS query response up to 10x, absorbing DNS DDoS attacks; secures DNS query response with DNSSEC; and delivers complete DNS control with DNS irules. These solutions ensure application availability during volume spikes and enable a DNS firewall. BIG-IP GTM with real-time DNSSEC from F5 ensures that the DNS query response your customers receive can be trusted. Implementing the BIG-IP GTM real-time DNSSEC feature can greatly enhance your DNS security. BIG-IP GTM helps you comply with federal DNSSEC mandates and protects your valuable domain name and web properties from rogue servers sending invalid responses. F5 takes the only approach to DNS security that enables organizations to deploy DNS firewall services quickly and easily into an existing local or global server load balancing environment. BIG-IP GTM with the real-time DNSSEC feature provides a scalable, manageable, and secure DNS infrastructure that is equipped to withstand DNS attacks. 8

Unified Access Provide access to networks and applications while ensuring security THE CHALLENGES KEY BENEFITS Unified global access Identity and dynamic access control Strong endpoint security Simplified authentication, consolidated infrastructure, and reduced costs Today, business resources, such as applications and data, are accessed inside and outside the traditional business perimeter. Local and remote employees, partners, and customers often access applications without context or security. Network administrators need more visibility and control over the increasing number of users coming from all over the world, on different networks, and accessing applications located in the data centers or in the cloud. This requirement, however, can add complexity to your IT infrastructure and prove difficult and expensive to scale. A central policy control point that delivers access based on context is critical to managing a scalable, secure, and dynamic environment. High performance, scalability, and flexibility 9

BIG-IP Local Traffic Manager Virtual Edition +Access Policy Manager Public/Private Cloud Apps Users Network Firewall BIG-IP Local Traffic Manager +Access Policy Manager Data Center Hosted Virtual Desktops VDI VDI VDI App 1 App n VMware Citrix Microsoft Web Servers Directory THE SOLUTION BIG-IP Access Policy Manager (APM) is a flexible, high-performance access and security solution that provides unified global access to your applications and network. By converging and consolidating remote access, LAN access, and wireless connections within a single management interface, and providing easy-to-manage access policies, BIG-IP APM can help you free up valuable IT resources and scale cost-effectively. BIG-IP APM is available as an add-on module on BIG-IP Local Traffic Manager physical and virtual editions and the VIPRION chassis platforms. It is also available as part of the BIG-IP Edge Gateway remote access product. BIG-IP APM is a component of the data center firewall solution enabling web access management and security. Many web applications need to limit certain users access, and BIG-IP APM supports this requirement with multi-factor authentication, authorization, and single sign-on (SSO) services. 10

Accelerated Remote Access Deliver secure and accelerated remote access to applications THE CHALLENGES KEY BENEFITS Superior scalability for mobile workforce Streamlined access management and reduced costs Accelerated application performance through network optimization IT departments must support ever-increasing numbers of mobile workers. Ensuring that these users have secure and seamless access to applications and data from different devices and locations becomes increasingly challenging. IT departments might deploy point solutions from different vendors to promote access, acceleration, and optimization. But as the number of users grows, this siloed approach proves complex, inflexible, and difficult to manage. It also becomes increasingly difficult to prevent unauthorized access and attacks, as new threats are continually evolving. This costly, error-prone environment inhibits successful remote access and hinders business growth. Increased productivity with always-connected user experience Strong endpoint protection and granular access control 11

BIG-IP Edge Gateway Virtual Edition Public/Private Cloud Apps BIG-IP Edge Client Mobile Users Internet Network Firewall Data D Center Data Center Resources BIG-IP Edge Client Branch Office Users BIG-IP Edge Gateway BIG-IP Local Traffic Manager BIG-IP Edge Client Internal LAN VLAN1 Wireless Users User Directories BIG-IP Edge Client Internal LAN VLAN2 LAN Users THE SOLUTION BIG-IP Edge Gateway is an enterprise access solution that brings together SSL virtual private network (VPN) remote access, security, application acceleration, and availability services for remote users. BIG-IP Edge Gateway drives identity into the network to provide context-aware, policy-controlled, secure remote access to applications at LAN speed. As the industry s most secure and accelerated access solution, BIG-IP Edge Gateway can help your organization deliver peak performance levels to users accessing the applications and networks that are critical to your business. With BIG-IP Edge Gateway, you can easily deliver accelerated remote access to enterprise applications and data for users over any network or mobile device (including Apple iphone, Apple ipad, Andriod, Windows Mobile, and Windows Phone devices). 12

Protocol Enforcement Services Powerful security services for HTTP/S, SMTP, and FTP THE CHALLENGES KEY BENEFITS Broad protection from HTTP attacks Spam-blocking SMTP security Centralized FTP security management If your environment requires more than network layer inspection services, the expertise and management you need to deploy a full-featured web application firewall might not be available. As an alternative, protocol security services provide powerful protection for HTTP/S, SMTP, and FTP protocols but might only be available in multiple vendor solutions. Likewise, trying to decode IPv4, IPv6, TCP, SIP, DNS, Diameter, and RADIUS protocols would require multiple point solutions from multiple vendors for a decentralized and cost prohibitive implementation. One-solution decoding and enforcing protocol functions 13

Web App Clients Data Center BIG-IP Local Traffic Manager +Protocol Security Module Web App Servers HTTP/S Protocol FTP Protocol SMTP Protocol Network Firewall Botnet/Attacker HTTP/S Protocol FTP Protocol SMTP Protocol THE SOLUTION BIG-IP Protocol Security Module (PSM) is aptly suited for environments that require inspection services, where the overhead needed to deploy a fullfeatured web application firewall isn t available, or there is a need to secure other protocols. Protocol enforcement services can be implemented on a per-virtualserver basis and configured within a matter of minutes. By enforcing protocol checks for HTTP/S, FTP, and SMTP, this service prevents attacks that use protocol manipulation techniques. In combination with BIG-IP Local Traffic Manager, this solution offers data center firewall services. The BIG-IP system natively decodes IPv4, IPv6, TCP, HTTP, SIP, DNS, SMTP, FTP, Diameter, and RADIUS communications, enabling more sophisticated analysis based on protocol as well as payload. This allows BIG-IP LTM to detect anomalies indicating an attack in progress and to take appropriate action. Organizations can control almost every element of the protocols they re deploying. With Dynamic Threat Defense, the BIG-IP system enforces protocol functions on both standard and emerging or custom protocols using irules and works with BIG-IP LTM for enabling data center firewall services. 14

Protection for Enterprise Email Extend protection for enterprise email to the edge of the corporate network THE CHALLENGES KEY BENEFITS Reduce unwanted email and spam by up to 70 percent Base policies on real-time lookup of sender reputation Each unwanted email message that crosses your organization s corporate gateway consumes costly bandwidth and server resources, and can be a potential threat to security. When system capacity is strained and security threats increase, it becomes harder for IT departments to ensure business continuity. Organizations often react by adding additional mail security gateways, firewalls, and mail servers to the infrastructure, and paying for more bandwidth to keep pace with email volume. For these reasons, keeping messaging costs within budget is challenging. Decrease overall infrastructure costs 15

TrustedSource IP Reputation Database Query for Score Response with Score Internet BIG-IP Local Traffic Manager +Message Security Module Existing Quarantine and Spam Inspection Email Servers Spam m~7 70% 0 Spam m~1 10% Source SMTP Server THE SOLUTION The BIG-IP Message Security Module (MSM) is a network-edge solution that adds security intelligence to manage and filter inbound email traffic by considering the sender s reputation when making traffic management decisions. BIG-IP MSM is the industry s first reputation-based, network edge security module. BIG-IP MSM takes advantage of data from Secure Computing s TrustedSource multi-identity reputation engine to extend protection for enterprise email to the edge of the corporate network. The solution gives organizations an extremely powerful and efficient tool for dealing with a growing volume of unwanted email. 16

LEARN MORE To learn more about F5 security solutions, please visit f5.com/security. 17

All in all, we can now offer customers a highly reliable and secure web platform, which is an important factor for future success. Steven Opstaele, Chief Infrastructure Architect at NorthgateArinso 18

LEARN MORE To learn more about F5 security solutions, please visit f5.com/security. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com 2012 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. CS21-00004 0212