Dynamic Attack Protection and Access Control



Similar documents
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Application Security Manager ASM. David Perodin F5 Engineer

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Security F5 SECURITY SOLUTION GUIDE

Deliver Secure and Fast Remote Access to Anyone from Any Device

Achieve Unified Access Control and Scale Cost-Effectively

Achieve Unified Access Control and Scale Cost-Effectively

Deliver Secure and Accelerated Remote Access to Applications

Achieve Unified Access Control and Scale Cost-Effectively

Availability Acceleration Access Virtualization - Consolidation

F5 Presentation Roman Tomasek

Post-TMG: Securely Delivering Microsoft Applications

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

High-Performance DNS Services in BIG-IP Version 11

Datacenter Transformation

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Application Security in the Cloud with BIG-IP ASM

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

F5 NETWORKS, INC. Secure Your Applications, Simplify Authentication, and Optimize Critical System

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Business Case for a DDoS Consolidated Solution

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Where every interaction matters.

Secure iphone Access to Corporate Web Applications

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Achieving PCI Compliance Using F5 Products

F5 White Paper. The F5 Powered Cloud

F5 Datacenter Virtualization & Application Security

Getting More Performance and Efficiency in the Application Delivery Network

Achieve Unified Access Control and Scale Cost-Effectively

Optimize Application Delivery Across Your Globally Distributed Data Centers

F5 and Microsoft Exchange Security Solutions

Workshop VLAB WMWARE. F5 Networks : Nicolas BERTHIER WestconSecurity : Romain MOREL 11 / 1 / 2010

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

FortiWeb 5.0, Web Application Firewall Course #251

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Load Balancing Security Gateways WHITE PAPER

BIG-IP Virtual Edition Setup Guide for Linux KVM. Version 11.4

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

F5 and VMware. Realize the Virtual Possibilities.

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

From the Bottom to the Top: The Evolution of Application Monitoring

304 - APM TECHNOLOGY SPECIALIST

A Guide to New Features in Propalms OneGate 4.0

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

BIG-IP Virtual Edition Setup Guide for Amazon EC2. Version 11.3

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

F5 Networks Overview Maximizing the Performance and Delivery of Your Mission Critical Enterprise Applications

IINS Implementing Cisco Network Security 3.0 (IINS)

How To Make A Cloud Bursting System Work For A Business

Optimize Application Delivery Across Your Globally Distributed Data Centers

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Load Balancing for Microsoft Office Communication Server 2007 Release 2

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

ARX Add-on: ARX1500+ License Upgrade (Limited to Enterprise) ARX Add-on: ARX1500+ Second Protocol License

F5 Silverline Web Application Firewall Onboarding: Technical Note

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Implementing Cisco IOS Network Security

Deploying F5 Application Ready Solutions with VMware View 4.5

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

Next Generation Firewall

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Deploying the BIG-IP System with Microsoft SharePoint

Deploying F5 with IBM Tivoli Maximo Asset Management

Deploying F5 to Replace Microsoft TMG or ISA Server

The F5 Intelligent DNS Scale Reference Architecture.

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

APV9650. Application Delivery Controller

F5 Presentation. F5 Account Manager pro ČR: Ladislav Novák, ,

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

AppDirector Load balancing IBM Websphere and AppXcel

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Cisco Small Business ISA500 Series Integrated Security Appliances

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

Transcription:

Security Revolution: F5 BIG-IP Dynamic Attack Protection and Access Control

2 How the Static Data Center Falls Short It started simple More user types, services Application issues Security woes What s the answer?

3 Dynamic Data Center Reconfigure dynamically Manage applications, not objects Context-aware policies ADC manages application services

4 Dynamic Attack Protection and Access Control Adaptive Protection for Web 2.0 Applications across All IT Environments Advanced Dynamic Services for Unified Access Control Scalable and Controlled DNS Infrastructure with DDoS Attack Mitigation

5 BIG-IP Advanced Acceleration Overview Adaptive Protection for Web 2.0 Applications

Hackers Attacking Websites With DDoS 6 60% of (orgs.) respondents rely on their websites for at least 25% of their annual revenue. Merrill Research, 2011

Recent Application and Network Attacks 7 And the hits keep coming: Indeed in today s world, acts of terror could come not only from a few extremist in suicide vests but from a few key strokes on the computer... Barack Obama, President of the USA Source: http://spectrum.ieee.org/static/hacker-matrix

8 Defend Against Cyberattacks Ongoing storm of cyberattacks is preventable, experts say Preventable with technology that exists today! Need to educate all IT organizations how to protect networks Many are blind to Layer 7 attacks Experts note that network firewalls are not enough Need comprehensive layered network and application security architecture unique to F5

9 Anonymous Attack Anonymous targeted customer with bots Traffic attack melted legacy systems Solution: Implement BIG-IP BIG-IP Attack Protection: Greater connection management LTM to mitigate network DDoS ASM to mitigate application DDoS irules for agility and extensibility

Optimize Traffic Management and Offload Application Server with BIG-IP Local Traffic Manager (LTM) 10 BIG-IP LTM Physical Virtual Public or private cloud OPTIMIZED APPLICATIONS & DATA Application Intelligence Load Balancing TCP Optimization Rate Shaping Server Offload RAM Caching Intelligent Compressing Health Monitoring SSL offload Session Persistence SECURE APPLICATIONS & DATA Application Proxy Transaction Assurance Resource Cloaking Secure Network Address Translation Port Mapping Selective Content Encryption Denial of Service (DoS) protection

11 Secure Applications and Data with BIG-IP Local Traffic Manager (LTM) SECURE APPLICATIONS & DATA Application Proxy Transaction Assurance Resource Cloaking Network and protocol attack protection Secure Network Address Translation Port Mapping Selective Content Encryption Denial of Service attack protection BIG-IP LTM Security at the application, protocol, and network levels Meet compliance requirements (PCI, HIPAA, etc.) Protect data without interrupting legitimate traffic

12 Leading Web Attack Protection BIG-IP Application Security Manager Protect from latest web threats Meet PCI compliance Out-of-the-box deployment Quickly resolve vulnerabilities Improve site performance

13 Quickly Resolve Application Vulnerabilities Request made BIG-IP ASM security policy checked Server response Enforcement Secure response delivered BIG-IP ASM applies security policy Vulnerable application Maintain security at application, protocol, and network levels Launch secure applications protected from vulnerabilities

Protection From Top Web App. Vulnerabilities (Open Web Application Security Project) OWASP Top 10 Web Application Security Risks: 1. Injection 2. Cross-Site Scripting (XSS) 3. Broken Authentication and Session Management 4. Insecure Direct Object References 5. Cross-Site Request Forgery (CSRF) 6. Security Misconfiguration 7. Insecure Cryptographic Storage 8. Failure to Restrict URL Access 9. Insufficient Transport Layer Protection 10. Unvalidated Redirects and Forwards 14 Source: www.owasp.org

15 Meet PCI Compliance Easily comply with audits PCI reporting provides: Requirements with details Current compliancy state Steps to become compliant

16

Securing Disperse Web Applications 17 No virtual WAF option for private cloud apps Replication of production environment complicated and cost-prohibitive Data Center

18 F5 Innovative Protection for Web 2.0 Apps Automatically share policies between devices Quickly deploy BIG-IP ASM VE in private clouds Data Center

19 Unable to Secure Latest Web Apps Support AJAX apps or JSON payloads Unable to parse and secure JSON payloads Same attack vectors as http apps Policy violation renders no blocking signal Example: www.stockfacts.com

20 Easily Secure JSON Payloads BIG-IP Application Security Manager Protect from JSON threats Render unique blocking message for AJAX widgets User informs admin with support ID for resolution Display a Blocking Message in AJAX Widget Example: www.stockfacts.com

Protection from Vulnerabilities Enhanced Integration: BIG-IP ASM and WhiteHat Sentinel 21 Customer Website Finds a vulnerability Virtual-patching with one-click on BIG-IP ASM WhiteHat Sentinel Vulnerability checking, detection and remediation Complete website protection BIG-IP Application Security Manager Verify, assess, resolve and retest in one UI Automatic or manual creation of policies Discovery and remediation in minutes

Improve Site Performance and Security CASE STUDY 22 Challenge: Third-party network solution unstable Keeping people out of network Difficult to pinpoint app security problems Poor performance led to downtime Benefits of BIG-IP LTM and ASM: Improved site performance by 2 3 Cut downtime from 4 hours per week to 0 hours Fewer false positives, more legitimate traffic Eliminated 8 hours per week in support calls The improvement in functionality, performance, security, and support with F5 has been outstanding. Brad Tran kina, Director of Network and Information Systems, Human Kinetics

23 Adaptive Protection for Critical Applications BIG-IP Application Security Manager Secure latest Web 2.0 applications Support for AJAX widgets and JSON payloads New platforms for All IT Environments BIG-IP ASM VE in virtual and private cloud Isolated resource allocation: vcmp support for ASM F5 s BIG-IP Application Security Manager Winner of the SC Magazine Reader Trust Award Best Web Application Security Solution 2010 BIG-IP ASM on 11000 = high throughput; 1600 = budget conscious Enhance management and reporting Vulnerability assessment and mitigation in the SDLC w/ WhiteHat Auto policy sync between devices iapp for integrated security services

24 BIG-IP Advanced Acceleration Overview Advanced Dynamic Services for Unified Access Control

25 Problem: Who, What, Where? What devices are requesting access? Who is accessing? What applications were accessed? Where did the user navigate?

26 Context = Access Control BIG-IP Access Policy Manager v11 Unify All Access Fast Authentication and Manage Access Single Sign On Based on Context Powerful Custom and Built-in Reporting Access and Application Analytics

27 Enable Simplified Application Access with BIG-IP Access Policy Manager (APM)

28 Authentication All in One and Fast SSO F5 BIG-IP Access Policy Manager Dramatically reduce infrastructure costs; increase productivity = BIG-IP v11

29 Auto-Connect to the VPN At Home (wireless) Auto-Connect! On the Way to Work (Aircard) Always Connected Application Access In the Office (docked LAN connection) In the Cafe (wireless) Presenting (corporate wireless)

BIG-IP Edge Client Web-Delivered and Standalone Client Mac, Windows, Linux iphone, ipad, itouch, Android Drive Security Endpoint inspection Full SSL VPN 30 Enable Mobility Smart connection roaming Uninterrupted application sessions Accelerate Access Adaptive compression Client-side cache Client-side QoS

Easily Design Access for ipad BIG-IP Edge Client Connection, Statistics and Settings 31

32 Configure ios Access to Applications with BIG-IP Edge Portal

33 Secure, Accelerated Remote Access with BIG-IP APM in Edge Gateway Edge Gateway includes: Access Control, Web Acceleration, WAN Optimization

34 BIG-IP Edge Gateway Secures and Accelerates Access to Applications Next generation remote access solution Converges SSL VPN access security, application acceleration and availability Optimize access for mobile users and remote offices BIG-IP Solution for the Network Edge Multiple Platforms: 1600, 3600, 3900, 6900, 8900, 11000 (Licensed concurrently) Includes BIG-IP Edge Client solution Exponential Performance, Capacity, and Scalability Up to 10 Gbps, 600 log-ins per second, 60,000 users

BIG-IP Edge Gateway will Power New Managed Services 35 Access Requirements Easy / cost effective access scaling Advanced, secure VPN with fast deployment Custom look and feel per customer Virtualized solution to maximize investment Enable secure collaboration between 3 rd parties BIG-IP Edge Gateway Delivered Superior scalability @ Lowest cost Acceleration technology with LAN speed performance Improved manageability and security with unified access Customized domains for personalized experience Virtual routing services with lower opex

Advanced Dynamic Services for Unified Access Control: BIG-IP APM 36 IPsec optimized site-to-site tunnels Dynamic Webtop: with Application Tunnels Access: External Dynamic ACLs, Flash patching, Oracle Access Manager 11g Hosted VDI: Microsoft Remote Desktops, Expanded Citrix VDI support (Proxy and Portal mode) EndPoint Inspection: Protected Workspace, Machine Info Inspector Powerful reporting/analytics: Custom & built-in reports, Access and Application Analytics for remote access solution Scale for Global enterprise: 11000 Series: ^60k users, w/1.2 TB of storage SSO enhancements: SSO across multiple domains, Kerberos auth. (CAC cards, etc)

37 BIG-IP Advanced Acceleration Overview Scalable, Adaptive and Secure DNS infrastructure

38 xxxxxx 888888 Nr.000000 Network Solutions hit 6/2011. D o m a i n R e g i s t r a r Network Solutions hit with a large denial of service attack targeting their DNS servers. Large DNS DoS attacks. World News DNS DoS Attacks continues to cost businesses millions of dollars each year G o G r i d, T h e P l a n e t, Register. com, UltraDNS, Network Solutions were all hit during March/April 2009 causing websites to be offline a n d c o s t i n g c u s t o m e r s DoS Attack Affects Global DNS Service inc. Amazon

39 DNS Attacks Are Common

Cost of No DNS-based Attack Protection 40

Scale and Consolidate Your DNS Fast ROI with F5 Solutions 41 10x DNS Express BIG-IP GTM 70%

42 F5 Solution: Easily Handle All DNS Requests F5 BIG-IP GTM Scalability CMP Enabled, 130K qps per core (~ 6 Million on VIPRION) F5 DNS Express Authoritative DNS in Memory, 10 s of Millions of Records F5 IP Anycast Integration Obscures DNS Servers and Distributes Load DNS Express in GTM Queries in Millions 6 Answer 3 DNS Query 0 Answer Low Query DNS Query Answer DNS Query Answer Query DNS Growth Query Query Spike DNS Server Exponential DNS performance Answer survives attack DNS Query OS Query Decline NIC Manage DNS Records Max DNS Admin Auth Roles DNS Queries w/ddos Valid DNS Queries Dynamic DNS DHCP

Secure Your DNS Infrastructure 43 Simple DNSSEC compliance: Implement BIG-IP GTM in front of existing DNS servers Ensure trusted DNS queries with dynamically signed responses Reduce management costs

DNS Infrastructure with DDoS Attack Mitigation BIG-IP Global Traffic Manager Deliver high speed "DNS Offload and Secure DNS DNS Express and DNSSEC 44 Maximum capacity DNS Geographically distribute to nearest GTM (IP Anycast Integration) Support both IPv6 and IPv4 hybrid environments DNS v6 to v4 translation and gateway Deliver industry leading, scalable, and flexible performance GTM on 11050 and VIPRION (CMP and vcmp) Cost effective, virtualized and globally dispersed datacenters GTM Virtual Edition GTM Standalone and module on LTM 1600

45 F5 Integrated Security No other vendor has a comprehensive solution Application Presentation Session Transport Network Data Link Physical XSS, SQL Injection, Data Leaks, SPAM SSL, XML Encryption, Images Sockets, RPC, NetBIOS Auth, SNMP SYN/ACK Attacks, Port Scans, MitM Port filters, IP Frag, Spoofing, Smurfs VLANs, ARP Poisoning Management Interface Segmentation

46 Delivers Dynamic Attack Protection and Access Control Adaptive Protection for Web 2.0 Applications Unified Access Control Scalable, Adaptable and Secure DNS

47 Q & A

2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, icontrol, irules, TMOS, and VIPRION are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries

TMOS Architecture The foundation of BIG-IP LTM and a unified system for application delivery 49