Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls



Similar documents
Content Security: Protect Your Network with Five Must-Haves

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco Cloud Web Security

Data Center Security That Accelerates Your Business

Cisco Security Intelligence Operations

Cisco SecureX Product Brochure

Readiness Assessments: Vital to Secure Mobility

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

4 Steps to Effective Mobile Application Security

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Cisco Advanced Malware Protection

isheriff CLOUD SECURITY

Requirements When Considering a Next- Generation Firewall

BYOD Security Challenges in Education: Protect the Network, Information, and Students

Next-Generation Firewalls: Critical to SMB Network Security

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Chief Security Strategist Symantec Public Sector

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

On and off premises technologies Which is best for you?

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Next Generation IPS and Reputation Services

Devising a Server Protection Strategy with Trend Micro

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Devising a Server Protection Strategy with Trend Micro

Secure Your Mobile Device Access with Cisco BYOD Solutions

Introducing IBM s Advanced Threat Protection Platform

Top 10 Reasons Enterprises are Moving Security to the Cloud

Securing the Borderless Enterprise

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Symantec Endpoint Protection

Symantec Endpoint Protection

Cisco & Big Data Security

Cisco Web Security: Protection, Control, and Value

Endpoint protection for physical and virtual desktops

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Security Practices for Online Collaboration and Social Media

Cisco RSA Announcement Update

End-user Security Analytics Strengthens Protection with ArcSight

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

What Is Cisco Mobile Workspace Solution?

The Future of Information Security Is Context Aware and Adaptive

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Symantec Endpoint Protection

Cisco Security IntelliShield Alert Manager Service

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Symantec Messaging Gateway 10.6

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

The Hillstone and Trend Micro Joint Solution

security changes with Orange focus on your business, we focus on your security

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Use Bring-Your-Own-Device Programs Securely

PULSE SECURE FOR GOOGLE ANDROID

Secure Your Mobile Workplace

Cisco ISR Web Security with Cisco ScanSafe

Fight Malware, Malfeasance, and Malingering with F5

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Finding Security in the Cloud

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Endpoint Security More secure. Less complex. Less costs... More control.

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

Cisco TrustSec Solution Overview

Types of cyber-attacks. And how to prevent them

Symantec Messaging Gateway 10.5

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Cisco Advanced Malware Protection for Endpoints

Cisco Mobile Collaboration Management Service

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Cisco Reputation Filtering: Providing New Levels of Network Security. Solution Overview

Secure Web Gateways Buyer s Guide >

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Sophistication of attacks will keep improving, especially APT and zero-day exploits

IBM Security Intrusion Prevention Solutions

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Protecting the Infrastructure: Symantec Web Gateway

BYOD Policy & Management Part I

Meeting the Challenges of the Borderless Network: The Six Do s and Don ts of Effective Mobile Security

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Networking for Caribbean Development

Achieve Deeper Network Security

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Meru MobileFLEX Architecture

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Payment Card Industry Data Security Standard

Best Practices for Secure Mobile Access

Preparing your network for the mobile onslaught

Sygate Secure Enterprise and Alcatel

Transcription:

Fast Facts In 2012, 9 billion devices were connected to the Internet, and 50 billion are projected to be connected by 2020. Global data center traffic is expected to quadruple over the next five years, and the fastest-growing component is cloud data. SaaS and B2B applications are 15 times more likely than pornography to deliver malicious content, and 8 times more likely to do so than counterfeit software. (Source: Cisco 2013 Annual Security Report.) IT innovation is fueling change around the world. According to the 2013 Cisco Visual Networking Index (VNI) study, by the end of 2013, the number of mobile-connected devices will exceed the number of people on earth. One billion people use Facebook and Twitter. New tablets, smartphones, and other mobile devices are being introduced at a breakneck pace, enticing consumers with a never-ending supply of must-have devices, applications, and services. Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they want risk losing their highly skilled employees and may fail to attract the newest generation of workforce talent. The cloud has quickly become an integral part of IT strategies among companies of all sizes, and public cloud services are seeing double-digit growth. Gartner forecasts the public cloud market to be $131 billion in 2013, with the market for infrastructure-asa-service (IaaS) growing faster than software-as-a-service (SaaS). 1 Content and application models are also transforming as people flock to the convenience of the cloud. The demand for video, whether for entertainment or collaboration, is seemingly insatiable. Video is projected to quadruple all IP traffic by 2014, and 70 percent of the world s mobile traffic is projected to be video by 2016. 2 1 Forecast Overview: Public Cloud Services, Worldwide, 2011-2016, 4Q12 Update, Gartner. February 8, 2013. ID G00247462 2 Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012 2017. February 6, 2013. 1 2013 Cisco and/or its affiliates. All rights reserved.

Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging in the next 10 years. The Future of Information Security Is Context Aware and Adaptive. Neil MacDonald, vice president and fellow at Gartner New Day for Security With the tectonic cultural shifts caused by the consumerization of IT, it s become clear that organizations carefully constructed security plans must be re-imagined. More than 1 million websites, including many sites used for legitimate, professional use, are compromised with some form of malware. 3 In fact, workers are more likely to get malware from an ad on a trusted site than from visiting sites widely thought to be risky. With four new pieces of malware created every second, information security is a highspeed race. Trying to keep pace with legacy security approaches and static policies is a steady drain on IT resources. But dedicated administrators continue to try: A typical firewall has more than five rules for every employee, and those rules change daily. Who can access which applications is a moving target for a security administrator, and that s no small risk in a world of complex compliance and regulatory frameworks. The challenge is formidable. IT is charged with protecting everything from the company s intellectual property to a smartphone left in a cab. Despite the growth of mobility and BYOD, IT must ensure that acceptable use policies are enforced, no matter where workers are; whether they are using their personal or companyissued smartphone, laptop, or tablet; or whether the applications are for business or personal use. A windfall of security resources is unlikely, and IT can t continue to squander precious resources by constantly patching malware signatures and updating blacklists. Adding a second vendor s firewall isn t the answer, either. Rather, it only magnifies complexity and the risk of configuration errors. There is a higher risk associated with configuring and managing firewalls from multiple vendors than from a single vendor, according to Gartner. 4 IT needs a more efficient means to adapt security practices and protections to meet changes in work patterns, device usage, and applications. To meet that challenge, security must take into account users identities and the applications they use, as well as the context in which they use the applications. 3 1,159,000 compromised sites as of March, 2012. www.stopbadware.com 4 One Brand of Firewall Is a Best Practice for Most Enterprises, by Greg Young, Gartner Research, November 2012. ID G00217262 2 2013 Cisco and/or its affiliates. All rights reserved.

Next-Generation Firewall Security in Context Cisco ASA 5500-X Series deliver the most comprehensive threat protection from targeted attacks and web-based malware, and can adapt to constantly evolving threats. Cisco next-generation firewalls apply the strengths of the world s most widely deployed stateful inspection firewall (the ASA 5500 Series), class-leading Cisco AnyConnect VPN, and network intrusion prevention, and build on that success with new application control and web security features that are backed by Cisco Security Intelligence Operations (SIO). Gartner predicts that by 2015, 90% of enterprise security solutions will be context-aware. 5 With this depth and breadth of policy enforcement, the ASA 5500-X Series delivers network wide security without compromise. Organizations can ensure that Web 2.0 and collaborative applications commonly used for business and personal reasons can be monitored and controlled based on context-aware policies. Organizations can be confident that their security policies will be enforced across physical and virtual domains to ensure complete protection and simplify administration. The ASA 5500-X Series brings the context of user identity, device type, device location, application type, web reputation, and threat information into the policy. With complete visibility into which users and devices are accessing the network, administrators can enforce policies by both device and user, rather than one or the other. Policies are enforced consistently and within context across the network without any penalties in network performance. Unmatched Global Threat Intelligence Next-generation, context-aware protection is predicated on the latest threat intelligence across the world. Operating around the clock, Cisco SIO pushes real-time threat intelligence from the cloud to your firewalls and other security infrastructure so you can make decisions based on up-to-the-minute threat information as well as the reputation of the domain, IP, URL, and sender. The combination of cloud-based intelligence and a context-aware firewall provides an unmatched advantage: Cisco can protect your organization months ahead of the threat. For example, in September 2012, when security researchers warned of a zeroday vulnerability in Internet Explorer (IE) that would allow an attacker to attain full administrator access to a vulnerable machine running IE version 6, 7, or 9, security providers rushed to develop and publish traditional signatures to protect against a potential attack. However, more than two weeks earlier, Cisco SIO had already automatically blocked the malicious site hosting the exploit. In addition, Cisco quickly moved to block access to domains that were subsequently used to spread the malware and identified more than 40 parked domains registered by the same attacker. With cloud-based intelligence and reputation analysis, Cisco stopped the attack at the source and disarmed the attacker weeks before competitive solutions could take any action. 5 The Future of Information Security Is Context Aware and Adaptive, Gartner, May 14, 2010. ID G00200385 3 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Security Intelligence Operation Highlights 100 TB of daily security intelligence 1000+ applications and 150,000+ micro-applications 1.6 million deployed security devices 13 billion daily web requests 35% of worldwide enterprise email traffic 93 billion daily email messages 5500+ IPS signatures Updates every 3 to 5 minutes Stop Threats Everywhere The comprehensive threat protection provided by Cisco next-generation firewalls gives companies the power to stop threats everywhere. The ASA 5500-X Series provides best-in-class threat protection against malware, targeted attacks, botnets, and web-based threats. With built-in reputation-based protection, your organization is protected far in advance of published exploits, and threats are blocked well before they can take hold. Web-based anti-malware protection ensures that any of more than 1 million compromised websites don t spread malware to an unsuspecting victim. All web traffic is inspected in the cloud for optimal efficiency and deployment simplicity. The ASA 5500-X Series also integrates the world s only reputation-based intrusion prevention system to ensure that attackers cannot penetrate the firewall and your critical systems. Using telemetry feeds from nearly 2 million Cisco security devices and 150 million endpoint devices located throughout the world, Cisco SIO analyzes and correlates that data to assess the reputation of websites and delivers near-realtime protection against zero-day threats. Cisco SIO updates this information and pushes it to all Cisco security devices globally every three to five minutes 24 hours a day, seven days per week. Similarly, Cisco IPS is the only context-aware IPS that uses device awareness, network reputation of the source, target value, and user identity to drive mitigation decisions so administrators can enforce proactive policies to act more aggressively on threats that present a more serious or immediate risk to network resources. The ASA 5500-X Series also identifies botnets, so if a device in your organization is compromised, such as via an infected USB, it can be rapidly identified and quarantined, limiting the damage. Your next-generation firewall investment is protected, even as business requirements change. Cisco ASA 5500-X Series combine the industry s most deployed stateful inspection firewall with comprehensive nextgeneration network security services, so organizations can start with the protection they need now and layer in additional security services as needed. But even as you add threat definitions, application control, and threat management, comprehensive security will not compromise performance. Granular Application Visibility and Control As the line between business and personal applications has blurred, IT can no longer unilaterally declare Facebook, Twitter, and LinkedIn bad and block their use. When the use of social media applications becomes essential for business, IT needs more flexible, granular controls over applications and their components. 4 2013 Cisco and/or its affiliates. All rights reserved.

The Cisco Application Visibility and Control (AVC) software module provides the greatest levels of visibility and control over mobile, collaborative, and Web 2.0 applications and even micro-applications, such as Facebook games. AVC identifies more than 1000 applications and 150,000 micro-applications, so administrators can easily allow or deny entire categories of applications, or allow access to some micro-applications while denying others. AVC can also identify application behaviors and can even identify individual actions a user takes within an application. For example, workers may be allowed to view but not post to Facebook. Or workers on a 3G cellular connection may be unable to stream music and movies or make purchases. AVC also ensures the security of applications, such as Skype and BitTorrent, which hop across different TCP ports, rendering useless the practice of using port numbers as a proxy for applications. This gives administrators new levels of control over social media, streaming media, and other applications. Reputation-Based Web Protection Cisco Web Security Essentials (WSE) delivers reputation-based protection against web-borne threats, often months before they are detected by antivirus engines. Using Cisco SIO s global threat correlation, WSE delivers reputation protection for URL, domain, and IP addresses. This helps protect organizations from zero-day attacks from compromised sites without requiring emergency signature updates or system patches. Web reputation feeds from Cisco SIO enable more granular policies based on reputation of the host site, as well as the most effective, timely coverage available. Cisco WSE also enables robust content-based URL filtering with differentiated access policies based on user, group, device, and role. It includes 65 URL categories and a comprehensive URL database that encompasses sites in more than 200 countries and over 60 languages. 5 2013 Cisco and/or its affiliates. All rights reserved.

Assured Identity and Device Access With mobility and BYOD making great strides, IT needs a way to easily differentiate access based on mobile devices and location. For example, workers may be allowed more limited access when using their personal tablets than when using companyowned laptops or virtual desktops. And access may be even more restricted when using a personal laptop. That access may change, depending on whether a user is in the corporate headquarters, at a branch office, or using Wi-Fi from home or cellular on the road. Together, the Cisco ASA 5500-X Series and Cisco AnyConnect Secure Mobility Client make it easy to provide flexible access that can be differentiated by the user s identity, network location, and specific device used. This way, when the vice president of manufacturing logs on with a new Android tablet or remotely via the VPN, IT can be confident that access policies will be enforced within the changing context. In addition to passive authentication methods using Active Directory agent and Lightweight Directory Access Protocol (LDAP), Kerberos and NT LAN Manager can provide active authentication for differentiated access control based on user, group and role. The Cisco ASA 5500-X Series integrates with Cisco TrustSec, allowing administrators to use the device and user identity already available in the network. This information can be used to identify and tag traffic from employees, contractors, and guests and then control access. For example, guest traffic can be limited to a guest network, and the Cisco ASA 5500-X Series firewall can limit the applications or websites that guests may use. No other next-generation firewall is able to provide such diverse access control mechanisms. 6 2013 Cisco and/or its affiliates. All rights reserved.

Built on a Strong Foundation Context-aware security provides protection against advanced threats in the new world of mobility, cloud, and collaboration. Organizations can depend on the comprehensive suite of Cisco ASA Next-Generation Firewall Services that can be added without sacrificing the proven protection of the industry s most trusted and most widely deployed stateful inspection firewall, unlike other next generation vendors. Administrators can use their network know-how to maximize their effectiveness while creating flexible, context-aware policies. Cisco ASA 5500-X Series are designed to scale to meet the needs of small businesses to global enterprises, and simplify the maintenance and auditing of policies, even across thousands of sites. Security Without Compromise Corporate networks are encountering unprecedented change as work becomes an activity, rather than a physical place. As more workers need anywhere, anytime access to enterprise and cloud-based resources, IT needs a fresh approach to ensure that the organization remains protected without impeding business innovation. Cisco ASA 5500-X Series provide security capabilities at scale while delivering superior levels of application visibility and control, web security, intrusion prevention, remote access, and cloud-based threat protection for flexible enterprise-class security today and tomorrow. Learn More Cisco ASA 5500-X Series Cisco Next-Generation Firewall Services Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) DDM13CS3947 05/13