presents: NitroSecurity Intrusion Prevention Overview for OSSIR (Groupe SUR) Marc Berlow, Cressida France



Similar documents
Ovation Security Center Data Sheet

V1.4. Spambrella Continuity SaaS. August 2

74% 96 Action Items. Compliance

Introduction of Intrusion Detection Systems

Building A Secure Microsoft Exchange Continuity Appliance

Ovation Security Center Data Sheet

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Chapter 9 Firewalls and Intrusion Prevention Systems

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Intelligent. Data Sheet

Sygate Secure Enterprise and Alcatel

INSTANT MESSAGING SECURITY

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

How To Buy Nitro Security

Security Policy JUNE 1, SalesNOW. Security Policy v v

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University.

Information Technology Policy

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Industrial Security for Process Automation

How To Manage Security On A Networked Computer System

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Best Practices For Department Server and Enterprise System Checklist

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Second-generation (GenII) honeypots

Achieving PCI-Compliance through Cyberoam

The Comprehensive Guide to PCI Security Standards Compliance

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

CorreLog Alignment to PCI Security Standards Compliance

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Taxonomy of Intrusion Detection System

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

BKDconnect Security Overview

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Gateway Security at Stateful Inspection/Application Proxy

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

McAfee Next Generation Firewall (NGFW) Administration Course

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Patch Management SoftwareTechnical Specs

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

INTRUSION DETECTION SYSTEMS and Network Security

Innovative Defense Strategies for Securing SCADA & Control Systems

SonicWALL PCI 1.1 Implementation Guide

Networking for Caribbean Development

IBM QRadar Security Intelligence April 2013

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Using Palo Alto Networks to Protect the Datacenter

Devising a Server Protection Strategy with Trend Micro

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Configuration Information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Industrial Security Solutions

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

End-user Security Analytics Strengthens Protection with ArcSight

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

IBM Security IBM Corporation IBM Corporation

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Virtualization Journey Stages

EndUser Protection. Peter Skondro. Sophos

Securing and Accelerating Databases In Minutes using GreenSQL

Key Considerations for Vulnerability Management: Audit and Compliance

Remote Services. Managing Open Systems with Remote Services

Best Practices for DanPac Express Cyber Security

The Cisco ASA 5500 as a Superior Firewall Solution

Designing a security policy to protect your automation solution

GE Measurement & Control. Cyber Security for NEI 08-09

Did you know your security solution can help with PCI compliance too?

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Protect Your Enterprise With the Leader in Secure Boundary Services

anomaly, thus reported to our central servers.

SURVEY OF INTRUSION DETECTION SYSTEM

funkwerk packetalarm NG IDS/IPS Systems

Bitdefender GravityZone Sales Presentation

Firewall Market Trends

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Transcription:

presents: NitroSecurity Intrusion Prevention Overview for OSSIR (Groupe SUR) Marc Berlow, Cressida France January 11, 2005

Cressida Int l Company History Created by Systems Administration and Security Experts in 2001 Distributes and supports software across all European markets Main products: NitroSecurity Suite Intrusion Prevention Systems Ecora Configuration & Change Reporting, Baseline & Compare settings, Automated Patch Management, Devices Security Akonix Real time solutions for Secure, Managed, Productive Enterprise Instant Messaging MQ Message Assurance Track, Record, Audit, Replay, Edit WMQ Messages RepliWeb Industrialized Strength Disaster Recovery cross platform tool, replication, distribution, synchronization 2

NitroSecurity Company History Technology origins U.S. Department of Energy's Idaho National Engineering and Environmental Laboratory (INEEL) (Sister to Los Alamos, Sandia, Oakridge) Products NitroEDB- High performance embedded relational database Built to handle exact, high speed data demands of nuclear power industry $30M and 65 man years invested Commercialized in 1999 for the OEM community NitroGuard IPS-In line intrusion prevention solution Open Source Debut in 2001 at DEFCON Commercialized in 4th Quarter of 2001 2002 version 3.0 introduced new Technologies for Detection, Analysis including integrating in-line SNORT, and Remote Communications 2003 version 4.0 introduced improved Device Analysis and more comprehensive Management Console queries and analysis capabilities 3

So many attacks, so little time 4

NitroGuard Concepts Next Generation Network-Based Intrusion Prevention System No client agents No version management or interoperability issues Scalable to any size enterprise Ultra-fast database Same database used to correlate data from all U.S nuclear power plants Highly scalable Technology embedded in upcoming Cisco monitoring products Enterprise management console Enterprise wide correlation from all IPSs Robust reporting 5

A Layered Security Approach Antivirus NitroSecurity Security Threat Firewall Limits access to parts of the network FULL FULL Translates internal addresses to external addresses FULL No IP Address Protects against virus attacks FULL PARTIAL Protects against worms FULL PARTIAL Protects against combination worm/intrusion attacks (Nimda, CodeRed) PARTIAL FULL Protects against intrusion *FULL Prevents outbound attacks *FULL Prevents outbound critical data loss *FULL Enforces policy rules (porn, gambling, webmail, IM, etc) *FULL Logs intrusion alerts for post-analysis *FULL 6

NitroGuard Security Architecture

NitroSecurity IPS Family Enterprise-Scale, In-line IPS NitroSecurity IPS Active (IPS) or promiscuous (IDS) mode in single device Real-time event correlation and analysis across entire enterprise via embedded security database architecture Hardware either supplied by NitroSecurity or purchased based on exact specifications Integrated Signature/Anomaly Detection Industry s largest signature (3600+) library Resources DMZ Internet Fully customizable signatures/reports Protocol and behavioral anomaly support Backbone Management Stealth Operation Mode Industry s only IPS that has no IP address using in-band management Workgroups Invisible to typical network attacks 8

NitroSecurity IPS Architecture Alert Block Pass Desired Traffic Deep Packet Inspection Engine Anomaly Detection Engine Signature Detection Engine NitroEDB (Embedded Database) Secure Encrypted Control (NitroSEC ) Network Traffic In-Band Management 9

NitroEDB Overview NitroGuard Console consolidates all security data NitroGuard Console North Campus Legal Dept. South Campus Dryer Wing Finance Building Rockson Facility NitroEDB is built-in into every NitroGuard IPS NitroEDB enables real-time, enterprise-wide correlation of security data across an unlimited number of NitroGuard IPS Traditional IPS designs decrease in performance and correlation capabilities as security data increases 10

NitroSEC Overview North Campus Legal Dept. No IP address on NitroGuard IPS Big Bad Internet????? Dryer Wing South Campus? Finance Building Rockson Facility Internet Attacks can not see to attack NitroGuard IPS NitroSEC makes NitroGuard IPS virtually impossible to attack (and does not require out-of-band management) Traditional IPS designs use an IP address for management (or require an out-of-band management interface and network) 11

NitroSecurity Demonstration NitroGuard Please contact us at www.cressida.info for a live demo 12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

NitroGuard Product Line NitroGuard 500 IPS Ready for the enterprise Redundant hardware NitroGuard 200 IPS SME and departmental solution NitroGuard WG IPS Work Group Solution Protects internal assets NitroGuard M IPS Hardware either supplied by NitroSecurity or purchased based on exact specifications Built for SMB Managed by a partner In the US, Nitroguard is delivered embedded within a hardware box. In Europe, NitroGuard is mostly provided as a software suite in order to run on hardware based on NitroSecurity exact specifications. 27

The NitroGuard Advantage User Customizable Custom Signatures / Alerts Custom Reports Secure Application Gateway Signature updates Based upon the industry s most widely deployed Intrusion Detection System core SNORT Over 3,000 built in attack signatures Multiple source vs. proprietary Automated signature updates World Class Service and Support 24X7 and managed service options available Alpha response available 28

Intrusions: What should you do? In an October 2003 release, Gartner advised clients to purchase a network-based IPS and states, A true network-based intrusion prevention system must: Operate as an in-line network device at wire speeds. Perform packet normalization, assembly and inspection. Apply rules based on several methodologies to packet streams, including (at a minimum) protocol anomaly analysis, signature analysis and behavior analysis. Drop malicious sessions - don't simply reset connections. Enterprises that have not yet made large investments in network IDSs should delay investment while investigating the advantages of Intrusion Prevention Solutions. 29

Other Cressida Security Solutions: Ecora Enterprise Auditor Ensure proper implementation and use of Security settings & policies Automatically generate configuration settings and change reports, For security audits and compliance. Covers all critical OS's, databases, network devices, and applications, including Cisco, Citrix, IBM, Microsoft and Oracle. Patch Manager Make sure latest Operating System Security capabilities are effective Automate and accelerate patch management Easy to install and use, Unsurpassed graphical reports. Agentless or agent-based your choice. Device Lock Stop improper use of mobile and volatile storage devices Prevent users with USB drives from stealing your data. Halt unauthorized Wi-Fi networks and manage user access to devices. 30

Other Cressida Security Solutions: Akonix Full and Comprehensive of Management of Public and Enterprise IM Public IM - AOL, ICQ, IRC, MSN and Yahoo! EIM Lotus SameTime and Microsoft Live Communication Server (LCS) IM Logging and Report for other selected Enterprise IM solutions Reuters Instant Messaging Bloomberg Instant Message Authenticates user/screen name Integrates with Active Directory Manages by single user, groups of users or everyone Full Access Controls Chinese Walls File Transfer Controls IM Feature Controls Full or Selective Content Filtering Anti-virus scanning (with 3rd party) IM conversation logging and reporting IM Content Archiving Integration (with 3rd party) Compliance Reporter and protocol Dynamic update for protocol changes Auto install, no downtime Offers full scalability 31

Other Cressida Security Solutions: ReQuest Recovery Time Stamp Recovery Detection of valid recovery points Cross Queue Manager Allows MQ data to be recovered in sync with DBMS data. Recover deleted queues and purged data. Forward Recovery Individual Q s or group of Q s, possibly cross queue manager Mass recovery in fail over situation. Purged Queues Reporting Granularity is MQ-call Cross Queue Manager By Q, By application, By Time-span Message Propagation -report MQPUT by appl A on RemoteQ in QMGR_A Put on transmission Q for QMGR_intermediate Put on transmission for QMGRB by QMGR_intermediate Put on Q_Receiving in QMGRB by receiver. MQGET from Q_Receiving MQPUT of reply message (correlid!) by appl B on Filtering options Raw data, in fixed documented format To interface with other reporting tools 32

Other Cressida Security Solutions: RepliWeb Recovery Fire and forget Recovers from networks failures or system crashes down to block level Data transfer Integrity Compression Bandwidth control Absolute Relative Time frames Differential Transfer on large files only transfer the differences 33

Thank You Interesting free downloads: NitroSecurity: White papers on IPS (Intrusion Prevention System) http://www.cressida.info/whitepapers_page.htm#nitroguard Akonix RogueAware software: free monitoring tool that detects and reports on IM and P2P File Sharing use within corporate network http://www.akonix.com/products/test_drive.asp Ecora Free software evaluation (Systems Configuration Audit & Patch Management) http://www.cressida.info/products_ecora_overview.htm Cressida, NitroSecurity Distributor for Europe, In France: 03 20 38 06 46, Int l HQ: +44 1483 23 93 00, www.cressida.info 34