Nakina Multi-Vendor Security Management Secure Your Network Operations



Similar documents
How To Achieve Pca Compliance With Redhat Enterprise Linux

Symphony Plus Cyber security for the power and water industries

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

About Network Data Collector

NETWORK MANAGEMENT SOLUTIONS

The Challenges of Administering Active Directory

IBM Security Privileged Identity Manager helps prevent insider threats

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Security from a customer s perspective. Halogen s approach to security

Cisco Prime Optical. Overview

-Archiving Regulatory Compliance for Small and Midsized Firms (SMBs)...a Whitepaper by Sony and Intradyn

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

SOLUTION WHITE PAPER. Managing AWS. Using BMC Cloud Management solutions to enhance agility with control

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

MRV EMPOWERS THE OPTICAL EDGE.

IBM Tivoli Netcool Configuration Manager

SERENA SOFTWARE Serena Service Manager Security

Best Practices for PCI DSS V3.0 Network Security Compliance

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Agentless Architecture. Agentless Backup is Not a Myth.

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

Understanding Enterprise Cloud Governance

Security Center Unified Security Platform

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Ipswitch WhatsUp Gold vs. Solarwinds Orion Comparing Product Offerings

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Netspan. Network Element Management System. Scalable Element Mangement Solution for Airspan s portfolio of RAN and Transport Solutions

Altus UC Security Overview

Network Security Administrator

CA Top Secret r15 for z/os

BUSINESS ANALYTICS. BIO for Microsoft Dynamics SL

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction Background Secure Access Link...

WHITE PAPER. 9 Steps to Successful Information Lifecycle Management: Best Practices for Effi cient Database Archiving

Enable unified data protection

Alcatel-Lucent Services

Managing Physical and Virtual Machines in Paragon Protect & Restore

BMC BSM for PCI DSS Addressing PCI DSS File Integrity Monitoring SOLUTION WHITE PAPER

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Guardium Change Auditing System (CAS)

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

WHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10

Secospace elog. Secospace elog

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Authentication in Apache Lenya

SAP Business Objects Security

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

The Sumo Logic Solution: Security and Compliance

Table of contents

Company & Solution Profile

TimePictra Release 10.0

Safeguarding the cloud with IBM Dynamic Cloud Security

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

INCIDENT RESPONSE CHECKLIST

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Information technology infrastructure key to your business success.

State of Texas. TEX-AN Next Generation. NNI Plan

Introduction to Endpoint Security

March

Cisco Wireless Control System (WCS)

Technical Proposition. Security

PRODUCTS & TECHNOLOGY

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Private Cloud. One solution managed by Applied

Vistara Lifecycle Management

This research note is restricted to the personal use of

PART 10 COMPUTER SYSTEMS

Taking the Leap to Virtualization

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

MRV EMPOWERS THE OPTICAL EDGE.

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

DATASHEET. Xythos on Demand. Productivity and collaboration tools

QRadar Security Intelligence Platform Appliances

BENEFITS OF MOBILE DEVICE MANAGEMENT

Infoblox vnios Software for CISCO AXP

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Protecting systems and patient privacy

WHITE PAPER. How to Launch a Data Governance Program: Practical Guidelines for Technology Implementers

whitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment

eztechdirect Backup Service Features

Transcription:

Nakina Multi-Vendor Security Management Secure Your Network Operations How Service Providers can improve the Security of their Network Operations

Security Challenges in Network Operations Service providers today face mounting challenges in securing their multi-vendor networks. Multiple user accounts on thousands of network elements (NEs) and devices are accessed by hundreds if not thousands of network operators daily. User IDs and passwords are usually shared across the network, making it diffi cult to authenticate and track user activity. NE equipment limitations and security feature idiosyncracies make it diffi cult to implement strong network-wide security policies like periodic password aging. Security administrators are left to feel overwhelmed by the responsibility of securing access to NEs while ensuring they do not impede progress in daily network operations. 2

Make it easier for your network operators to do what they should be doing and harder to do what they shouldn t. Automated, Centralized, Standardized Security Now there s a better way of securing the network. Nakina s Security Management solution allows security administrators to implement a single user interface to securely control all access to NE in the network, whether it is access for back offi ce systems or network operations personnel. Security policies are effortlessly enforced network-wide while reducing the operating cost, time, and effort required to do so. The Nakina Multi-Vendor Security Management solution offers the ability to: Substantially reduce the effort and cost of administering security credentials for thousands of users across large networks (from a few hundred up to 100,000 NEs) Centralize, consolidate and standardize security practices on a single Security Administration GUI for the entire network Overcome inconsistencies in the way a security feature is implemented by different vendors by overlaying security features onto all NEs and devices in the network Enforce robust and consistent security policies with automated, network-wide security measures like password aging, minimum alphanumeric character requirements, etc. Customize security privileges for each network operator to reduce a network s vulnerability to inadvertent human error or oversight in issuing commands to a device or NE Define and assign precise roles to a user or group of users that determine the applications, commands, and NEs that can be accessed by the user(s) Integrate with existing corporate authentication and HR systems such as LDAP/HR Systems, RADIUS Servers, etc. OPEX Reductions Mean Rapid Payback Industry experts estimate that network operators spend between $30 and $50 in operating costs for every password change made in their networks. It is not unusual for annual security administration costs to amount to many millions of dollars per year when proper security measures are correctly enforced. Nakina s solution improves security robustness network-wide while offering an average payback period on investment of 6 to 12 months. Meeting the Challenge of Emerging Standards Nakina s solution is a carrier grade, scalable solution that achieves ANSI / ATIS T1.276-2003 and ITU-T M3016 / X.805 compliance. In the U.S., a recently released President s National Security Telecommunications Advisory Committee report is the result of a U.S. Government-led initiative requiring all major service providers to take measures to ensure the protection of their networks, with the resulting specifi cation, ANSI / ATIS T1.276-2003, requiring rigorous and stringent security policies. Nakina s solution also supports all aspects of the ITU-T M3016 and X.805 recommendations for a framework handling security threats within the context of the TMN functional architecture, described in ITU Recommendation M3010. Nakina Multi-Vendor Security Management 3

The Nakina Security Management Solution Telnet Session FTP Session Command Broker Command Broker 3 Command Broker Security Administration LDAP (HR) Systems 2 Nakina User Security 4 1 Session Broker Nakina NE Security Equipment Adapters Nakina Open Network OS Security Administrators Vendor A Adapter Vendor B Adapter Vendor C Adapter RADIUS Servers RADIUS compliant NE Subnet Vendor A Vendor B Vendor C Nakina NE Security Nakina NE Security enables centralized management and automation of NE account access authorizations. Nakina NE Security is strictly for use by Security Administrators, shielding user account passwords from day-to-day network operations staff. User Security on Nakina Open Network OS Nakina Open Network OS is the business tier that provides each network operator with his or her own unique user ID and password, eliminating shared passwords. It requires each user to log into the Nakina Open Network OS with his or her own unique account credentials before getting access to any given applications, commands, or NEs. An added benefi t - this is all achieved without exposing NE account credentials to the user, and all user activity is fi ltered and logged in the process for future reference. Nakina Command Broker 1 2 3 4 Nakina Command Broker is a rich graphical user interface that operators use to issue authorized commands to NEs they have access to. Security administrators can customize each user s privileges by specifying the precise set of commands he or she is authorized to use. Nakina Session Broker A standalone application that allows security administrators to fi lter all Telnet, FTP, etc., sessions to NEs network-wide and regardless of vendor, by requiring network operations personnel and automated systems to log in through a security proxy server that in turn authorizes the user s privileges and establishes the session on the user s behalf. 4 5

A Carrier-Class, Flexible, Scalable Architecture The Nakina Security Management application is engineered to grow with the service provider s network over time. Inherent in the architecture is the capacity to: Securely control access and command privileges for all network operators (from a few hundred up to several thousand users) Securely control privileges on tens of thousands of NEs (from a few hundred up to 100,000) in a multi-vendor network Quickly and simply accommodate new NE types being introduced by vendors in the future, immediately leveraging all of Nakina s security features in next generation networks Nakina Network OS is the foundation upon which the Security Management solution is built. The key to Nakina Network OS is that it provides a layer of abstraction between network applications and the various NEs they must interact with. The layered software architecture allows service providers to use Nakina, in-house development teams, or third party application developers to create additional security and management software features that plug-in to Nakina Network OS, simply and cost-effectively. Disaster Recovery Solutions for Added Peace of Mind In addition to the core portfolio of security applications, Nakina offers disaster recovery applications that can help get a network up-and-running in signifi cantly shorter times than is currently the case, complementing the security features described to provide additional peace of mind. Disaster recovery applications include: Nakina Network Audit & Software Delivery, for software load management and the ability to upgrade thousands of NEs in the network with new security features in very little time (eliminating any critical vulnerabilities) Nakina Backup and Restore for automated backups of all NE software and the ability to revert to backup software images across the network in times of crisis 6

Ease-of-Integration with Existing Security Systems Nakina s solution is designed to integrate simply with third party software systems that provide further security enhancements. These include (but are not limited to): RADIUS Servers for robust and secure user authentication technology, integrating a best-in-class, strong authentication technology into the overall solution. LDAP/HR Database systems for integration with back offi ce human resource systems, adding the ability to map employee statuses and role assignments to security privileges. Nakina Multi-Vendor Security Management 7

Secure. About Nakina Systems Nakina Systems provides one platform to discover, manage and secure multi-vendor networks for network operators worldwide. Using Nakina s software, service providers can reduce their operating expenses and introduce new services more quickly into their networks. They can bolster access security and eliminate headaches caused by shared passwords on their network by using centralized security and password administration. Operators eliminate the chaos of swivel chair management by consolidating their view of a network s topology, faults, and activity logs. They substantially improve their productivity and competitiveness with the automation of software upgrades, system-wide backup and restore procedures, and equipment confi guration. And it s all with one system. Only from Nakina. Contact Us Phone: 613.254.7351 Toll Free: 1.877.625.4627 Email: info@nakinasystems.com www.nakinasystems.com Copyright 2006. Nakina, Nakina Systems, Simply Profi table Networks, Nakina Network OS, Nakina Open Console, Nakina NE Security, Nakina Command Broker, Nakina Session Broker, Nakina Backup & Restore, Nakina Network Audit & Software Delivery, Nakina PM Collector, Nakina NE Confi gurator, Nakina Inventory Browser, Nakina Discovery, Nakina NE Provisioning, and Nakina Adapter SDK are all trademarks or registered trademarks of Nakina Systems Inc. All other trademarks are property of their respective owners. All rights reserved.