Application Intelligence, Control and Visualization



Similar documents
Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Applications erode the secure network How can malware be stopped?

Next-Generation Firewalls: Critical to SMB Network Security

Dell SonicWALL Portfolio

Dell Security Next-Generation Firewalls

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Providing Secure IT Management & Partnering Solution for Bendigo South East College

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

How to Build a Massively Scalable Next-Generation Firewall

Network Security Solution. Arktos Lam

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

SonicWALL Unified Threat Management. Alvin Mann April 2009

Is Your Network Ready for VoIP?

Why Protection and Performance Matter

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

Network protection and UTM Buyers Guide

Achieve Deeper Network Security

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Why protection & performance matter

Achieve Deeper Network Security and Application Control

Simple security is better security Or: How complexity became the biggest security threat

SonicWALL Corporate Design System. The SonicWALL Brand Identity

Firewall and UTM Solutions Guide

Securing the Small Business Network. Keeping up with the changing threat landscape

Clean VPN Approach to Secure Remote Access

Astaro Gateway Software Applications

FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012

Jort Kollerie SonicWALL

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Clean VPN Approach to Secure Remote Access for the SMB

Introducing IBM s Advanced Threat Protection Platform

10 Cool Things Your Firewall Should Do. A firewall that blocks threats is only the beginning

Consolidating SMB Network Security Infrastructure. Ways to Cut Costs and Complexity

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Using Palo Alto Networks to Protect the Datacenter

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

WatchGuard Technologies WatchGuard Technologies

Cisco Small Business ISA500 Series Integrated Security Appliances

Configuration Example

Next-Generation Firewall Market Analysis: The SonicWALL Difference CONTENTS

Unified Threat Management, Managed Security, and the Cloud Services Model

Firewall Buyers Guide

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

SonicWALL ECLASS Netw

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance

Ten easy steps to secure your small business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Next Gen Firewall and UTM Buyers Guide

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Content-ID. Content-ID URLS THREATS DATA

Fortigate Features & Demo

Cyberoam Next-Generation Security. 11 de Setembro de 2015

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Move over, TMG! Replacing TMG with Sophos UTM

Networking for Caribbean Development

Data Center security trends

Gateway Security at Stateful Inspection/Application Proxy

How To Choose A Network Firewall

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Analyzer 7.1 Administrator s Guide

DPI and Metadata for Cybersecurity Applications

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

SuperMassive E10000 Series

Log Audit Ensuring Behavior Compliance Secoway elog System

Securing and Monitoring BYOD Networks using NetFlow

SonicOS 5.9 One Touch Configuration Guide

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

What to Look for When Evaluating Next-Generation Firewalls

Inspection of Encrypted HTTPS Traffic

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Next Generation Enterprise Network Security Platform

Top tips for improved network security

Transcription:

Application Intelligence, Control and Visualization Marco Ginocchio Director of Systems Engineering Europe, Middle East, and Africa mginocchio@sonicwall.com

SonicWALL Over 1.7 million security appliances shipped Over 35 million end users protected Since 1996, leading provider of subscription services on optimized appliances Over 10,000 channel partners worldwide Over 900 employees Award-wining Product Lines: Next-Generation Firewalls Secure Remote Access Email Security Backup & Recovery 125 patents and patent applications 2

SonicWALL Productlines Secure Networking Business Continuity Content Security TZ & NSA Secure Wireless Continuous Data Protection (CDP) Global Management Email Security Remote Access SonicPoint N Global Management System (GMS) & Viewpoint Aventail & Sonicwall SSL-VPN 18.04.11 3

SonicWALL Productlines Secure Networking Business Continuity Content Security TZ & NSA Secure Wireless Continuous Data Protection (CDP) Global Management Email Security Remote Access SonicPoint N Global Management System (GMS) & Viewpoint Aventail & Sonicwall SSL-VPN 18.04.11 4

Technology Trends Impacts to Productivity & ROI Bandwidth Performance Availability Efficiency Manageability Security 5

Security is an Ongoing Challenge Ripped from the Headlines Barracuda Networks Hacked via SQL Injection http://www.thehackernews.com/2011/04/barracuda-networks-hackingvia-sql.html 6 Confidential - All Rights Reserved april 18, 2011

The Problem Vulnerabilities are in the software everyone uses everyday Problem Programmers make mistakes Malware exploits mistakes Solution SonicWALL Security Center provides up-to-minute information about viruses, vulnerabilities, and spyware 7

Result: Relentless, Unyielding Malware A Typical Day in 2011 SonicWALL Security Center www.sonicwall.com/security_center.html

Malware Lurks in Social Networks Set-up: Create bogus celebrity LinkedIn profiles Lure: Place link to celebrity videos in profile Attack: Download of codec required to view video Infect: Codec is actually Malware Result: System compromised 9

What Are Your Employees Doing? Blogging Facebook Twitter IM Streaming video Streaming audio Downloading files Playing games Personal Webmail 25% of office Internet traffic is nonbusiness related (Burst Media Survey, 2008) 50% of surveyed companies said at least 30% of their bandwidth is being consumed by social networking traffic (Forrester, Feb 2009) 10 Copyright 2010 SonicWALL Inc. All Right Reserved.

Application Chaos IT Controls Challenged Who chooses what Applications are good or bad for you? Acceptable Apps Unacceptable Apps

The Problems Today: Security and Productivity What are the THREATS? What APPLICATIONS are really on my network? Where is ALL my BANDWIDTH going? Where is this TRAFFIC coming from? 12

Overcoming Application Chaos The market demands a new control paradigm based on scanning everything, and understanding traffic for all applications and users

What is a Next-Generation Firewall? Full Stateful Packet Inspection Next-Generation Firewall Defined I.E., must have traditional Firewall by Gartner capabilities Intrusion Prevention Fast, enterprise quality Deep Packet Inspection and prevention for Intrusions Application Control Ability to block/allow applications by identifying the specific applications, not relying on Port or Protocol SSL Decryption Ability to inspect encrypted traffic (man in the middle) and take policy action 14

SonicWALL Next-Generation Firewall Identify By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Application Chaos Many on Port 80??????? Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI 15

SonicWALL Next-Generation Firewall Identify By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Application Chaos Many on Port 80??????? Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI 16

SonicWALL Next-Generation Firewall Identify By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Application Chaos Many on Port 80 Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Cloud-based Extra Firewall Intelligence Malware Blocked 17

SonicWALL Next-Generation Firewall Identify By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Application Chaos Many on Port 80 Users/Groups Policy Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Cloud-based Extra Firewall Intelligence Malware Blocked 18

SonicWALL Next-Generation Firewall Identify By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Application Chaos Many on Port 80 Users/Groups Policy Cri$cal Apps: Priori$zed Bandwidth Massively Scalable Next-Generation Security Platform Acceptable Apps: Managed Bandwidth High Performance Multi-Core Re-Assembly Free DPI Unacceptable Apps: Blocked Cloud-based Extra Firewall Intelligence Malware Blocked Visualize & Manage Policy 19

Real-Time Monitor: Real Time Analysis of Exactly What is Happening

Visualize in Multiple Ways for Analysis 21

Dig Deeper To Determine Action 22

Network Analysis Tools Who s watching YouTube? 23

User Identification Single Sign On (AD/LDAP Integration) Local Login Identify Top Bandwidth users 24

Identify the Bandwidth Hogs 25

Or View Bandwidth Hogs in Detail 26

Connection Tracking by Country 27

Track Suspicious Traffic 28

Dig Deeper into Suspicious Traffic 29

Capture Packets for Further Analysis 30

Combine filters for Powerful Network Intelligence Cross-Filter for a deeper dive into real-time traffic 31

CONTROL the Application Traffic 32 Available Today since SonicOS 5.0

CONTROL: Powerful Policy Creation 33

NetFlow/IPFIX with Extensions Reporting NetFlow/ IPFIX with Extensions 1. Rating 2. Location 3. Applications 4. Intrusions 5. Viruses 6. Spyware 7. Services 8. Flow Table 9. Location 10. Users 11. URLs 12. Log 13. Interface Statistics 14. Core Utilization 15. Memory Utilization 16. VOIP 17. SPAM 18. Connected Devices 19. VPN Tunnels 20. URL Rating Large Ecosystem of collectors Historical Reporting Alerts 34

SonicWALL NGFW Platforms NSA E8500 NSA 4500 TZ 210 Series SonicPoint-Ni/Ne NSA E7500 NSA 3500 NSA E6500 NSA 2400MX TZ 100/200 Series NSA 2400 NSA E5500 NSA 240 35 Copyright 2010 SonicWALL Inc. All Right Reserved

Next-Generation Network Security Platform Comprehensive Inspection Application Intelligence & Control Powerful IPS, Multi-gig performance Management/Visualization of traffic RFDPI Technology SSL Traffic Inspection High Availability: A/P, A/A, StateSync, Clustering The Technology 96 processor cores 40+ Gbps Stateful Inspection 30+ Gbps IPS 10+ Gbps DPI / Application Control Detects over 1 Million unique threats

SonicWALL Nordic ChannelWorld 2011 Quiz Vinn en TZ 210 Wireless-N med 3 års full UTM och Application Intelligence. Ta chansen och vinn en nästa generations brandmur från SonicWALL med support och alla säkerhetstjänster i hela 3 år, vänligen svara på frågorna nedan och lägg ditt visitkort i lådan. 1) Nyheten Application Intelligence från SonicWALL kommer bundlad med vilken tjänst? A) SonicWALL Gateway Anti-Virus, Anti-Spam and Intrusion Prevention B) SonicWALL Comprehensive Anti-Spam Service C) SonicWALL Content Filtering Service 2) Vad är UTM en förkortning på? A) University of Technology Mauritius B) Unified Threat Management C) Universal Transfer Management nordic@sonicwall.com

Thank You CONFIDENTIAL 38 All Rights Reserved