AccessEnforcer. HTTPS web filter overview



Similar documents
Intro to Firewalls. Summary

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

INSTANT MESSAGING SECURITY

Protecting Your Organisation from Targeted Cyber Intrusion

CS5008: Internet Computing

Top tips for improved network security

Firewall Firewall August, 2003

Networking for Caribbean Development

SSL EXPLAINED SSL EXPLAINED

The Benefits of SSL Content Inspection ABSTRACT

Service Managed Gateway TM. How to Configure a Firewall

How To Control Your Computer With Watchguard Application Control

The Secure Web Access Solution Includes:

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Fortigate Features & Demo

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Check list for web developers

The Hidden Dangers of Public WiFi

Firewalls, Tunnels, and Network Intrusion Detection

HTTPS Inspection with Cisco CWS

Protecting Your Network Against Risky SSL Traffic ABSTRACT

5 Steps to Advanced Threat Protection

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall

How To Protect A Web Application From Attack From A Trusted Environment

CSE543 - Computer and Network Security Module: Firewalls

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

The Hillstone and Trend Micro Joint Solution

The enemy within: Stop students from bypassing your defenses

Basic Computer Security Part 2

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data.

CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Top five strategies for combating modern threats Is anti-virus dead?

Access Control Rules: URL Filtering

CSC574 - Computer and Network Security Module: Firewalls

Security Awareness. Wireless Network Security

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network protection and UTM Buyers Guide

F5 and Microsoft Exchange Security Solutions

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Where every interaction matters.

CMPT 471 Networking II

User Guide. You will be presented with a login screen which will ask you for your username and password.

Installation and configuration guide

Mobile Devices and Malicious Code Attack Prevention

The Key to Secure Online Financial Transactions

Topics in Network Security

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Providing Secure IT Management & Partnering Solution for Bendigo South East College

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

SERVICE DESCRIPTION Web Proxy

CIS 433/533 - Computer and Network Security Firewalls

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Next-Generation Firewalls: Critical to SMB Network Security

Integrating Single Sign-on Across the Cloud By David Strom

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Firewall Defaults and Some Basic Rules

Getting Started Guide

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Network Access Security. Lesson 10

Malicious Network Traffic Analysis

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Solution of Exercise Sheet 5

Applications erode the secure network How can malware be stopped?

Zscaler Internet Security Frequently Asked Questions

74% 96 Action Items. Compliance

Astaro Gateway Software Applications

Migration Manual (For Outlook 2010)

Owner of the content within this article is Written by Marc Grote

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Remote Access Security

Achieving PCI-Compliance through Cyberoam

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

AVG AntiVirus. How does this benefit you?

Configuration Example

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Transcription:

AccessEnforcer HTTPS web filter overview A web filter is essential to keeping hazards and distractions away from businesses. To stay safe, productive, and compliant, every organization must block certain websites. Recent developments have made this harder for small businesses. Popular sites including Facebook, YouTube, and Yahoo! have adopted the HTTPS standard. While this is good news for security, it s bad news for some companies. The HTTPS standard encrypts data transmitted between a host and server. This renders the data almost useless to attackers. It also prevents eavesdropping and man-in-the-middle attacks. But not all web filters can block HTTPS sites. For example, some can block http://twitter.com but not https://twitter.com. This gives users an easy way around the filter. The result is more wasted time and greater risks for organizations. In this report: Why use an HTTPS web filter? How it works - policy enforcement Settings for the AccessEnforcer HTTPS web filter How the AccessEnforcer HTTPS web filter compares to others

Why use an HTTPS web filter? Four reasons why every organization needs the ability to allow or block HTTPS sites. #1. Increase staff productivity At one time, HTTPS was mostly used for online transactions, online banking, and other sensitive sessions. However, websites that do not handle sensitive data are adopting HTTPS. Leading the way are popular sites that are often viewed as timewasters. Facebook, Twitter, YouTube, Google, and other sites that many businesses would prefer to block now use HTTPS by default. For a small business, having the ability to block HTTPS is the only practical way to prevent employees from wasting time on these sites. #2. Block malicious sites Millions of websites are dangerous. Through drive-by-downloads, session hijacking, spoofing, and other tactics, they can inject malware onto the user s system or trick users into supplying sensitive information. These techniques work on HTTP sites, and they work on HTTPS sites as well. The HTTPS filter helps protect businesses from these hazards. #3. Block offensive web content Websites with offensive or inappropriate content abound on the web. Nothing prevents them from using HTTPS. The only way an organization can remain free of this disruptive material is to use a web filter that can manage both HTTP and HTTPS sites. #4. Comply with regulations Education, healthcare, and retail are three industries among many that are required to have enhanced network security. Some standards, such as the Children's Internet Protection Act (CIPA), require organizations to filter web content. Any industry that requires HTTP filtering is all but certain to require HTTPS filtering as well.

How it works Policy enforcement Not all web filters are created equal. The way they handle traffic and enforce policies can have a significant impact on performance. Performance determines, in part, whether an organization will use the filter, so speed is critical. The HTTPS filter in AccessEnforcer, the UTM firewall from Calyptix, is fast and effective. It monitors sites by comparing the server s identity with the filtering policies set by the administrator. If a site is not allowed by the policies, then the connection is not established. If the site is allowed, then the connection is made. This approach does not decrypt the data, so security and connection speeds remain strong. Disallowed connections are never established with the gateway, so threats stay out of the network. Some filters use other methods, but they are often complicated, labor intensive, and demanding of network resources. In short, they are not practical for small businesses. Settings for the HTTPS web filter AccessEnforcer filters HTTPS sites in a single click. Assuming the organization has filtering policies for HTTP traffic, a click on a single checkbox automatically applies the same policies to HTTPS traffic. Policies When the HTTPS filter is active, the following policies will apply to HTTPS traffic: URL whitelist URL blacklist Web filter exemptions Activation The HTTPS filter has three options for how it enforces policies: Disabled the HTTPS filter is off. Monitor the filter will log HTTPS traffic, but it will not enforce policies. Enforce the filter will log and enforce policies on HTTPS traffic.

Settings for the HTTPS web filter (cont.) Protocols AccessEnforcer monitors HTTPS requests that use TLS 1.0 and later on port 443. In settings, administrators can choose whether to allow or deny all non-tls HTTPS connections. Compared to other HTTPS web filters Some firewall vendors are able to block HTTPS sites, but very few can provide the feature alongside these benefits: Faster activation Some filters require complicated and time-consuming configurations to enable HTTPS filtering. AccessEnforcer does it in one click. Faster connection speeds Many web filters decrypt HTTPS traffic to inspect it before filtering. This demands a tremendous amount of resources from the device and can slow connection speeds. AccessEnforcer filters HTTPS traffic without decryption, so the network stays fast. Stronger chain of security HTTPS traffic is encrypted to prevent eavesdropping and man-in-the-middle attacks. Web filters that decrypt HTTPS traffic break the chain of security, creating a point at which the data is in plain-text. This can potentially expose the data to threats. AccessEnforcer does not break the chain of encryption, so additional opportunities are not provided for threats that enter the line of communication to steal data.

HTTPS web filter comes standard The HTTPS filter is included with standard service for AccessEnforcer from Calyptix. In fact, standard service includes every security feature we offer. Additional standard features include: Intrusion detection and prevention (IDS/IPS) Quality of service (QoS) Web filtering Email filtering Automatic firmware updates Automatic security updates Unlimited network users Unlimited virtual private networks (VPNs) GUI-based management Give your organization simple and powerful security with AccessEnforcer. Request pricing, learn about partnership, and request info: info@calyptix.com 704-971-8982