Unified Threat Management, Managed Security, and the Cloud Services Model



Similar documents
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Advantages of Managed Security Services

Move over, TMG! Replacing TMG with Sophos UTM

CLOUD & Managed Security Services

Security Models for Cloud. Kurtis E. Minder, CISSP

Fortigate Features & Demo

Astaro Gateway Software Applications

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Solving the Enterprise Information Security Problem Common Approaches

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

Chapter 9 Firewalls and Intrusion Prevention Systems

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Modular Network Security. Tyler Carter, McAfee Network Security

How To Protect Your Cloud From Attack

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Injazat s Managed Services Portfolio

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Cisco Small Business ISA500 Series Integrated Security Appliances

Network protection and UTM Buyers Guide

2012 North American Enterprise Firewalls Market Penetration Leadership Award

Network Security. Intertech Associates, Inc.

Delivering Managed Services Using Next Generation Branch Architectures

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Applications erode the secure network How can malware be stopped?

SANS Top 20 Critical Controls for Effective Cyber Defense

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Dell SonicWALL Portfolio

Nominee: Barracuda Networks

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

On and off premises technologies Which is best for you?

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Today's security needs in networking

Clavister InSight TM. Protecting Values

2012 North American Managed Security Service Providers Growth Leadership Award

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Boston Area Windows Server User Group April 2010

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Sophos SG 1 Session: Sophos UTM

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Cisco IOS Advanced Firewall

Advantages of Managed Security Services

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CloudCheck Compliance Certification Program

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

WatchGuard Technologies WatchGuard Technologies

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Emerging Trends in the Network Security Market in India, CY 2013

Chapter 1 The Principles of Auditing 1

The Fortinet Secure Health Architecture

Managed Security Services for Data

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Simple security is better security Or: How complexity became the biggest security threat

Security Services. 30 years of experience in IT business

Network Security Solution. Arktos Lam

Solution Brief. Secure and Assured Networking for Financial Services

Cyberoam Perspective BFSI Security Guidelines. Overview

IBM Internet Security Systems

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Zscaler Internet Security Frequently Asked Questions

Partner with the UK s leading. Managed Security Service Provider

Clean VPN Approach to Secure Remote Access for the SMB

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Fortinet Overview Real Time Network Protection. Stefano Chiccarelli Consultant Engineer EMEA

Fighting Advanced Threats

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Top 10 Reasons Enterprises are Moving Security to the Cloud

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

SonicWALL Unified Threat Management. Alvin Mann April 2009

Information Technology Solutions

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

The Fortinet Secure Health Architecture

Next Gen Firewall and UTM Buyers Guide

vsrx Services Gateway: Protecting the Hybrid Data Center

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Looking Ahead The Path to Moving Security into the Cloud

White Paper. ZyWALL USG Trade-In Program

Payment Card Industry Data Security Standard

13 Ways Through A Firewall

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

74% 96 Action Items. Compliance

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

BSNL IDC Hosted Firewall Service. Total Network Security

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

The Education Fellowship Finance Centralisation IT Security Strategy

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Achieving PCI-Compliance through Cyberoam

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

The Cisco ASA 5500 as a Superior Firewall Solution

Transcription:

Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc.

Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson Business Development Global Account Manager Actual work: Installation / Configuration Design Support Product development / POC Audit Penetration testing Sales / BD

Agenda Security Overview / Appliance Primer Unified Threat Management Managed Security Services Cloud Security Questions

Security Overview / Appliance Primer

Firewalls The Firewall was adopted to protect corporate networks from would-be Internet attackers. Firewalls, deployed in-line, typically use a set of network layer rules to determine what traffic can enter/leave the network. Improvements to Firewall technology have been largely limited to performance. As bandwidth increased, Firewalls had to process faster. (Some FW companies have increased app visibility) New technologies are increasing FW capability to inspect traffic faster and more intelligently

Anti-Virus Anti-Virus provides software / desktop level risk management for workstations in the enterprise. Uses malicious code signature database to determine whether workstation was being attacked/compromised. Enterprise solutions evolved to provide central management and enhanced capability for workstation control. (McAfee Enterprise Policy Orchestrator.) As larger AV vendors acquire new technologies, feature set improves (DLP, Encryption, Config Management)

VPN VPN (Virtual Private Networking) was adopted to provide secure remote access to corporate networks. Provides remote access via IPSEC or SSL to the corporate network Enhanced features can include workstation integrity checks and role based access control Also is often used to provide connectivity between networks for business to business transactions.

Intrusion Detection / Prevention IDS was developed to detect attacks on the network and alert the security administrator IPS, typically inline, added the capability to stop the attack automatically or manually IDS/IPS originally relied entirely on signatures, but evolved to include clever behavioral, heuristic-based algorithms to detect threats

Content Filtering Content Filtering/Web Filtering emerged to increase worker productivity and reduce workplace risk. Monitors web surfing and other application use leaving the corporate network. Manages which websites each department can use/see. Leverages policy to reduce risk of malicious injection of code into the network/users browser. Some systems provide value added functions such as web acceleration / caching.

Data Loss Prevention Data Loss Prevention (DLP) technology was developed as a direct result of lost corporate information from inside the network. DLP Technology uses a multi-faceted approach to solving the Data Leak problem, including network bases sensors, workstation software, and complex policy management The technology is largely developed to keep corporate intellectual property and finance data from being distributed. Also used to maintain compliance initiatives around SOX, HIPAA; showing due diligence toward securing patient / customer data

Threat Evolution Malicious code exposing confidential data has increased significantly Multi and Blended attacks are now a common practice. Email is the most common delivery mechanism. The motive and intent is changing Moving from notoriety to financial gain. Theft of financial and personal information. Traditional security isn't enough

The Traditional Approach to Network Security First you buy routers, firewalls, VPNs, server load balancers Then you buy network intrusion prevention, antivirus, anti-malware, antispyware, anti-spam, antietc Then you buy proxies, web filtering, instant messaging security, data loss prevention, tomorrow s security product, and on and on. Impact High integration effort with multiple products and vendors Weak security due to lack of integration and unified configuration Operationally expensive to manage and operate Impractical and too expensive

A New Security Architecture Is Required Firewall Antivirus IPS Defend against intrusions Protect email and web applications from virus infection Protect against malicious attacks Antispam Reduce unwanted email Web filters Eliminated unproductive web-browsing VPN Delivering secure remote access VPN IPS Firewall Servers Antivirus Antispam URL Filters Users

Multiple Point Solutions Add Complexity Perceived Advantages Comprehensive security approach Quickly react to individual threats Real Disadvantages Requires multiple products that don t talk to each other Increases network complexity and operational cost Non optimal security implementation VPN IPS Firewall Servers Antivirus Antispam URL Filters Users

Unified Threat Management

Security Market Evolution Unified Threat Management Firewall Antivirus IPS Antispam Content Filtering VPN Firewall + VPN Intrusion Detection & Prevention Secure Content Management Firewall Intrusion detection system Antivirus Web filtering Virtual private network (IPSec and SSL) Intrusion prevention system Antispyware Messaging security

UTM - Best treatment for Appliancitis From: Single hardware platform Unified management interface One vendor contract / contact Single licensing agreement (..sometimes) Reduced data center footprint Power consumption reduction Minimized point of failure/latency Simplified network security architecture Speeds and simplifies support and problem resolution Allows for more accurate policy development Quickly correlates events between components Blended threat protection! To:

UTM Box (Small enterprise)

UTM Box for MSS and Clouds

Managed Security Services

What is/are MSS? Wikipedia defines Managed Security Services as simply network security services that have been outsourced. A company providing such a service is a Managed Security Service Provider (MSSP) Typical reasons for engaging an MSSP to manage your IT Security Improve IT Security and Compliance Reduce Security Capex and Opex expenditures Focus on core business intitiatives and competances

MSS Value Added Services Services that MSSPs typically offer: Vulnerability Assessments Penetration Tests FW Management IDS Management VPN Management Event Mitigation Services Data Archival Managed UTM

Traditional MSS - Customer Premise Equipment (CPE) Internet Content Filtering AV Firewall IPS NOC/SOC Facilitates Logical and Physical Segmentation Facilitates the addition of non security services such as Dial Back Up, WiFi LAN, Dual / Redundant WAN, 3G connectivity options and rate shaping / QoS

MSS benefits / concerns Who sees my data? Compliance responsibilities? I want access to my FW/Logs! Will people lose their jobs? Reduced CAPEX Economies of Scale around security services Top security analysts reviewing log material Enhanced correlation and automated security intelligence available All updates and patches done!

Cloud Security Services

What is Cloud Security Provider Edge Internet Legend Clear / Clean Traffic Potentially Bad Traffic Security Scanning Cloud security is essentially the concept of delivering security services without CPE. This means that the services are typically provisioned at the other end of the transport medium. End Users X/DSL / T 1

UTM in the Cloud Many carriers and cloud services companies are offering Managed Security in the Cloud via Unified Threat Management platforms. Why? Rapid Portfolio Creation Seamless Provisioning Increased Operational Efficiencies Single Vendor Contract Simple Licensing Easy correlation and alerting VIRTUALIZATION! Value Added Services Delivery Model Customer Wins!

Delivering Clean Pipe with UTM

Virtualization Providing virtual UTM services from a single platform to multiple customers and applications.

Cloud Computing Security These companies want to deliver your: Applications Desktops Storage High Powered Computing (HPC) Services from the internet to your office. And well they should but how do we secure it?

Cloud Computing Security Architecture Example Virtualized VDOM VDOM Virtual Machine Virtual Machine Virtualized Virtualized VDOM VDOM Virtual Machine Virtual Machine Virtualized Manager Manager DB Provisioning Analyzer Policy and Event Information Shared

Cloud benefits / concerns Who sees my data? Compliance responsibilities? Internet reliable? Reduced OPEX/CAPEX 0 point of failure Disaster recovery / business continuity outsourced! Infinitely and instantly scalable Supports burst Scales down for economy

About Fortinet

Company Overview Leading provider of ASIC-accelerated Unified Threat Management (UTM) Security Solutions Company Stats Founded in 2000 Silicon Valley based with offices worldwide Seasoned executive management team 1,000+ employees / 500+ engineers 300,000+ FortiGate devices shipped worldwide Strong, validated technologies and products 11 patents; 80+ pending Six ICSA certifications (first and only security vendor) Government Certifications (FIPS-2, Common Criteria EAL4+) Virus Bulletin 100 approved (2005, 2006, 2008)

The Integrated Security Platform Integrated Network Security Appliance Application Aware, Identity Based Firewall Routing, Traffic Shaping, Quality of Service, Server Load Balancing IPSec VPN & SSL VPN Termination Network Application Control & Recording Network Anti-Virus Anti-Malware Anti-Spyware Network Intrusion Prevention Network Data Loss Prevention Web URL & Content Filtering Vulnerability Management Appliance Auditing Patch Management Reporting and Compliance Smart Automation Email Security Appliance Anti-spam, anti-malware Server, gateway & transparent Quarantine, user self service Archiving, logging & reporting Database Security Appliance Database vulnerability assessment Security monitoring & auditing Monitor all access, users, methods Compliance reporting Web Application Firewall Appliance XML router & accelerator XML firewall & intrusion prevention XML denial of service protection SQL injection & malware protection Security Research & Development Streaming security updates for appliances Worldwide deployment infrastructure All original security research & development Updates for application intelligence, web filtering, intrusion prevention, anti-virus, anti-malware, antispyware, vulnerability assessment & database security Worldwide Update Service

Q&A

Thank You. Kurtis E. Minder CISSP Kminder@fortinet.com - kurtis@kurtisminder.com 847-563-4272 - kurtisminder (skype) http://www.fortinet.com http://www.linkedin.com/in/kurtisminder http://www.kurtisminder.com