Datacenter Transformation



Similar documents
F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Business Case for a DDoS Consolidated Solution

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

F5 and Microsoft Exchange Security Solutions

The F5 Intelligent DNS Scale Reference Architecture.

Application Security Manager ASM. David Perodin F5 Engineer

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Oracle Database Firewall

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Security F5 SECURITY SOLUTION GUIDE

Business Case for Data Center Network Consolidation

Document version: 1.3 What's inside: Products and versions tested Important:

Getting More Performance and Efficiency in the Application Delivery Network

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Scale your DNS Infrastructure Ensure App and Service Availability. Nigel Ashworth Solution Architect EMEA

Deployment Guide. Deploying F5 BIG-IP Global Traffic Manager on VMware vcloud Hybrid Service

Technical Note. ForeScout CounterACT: Virtual Firewall

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

BEST PRACTICES. Application Availability Between Hybrid Data Centers

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Availability Acceleration Access Virtualization - Consolidation

Application Security Best Practices. Matt Tavis Principal Solutions Architect

CloudFlare advanced DDoS protection

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Radware Solutions for NGDC

The F5 DDoS Protection Reference Architecture

NSFOCUS Web Application Firewall White Paper

VALIDATING DDoS THREAT PROTECTION

Check Point DDoS Protector

High-Performance DNS Services in BIG-IP Version 11

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

F5 and VMware. Realize the Virtual Possibilities.

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Brocade Virtual Traffic Manager and Microsoft SharePoint 2010 Deployment Guide

Array Networks & Microsoft Exchange Server 2010

Dynamic Attack Protection and Access Control

F5 Silverline Web Application Firewall Onboarding: Technical Note

A Layperson s Guide To DoS Attacks

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

Networking and High Availability

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Where every interaction matters.

Load Balancing Security Gateways WHITE PAPER

Unified Threat Management, Managed Security, and the Cloud Services Model

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

On-Premises DDoS Mitigation for the Enterprise

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Networking and High Availability

Secure networks are crucial for IT systems and their

Swordfish

Load Balancing 101: Firewall Sandwiches

Acquia Cloud Edge Protect Powered by CloudFlare

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Clustering and Queue Replication:

NSFOCUS Web Application Firewall

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Background. Industry: Challenges: Solution: Benefits: APV SERIES CASE STUDY Fuel Card Web Portal

KeyLock Solutions Security and Privacy Protection Practices

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager

DDoS Protection on the Security Gateway

Oracle Collaboration Suite

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.

FortiWeb 5.0, Web Application Firewall Course #251

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Automated Mitigation of the Largest and Smartest DDoS Attacks

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

How To Protect A Web Application From Attack From A Trusted Environment

Smart Network. Smart Business. Application Delivery Solution Brochure

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Sitefinity Security and Best Practices

EXPEDITING ACCESS TO V6 SERVICES: GETTING WEB CONTENT AVAILABLE OVER IPV6 QUICKLY AND AT LOW COST

Deploying F5 to Replace Microsoft TMG or ISA Server

Aplikacija novi vladar poslovanja. Dino Novak F5 Networks

Building a Systems Infrastructure to Support e- Business

Transcription:

Datacenter Transformation Consolidation Without Compromising Compliance and Security Joe Poehls Solution Architect, F5 Networks

Challenges in the infrastructure I have a DR site, but the ROI on having all of those devices sitting idle is a concern I m not sure if DR will actually work properly if we do have some sort of disaster Our customer centricity business initiatives require us to deploy new services quickly, but my vendors can t keep up There are certain times of the month or year that we just need more capacity than I have for certain applications 2 F5 Networks, Inc.

An Active/Active infrastructure Client Access Global Traffic Manager Presentation Primary Data Center Public/ Private Cloud Presentation Secondary Data Center Presentation Layer and Core Systems are always in use, no standby units If running virtualized hardware, time to deploy can be minimized Core Systems Core Systems Can add new data centers/ private clouds as needed to expand capacity Databases/ Databases/ Data Transaction Engine Data Transaction Engine 3 F5 Networks, Inc. Management Management

Active-Active Use Cases Customer: Online Service Website Environment: Multiple US datacenters with large databases Critical Issues: Solve read-write database replication issue Scale performance Add redundancy Improve user response time Solution: Global traffic management Scale by making use of active/active datacenter resources Insert read/write timing information into cookie and use to determine where to steer subsequent requests 4 F5 Networks, Inc.

Challenges around Compliance I really don t have a big-picture view of how transactions flow through our complex app environment I want to enforce strict governance, but for compliance purposes we need to keep a clear separation of responsibilities for some applications On the other hand, to ensure compliance sometimes we need to gather and collate access information across applications At the same time we still need to enable customer centricity and keep performance high 5 F5 Networks, Inc.

Application Monitoring for Compliance Use a combination of logging and Application Visibility features to monitor the application and provide information to improve compliance, as well as performance Syslog Server Do I have enough resources? Where should I add them? Am I receiving DoS attacks? Which process in my app is consuming the most resources? Management Console Information collected Serverside latency Clientside latency Throughput Response codes Methods URL Client IP Client location info User Agent User Session Views Application Virtual Server Pool Member Response Code URL Method Deposits Loans Cards 6 F5 Networks, Inc.

Enforcing Compliance in the App When receiving requests, check and enforce service interface definitions Add Layer 7 security in front of all web services Log a summary of the transaction that protects separation of responsibilities yet also allows you to enforce and maintain governance Identity and Service Management Service Definition Repository Log transactions in a way that enforces governance while maintaining compliance Frontend Service Enforce and screen requests before sending downstream Bank Transfer Service Loan and Lending App (.NET based) Async Access Loan Service X-lation GW Core Banking App (Mainframe) Presentation Layer Core Systems Data Management 7 F5 Networks, Inc.

Use Case: Standard Life Standard Life, in Scotland, provides a number of financial products including life insurance, pension services, and investment banking. They have over 6.5 million customers worldwide. They began their SOA project a number of years ago and began using F5 as they rolled out their 4 th generation architecture F5 helps them in key areas of their architecture: Performing load distribution at layer 7 Maintaining compliance with PCI DSS, HIPAA, Basel II, SOX security requirements Achieving scalability and fault tolerance We concluded that, to deliver on our goals, we needed to implement powerful application-layer load balancing and security capabilities while minimizing infrastructure complexity." 8 F5 Networks, Inc.

Compliance Case Study Challenges PCI, FFIEC compliance Using F5 for Intelligent traffic management PCI, FFIEC, DNSSEC, FIPS and IPv6 compliance Virtualization support and enablement Results Improved visibility and control of applications Reduce OPEX between 31%-40% 9 F5 Networks, Inc.

Challenges around Security I understand the need for higher security, but I m not sure what we can do to increase security in my online applications We don t like the idea of adding point solutions in the network to address security problems We have a feeling that our point security solutions will not give me protection in today s complex threat environment We really need a way to increase time to detect and time to resolve security issues 10 F5 Networks, Inc.

Security F5 solutions offer multiple layers of security SECURE APPLICATIONS & DATA Transaction Assurance Resource Cloaking Network and protocol attack protection Secure Network Address Translation Port Mapping Selective Content Encryption Denial of Service attack protection We can apply security policies to both request AND response LAYER 7 SECURITY Brute Force Layer 7 DDoS Web Scraping XSS, CSRF, SQL Injection Zero Day attacks Compliance (PCI DSS, HIPAA, etc.) Information Leakage protection Data Center 1 Web/App Tier DB Tier 11 F5 Networks, Inc.

Security framework Creating a multi-layer security framework with F5: - 1) DNS DDoS attack mitigation Primary Data Center SYN Check, ICMP (3) Web Tier Flood Mitigation N+1 Tier (4) SSL attack prevention (1) DNS Express +GTM - 2) Secure/Unsecure zone network isolation - 3) Flexible TCP and IP DDoS protection App Tier (2) Full Proxy mode (5) L7 irules Infoblox - 4) SSL renegotiaion Attack mitigation DB Tier - 5) Layer 7 DDoS mitigation 12 F5 Networks, Inc.

Security framework Creating a multi-layer security framework with F5: Primary Data Center SYN Check, ICMP (3) Web Tier Flood Mitigation (6) ASM Tier N+1 Tier (1) DNS Express +GTM App Tier (2) Full Proxy mode (5) L7 irules X X (7) Geolocation identifies origin of attacks Infoblox - 5) Web Application Firewall for intelligent L7 attack prevention - 6) Identify and block attack origins with Geolocation - 7) Real-time forensics and threat response with intelligent logging Access logged for DB Tier (8) analysis and response Log Servers 13 F5 Networks, Inc.

Case Study: Attacks at Online Service Company Problem: Company s existing security solutions could not protect servers from attack using 3 tier DDoS methodology LOIC (L4 connection DDoS) Slowloris (L7 DDoS) ICMP attack (Ping of death etc.) Existing solutions ISP border router blacklist IPS device in Stateless mode Integrated LB + FW chassis device F5 Solution Absorb LOIC attack with TCP proxy Reroute Slowloris attack to special servers for forensics and to free service platform from the attack 14 F5 Networks, Inc.

Call to Action Create initiatives to understand your (new) customer base and what services can keep their loyalty Build an agile infrastructure, as well as application environment that will enable you to quickly deploy new services Examine your needs for compliance, governance, and security Deploy mechanisms that will allow for faster analysis, faster response, and faster resolution to security, governance, and compliance issues 15 F5 Networks, Inc.

2012 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5.