Avishai Wool, Ph.D. AlgoSec CTO & Co-Founder. AlgoSec Inc. 1



Similar documents
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

How To Manage A Network Security System

The Business Case for Network Security Policy Management Quantifying the Annual Savings with the AlgoSec Security Management Suite

AlgoSec. Managing Security at the Speed of Business. AlgoSec.com

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

Configuration Audit & Control

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

Cyber Security RFP Template

How to Painlessly Audit Your Firewalls

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

IBM Tivoli Netcool network management solutions for enterprise

QRadar SIEM 6.3 Datasheet

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

FireMon Security Manager Fact Sheet

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

FIREMON SECURITY MANAGER

Cisco PIX vs. Checkpoint Firewall

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

What is Security Intelligence?

Network Management and Monitoring Software

10 Things IT Should be Doing (But Isn t)

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Riverbed SteelCentral. Product Family Brochure

OpManager MSP Edition

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Cisco Network Planning Solution 2.0 Cisco Network Planning Solution Service Provider 2.0

Q1 Labs Corporate Overview

Security Policies Tekenen? Florian Buijs

How To Manage Sourcefire From A Command Console

The syslog-ng Store Box 3 F2

Tufin Orchestration Suite

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

ensurcloud Service Level Agreement (SLA)

Best Practices for PCI DSS V3.0 Network Security Compliance

WHITEPAPER. PHD Virtual Monitor: Unmatched Value. of your finances. Unmatched Value for Your Virtual World

The SIEM Evaluator s Guide

Unified Threat Management, Managed Security, and the Cloud Services Model

Riverbed SteelCentral. Product Family Brochure

Customer Service Description Next Generation Network Firewall

Firewall Configuration Errors Revisited

How To Set Up Foglight Nms For A Proof Of Concept

PROFESSIONAL SECURITY SYSTEMS

Log management & SIEM: QRadar Security Intelligence Platform

How To Use Mindarray For Business

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

Using Skybox Solutions to Achieve PCI Compliance

Solution Brief Virtual Desktop Management

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

IBM Tivoli Network Manager software

STEALTHWATCH MANAGEMENT CONSOLE

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

One software solution to monitor your entire network, including devices, applications traffic and availability.

Altiris Server Management Suite 7.1 from Symantec

The syslog-ng Store Box 3 LTS

Network Monitoring. Easy, failsafe, and complete visibility of your network. Our customers have the same view as our NOC technicians.

Server & Application Monitor

Application Performance Monitoring (APM) Technical Whitepaper

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows

Firewall Change Management

Network Management Deployment Guide

Alcatel-Lucent Services

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

Securing Networks with PIX and ASA

Virtualization Impact on Compliance and Audit

Vyatta Network OS for Network Virtualization

Cisco Network Services Manager 5.0

Firewall Migration. Migrating to Juniper Networks Firewall/VPN Solutions. White Paper

Network Performance Management Solutions Architecture

Examining the Dangers of Complexity in Network Security Environments AlgoSec Survey Insights

Network Security Administrator

Netzwerkvirtualisierung? Aber mit Sicherheit!

Not All Database Security Solutions Are Created Equal

Where can I install GFI EventsManager on my network?

SOFTWARE DEFINED NETWORKING

SANS Top 20 Critical Controls for Effective Cyber Defense

Monitoring Windows Workstations Seven Important Events

IBM 2010 校 园 蓝 色 加 油 站 之. 商 业 流 程 分 析 与 优 化 - Business Process Management and Optimization. Please input BU name. Hua Cheng chenghua@cn.ibm.

The Cisco ASA 5500 as a Superior Firewall Solution

Der Weg, wie die Verantwortung getragen werden kann!

Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, Vedran Hafner, Systems Engineer,

Infoblox vnios Software for CISCO AXP

Symantec Server Management Suite 7.6 powered by Altiris technology

How To Make Money From A Network Connection

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

VMware vcloud Networking and Security Overview

The Advantages of Cloud Services

Transcription:

Gérer vos pare-feux dans une architecture segmentée, conserver un niveau de conformité et remédier aux risques liés aux évolutions des politiques de sécurité Avishai Wool, Ph.D. AlgoSec CTO & Co-Founder AlgoSec Inc. 1

Managing your firewalls in a segmented architecture, maintaining compliance, and remediating risks related to evolving security policies (Translation based on BabelFish ) AlgoSec Inc. 2

Agenda Background AlgoSec Firewall Analyzer Firewall operations efficiency Enhance security and compliance through automation Improve firewall performance, stretch device lifespan AlgoSec FireFlow Change Workflow Automation Live demo AlgoSec Inc. 3

Background: Firewalls become Overgrown Firewall configurations become overgrown over the years: Constant rate of rule changes (dozens of changes per week!) Multiple administrators, staff turnover, outsourcing Examples we ve seen: Check Point Firewall with 200-1,500 rules and 1,000-20,000 objects PIX configuration with 400-50,000 lines Challenges: Industry statistics: 20-30% of firewall rule changes are not needed! Extend the lifespan of devices in use AlgoSec Inc. 4

Complexity Leads to Problems Performance and management problems Firewall slows down may become a bottleneck Hardware size limitations may need bigger hardware Slow and cumbersome management interface Hard to manage and time consuming Security risks: A survey of the firewall policies of 30 US-based large corporations suggest that all complex policies are exposed to serious risk. Rule-base complexity = Rules + Objects + (Interfaces) **2 AlgoSec Inc. 5

Requirements for Security Management Cost Saving Governance by Intelligent Automation of AlgoSec Inc. 6

About AlgoSec The established leader of Firewall, Router & VPN Policy Lifecycle Management Hi-Tech Over 300 customers; 5 Patents pending Our prosperity is driven by 100% customer satisfaction Telecom Energy Financial Automotives Commercial Big-4 4 Auditing Firms Government Transportation AlgoSec Inc. Confidential 7

AlgoSec Products AlgoSec Firewall Analyzer (AFA) Intelligent Analysis for Network Security Challenge: Manual firewall policy analysis is error-prone,expensive and time consuming Unique firewall & topology simulation allows: Operational efficiency Cleanup Performance optimization Audit-ready compliance reports Risk analysis & metrics Change monitoring Challenge: 20-30% rule changes unneeded 2-8% changes done wrong Lack of accountability FireFlow Intelligent Workflow for Network Security Unique firewall & topology aware workflow allows: Auto plan Auto validate Governance Operational efficiency Auto-document activities Integrates with existing systems AlgoSec Inc. Confidential 8

AlgoSec Solution Brief The AlgoSec Firewall Analyzer is the established leading solution for: Firewall, router and VPN operations and change management Risk management, security compliance, audit Policy optimization and configuration cleanup It is a comprehensive, scalable, non-intrusive, easy-to-deploy and use, and supports all versions of the major firewall platforms in the enterprise market: PIX FWSM ASA IOS Router ACLs ScreenOS NSM Virtual Router Virtual System Sun Solaris Linux Win-NT Nokia SecurePlatform Alteon NSF Provider-1 SmartCenter Crossbeam OPSEC integration The AlgoSec solution provides unmatched visibility, analysis and intelligence into an organization's firewall policies. AlgoSec Inc. 9

AFA How does it work? Real-time Monitoring track changes Data Collection Rule Base, Log and Routing Table Analysis Non intrusive, offline analysis Single Firewall, group of firewalls or hierarchically connected firewalls (matrix) Analyze the traffic, not just the rules text Patented 5-dimentional algorithms calculate how the firewall will respond to every potential packet it may encounter Knowledge Base Compare the policy to built-in industry best practices AlgoSec Inc. 10

AFA Solution: Network Operations Efficiency Improve manageability and security: track policy changes - in realtime Track the 5 W s: What (rules, routing, VPNs, ), Who, When, Where, What is the impact Realtime change alerting Save time with routing-aware firewall troubleshooting Pinpoint the exact firewalls and rules that block operational traffic Ease firewall management using policy visualization View firewall policy and connectivity in a format not available on native management consoles - saves time, makes administrative tasks much easier Enable firewall/server consolidation/migration Consolidation assistance: identify required rule changes Firewall migration assistance: policies comparison AlgoSec Inc. 11

AFA Solution: Extend Firewall Lifespan and Performance Improve performance through Intelligent rule reordering Based on log analysis Improve performance by cleanup: Rules: unused, duplicate, covered, disabled, timed out Objects: Unused, unattached, duplicate, empty VPN: Unused, unattached, expired,users and groups Support log analysis for over a year Analyze historical logs AlgoSec Inc. 12

AFA Solution: Intelligent Automation of Risk & Compliance Automated Industry Best Practice (IBP) risk analysis Out-of-the-box usability based on AlgoSec IBP Knowledgebase Shows risks ranked by severity and lists all risky rules Provides details on risks found, offers remediation guidance Friendly customizations to conform with internal policies Easy to use risk customization, trusted traffic, user-defined zone types Ensures each firewall conforms to organization-specific security policy Automatically completed compliance reports SOX, PCI-DSS, J-SOX, ISO 27001 VPN risk analysis Identify risks associated to VPN rules and objects AlgoSec Inc. 13

AlgoSec Delivery Options Two hardware appliance models: AlgoSec 1020 entry level CPU: Dual Core Memory: 4GB (1GB DDR2/667 x 4) AlgoSec 1080 high-performance, enterprise level CPU: 8-Core Memory: 16GB (2GB FB-DIMM x 8) Pre-built VMware soft-appliance Software only AlgoSec Inc. 14

Product Demo Feature Overview Security. Visibility. Governance. AlgoSec Inc. 15

FireFlow Network Security Policy Change Workflow Automation AlgoSec Inc. 16 Confidential

Firewall policy change process overview Business units make firewall change requests Often many requests per week The process of meeting the requests is complex Involves multiple people in different organizations Involves several approvals and checks Subject to audit and regulation Change planning, risk assessment rely on personal expertise Industry statistics: 20-30% of implemented rule changes are not needed! Existing systems are focused on process administration AlgoSec Inc. 17

Current Challenges Delays and mistakes create inefficiency and time waste Actual change may differ from original request Actual change may differ from what was approved Variable levels of expertise may introduce mistakes SLA is hard to maintain Poor visibility increases cost: Where are we in the process? Who requested / approved / implemented the change? Why was a change made? What are the impacts of a change? AlgoSec Inc. Confidential 18

FireFlow within Your Organization Information Security Network Operations Firewall End-user (Business Unit) Create Change Request ( Existing system, web form, email) AlgoSec Inc. 19

FireFlow within Your Organization Information Security Network Administration Firewall End-user (Business Unit) Translate vague request into technical requirement. Check if rule-change needed Cost saving: avoid unneeded changes AlgoSec Inc. 20

FireFlow within Your Organization Information Security Network Operations Firewall End-user (Business Unit) Assess risk of suggested change, Approve change AlgoSec Inc. 21

FireFlow within Your Organization Information Security Network Operations Firewall End-user (Business Unit) Auto-create work order create checklist of rules and firewalls to be modified AlgoSec Inc. 22

FireFlow within Your Organization Information Security Network Operations Apply modified policy ` A matching Policy was request modified! was found. Firewall End-user (Business Unit) Auto-detect policy changes, match to requests AlgoSec Inc. 23

FireFlow within Your Organization Information Security Network Operations Firewall End-user (Business Unit) Notify stakeholders of successful completion of change AlgoSec Inc. 24

FireFlow within Your Organization Efficiency metrics, SLA reports Information Security Unauthorized Changes Network Operations Delayed requests, Internal billing CIO, Management Audit Trail, Documentation Archive Create Flexible Reports, Visibility, and Measurable Results Audit and compliance AlgoSec Inc. 25

Request and Auto planning stages in FireFlow Request Translate vague incoming requests into technical requirements Convert DNS names to IP addresses Convert port firewall service name Auto Plan Identify if a policy change is needed at all Auto identify which devices participates in change process AlgoSec Inc. 26

Risk Check and Approval Check and Approve Identify introduction of new risks, alert if non regulation compliant Approve for implementation, or send to re-plan Issue Work Order Auto-build rule change recommendation AlgoSec Inc. 27

Reconciliation: Auto-match change and request Validate Ensure that implemented policy meets the request Reconcile Ensure that all requests get implemented Ensure that no unauthorized changes are made Audit View full request history Link modified rules to request history AlgoSec Inc. 28

Network Security Change Lifecycle. FireFlow Any questions before live demo? AlgoSec Inc. 29

Questions? E-mail: avishai.wool@algosec.com http://www.algosec.com AlgoSec Inc. 30