Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect



Similar documents
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Comprehensive real-time protection against Advanced Threats and data theft

F5 Secure Web Gateway Services Reference Architecture

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Stop advanced targeted attacks, identify high risk users and control Insider Threats

DUBEX CUSTOMER MEETING

Threat Containment for Facebook

TRITON APX. Websense TRITON APX

Security F5 SECURITY SOLUTION GUIDE

WEBSENSE TRITON SOLUTIONS

Cisco Cloud Web Security

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Fight Malware, Malfeasance, and Malingering with F5

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Deploying F5 to Replace Microsoft TMG or ISA Server

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Introduction to the Mobile Access Gateway

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Content Security: Protect Your Network with Five Must-Haves

Top 10 Reasons Enterprises are Moving Security to the Cloud

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Filling the Threat Management Gateway Void with F5

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Superior protection from Internet threats and control over unsafe web usage

February Considerations When Choosing a Secure Web Gateway

FileCloud Security FAQ

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Direct or Transparent Proxy?

The Benefits of SSL Content Inspection ABSTRACT

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

REPORT & ENFORCE POLICY

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Security Administration R77

Move over, TMG! Replacing TMG with Sophos UTM

How To Control Your Computer With Watchguard Application Control

Network protection and UTM Buyers Guide

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

The Cloud App Visibility Blindspot

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

The Hillstone and Trend Micro Joint Solution

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

Security Best Practices for Microsoft Azure Applications

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

End-user Security Analytics Strengthens Protection with ArcSight

Firewall and UTM Solutions Guide

Content-ID. Content-ID URLS THREATS DATA

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

V1.4. Spambrella Continuity SaaS. August 2

INSTANT MESSAGING SECURITY

Putting Web Threat Protection and Content Filtering in the Cloud

Protecting Your Network Against Risky SSL Traffic ABSTRACT

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Applications erode the secure network How can malware be stopped?

Advantages of Managed Security Services

The Advantages of Security as a Service versus On-Premise Security

Secure Web Gateways Buyer s Guide >

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Analyzing HTTP/HTTPS Traffic Logs

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Intelligent, Scalable Web Security

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Securing and Optimizing the Next Generation Branch Office

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

On and off premises technologies Which is best for you?

PULSE SECURE FOR GOOGLE ANDROID

Transcription:

Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect

Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to All Apps Cloud based web security True identity and context aware BIG-IQ Central management and reporting Secure Web Gateway Internet Internet Apps Internet Apps Web Access Management Remote Access and Application Access Enterprise Apps Mobile Apps Enterprise Mobility Management Federation Cloud, SaaS, and Partner Apps F5 Agility 2014 2

Employee personal web use at work is a problem US workers spend between 60% - 80% of their time at work surfing non-work related websites. 37% 15% 49% Surf news sites Update Facebook daily from work* *Most visited non-work related website Of Cyber Monday 2013 purchases made from work Sources: Salary.com, InsideView, Forbes, Comscore F5 Agility 2014 3

And, web-borne threats becoming more sophisticated and difficult to detect Watering Hole Attacks Drive-by Downloads Spearphishing F5 Agility 2014 4

Why web defenses are a necessity today SECURITY PRODUCTIVITY ACCESSIBILITY COMPLIANCE COST-SAVINGS F5 Agility 2014 5

However, most web defenses fail PRIMARILY BASED ON SIGNATURE AND REPUTATION LACK OF REAL-TIME INLINE CONTENT ANALYSIS FORWARD FACING ONLY, LACKS OUTBOUND PROTECTION MORE OF THE SAME IN NEW DEPLOYMENT OPTIONS SSL LACKS VISIBILITY F5 Agility 2014 6

What is a secure web gateway According Gartner, secure web gateway solutions protect Web-surfing PCs from infection and enforce company policies HTTP:// Filter unwanted software and malware from user-initiated web traffic Enforce compliance with corporate and regulatory policies Must include URL filtering, malicious code detection and filtering, web app controls, and limits bandwidth F5 Agility 2014 7

F5 Secure Web Gateway Services Advanced Threat Intelligence Human Resources IT/Security Admin Home Mobile User Devices User Acceptable Policy Control + Context-Aware Web Security + Compliance + Bandwidth Control + Web Firewall Services Visibility & Control Inappropriate Websites Employee with SWG BIG-IP Platform Internet Infected Websites Headquarters Contractor Guest User Acceptable use policy and compliance controls Context-aware web security/protection Inbound and outbound malware protection Bandwidth control and preservation Infected Web Apps Infected Executable Files Standalone & Embedded F5 Agility 2014 8

F5 Secure Web Gateway Services consolidate infrastructure and maintenance costs Single integrated solution (BIG-IP, VIPRION) vs. two-box (ProxySG + Proxy-AV) solution Total cost of ownership savings between 29% - 72%, depending on service (URL Filtering or SWG Services), subscription length (1-year or 3-year), and number of users F5 Agility 2014 9

F5 Secure Web Gateway Services One-stop for all access policy, inbound and outbound Reduces chances of human error Strengthens policies Devices Reduces overhead Increases security posture Deliver consolidated policy views both inbound and outbound with SWG BIG-IP Platform Internet F5 Agility 2014 10

F5 SWG Services Mitigate Threats, Cut Costs, and Increase Productivity and Availability Identify and eradicate malicious websites, web-based malware, and APTs Simply enforce corporate Web use policies and regulatory compliance Plug data leaks Restrict access to non-work related web sites based on policy, user, group, time, and more Increase bandwidth availability AD Internet Campus URL Filtering URL Classification Advanced Malware Detection With SWG Servers Servers H Q SaaS Apps Advanced Threat Intelligence Data for real-time URL classification and advanced malware detection F5 Agility 2014 11

Web access and activity visibility + the only web gateway to secure against inbound and outbound malware Maps and tracks user identity to network addresses Fully tracks activity by user identity and their device Enable transparent user-based security policies through F5 User Identity Agent Link user identity with endpoint integrity, assuring endpoint health prior to and after Web access F5 User Identity Agent runs on a Windowsbased server, and pulls information from Active Directory domain controllers Active Directory URL Filtering URL Classification Advanced Malware Detection with SWG Servers F5 User Identity Agent F5 Agility 2014 12

Advanced Threat Protection Devices Real-time threat intelligence analyzing and processing up to 5 Billion content requests/day Robust malware database with over 10,000 web malware analytics and collection of signature and heuristic detection engines Advanced Threat Intelligence Powerful URL categorization engine and database, constantly classifying over 40 million URLs Infected Websites Disallowed/Un approved Web Apps Malware Data with SWG Inappropriate Websites Insecure Websites Attackers BIG-IP Platform Infected Cloud Apps Web Bots Real-time threat analysis and intelligence Composite reputation scoring and predictive analysis Malware sandbox analysis Social app and video controls Graphical reporting and comprehensive logging Disallowed Websites State Sponsored Attacks Hacktivism F5 Agility 2014 13

Flexible deployment options limit network change and churn Explicit Proxy Mode Inline Transparent Proxy Mode Proxy: <f5swg_ip>:<f5swg_port> Access Policy Management URL Filtering HTTP(S) Client HTTP(S) Client with SWG HTTP(S) Client Client Client Client Tablet Laptop URL Filtering (Outbound) Social Media App Controls with SWG Mobile Client Remote Client Web App Visibility & Control BIG-IP Platform Internet Client Desktop Infected Laptop BIG-IP Platform Web Surfing (HTTP/HTTPS) Internet Connect: <f5swg_ip> User: user_id@<dest_host> Off-premise web traffic On-premise web traffic Web App Servers F5 Agility 2014 14

Secure Web Gateway architecture diagram PCI CDE Salesforce.com Server Server Cloud-BasedThreat Intelligence Facebook Facebook Games Server Server Web Application Firewall E-Commerce Corporate Network Secure WebGateway Services B2B Server Contractors Next- Generation Firewall DDoS Protection Internet Update Server Employees Wireless Guest Network ActiveDirectory Malicious Site Web APIs Entertainment Site Malware YouTube Viral Video Strategic Point of Control F5 Agility 2014 15

Secure Web Gateway solution diagram Corporate Network Context-Aware Web Security Bandwidth Controls Acceptable Use Policy Controls Customer Scenarios Compliance Acceptable Websites Contractor Employee PCI CDE Cloud-Based Threat Intelligence Centralized Management Infected Executable Files Secure WebGateway Services Update Servers Remote Users UserIdentification/ Endpoint Inspection URL Filtering Customer Functionality Web Access Policy Enforcement Malware Protection Identity Federation Infected Web Apps Guest User Mobile User Professional Services and Support SaaS Visibility (Logging) Human Resources Control (Reporting) IT/Security Admin Inappropriate Websites F5 Agility 2014 16

Secure Web Gateway solution diagram Corporate Network Context-Aware Web Security Bandwidth Controls Acceptable Use Policy Controls Customer Scenarios Compliance Acceptable Websites Contractor Employee PCI CDE Cloud-Based Threat Intelligence Centralized Management Infected Executable Files Secure WebGateway Services Update Servers Remote Users UserIdentification/ Endpoint Inspection URL Filtering Customer Functionality Web Access Policy Enforcement Malware Protection Identity Federation Infected Web Apps Guest User Mobile User Professional Services and Support SaaS Visibility (Logging) Human Resources Control (Reporting) IT/Security Admin Inappropriate Websites F5 Agility 2014 17

Secure Web Gateway solution diagram Corporate Network Context-Aware Web Security Bandwidth Controls Acceptable Use Policy Controls Customer Scenarios Compliance Acceptable Websites Contractor Employee PCI CDE Cloud-Based Threat Intelligence Centralized Management Infected Executable Files Secure WebGateway Services Update Servers Remote Users UserIdentification/ Endpoint Inspection URL Filtering Customer Functionality Web Access Policy Enforcement Malware Protection Identity Federation Infected Web Apps Guest User Mobile User Professional Services and Support SaaS Visibility (Logging) Human Resources Control (Reporting) IT/Security Admin Inappropriate Websites F5 Agility 2014 18

Accommodating licensing models Annual Subscription services 1-year or 3-year subscriptions Pricing ranges depending on platform Virtual, BIG-IP or VIPRION and number of filtering sessions (500 80,000) Only activated on top of F5 Access Policy Manager (APM) enabled platforms Session limits are defined and enforced on each platform ensuring future capacity and security service expansions F5 Agility 2014 19

So lets look at the details

Adaptive subscription-based security services Option #1: Secure Web Gateway URL classification and filtering (as defined) Support for custom URL categories (URL white/black lists) Connection to cloud-based threat intelligence infrastructure Web-based malware and advanced threat protection Granular social web applications detection and control User identification User based policy, graphical reporting and logging Option #2: URL Filtering URL classification and filtering (as defined) Support for custom URL categories (URL white/black lists) Connection to cloud-based threat intelligence infrastructure Granular social web applications detection and control User identification User based policy, graphical reporting and logging AD URLFiltering URL Classification Advanced Malware Detection with SWG Servers Servers Advanced Threat Intelligence Data for real-time URL classification and advanced malware detection F5 Agility 2014 21

Real-Time Security Classification Empowers social web controls, and inspects all web content for malicious or suspicious code such as open or obfuscated scripts, exploit code and iframe tags Real-Time Content Classification Employs advanced machine learning to quickly and accurately classify pages based on content including images, multimedia, and links Real-Time Data Classification Classifies structured and unstructured data with paring and decoding support to address outbound data theft Anti-Malware Engines - Applies multiple anti-malware engines to identify both general and specialized malware Reputation Analysis - Considers more than twenty characteristics for detailed assessment and more accurate reputation scoring that encompasses contextual awareness URL Classification - Used independently and in conjunction with other defense assessments to apply current classification information for known pages, or to help assess new pages and links Anti-Spam/Spear-Phishing Provides matchless, proactive protection against traditional and emerging threats in email F5 Agility 2014 22

Database Update Types Three types of updates Type of download Schedule Description Master Daily, sometime during the specified update window Updates the categories and the URL s in them RTSU ACE Every 5 Minutes, not configurable Every 5 Minutes, not configurable Real time updates, that is the latest URLs that have been categorized Updates data that is used for Analysis, when necessary, to categorize a URL further F5 Agility 2014 23

URL Categorization

URL Categories Custom categories may be added, in addition to the default categories that you want to block or allow Custom Categories that you add become subcategories of Custom Categories Custom Categories take precedence over other categories F5 Agility 2014 25

Social Web Filters - Facebook Facebook Posting: Facebook function that enables a user to share a post, status or link. Facebook Commenting: Facebook function that enables a user to comment or like. Facebook Friends: Facebook function that enables a user to add a connection. Facebook Photo Upload: Facebook function that enables a user to upload a photo. Facebook Mail: Facebook function that enables a user to send an email within the Facebook community. Facebook Events: Facebook function that enables a user to create, modify or respond to an event within the Facebook community. Facebook Apps: Facebook function that enables a user to access or utilize an app. Facebook Chat: Facebook function that enables a user to chat within the Facebook community. Facebook Questions: Facebook function that enables a user to ask a question within the Facebook community. Facebook Video Upload: Facebook function that enables a user to upload a video. Facebook Groups: Facebook function that enables a user to create, modify or join a group within the Facebook community. Facebook Games: Facebook function that enables a user to access or play a game. F5 Agility 2014 26

Social Web Filters LinkedIn, Twitter, & YouTube LinkedIn: LinkedIn Updates: LinkedIn function that enables a user to edit a profile or post an update. LinkedIn Mail: LinkedIn function that enables a user to send an email within the LinkedIn community. LinkedIn Connections: LinkedIn function that enables a user to add a connection. LinkedIn Jobs: LinkedIn function that enables a user to perform activities related to job search Twitter: Twitter Posting: Twitter function that enables a user to post an update. Twitter Mail: Twitter function that enables a user to send an email within the Twitter community. Twitter Follow: Twitter function that enables a user to add a connection. YouTube: YouTube Commenting: YouTube function that enables a user to comment, like or dislike. YouTube Video Upload: YouTube function that enables a user to upload a video. YouTube Sharing: YouTube function that enables a user to share a video within and outside of the YouTube community. F5 Agility 2014 27

SWG and Instant Messaging Secure Web Gateway (SWG) supports HTTP and HTTPs-based instant messaging protocols As a result, when you use the Instant Messaging URL category to block messages, SWG can block messages to ICQ, for example, but cannot block messages from applications that use non-standard ports or tunneling over HTTP, such as, Yahoo Messenger, Skype, Google Talk, and so on Similarly, SWG cannot block messages from file-sharing and peer-to-peer protocols that do not use HTTP or HTTPs; most do not F5 Agility 2014 28

URL Filtering

Default URL Filters Default URL Filters such as block-all and basic-security are available You cannot delete any of the default filters, you can create new filters or copy existing ones F5 Agility 2014 30

Basic Security URL Filter Blocks the Security URL Category, and allows all other categories URL Categories URL Filters F5 Agility 2014 31

URL Filters Custom URL Filters allow admin to Allow or Block any category or sub-category F5 Agility 2014 32

URL Filters To block URLs that SWG cannot categorize, expand the category Miscellaneous, and select Uncategorized To use a URL Filter you must add it to a Scheme F5 Agility 2014 33

Secure Web Gateway Schemes

Schemes You configure schemes to specify and schedule a group of URL filters that you want to apply to users What to do on uncategorized URL Scan responses for malicious content F5 Agility 2014 35

Bringing it all together with APM VPE F5 Agility 2014 36

Logging and Reporting

Sample Error/Blocking Messages F5 Agility 2014 38

Policy, User Identity, Reports and Logs F5 Agility 2014 39

Where to get more information Follow up with your F5 channel partner and/or account manager For detailed information, please go to f5.com/architectures If I can be of further assistance please contact me: r.bible@f5.com +44 7919408772