Five Key Challenges Facing Campus Network Administrators Today



Similar documents
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Network Management and Monitoring Software

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Unified network traffic monitoring for physical and VMware environments

End-user Security Analytics Strengthens Protection with ArcSight

Traffic Analysis With Netflow. The Key to Network Visibility

Traffic Analysis with Netflow The Key to Network Visibility

STEALTHWATCH MANAGEMENT CONSOLE

The SIEM Evaluator s Guide

Autodesk Streamline Achieve maximum project visibility.

What Do You Mean My Cloud Data Isn t Secure?

INTRODUCING isheriff CLOUD SECURITY

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

High Speed Internet - User Guide. Welcome to. your world.

Network Security and the Small Business

How To Manage Security On A Networked Computer System

BUSINESS IMPACT OF POOR WEB PERFORMANCE

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Top tips for improved network security

RSA Security Analytics

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Monitoring Microsoft Exchange to Improve Performance and Availability

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Managed Security Services for Data

Next Gen Firewall and UTM Buyers Guide

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Sygate Secure Enterprise and Alcatel

COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

IDS or IPS? Pocket E-Guide

Network Monitoring and Security Measures in Campus Networks

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Advanced Threat Protection with Dell SecureWorks Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Mobile Device Management Version 8. Last updated:

Securing the Intelligent Network

ANDRA ZAHARIA MARCOM MANAGER

How To Protect A Network From Attack From A Hacker (Hbss)

Section 12 MUST BE COMPLETED BY: 4/22

Copyright 2013, 3CX Ltd.

Managed Antivirus Quick Start Guide

11 NETWORK SECURITY PROJECTS. Project Understanding Key Concepts. Project Using Auditing and Event Logs. Project 11.3

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Using TS-ACCESS for Remote Desktop Access

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Symantec Endpoint Protection Datasheet

Internet threats: steps to security for your small business

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Firewalls Overview and Best Practices. White Paper

Endpoint Security Management

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Cisco IPS Tuning Overview

Remote Access: Internet Explorer

Contents. McAfee Internet Security 3

Configuration Information

Network Performance + Security Monitoring

INFORMATION SECURITY PROGRAM

Trend Micro. Advanced Security Built for the Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Network/Cyber Security

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Pearl Echo Installation Checklist

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Century Commons' Internet Use

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

10 Best Practices for Application Performance Testing

Corporate Account Takeover & Information Security Awareness. Customer Training

Secure Your Mobile Device Access with Cisco BYOD Solutions

Network Monitoring as an essential component of IT security

Net Protector Admin Console

STEALTHWATCH MANAGEMENT CONSOLE

Using Application Response to Monitor Microsoft Outlook

Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management

Student Halls Network. Connection Guide

Astaro Gateway Software Applications

OUTLOOK WEB ACCESS. User Guide

Security Policy JUNE 1, SalesNOW. Security Policy v v

Systems Manager Cloud Based Mobile Device Management

Security Event Management. February 7, 2007 (Revision 5)

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Someone may be manipulating information in your organization. - and you may never know about it!

D&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B

Transcription:

White Paper Five Key Challenges Facing Campus Network Administrators Today Real-world solutions for improving the security and productivity of students, educators and administrators 2011 NetFort. All rights reserved. This document is provided for informational purposes only. Seek professional advice before making any technical or purchase decisions. All information is subject to change without notice.

Introduction: Shouldering the Responsibilities of a Campus Network Networking and IT professionals today have a tremendous responsibility when it comes to managing the network of a higher-education campus or organization. The massive growth of stored data (and the need to share it) is constantly placing pressure on an already over-stressed network. The unpredictable student user base is prone to network misuse and security breaches. Educators are looking to further leverage networked-based learning tools and streaming video. Campus administrators are adding new applications while demanding more and more remote accessibility. And campus legal departments are anxious to ensure that campus networks are meeting all government and other security and privacy regulations and compliancy while constantly making requests for network usage reports and other network activity to assist in copyright protection efforts. The Campus Networking Environment Networking and IT professionals responsible for the management of an organizational-wide network within a highereducation institution such as a college, university or other learning institute are faced with one of the most challenging networking environments today. The parameters that exist for campus networking environments are numerous and daunting: Large network extended across broad geographies Massive user base that s constantly in a state of change Complex networking infrastructures across diverse platforms Strong need to track individual user activity due to copyright infringement concerns, cheating, etc. Wide array of network devices of all types, makes, operating systems, etc. High number of remote and transient users Broad and disparate number of applications and databases being accessed across the network Unpredictable user base (especially students) apt to misuse or attempt to breach network security High volume of large file sharing and file downloading Open networks (required especially for remote access) creating higher security risk The fact is clear: there is not likely a networking environment today as challenging and as complex as exists at colleges, universities and higher-education institutes. 2 P a g e

The NetFort LANGuardian Campus Network Challenges White Paper The following white paper will discuss five specific and key challenges that are faced by campus network professionals today and provide real-world examples of how colleges, universities and higher education learning institutions have been able to address these key challenges with the use of NetFort LANGuardian, a powerful software tool that helps you monitor and manage the traffic flow across campus networks, recording and tracking details of user activity and traffic volumes, and generate reports on the health and security of the network. Our white paper discusses the following five actual scenarios where campus networking professionals were faced with some of the most common, yet critical challenges in managing, monitoring and securing their campus network to improve the security and productivity of students, educators and administrators. Challenge #1 Responding to copyright infringement requests. Page 4 What happens when an outside party notifies you that copyrighted material has been found on your network? How do you quickly find the user that s responsible to ensure that any such material is removed? Challenge #2 Investigating the network activity of an individual student or staff member.. Page 5 What happens when an individual user has clicked on a link within their email that causes the download of malware and the launch of thousands of spam emails? How do you find and quickly investigate the network activity of a single user? Challenge #3 Quickly identifying viruses and worms on the network. Page 6 Viruses and worms are, unfortunately, a fact of life for networks especially campus networks. How can you greatly reduce the time you spend finding, isolating and removing viruses and worms? Challenge #4 Determining why applications are slowing down.. Page 7 Dealing with calls and complaints when key applications start to slow down is not fun. How can campus network administrators quickly find the cause of the application slowdown? Challenge #5 Detecting rogue systems on the network... Page 8 There are likely no more diverse hardware environment than colleges, universities and higher-education institutes. How do campus network managers and administrators better identify and isolate rogue systems on their network? 3 P a g e

Campus Network Challenge #1: Responding to copyright infringement requests Colleges and universities have an obligation to promptly investigate issues brought to their attention by an external source. These may vary from notifications about network scanning to inquiries regarding downloaded files. Here is an actual example of where HEAnet (Ireland s National Education and Research Network, which provides high quality Internet services to Irish universities, institutes, and the education and research communities) has been notified of copyrighted material being downloaded onto a campus network via BitTorrent: The Answer A review of the main LANGuardian security report revealed a number of users running BitTorrent at the time referenced in the notification. LANGuardian s intrusion detection records and historical database were used to identify the issue. What proved of particularly high value to the campus network team was the fact that the LANGuardian system can link back to the individual username. Tracking network activity to individual username levels allows much more specific and timely response to important third party inquiries regarding questionable or concerning network activity. 4 P a g e

Campus Network Challenge #2: Investigating the network activity of an individual student or staff member There are many reasons why network administrators and managers need to have the ability to focus on a specific student or staff member. Recently, a customer used LANGuardian s user search feature to focus attention and investigation on a member of staff who had clicked on a link within an email, causing their PC to become infected with malware which, in turn, started to send massive quantities of SPAM email. The network administrators wanted to check what other systems were accessed by the problematic PC. It was easily done using the LANGuardian user search feature. The image below shows a similar report that was generated by LANGuardian. In this case, LANGuardian s network traffic analysis deep packet inspection, Active Directory user information and historical database were leveraged to drill down into the individual user s detailed network activity (by username) to identify the problem and source of the malware. 5 P a g e

Campus Network Challenge #3: Quickly identifying viruses and worms on the network Worms and viruses are a fact of life on a campus network. Issuing instructions to students, educators and administrators on how to avoid the activation of viruses or worms, while required, is often futile. Yet the amount of productivity, time and money lost to worms and viruses each year is staggering. Meanwhile, new generations of more sophisticated worms and viruses are constantly being launched. The challenge to respond to these worms and viruses, seek their sources, isolate and remove them from systems and networks, and then seek corrective action (through user communications and education, policies, etc.) to reduce the damage of future worms and viruses -- are all critical, time-consuming roles for campus network managers and administrators today. There are numerous real-world examples of where NetFort LANGuardian has helped colleges and universities quickly identify the sources of many worms and viruses on their computer networks, making the job easier and less stressful for network managers and administrators. The Answer LANGuardian includes an IDS based system based on Snort to quickly detect the sources of viruses and worms on the network. Shown below is an example of a report that s generated by LANGuardian as installed on a network where the Conficker worm has been detected. LANGuardian s powerful intrusion detection records and historical database work together to provide easy-to-use reports for campus network administrators. Best yet, the campus administrators are able to complete their investigation and detection efforts within just a matter of a few clicks. Without LANGuardian, the effort could have taken significantly longer possible even hours to identify the true source of the worm among thousands of users and network devices. 6 P a g e

Campus Network Challenge #4: Determining why applications are slowing down On December 24 th, 2010 a major university in Ireland contacted the NetFort support team requesting assistance to help with a problem where their Blackboard application was going offline. This was a massive problem for them as staff and students needed to access this application over the Christmas holiday period. At first they suspected a DDoS attack, but were unsure. With this critical application going offline, the entire academic program was at risk for becoming completely unavailable to students and educators alike. And the pressure mounted on the IT staff to find the problem and fix it fast. The Answer Using LANGuardian s network traffic analysis deep packet inspection capabilities, an analysis of the network traffic between the Blackboard servers showed large amounts of logon originating from Android based devices. Each device would logon but once authenticated, would continue to issue logon requests eventually the logon process failed, causing the main application to be inaccessible. As a short-term measure, the network administrators blocked Android devices at the firewall and waited until the application was patched before they were allowed to connect again. Shown below is an example of a LANGuardian report, focused on traffic levels and top clients on the network. Unusual activity can be quickly spotted for immediate action. And by simply clicking on the trend peaks, you can drill down to get further information as needed right down to the individual username level. Similarly, NetFort worked with another college recently which was experiencing problems with a remote connection to a training center. Users at the site were complaining that accessing their systems was slow. Using LANGuardian, they found that user PCs at the center were automatically connecting back to a Windows update server and were downloading updates which resulted in large volumes of traffic. Because the PCs were not powered up regulary, they all downloaded updates at the same time. The update process was simply paused, allowing users to get on with work without experiencing delays with application responses. Identifying what was causing this problem would normally have been a difficult, time-consuming task. But with LANGuardian, it took just minutes to detect the problem. 7 P a g e

Campus Network Challenge #5: Detecting rogue systems on the network To provide the most productive learning environment for students and educators (and a productive work environment for campus administrators), it is often the policy for organizations to allow users to bring their own devices for use on the campus network. However, for such colleges, universities and educational institutions, this policy to allow those devices onto the network can also lead to significant risk and ramifications. More common rogue devices on the campus network may include: Compromised iphones or other devices scanning networks User introducing rogue DHCP servers Systems infected with malware sending large amounts of SPAM The NetFort support team has worked with a number of colleges to help them more promptly and accurately identify issues caused by rogue devices on the network. The potential damage of a rogue device introduced onto the campus network is a serious challenge for campus network managers and administrators today. The Answer Network managers and administrators need the ability to quickly and accurately view and understand all network activity including situations where rogue devices have been introduced to the network, causing any number of problems that impact other users, applications, network access and speed, etc. With NetFort LANGuardian s intrusion detection, network traffic analysis and historical database, campus network administrators can quickly generate simple, easy-to-understand reports to identify the problems caused by rogue systems on the network. The report image below shows the output of a sample LANGuardian report which identifies emails originating from unofficial servers. With a few simple clicks, the network administrator is able to drill down to view network activity reports at the individual username level to identify the SPAM emails and their source, making it much easier to find and remove the unauthorized devices. 8 P a g e

NetFort LANGuardian - proven by education institutions around the world As we ve illustrated, NetFort LANGuardian has been used by educational institutions around the world to effectively monitor the traffic flowing across their campus network. LANGuardian reports on the health and security of the network and records details of user activity and traffic volumes. It also features a number of customizable dashboards to enable a real time and unified visibility of campus network and user activity, making it easy to quickly identify unusual activity and perform instant drill down to the required level of detail (even at the individual user level) to understand exactly what is going on. LANGuardian also includes a built in database for historical reporting, forensics and trending. NetFort Support The LANGuardian support team is a key part of the NetFort solution and can be called upon to assist with troubleshooting network/user problems. But don t just take our word for it; here are some actual examples of feedback we ve received from our customers regarding the quality of our support: The bottom line is: NetFort provides the quality service and support you need and expect from a trusted business partner. 9 P a g e

For More Information on NetFort LANGuardian To learn more about NetFort LANGuardian, request our LANGuardian Campus Networking Solutions brochure, see LANGuardian in action, or learn how to get a free 30-day trial, visit us at www.netfort.com. Or to discuss your specific networking needs with one of our campus networking experts, or request a live demo of LANGuardian, contact us at nasales@netfort.com. 2011 NetFort Ltd. All rights reserved. LANGuardian is the trademark of NetFort Technologies Ltd. 10 P a g e