Firewall and UTM Solutions Guide



Similar documents
The Next Level of Secure Channel Partnership

WatchGuard Technologies WatchGuard Technologies

Advantages of Managed Security Services

Astaro Gateway Software Applications

Next-Generation Firewalls: Critical to SMB Network Security

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Configuration Example

How To Build A Network Security Firewall

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Next Gen Firewall and UTM Buyers Guide

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Stable and Secure Network Infrastructure Benchmarks

CMPT 471 Networking II

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Networking for Caribbean Development

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Network protection and UTM Buyers Guide

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

How To Control Your Computer With Watchguard Application Control

Simple security is better security Or: How complexity became the biggest security threat

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

V1.4. Spambrella Continuity SaaS. August 2

Zscaler Internet Security Frequently Asked Questions

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Putting Web Threat Protection and Content Filtering in the Cloud

Section 12 MUST BE COMPLETED BY: 4/22

Securing the Small Business Network. Keeping up with the changing threat landscape

A Decision Maker s Guide to Securing an IT Infrastructure

Cisco Small Business ISA500 Series Integrated Security Appliances

Top tips for improved network security

How To Prevent Hacker Attacks With Network Behavior Analysis

Advantages of Managed Security Services

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Netsweeper Whitepaper

Readiness Assessments: Vital to Secure Mobility

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Load Balancing Security Gateways WHITE PAPER

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Industrial Firewalls Endpoint Security

Configuration Example

Table of Contents. Page 2/13

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

The Cisco ASA 5500 as a Superior Firewall Solution

Barracuda Intrusion Detection and Prevention System

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

DOWNTIME CAN SPELL DISASTER

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Fight Malware, Malfeasance, and Malingering with F5

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Intelligent, Scalable Web Security

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Internet Content Provider Safeguards Customer Networks and Services

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Cyber Security: Beginners Guide to Firewalls

Advantages of Managed Security Services. Cloud services via MPLS networks for high security at low cost

Computer Security Maintenance Information and Self-Check Activities

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Simplify Your Network Security with All-In-One Unified Threat Management

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Global Partner Management Notice

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Best Practices for Outdoor Wireless Security

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

IBM Internet Security Systems

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Deploying Firewalls Throughout Your Organization

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

PART D NETWORK SERVICES

Huawei Eudemon200E-N Next-Generation Firewall

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

isheriff CLOUD SECURITY

Transcription:

Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com

Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers target you? There are a number of reasons why hackers target small companies. Small companies do not spend as much on security and so are easier targets. The first step a hacker takes when attacking is to test for vulnerability. This is usually done with a scanner, a commonly available application that queries thousands of arbitrary Internet addresses, hunting for any network with any openings through which a hacker can enter. It s the same as a burglar sneaking down your street at 3am trying every front door, looking for one that s unlocked. If you get broken into, it s not personal. You just made it easy, you didn t lock your door. Hackers want your computing power Being roped unknowingly into such distributed computing applications poses a serious risk to any company, in part because most such attacks keep a low enough profile as to be unnoticeable. With 10 PCs and a broadband internet connection, a company by the name of Corporate Health Systems had persistent hacking which had enslaved the company s network for one purpose; to help the hacker win an encryption-cracking contest. Their hacking problem has now been resolved with the installation of a Watchguard UTM firewall. Hackers want your bandwidth Distributed denial of service (DDoS) attacks involve numerous computers bombarding an Internet server with data, overloading it and causing the server to go offline or crash. Hackers don t want their exploits to point back at their own machines, so they enslave other computers, turning them into zombies, forcing them to attack in concert. Your identity is valuable If a hacker can learn your name and e-mail address he is at liberty to change his mail, news, and chat settings to impersonate you. He might raid your contacts list and then pretend to be you while asking customers for information about your order history, including the account numbers used to pay invoices. In this guide we look at the firewall options available with their advantages and disadvantages. From the simple Windows Firewall through all-in-one DSL router firewalls to options that allow you to track and scan all the emails moving within your organisation. Essex CM12 0DU Telephone: 0845 230 2940 Page 1

Software Firewall When it comes to business, using only a software firewall can put you at risk. Software firewalls can be manipulated by viruses and thus are not as secure as a hardware firewall. Windows comes with its own built in software firewall, this can be used by laptop users if they are using hotspots or mobile connections while on the road. Budget friendly, Windows firewall comes free with the Windows operating system. No additional hardware needed, ideal for use while travelling. Can be manipulated by viruses and programs, not as secure as a hardware firewall. As computer is processing firewall data it can degrade performance. Hardware Firewall - ADSL Router/Firewall Most combined Firewall/Routers have a Packet filtering firewall. A packet contains a unit of user data with control information. The control information provides data the network needs to deliver the user data to its destination. Think of it like a bus, with the driver being the control information and the passengers being the user data. These firewalls do not allow packets to pass through the firewall unless they match the firewalls rule set. Generally these firewalls have limited ability to examine the packets to check for viruses or analyse web traffic. Modern firewalls however, can filter traffic based on many different packet attributes, these attributes include source or destination IP address or port; or a destination service like WWW (web traffic), SMTP (email) or FTP (file transfers). Compact, ideal for small companies not requiring private network connections. Budget friendly, only one device needed to connect network to internet. No redundancy in event of line failure as only one internet connection. Limited speed throughput, with internet connections becoming superfast it is usually the firewall that slows the connection. Limited features, less secure remote connections and no packet inspection. Essex CM12 0DU Telephone: 0845 230 2940 Page 2

UTM the next Generation Firewall Unified Threat Management is the term used for the latest premium firewalls. UTM solutions emerged out of the need to stem the increasing number of attacks on companies by hacking, cracking, viruses and worms. UTM devices contain technology to inspect every packet so to detect and stop threats as they come through the door. Below are some of the features of Watchguard s UTM firewall. Application Control Application Control enables administrators to monitor and control access to web and business applications to enforce policy, and protect productivity and network bandwidth. Gateway AntiVirus Gateway AntiVirus is a fully integrated, heuristic and signature-based security subscription that identifies and blocks known spyware, viruses, trojans, and blended threats in real time. Intrusion Protection Service Intrusion Protection Service works hand-in-hand with the WatchGuard firewall's application layer content inspection to provide real-time protection from threats, including spyware, SQL injections, cross-site scripting, and buffer overflows. SpamBlocker SpamBlocker is the best in the industry at distinguishing legitimate communication from spam outbreaks in real time, blocking nearly 100% of unwanted emails and the viral payloads they carry. WebBlocker WebBlocker content and URL filtering subscription helps eliminate legal liabilities resulting from inappropriate web surfing, while increasing employee productivity and protection from web-based attacks. Reputation Enabled Defence Reputation Enabled Defence delivers a powerful, cloud-based URL reputation service that protects web users from malicious web pages, while dramatically improving web processing overhead. The firewalls we recommend are physically separate form the router, this means it can have more than one internet connection plugged in enabling it to switch between them in the case of a line failure. As all the security is controlled by the firewall it does not matter which line is used as the security will remain the same. Option for full redundancy in event of line failure (backup line needed). High speed data throughput. Caters for faster connection speeds. Highly secure Site to Site and remote access VPN connections. Modular pricing, you only pay for the features you require. More expensive, however modular pricing enables cost effectiveness. Is installed in additional to a router and involves more time to configure. Subscription charges for Antivirus/Weblocker. Essex CM12 0DU Telephone: 0845 230 2940 Page 3

Additional products Email Security The Watchguard XCS appliance is used in addition to a firewall and is a dedicated state of the art Email Security solution that defends against inbound threats including viruses, spam, blended threats, phishing, spyware and network attacks. It blocks 98% of unwanted traffic at the perimeter and boosts your email security and performance. Securely transmits and receives private and sensitive information with a SecureMail Email Encryption subscription Next-generation real-time threat monitoring aggregates intelligence from thousands of systems globally to block more than 98% of unwanted and malicious traffic at the perimeter. Deep content inspection and contextual analysis provides defence-in-depth approach for stronger protection from inbound spam, malware, blended threats, and network attacks. Zero-hour threat outbreak response closes the window of vulnerability to new threats with the fastest of response times. Email Encryption for Privacy and Compliance. Attachment control blocks files that are known to be harmful so they never enter your network. Set-it-and-forget-it administration allows you to apply a single policy for total visibility and control of all inbound email traffic. Wireless Watchguard's wireless access points seamlessly integrate with their XTM firewalls to extend the best-in-class UTM security. You can harness the power of mobile devices and encourage BYOD without putting your network assets at risk. Security policies can be applied to wired and WLAN resources simultaneously, which is critical to enforcing security standards across an entire network. Automatic channel selection reduces network interference and congestion to ensure performance maximization Customizable Captive Portal technology allows network access to be gated upon acceptance of terms and conditions Administrator can restrict device access based on MAC address Auto-discovery of new access points allows for easy deployment - reducing setup time, saving money Clients connected to an SSID experience seamless network access when roaming between access points Scan and report functionality details information about wireless devices on the network for PCI compliance Summary What solution offers the best network protection for you? We believe the Watchguard XTM series firewall appliances give you the best security. Our technical director has been using them for almost 20 years and we currently support over 40 Watchguard XTMs. As every company has different needs, we can offer you a FREE, no obligation survey of your current equipment and then recommend the most flexible, scalable and competitive solution designed specifically for your business and your budget. Essex CM12 0DU Telephone: 0845 230 2940 Page 4