White Paper. Network Management and Operational Efficiency



Similar documents
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

McAfee Security Architectures for the Public Sector

McAfee Security. Management Client

GOOD PRACTICE GUIDE 13 (GPG13)

Encryption Made Simple

McAfee Next Generation Firewall

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings

Encryption Made Simple

Forcepoint Stonesoft Management Center

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

How To Buy Nitro Security

V1.4. Spambrella Continuity SaaS. August 2

HP Service Manager software

Managed Security Service Providers vs. SIEM Product Solutions

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee epolicy Orchestrator

Total Protection for Compliance: Unified IT Policy Auditing

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency

Microsoft Dynamics CRM Solutions for Retail Banking

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs

CA Service Desk Manager

Multi-Link - Firewall Always-on connectivity with significant savings

How To Use Ibm Tivoli Monitoring Software

End-to-End E-Clinical Coverage with Oracle Health Sciences InForm GTM

GROWTH. Microsoft Dynamics GP Business Essentials Build your business with a solution designed for growth

Drive Down IT Operations Cost with Multi-Level Automation

Database Security in Virtualization and Cloud Computing Environments

how can I deliver better services to my customers and grow revenue?

McAfee Certified Product Specialist McAfee epolicy Orchestrator

InforCloudSuite. Business. Overview INFOR CLOUDSUITE BUSINESS 1

Asentinel Telecom Expense Management (TEM)

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Virtualization Essentials

PULSE SECURE CARE PLUS SERVICES

Secure Your Success. Intel Security Partner Program

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for

IBM Tivoli Netcool Configuration Manager

McAfee Web Reporter Turning volumes of data into actionable intelligence

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

CA Workload Automation

CA Service Desk Manager

Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings

Supply Chain Management Build Connections

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

IBM Tivoli Netcool network management solutions for enterprise

Redefining Infrastructure Management for Today s Application Economy

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Customer Benefits Through Automation with SDN and NFV

Executive Summary WHO SHOULD READ THIS PAPER?

VCE SUPPORT OVERVIEW. Investment Protection and Welcome Peace of Mind

Requirements When Considering a Next- Generation Firewall

McAfee Total Protection Reduce the Complexity of Managing Security

Data Loss Prevention Best Practices for Healthcare

Solutions Brochure. Security that. Security Connected for Financial Services

Security Intelligence Solutions

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Juniper Care Plus Services

Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency

Executive Overview 3. Case Study 1: Augmented Connections 3. Case Study 2: Augmented Bandwidth 5

Integration Maturity Model Capability #5: Infrastructure and Operations

How To Create A Help Desk For A System Center System Manager

agility made possible

The case for cloud-based data backup

can you simplify your infrastructure?

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

Achieve Deeper Network Security

Choosing the Right Project and Portfolio Management Solution

Address IT costs and streamline operations with IBM service request and asset management solutions.

How To Protect Your Network From Attack From A Network Security Threat

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

IBM Tivoli Netcool network management solutions for SMB

Achieving Security through Compliance

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

VMware Hybrid Cloud. Accelerate Your Time to Value

Facilitating a Holistic Virtualization Solution for the Data Center

Document control for sensitive company information and large complex projects.

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

Securing Enterprise Mobility for Greater Competitive Advantage

Transcription:

White Paper Network Management and Operational Efficiency

Table of Contents Why Does It Matter? 3 Customer Needs and Challenges 3 Key operational tasks 3 Typical Management Systems 4 The McAfee Response 5 Conclusion 6 2 Network Management and Operational Efficiency

Why Does It Matter? According to Gartner, 80% of total IT costs occur after initial purchase. The significance of recurring operational costs is not always realized by organizations that are mainly focused on short-term investments. Correct configuration is fundamental for network security. In the end, systems and technologies will not be robust if setup is incorrectly configured and contains critical security holes. Misconfiguration is, in fact, the result of human error, which is the leading factor in security failures. As much as 80% of unplanned outages are due to ill-planned changes made by administrators or developers. On top of security concerns, fixing issues causes extra work, which eats into profitability. Misconfiguration also leads to increasing network complexity and makes overall control and troubleshooting more challenging. Network management systems play a critical role in avoiding human error and optimizing time and resources in network operations. All of this has a direct impact on the perceived security level and recurring costs. Customer Needs and Challenges According to the global next-generation firewall (NGFW) study conducted by McAfee, most enterprises prefer to manage their network security themselves despite the clear trend towards outsourcing management to third parties. Security outsourcing is still considered risky, and enterprises themselves prefer to have network visibility, full control, and the independence to make their own decisions about changes. Based on the survey, it is clear that management capabilities play an extremely important role in overall satisfaction with NGFW solutions. Manageability and centralized management tools in particular were flagged as important areas that enterprises are not happy with. The more distributed the network gets, the more essential remote management capabilities become. Network/network operations and security teams are the primary decision makers when making NGFW purchase decisions. Solutions must fulfill requirements for both departments. Key operational tasks If we look at the network security and management lifecycle, a proper management solution must provide tools for all major administrative phases and areas as shown in Figure 1. Network deployment Network maintenance Service deployment Reporting Service updates Troubleshooting Figure 1. Network operations lifecycle. 3 Network Management and Operational Efficiency

Management tools must enable customers to rapidly react to network and business changes and provide constant control and visibility over the network. Based on customer interviews, the following tasks were highlighted as frequent administrative activities: Network deployment. Policy management. Network monitoring and troubleshooting. VPN management. Network maintenance. Flexible separation of administrative rights. As these activities can be considered routine tasks, it is paramount that management tools enable customers to execute these easily, accurately, and in a scalable manner. Typical Management Systems In practice, all NGFW solutions on the market offer a centralized management system, which is generally considered a must-have. However, the real usability and robustness of management systems greatly differ between vendors. Some important points to consider when selecting between NGFW technologies are: The available tools for essential tasks across the whole operational lifecycle. The ability to streamline real-world operational workflows. The scalability to support network growth. The number of resources required to manage the network. The system s long-term total cost of ownership (TCO). The level of compliance with many key capabilities cannot be understood just from paperwork but requires testing, investigation, and familiarity with system architecture. Simple product demonstration is not enough to prove that a system is robust in realworld network operating conditions, so is essential to dig deeper into the real management capabilities of NGFW systems. As mentioned previously, proper understanding of a management system s real capabilities can only be achieved by testing the system in tasks that are relevant to the customer. Based on testing the latest versions of competitive network security management solutions, we have outlined the common capabilities of typical NGFW management solutions (Table 1). Table 1: Operational Tasks and Typical Management Solutions Key task Typical management solutions Implications for the network and administrations Network deployment Policy management Network monitoring and troubleshooting VPN management Network maintenance Flexible coordination of administrative rights No automated deployment tools. Lack of efficient group operations. Lengthy, unstructured policies. Lack of granular rule counters and policy comparisons. Extra licenses for complete policy management. Lack of clear log visualizations. Slow log responsiveness. Extra licenses for deeper log navigation. Labor-intensive configuration. Lack of VPN link aggregation concepts over multiple ISPs. No scheduled upgrade tools. Not designed for large network maintenance. One-to-one mapping between administrative and role only. No efficient tools for MSPs to manage their customers within a single management system. Costly roll-out process requiring site visits and manual work. Time-consuming deployment Inefficient policy execution. Lack of central control of policies. Lack of clear visibility of policy relevance. High TCO difficult to budget. Difficult to get a clear picture of network events. Slow reaction to network security issues. High TCO difficult to budget. VPN network setup takes as much as 10 minutes per site. No practical, fast resilience option for site-to-site VPN. Remote engine upgrade takes time and resources. High risk of human error. Service disruptions in maintenance window. Limited flexibility to combine administrators and rights in large organizations and MSPs. High total cost difficult to budget. 4 Network Management and Operational Efficiency

The McAfee Response Many customers consider the criteria discussed earlier important for their businesses. Wouldn t it be nice if the management system were capable of the following? Centrally cover all key operational tasks for the entire NGFW network. Optimize workflows to make operations fast and straightforward for the user. Scale for management environments with thousands of NGFW or nodes. Provide an easily controllable and understandable cost structure with no hidden costs. Implementing proper tools that meet the real needs of network security administrators often needs thorough and longterm understanding about customer processes. In addition, when management tools are all built in rather than bolted on, navigating between functions and getting a holistic picture of the network is only possible when different functions talk to each other. The McAfee Security Management Center, which is part of McAfee Next Generation Firewall, provides a single pane of glass for management tasks across the management lifecycle. The McAfee Security Management Center is developed in-house and has all tools built into one system without the limitations and complexity of rigid blade-type architecture. From the beginning, the McAfee Security Management Center has been designed to scale for large networks and remain responsive despite network growth. McAfee Next Generation Firewall and McAfee Security Management Center offer an optimal solution for enterprises, as they meet the needs of both network/network operations and security teams. Table 2 outlines the key capabilities offered by the McAfee Security Management Center for improving operational efficiency and how it meets the combined needs of network and security administrators. Table 2: McAfee Security Management Tools for Key Operational Tasks Key task Key McAfee capabilities Advantage for operational efficiency Network deployment Plug-and-play deployment tools. No site visits and related costs. Primary buyer organization team Policy management Network monitoring and troubleshooting VPN management Network maintenance Flexible coordination of administrative rights Efficient group operations with multiple selections. Hierarchical policies. Re-use the same policy for many NGFWs with aliases. Built-in rule counters and search. Built-in policy validation and comparison tools. Responsive log system. Easy-to-use filtering and visualizations. Direct links between logs, reports, and policies. Support for configuring large VPN deployments efficiently. Unique McAfee Multi-Link for resilient and flexible site-to-site connectivity. Scheduled tasks, including NGFW upgrades. User-adjustable automated update and upgrade options. In-service upgrades. Automated log data management. Granular customer roles. Ability to mix roles, elements, and domains per administrator. Fast and automated network deployment for large and distributed roll-outs. Short and simple policy structures. Fast, accurate, and centrally controlled policy changes. Efficient policy re-use across NGFWs. Ability to keep policies relevant and remove idle rules. No hidden costs. Clear picture of network events and shortcuts between logs, policies, and reports. Ability to focus on relevant logs and visualize the logs in an ad hoc manner. Responsive log troubleshooting. Rapid VPN network setup. Ability to offer resilient and QoS-aware site-to-site VPN across multiple ISPs and access technologies. Centrally controlled NGFW upgrades with the ability to precisely set time to execute, for example, per element. Adjustable to required operational processes. Unique cluster upgrades with no traffic disruption. Tasks to automatically archive and delete logs. Ability to optimize administrator tasks and change when needed. Good fit for demanding large organizations and MSSPs. Network administrator Security administrator 5 Network Management and Operational Efficiency

The McAfee Security Management Center is highly appreciated by McAfee Next Generation Firewall customers (84% chose McAfee Next Generation Firewall), thanks to its centralized management capabilities. Customers also expressed that the McAfee Security Management Center enables administration teams to be small and efficient, regardless of the number of NGFWs or customers served. Additionally, the simple McAfee Security Management Center license model facilitates transparent cost effectiveness as nearly all tools are inherently part of the basic product. This is an important thing to realize when looking at a system s total lifecycle cost. Conclusion Management systems are vital to network security and their lifecycle costs are high. Their importance grows with the tendency for networks to get more and more complex. Network management systems for NGFWs currently on the market are not all the same. They differ greatly in terms of how they support daily routine tasks, how well they automate workflows, how well they scale, and how they are licensed. With these challenges in mind, customers should take a closer look at their potential NGFW vendors and compare their management solutions. McAfee Security Management Center has been designed for distributed enterprise networks that need simplicity, efficiency, and scalability for their daily routines. The efficiency of the McAfee Security Management Center consistently received high customer satisfaction ratings over the past 10 years. About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com. 1 Gartner data (http://www.networkalliance.com/your-advantage/understanding-technology-costs) 2 IT Process Institute s Visible Ops Handbook (http://www.wikisummaries.org/visible_ops) 3 NGFW Market Intelligence Survey by McAfee (for 341 decision makers), Q1 2014 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2014 McAfee, Inc. 61035wp_opp-eff-ngfw_0314_fnl_ETMG