Unified Threat Management. Joel M Snyder Senior Partner Opus One jms@opus1.com



Similar documents
How to Build a Security Dashboard

Unified Threat Management, Managed Security, and the Cloud Services Model

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

SonicWALL Unified Threat Management. Alvin Mann April 2009

Braindumps QA

BroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in

Internet Content Provider Safeguards Customer Networks and Services

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

White Paper. ZyWALL USG Trade-In Program

Networking for Caribbean Development

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012

Clavister InSight TM. Protecting Values

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Fortigate Features & Demo

Firewall and UTM Solutions Guide

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Current IBAT Endorsed Services

Advantages of Managed Security Services

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

IDS or IPS? Pocket E-Guide

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Reduce Your Network's Attack Surface

Integrating Single Sign-on Across the Cloud By David Strom

CALNET 3 Category 7 Network Based Management Security. Table of Contents

How to Build a Massively Scalable Next-Generation Firewall

Clean VPN Approach to Secure Remote Access for the SMB

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Dell SonicWALL report portfolio

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Top 10 Features: Clearswift SECURE Gateway

WatchGuard Technologies WatchGuard Technologies

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Avoiding the Top 5 Vulnerability Management Mistakes

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Advantages of Managed Security Services

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Managed Service Plans

Cisco Small Business ISA500 Series Integrated Security Appliances

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Vendor Questionnaire

AlienVault for Regulatory Compliance

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

Next-Generation Firewalls: Critical to SMB Network Security

5 Reasons Your Business Needs Network Monitoring

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Injazat s Managed Services Portfolio

How to Painlessly Audit Your Firewalls

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

FortiMail Filtering Course 221-v2.2 Course Overview

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Master Data Management, Risk and Governance

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

Using Palo Alto Networks to Protect the Datacenter

Application Intelligence, Control and Visualization

Cisco ASA 5500 Series Business Edition

TS-301 Case Project Shaun DeRosa

Critical Security Controls

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Providing Secure IT Management & Partnering Solution for Bendigo South East College

The Next Step in Outbound Protection. By Robert Mannal, CIPP, CISSP

How To Save Money On An Ip Trunking (Ip Trunking)

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

DOWNTIME CAN SPELL DISASTER

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

Solution Brief. Secure and Assured Networking for Financial Services

Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management

Transcription:

Unified Threat Management Joel M Snyder Senior Partner Opus One jms@opus1.com

Agenda: Unified Threat Management What is it? UTM Features and where you should use them Performance and UTM Cost and UTM 2

What is UTM? Why would you want to use UTM? 3

UTM is a buzzword for threat mitigation we stuck in the firewall whatever new thing that we didn t used to do that we do now For a price, usually App Presentation Session Transport Network Data Link Physical 4

UTM can cover many bases Anti-Spam Anti-Virus Anti- Spyware Anti- Phishing Intrusion Prevention DoS/DDoS Mitigation Bad Content Bad Activity Control Usage Enforce Policy Content Filtering Application Blocking Bandwidth Management Regulatory Logging/ Blocking 5

UTM has taken over the firewall industry Current Vendors Include: Check Point Cisco Systems FortiNet IBM/ISS Juniper/NetScreen Secure Computing SonicWALL Symantec Untangle WatchGuard ZyXel Features Include: Firewall VPN Anti-Virus Anti-Spam Anti-Spyware Anti-Phishing Bandwidth Management IPS/IDS Content Filtering Web Proxy 6

UTM is an alternative to the common approach to perimeter security Rack em and Stack em UTM 7

Arguments for UTM vary depending on your environment In the SMB space, four arguments push UTM 8

In the Enterprise Network, UTM has a very different justification Criteria Cost Performance Complexity Management Flexibility Notes Long-term costs for UTM will likely be lower than individual point solutions By intelligently routing traffic to different engines, performance of a single large box can exceed multiple small boxes High Availability and Scalability are dramatically simplified in UTM A single management interface reduces the possibility of mistakes Ability to bring security services in and out of the equation quickly supports threat response requirements best 9

Of course, neither strategy excludes the other You may want to do a mix-and-match solution because You have different management responsibilities (e.g., email versus network layer) You have audit requirements (e.g., compliance versus security) You have random requirements that aren t met by a single product (e.g., box must be blue and have a prime number of fans) 10

Which parts of UTM are best? Which ones should I use? What will it cost me? What are key tactics on UTM? 11

Not every function in a UTM firewall offers the same level of security Anti-Spam Anti-Virus Anti-Spyware Anti-Phishing Intrusion Prevention DoS/DDoS Mitigation Content Filtering Application Blocking Logging and Auditing Regulatory Logging Regulatory Compliance Let s run through them to make some general observations. Start with: The UTM/no-UTM decision is often a budget and appropriate fit one! 12

Anti-spam/Anti-phishing with UTM is not a complete package Anti-Spam Anti-Virus Anti-Spyware Anti-Phishing Intrusion Prevention DoS/DDoS Mitigation Content Filtering Application Blocking Logging and Auditing Regulatory Logging Regulatory Compliance UTM Blacklist IP-based filtering Simple DCC or content-based anti-spam Edge Email Security Device Reputation-based IP filtering Powerful signature/ heuristic-based anti-spam End User Quarantine Per-user settings Greater control, reporting 13

Anti-Virus and Anti-Spyware are the most common UTM features Anti-Spam Anti-Virus Anti-Spyware Anti-Phishing Intrusion Prevention DoS/DDoS Mitigation Content Filtering Application Blocking Logging and Auditing Regulatory Logging Regulatory Compliance Works great at detecting outbound phone home of malware/spyware Works well for known protocols (SMTP, IMAP, POP) as long as the channel isn t encrypted Works moderately well for web-based traffic as long as the channel isn t encrypted & the port is predictable 14

With IPS, the problem isn t the technology but the interface Anti-Spam Anti-Virus Anti-Spyware Anti-Phishing Intrusion Prevention DoS/DDoS Mitigation Content Filtering Application Blocking Logging and Auditing Regulatory Logging Regulatory Compliance Signatures and signaturebased alerts don t work. DoS/DDoS mitigation works better out of the box because most UTM firewalls aren t in front of hosting farms. A simpler interface is optimal. 15

Content Filtering and Application Blocking are sweet spots for firewalls Anti-Spam Anti-Virus Anti-Spyware Anti-Phishing Intrusion Prevention DoS/DDoS Mitigation Content Filtering Application Blocking Logging and Auditing Regulatory Logging Regulatory Compliance As a choke-point, firewalls are perfectly situated to enforce policy although be aware that not every application wants to be enforced. With content filtering, a 90% solution is generally acceptable. 16

Logging and Compliance require more than a UTM firewall Regime Goal How IT Helps? Anti-Spam Anti-Virus Anti-Spyware Anti-Phishing Intrusion Prevention DoS/DDoS Mitigation Content Filtering Application Blocking Logging and Auditing Regulatory Logging & Compliance GLBA SOX HIPAA SEC 17A-4 California SB1386 Basel II EU Data Protection Protection of private financial information Financial reporting integrity Health information privacy and control Support of audit process Disclosure when a privacy breach occurs Promoting financial stability Personal information integrity More firewalls; leak protectors More disk More firewalls; leak protectors More disk More firewalls More firewalls; disk More firewalls; leak protectors 17

Best Practices for UTM Use firewall + UTM where it fits perfectly Use UTM to backstop better technologies Don t use UTM where it doesn t work well Don t use technologies you don t understand or won t manage Let your budget override everything DDoS mitigation, application control, bandwidth management, content filtering Anti-virus, antispyware Anti-spam, antiphishing IPS, IDS Imperfect security is better than no security 18

UTM Performance: Nothing is Free 19

UTM Performance: Nothing is Free 20

Performance hit is no anomaly Goodput (mbps) Latency (sec) 21

Goodput is not the most important metric for a firewall Added moderate latency Added latency and loss Added latency, loss, and bandwidth cap 22

UTM has benefits, and it has costs UTM Benefits Reduces number of boxes you have to buy Reduces amount of uncoordinated management Ideally positioned (bottleneck) for Internet-facing security Allows you to incrementally add security without complexity UTM Costs System performance can be dramatically affected Single Choice may be wrong choice for your network Some UTM features are in for check-list purposes, and not for security purposes Subscription costs need to be budgeted 23

Four Key Tactics for UTMs The Devil Is In The Details Understand exactly what features of perimeter defense you need. If you don t need it, don t ask for it. Do What Makes Sense Natural consolidation is a good thing. Forcing consolidation is a bad strategy. Nothing is Free Adding security services to your network at any point will cost you time, money, and reliability. If you don t budget for it, how are you going to pay for it? A Strong Perimeter is a Good Thing But a deep defense is a better thing. Don t let money spent on the edge deceive you. 24

How do I make a business case for UTM? Will UTM save me money, really? 25

Perimeter Intrusion Defense is something you already have The question is: how do we grow perimeter security? Should we use UTM or not? Do you add additional services to a UTM-ish firewall? Are your perimeter defenses adequate? Do you add standalone devices at the edge? 26

How a Normal Business Decision is Supposed to be Made Business Requirements and Needs IT or MIS Project, Action, or Service Customers need to be able to see the status of orders, including shipping and tracking information. Project: Web-based portal into SAP to show order status; link to UPS via XML for shipping information 27

The problem with security it that it doesn t solve direct requirements Business Requirements and Needs IT or MIS Project, Action, or Service??? Project: Upgrade our existing firewall to UTM version to add Intrusion Prevention System on Internetfacing links 28

Identify assets and define their value So most security people build frameworks Identify threats to assets Calculate SLE = (EF x Value) + Downtime Calculate ALE before = ARO before * SLE before SLE = Single Loss Expectancy EF = Exposure Factor (0-100%) ALE = Annual Loss Expectancy ARO = Annual Rate of Occurrence (0-100%) Figure out a solution that mitigates risk Change EF, ALE, and ARO Compare ALE before with ALE after Calculate ALE after = ARO after * SLE after 29

Even if the numbers are largely bogus, you can ask yourself Compare ALE before with ALE after Is the amount of money I am proposing to spend LESS or MORE than the change in ALE? = ALE before - ALE after 30

But your typical CxO doesn t want to see the framework The CIO wasn't going to look at the twenty seven eight-byten color glossy pictures with the circles and arrows and a paragraph on the back of each one explaining what each one was to be used as evidence against us. (with apologies to Arlo Guthrie) So what do I do? If there s no requirement, Am I wasting time & money? 31

You can fall back to the Security Manager s Best Friend The Fear, Uncertainty, and Doubt Strategy Find out what newspaper the CxO reads Get a Subscription and Read It (Hint: you may have to touch paper to do this) Wait until there is a story about some awful security thing happening to someone, somewhere Run into CxO s office with unsigned purchase requisition for random piece of security SW/HW. Tell him/her this will keep them out of the newspaper. 32

When you add these new technologies, there are OpEx costs UTM technology is moving from a CapEx model to an OpEx model Adding security services adds management costs whether UTM or dedicated It s not a question of one-time expenses. It s a question of continuing costs! 33

For example, let s suppose you like the ZyXel ZyWALL UTM 70 firewall Capital Cost: $1,588.00 Capital: $1,588.00 1 Year: Anti-Virus and Intrusion Prevention: $362 1 Year: Anti-Spam: $202 1 Year: Content Filtering: $299 Security Services: $863.00 34

But wait, there s more Hardware maintenance tasks Firewall configuration management, @ 24 hours/year Periodic Software Updates, @ 12 hours/year Software maintenance tasks Anti-virus management, @ 12 hours/year Intrusion Prevention management, @ 48 hours/year Content Filtering management, @ 24 hours/year Anti-spam management, @ 48 hours/year Capital: $1,588.00 Management Time: 168 hours/year, or about $6,500.00 Security Services: $863.00 35

How about the SonicWALL PRO 2040? Capital Cost: $1,995.00 1 Year: Anti-Virus and Intrusion Prevention: $695 1 Year: Content Filtering: $995 Capital: $1,995.00 3 year Service costs: $4,788.00 (special package deal) 36

How about the Netscreen SSG20? Capital Cost: $1,100.00 1 Year: Anti-Virus, IPS, Content Filtering, and Anti-Spam: $700 Capital: $1,100.00 3 year Service costs: $2,100.00 37

You can always save money using Open Source technologies ZyXel Proposal (1 year costs) Capital: $1,588 Support: $863 Overhead: 168 hours, $6500 Total: $8,951 Open Source Proposal (1 year) Capital: $000 Support: $000 Overhead: 336 hours, $13,000 Total: $13,000 OK, I just put this in here as flame bait. But the point is real: overhead costs for this technology dominate acquisition costs 38

All this tells us some very unpleasant things It s hard to justify spending money on security, because the ROSI (Return on Security Investment) or ROI (Return on Investment) The cost for the hardware is very reasonable, but The cost for the service can add 50% to 100% to the total each year, and Your overhead and management costs are a continuing burden 39

Tips and Hints: The Business Case for UTM Security DO make the calculation of costs and expected benefits for any intrusion defense. Learning IPS might be a lot of fun, but if it doesn t bring enough value, maybe it s not right. DO NOT fail to budget for support and subscriptions. UTM firewalls without updates are doorstops. DO prioritize based on your requirements and risks. DO NOT pick services because they came with the UTM firewall you already bought. DO NOT depend on FUD to sell security. But DO take advantage of it when opportunity presents itself. 40

Thanks! Joel Snyder Senior Partner Opus One jms@opus1.com