INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES



Similar documents
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Stormshield Network Security vs Fortinet

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Multi-layered Security Solutions for VoIP Protection

Security challenges for Voice over IP

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

IBM Security Intrusion Prevention Solutions

Data Center security trends

Inspection of Encrypted HTTPS Traffic

The Cisco ASA 5500 as a Superior Firewall Solution

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Cutting the Cost of Application Security

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Cisco Advanced Services for Network Security

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

How To Protect A Web Application From Attack From A Trusted Environment

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Ingate Firewall/SIParator SIP Security for the Enterprise

COORDINATED THREAT CONTROL

Complete Protection against Evolving DDoS Threats

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Network Instruments white paper

The Hillstone and Trend Micro Joint Solution

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

Security. Security consulting and Integration: Definition and Deliverables. Introduction

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Deploying Firewalls Throughout Your Organization

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Manage the unexpected

Networking for Caribbean Development

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

security changes with Orange focus on your business, we focus on your security

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Readiness Assessments: Vital to Secure Mobility

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Endpoint Based Policy Management: The Road Ahead

Payment Card Industry Data Security Standard

How To Prevent Hacker Attacks With Network Behavior Analysis

Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Chapter 9 Firewalls and Intrusion Prevention Systems

Securing VoIP Networks using graded Protection Levels

FDIC Division of Supervision and Consumer Protection

Managed Security Services for Data

Database Security in Virtualization and Cloud Computing Environments

IBM Protocol Analysis Module

IBM Security QRadar Vulnerability Manager

Streamlining Web and Security

The 2014 Next Generation Firewall Challenge

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Protection profile of an industrial firewall

NSFOCUS Web Application Firewall White Paper

Cisco Security Intelligence Operations

Top five strategies for combating modern threats Is anti-virus dead?

The changing face of global data network traffic

CA Host-Based Intrusion Prevention System r8.1

T6 w a y s t o m a x i m i z e y o u r s u c c e s s

A Model-based Methodology for Developing Secure VoIP Systems

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Solution Brief. Secure and Assured Networking for Financial Services

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Extreme Networks Security Analytics G2 Vulnerability Manager

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Protection profile of an industrial firewall

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

POLIWALL: AHEAD OF THE FIREWALL

10 Things Every Web Application Firewall Should Provide Share this ebook

Advanced Threat Protection with Dell SecureWorks Security Services

The Challenge of a Comprehensive Network Protection. Introduction

A Layperson s Guide To DoS Attacks

Intelligent. Data Sheet

IBM Security Network Intrusion Prevention System

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Securing SIP Trunks APPLICATION NOTE.

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Securing Converged Networks

CGI Cyber Risk Advisory and Management Services for Insurers

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

End-user Security Analytics Strengthens Protection with ArcSight

2012 Bit9 Cyber Security Research Report

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Network Intrusion Prevention Systems Justification and ROI

Application Security Backgrounder

VOICE OVER IP SECURITY

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Norton Personal Firewall for Macintosh

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Transcription:

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

The way the Internet is used evolves rapidly all the time. Where traffic was once limited to the exchange of multimedia, today it consists of large volumes of application-based data and interactive content. Data transactions are increasingly complex and simply using a firewall to block forbidden traffic these days is no longer enough. Modern threats have become much more complicated and are specially crafted to bypass conventional protection mechanisms, with a particular preference for signature-based systems. To detect and block such threats, new-generation security technologies that can identify abnormal behavior are what we need. Intrusion Prevention (IPS) Most network attacks primarily use web pages or authorized services such as email, instant messaging or IP telephony. Each of these applications uses a unique communications protocol. To block such attacks without affecting a company s day-to-day business activity, protocol analysis is imperative. In evaluating intrusion prevention technologies, inspection performance and detection quality are key considerations. Optimal efficiency is achieved by the IPS sharing synergies with other technologies. Integrating an IPS with an application firewall, user recognition or vulnerability audit enhances its relevance. An IPS system can lie at the heart of a multifunction firewall deployed at segmentation points. It can also operate in transparent mode without the need to modify an existing network infrastructure. Stormshield s IPS is the result of 10 years of research. It combines several protocol and behavioral analysis technologies to offer zero-day protection, detecting and blocking most threats even before they are published. Stormshield s IPS signature lists are updated automatically and the Stormshield security team adds large numbers of signatures to their lists every day. Stormshield develops the most effective protection technology to address each new security loophole. Because the IPS function provides uniquely high levels of efficiency, it is reflected in performance measurements for all Stormshield Network Security products. Stormshield Network Security s combination of technologies allows you to choose the most appropriate protection for each threat, rather than depending solely on signatures. The result is optimum security levels which meet all your needs. Every Stormshield Network Security appliance comes with IPS by default. Different configuration profiles are automatically selected, depending on which applies most to the nature of the traffic flow. The result is higher security levels for all.

Developed within Stormshield Network Security s operating system, the IPS engine offers real-time analysis of different traffic flows. It does not cut or copy either the data or the exchanges between the operating system and the detection software. The architecture is tailored to optimize performance and is particularly effective at high throughput levels or where absence of latency is a critical factor, such as in VoIP applications. Zero-Day Protection Zero-day protection eliminates the period of vulnerability for your enterprise. Protection is available, even when vulnerabilities are exploited before public notification. Every zero-day protection signature targets an abnormal behavior. The database is updated frequently to enable immediate detection of new threats. Network security is a race against time in which attacks are often one step ahead of defenses. Some attacks, known as zero-day exploits, spread before any official communication can be issued. Hackers take advantage of them before software companies or the world at large can be notified. Once a threat is identified, protection signatures are created and deployed as rapidly as possible. This is far more effective than waiting for days or even weeks for corrective action to be taken. But however short the period, the vulnerability is real. Anyone who is responsible for network security has to be constantly on the lookout for effective zero-day protection to counter zero-day exploits. Stormshield Network Security s intrusion prevention engine has been designed to maximize its zero-day protection capabilities. A number of complementary technologies are deployed: Protocol inspection Abnormal behavior detection Hidden interactive connection detection (e.g. C&C, Botnet) And proactive creation of contextual protection signatures These 4 forms of analysis are effective because they don t have to wait for a vulnerability to appear. The linchpin of Stormshield Network Security s zero-day protection is protocol inspection. Stormshield s security watch teams anticipate future attacks by continuously adding new inspections for each protocol. Thus, the SIP voice protocol already incorporates various levels of protection against identity theft and denial of service. These effective analyses are activated on all appliances.

VoIP & CoIP The implementation of IP telephony has seen enormous growth in recent years. Maturing technology and falling costs have coincided with the convergence of voice and data. The ability of the phone system to now carry network data enables resource optimization The network can also manage the telephony system and carry voice data However, these developments have been accompanied by a rise in malicious attacks exposing vulnerabilities associated with both technologies. IP networks and voice protocol weaknesses can be exploited by denial of service attacks at both the application and protocol levels. Identity theft and unauthorized recording of telephone conversations can pave the way to malicious data access. SQL injection attacks result in the theft of confidential information. An effective security system is now a prerequisite for any organization wishing to protect its telephony and network assets. Stormshield s network protection solutions allow customers to secure all of their network assets. They guarantee the security of IP telephony systems, while their advanced functionality enables them to deal with the special requirements of real-time data and all aspects of converged voice and data networks. REAL-TIME IP TELEPHONY SYSTEM PERFORMANCE To ensure that security concerns do not prejudice performance levels, all standard Stormshield Network Security appliances are supplied with the Intrusion Prevention Engine preactivated. In addition, quality of service parameters are configured and managed to address problems such as latency and jitter. IP TELEPHONY The vulnerabilities inherent in any IP telephony system represent a risk to security. Attacks can lead to denials of service, remote code vulnerabilities and the hijacking of sensitive data. Stormshield Network Security solutions contain the Stormshield Network Vulnerability Manager. The service delivers specific reports, seeks vulnerable devices and suggests appropriate corrective measures. Effective procedures can then be implemented to manage the vulnerability risks within an IP telephony system. Adapted filtering and security policies can be applied to vulnerable hosts in just one click.

ABOUT Arkoon and Netasq, fully owned subsidiaries of Airbus Defence and Space CyberSecurity, run the Stormshield brand and offer innovative end-to-end security solutions both in France and worldwide to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security). All trademarks are the property of their respective companies. Phone +33 9 69 32 96 29 The cost of a call may vary according to the country you are calling from and your telecoms operator. WWW.STORMSHIELD.EU Netasq Parc Scientifique Haute Borne - Parc Horizon, Bat 6, Avenue de l Horizon 59650 Villeneuve d Ascq - FRANCE Arkoon & Netasq Copyright 2014