White paper. Cyberoam - Securing You. Next Generation UTMs. for SOHO-SMB Wire-Speed Security. www.cyberoam.com. sales@cyberoam.com



Similar documents
Prioritize Access to Business Applications With Cyberoam s Application Visibility & Control

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Achieving PCI-Compliance through Cyberoam

Next-Generation Firewalls: Critical to SMB Network Security

Firewalls Aren t Just About Security

Cyberoam s Future-ready Extensible Security Architecture (ESA) Cyberoam. White paper

Intro to Firewalls. Summary

Network Security Solution. Arktos Lam

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Achieve Deeper Network Security

Executive Brief on Enterprise Next-Generation Firewalls

Total Business Continuity with Cyberoam High Availability

Achieve Deeper Network Security and Application Control

Secure your Virtual World with Cyberoam

White paper BYOD. - A blessing or curse in disguise?

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

WHITE PAPER. Understanding How File Size Affects Malware Detection

Moving Beyond Proxies

10 easy steps to secure your retail network

Cyberoam Perspective BFSI Security Guidelines. Overview

Content-ID. Content-ID URLS THREATS DATA

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

SA Series SSL VPN Virtual Appliances

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

Protecting Your Organisation from Targeted Cyber Intrusion

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

Freedom for Servers, Drives & Desktops

SIZE DOESN T MATTER IN CYBERSECURITY

Cyberoam Next-Generation Security for Enterprises

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Nominee: Barracuda Networks

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

What Do You Mean My Cloud Data Isn t Secure?

The Next Generation Network:

Intelligent Threat Management TM Coupled with Automated Threat Management

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Dell SonicWALL Portfolio

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM BUSINESSES

How Attackers are Targeting Your Mobile Devices. Wade Williamson

How To Secure A Remote Worker Network

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Balancing Security and Speed: Developing Mobile Apps for Enterprise

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

A Guide to MAM and Planning for BYOD Security in the Enterprise

Emerging Technologies for SMBs

"Secure insight, anytime, anywhere."

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

How To Protect A Web Application From Attack From A Trusted Environment

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Firewall and UTM Solutions Guide

SSL Performance Problems

Data Center Network Evolution: Increase the Value of IT in Your Organization

Application Security Backgrounder

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Addressing Security for Hybrid Cloud

Endpoint protection for physical and virtual desktops

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Unified Threat Management Throughput Performance

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Fighting Advanced Threats

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

AccessEnforcer. HTTPS web filter overview

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Analyzing Full-Duplex Networks

Compliance Ready Mobile Device Management (MDM)

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Automate your IT Security Services

Zscaler Internet Security Frequently Asked Questions

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Types of cyber-attacks. And how to prevent them

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Risk Free Instant Messaging

SecureAge SecureDs Data Breach Prevention Solution

NetDefend Firewall UTM Services

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

NEW! CLOUD APPS ReadyCLOUD & genie remote access

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Content Security: Protect Your Network with Five Must-Haves

Network Security, Guidelines to Build a Security Perimeter for SMEs

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Endpoint protection for physical and virtual desktops

Secure Web Gateways Buyer s Guide >

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

Inspection of Encrypted HTTPS Traffic

Meeting the Challenges of Virtualization Security

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

4 Steps to Effective Mobile Application Security

The Benefits of SSL Content Inspection ABSTRACT

Transcription:

White paper Next Generation UTMs for SOHO-SMB Wire-Speed Security www.cyberoam.com I sales@cyberoam.com

Contents Summary 1 Introduction 2 Gigabit Internet Speeds 3 Generic Threats Fill the Fat Pipe 4 BYOD Device Density 4 - Multiple OS Multiplying Vulnerabilities The Rise of Apps 5 - The Rise of Application Threats Shift in Security Fundamentals 5 - Gigabit Security for Gigabit Networks 6 - Deep Inspection Converging on HTTP/HTTPS 6 - Multiple Intelligence 6 Conclusion Next Generation UTM is the Future 7 Gigabit Security for SOHO-SMBs Cyberoam Next Generation UTM Appliances 7

Summary Affordable gigabit Internet speeds and cloud-based solutions are driving SOHO- SMBs to adopt a wide range of IT solutions for the first time to streamline and enhance their business. Living under a changed life style regime, employees are bringing multiple devices, including laptops, tablets and smart phones to work, expecting anywhere, anytime, any device access for work and personal uses. At the same time, business and personal applications are proliferating, often without security credentials. These factors are contributing to a rise in the volume of threats to SOHO-SMB networks in addition to exposing the latter to fresh vulnerabilities. Security devices must carry next generation gigabit-capability with deep inspection and multiple intelligence, involving application-user-device identity, content and context-aware intelligence to meet the security challenges of SOHO-SMBs.

Introduction A look at the brief but intense history of Internet security reveals the fact that it has been a war of us vs them us being organizations networks and users; them being the threats that target users and networks. As the pattern of network and Internet usage underwent incremental changes, it invariably challenged the network security in organizations, pushing it to shift and adapt to these changes. However, today the pattern is undergoing a tremendous shift that is nothing short of a life style change, demanding a transformation in security capability. At the root of this shift is the gigabit-speed Internet that is reaching users, driving them to change how they access the Internet and what they do with the Internet. Users are bringing multiple devices and a variety of always-on applications into organizations. This shift is taking networks from the equivalent of the early-nineteenth century to the mid-twenty first century. For the first time, gigabit Internet speeds are bringing a wide range of solutions within reach of SOHO-SMB organizations. Simultaneously, they are placing enormous pressure on security devices. The question that arises is, what does it take for security devices to keep pace with the shift?

Gigabit Internet Speeds The gigabit broadband pipe that is acting as a catalyst to the change is the equivalent of massive expressways to the doorstep. Data is set to move at 100 times the current Internet speed. Google Fiber which brings Fiber-to-the-Home (FTTH) is offering 1000 MBPS upload and download speeds at affordable rates. With existing average speeds languishing anywhere between 1 and 6 MBPS, this is a steep jump. The UK Government is mulling a law that guarantees the legal right for all householders to high speed broadband, placing it at par with guaranteed utilities like water and gas. The Government aims to focus on providing speeds of 40 MBPS or more by 2017. In India, Bharat Sanchar Nigam Limited (BSNL), the country s state service provider is to provide FTTH with 100 MBPS speed. With high-speed Internet reaching homes themselves, it no longer remains the privilege of enterprises. The massive speed that these enormous data pipes generate allows SOHO- SMBs to adopt solutions for the first time that had once been the preserve of enterprises, enabling the former to systematize business processes, expand opportunities and help them meet the requirements of large buyers. Personal Use: Employees personal use of high speed Internet is a matter of concern for organizations since users have begun to perform business and personal work over the same devices, placing corporate data and networks at risk. From entertainment to news updates to presence on social media platforms like Facebook and Twitter, users personal activity in the virtual world is meshing with their business activity. Business Use: The fact that high-speed Internet has transformed yesterday s SMBs into today s enterprises and yesterday s SOHOs into today s SMBs has driven solution providers to provide SOHO-SMB solutions that are geared to meet the specific needs of individual industries. These range from healthcare, oil and gas, to sub-segments of industries such as chemicals, electronics, logistics and more. From solutions that systematize business processes like BPM, ERP, CRM, SCM and monitoring solutions like dashboards, reporting and analytics to productivity solutions like Adobe Acrobat and Google Drive, many are finding place in SOHO- SMB organizations. A wide range of SOHO-SMBs, from catering companies to children s charities, Internet marketing technology firms and school districts to manufacturing firms are turning to these solutions and applications extensively.

Generic Threats Fill the Fat Pipe At the most basic level, there exists a direct equation between high-speed broadband which leads to growth in Internet and the rise in security incidents. The higher the traffic, the higher the volume of threats. Generic threats in the form of probes, scans, account and root compromise, packet sniffers, exploitation of trust, malicious code, phishing, viruses, worms, Trojans and a host of other attacks are growing rapidly with the growth in traffic volume. They are entering the network through susceptible applications and devices, compromising data and resources. But there is more to it than just a straightforward rise in threats. It becomes necessary to take a look at what organizations and employees do with the gigabit speeds at their disposal. Whereas earlier, business solutions were available as server and client installations within the network or were being accessed over the browser as Salesforce was, today, many are available as cloud services accessed through applications over mobile devices. These cloud-based solutions along with the organization's data backup in the cloud are facilitating anywhere access to organizational data and systems which users are accessing through multiple devices which have emerged as an employee expectation. BYOD Device Density Organizations are adopting a BYOD (Bring Your Own Device) policy or in technical parlance, the Consumerization of IT has come to stay. The aim is to offer employees the flexibility to access their work anytime, anywhere, from any device, enhancing productivity and responsiveness. Employees are bringing in devices, otherwise used to access personal data laptops, tablets and smart phones, to the work place, accessing the Internet, systems and data through each of these devices. Using these mobile devices which are fraught with risks in the absence of adequate security mechanisms, employees are accessing a range of the organization s systems and resources in the course of their work, leaving corporate networks highly vulnerable. Multiple OS Multiplying Vulnerabilities While organizations implement a BYOD policy for safe device usage, the devices themselves are based on the individual s choice leading to different laptops, tablets and smart phones introducing multiple operating systems into organizational networks. From a scenario of a single operating system, today, security solutions face the complex scenario where they oversee between 2-5 operating systems across multiple devices. And the vulnerabilities of each operating system cumulate on the network as threats. The attack surface is expanded considerably with attacks looking at exploiting any vulnerability present within the OS, applications, and even the people using these devices. However, contradictory to the earlier network dynamics where a single user brought in one device to the network, today, on an average, an employee brings in anywhere from 2-5 devices to the organization, leading to higher device density and too much load on the network. The network traffic now encompasses traffic from multiple devices of a single user from within the network perimeter or outside, accessing data stored within the network or in the cloud, multiplying network security complexities by many times.

The Rise of Apps The many business solutions being adopted by SOHO-SMBs are today accessible through apps on their mobile devices. With cloud-based apps, the office is wherever the employee is, facilitating telecommuters and road warriors and increasing employee productivity. Executives can monitor functions within the organization and the network, helping them stay organized and efficient, enabling quick inspection and customer response. The presence of the same app on different devices which executives use interchangeably, depending on whether they are in the office, on the road, or with client raises the need to keep the session alive and to synchronize the status with the cloud and the other devices. All this traffic is taking its toll on the network and security. Further, these apps work on the web protocols, HTTP, HTTPs and are always on, keeping executives updated on a continuous basis. So the port-protocol thumb rules of olden times become irrelevant in meeting current security needs. The Rise of Application Threats Whereas earlier, the vectors of attack were floppies, pen drive or emails, today, applications have become an important vector. The rise in personal and business applications on devices has led to a rise in application threats. About 80-96% of web applications contain high risk vulnerabilities detected during detailed manual and automated assessment by white box method, according to the Web Application Security Consortium. While malicious applications whose sole objective is to gain access to data or to perpetrate other threats gain attention, genuine business and personal applications are of critical security concern too. Many of them carry security lacunae, leaving devices vulnerable to new forms of application threats. Business and personal applications co-exist on the same devices, exposing organizations to higher levels of risk. Threats can easily trick an application into doing what they are not supposed to do, gaining access to devices and data stored on the device, including user credentials to a range of personal and business applications. Further, given the always-on nature of devices and constant access to the network, it is with little delay that attackers gain access to the network and the cloud through compromised data. Shift in Security Fundamentals The fact that these apps travel through the HTTP, HTTPS protocols makes it practically impossible to detect them without deep packet inspection. The basic security need of the organization today is to prevent the gigabit network and cloud traffic generated by multiple devices and multiple applications from compromising network security. Cloud security might well offer multi-layered security, but the network and mobile devices themselves can become the weak link if network security devices are not geared to handle the high-volume, complex traffic. Security devices geared towards generic traffic assessment and monitoring fail to understand, assess or meet the traffic and filtering requirements of this single-user, multiple-device, multiple-application traffic scenario. It is as if a single user with a lone car on the expressway has metamorphosed into a range of vehicles, some of them gigantic trucks rumbling at blazing fast speeds on the expressway. www.cyberoam.com I sales@cyberoam.com

Shift in Security Fundamentals The ability to meet these challenging security requirements requires an urgent shift in security fundamentals. Three factors represent the shift and hold the key to effective SOHO-SMB security gigabit speeds, deep inspection and multiple intelligence. Gigabit Security for Gigabit Networks Although the Internet traffic they are meant to filter travels at blazing fast speeds and the infrastructure itself, including switches and laptops carry gigabit ports, current security devices and next-generation firewalls meant for SOHO-SMBs still function with 10/100 ports. When such security devices capable of filtering traffic along single digit broadband pipes attempt to filter traffic that runs at five to a hundred times the current MBPS, the effect is evident. It is the equivalent of trying to drive 12-lane traffic through a 2-lane check point along the expressway. These inline security devices then become the bottleneck, queues form, packets begin to drop and productivity suffers. Given the choice of productivity vs security, it is productivity that gains the upper hand, security rules are bypassed or completely discarded and the organization is open to threats from the unfiltered traffic that begins to move through the network. It becomes critical for the security device to carry gigabit capability to match the volume of traffic generated by multiple devices with no traffic slow down. Deep Inspection Converging on HTTP/HTTPS Traditionally, port-based scanning and filtering simplified the task of security devices wherein they had to identify the application based on the port-protocol. In contrast, today, with all applications tunneling through port 80 and port 443, the ubiquitous HTTP and HTTPS ports, or by port-hopping, the application architecture itself has undergone a sea change. The task of security devices has just become more complicated. Firstly, in addition to the surge in traffic volume, they need to perform deep inspection of traffic without the simplicity afforded by port identification. The second level of complexity is that HTTPS protocol being an encrypted port designed for data security in transmission, it is also actively used to hide threats. Decryption to identify this traffic places a higher burden on the security device. Performing deep packet inspection in case of SSLencrypted traffic is unavoidable in the interests of identifying and filtering malicious traffic arriving through compromised devices with malicious or compromised applications. The third level of complexity is the fact that each app, for example, Facebook can potentially carry hundreds of apps related to photos, messenger, games, surveys and many more, requiring identification. Considering that organizations want selective access to these applications, the demand is for granular policy enforcement. This takes the number of applications to be scanned, identified and filtered into the thousands a task that requires application-awareness with context and content intelligence in addition to identity and device intelligence and can only be performed by a gigabit-port, next-generation unified threat management (UTM) device. Multiple Intelligence There is no question any longer that identity forms the foundation of intelligent security. Generic security no longer holds good. With multiple devices accessing the network, the question of identity becomes one of multiple intelligence. Security performance was traditionally assessed and predicted based on the number of users within the network since a user equaled a device. Today, the user is no longer synonymous with the device. With the same user handling multiple devices with applications that are always on, multiple simultaneous streams of traffic are created. Security devices that are capable of identifying the user and the device become necessary to secure the organization, its data and network. In addition to Layer 7 application security, Layer 8 human security becomes critical. This scenario demands multiple intelligence comprising user, device and application identity in addition to context and content intelligence. Such intelligence holds the key to next generation security.

Conclusion Next Generation UTM is the Future With gigabit Internet speeds, multiple devices and multiplying applications expanding the current volume of threats and introducing a whole new range of threats to SOHO-SMBs, a quantum shift in security fundamentals has become critical. The high speed networks of SOHO-SMBs require network security devices that function at gigabit speeds with deep packet inspection. These capabilities are necessary to prevent these inline security appliances from becoming choke points rather than high-speed check points. The critical fact is that generic security or single intelligence based on application or user is no longer enough to retain security as well as work flexibility. Only security devices with multiple intelligence can ensure high levels of secure flexibility at work. Failure to incorporate these security fundamentals can lead to compromised data and networks, loss of trust and credibility in the industry, slowing down organizational growth. Gigabit Security for SOHO-SMBs Cyberoam Next Generation UTM Appliances Cyberoam Next Generation UTM appliances bring enterprise-grade gigabit security to SOHO-SMB organizations for the first time, offering network and crypto acceleration through radical software enhancements that help these appliances get the best out of their state-of-the-art hardware. The hardware comes with gigabit ports, gigahertz processor and high-memory gigabyte RAM along with gigabyte compact flash and hard disk drive which help the appliances deliver nano-second security processing for high speed networks. Cyberoam next-generation UTM appliances provide wirespeed, intelligent security geared to meet the requirements of high-speed complex networks where the user-device-application ratio is expanding beyond measure. These appliances carry multiple intelligence with the capability of user and device identification, granular application identification, content and context-aware intelligence to perform the high-rigor security with deep inspection required in today s flexible and highly complex work environments. By providing such critical security, they enable SOHO-SMBs to leverage high-speed Internet and the numerous business applications to enhance productivity, gain customer trust and build expanding businesses. Cyberoam Awards & Certifications:- VPNC CERTIFIED www.check-mark.com VPNC CERTIFIED Basic Interop AES Interop SSL Portal SSL Exchange SSL Firefox SSL JavaScript SSL Basic Network Extension SSL Advanced Network Extension BEST BUY PC PRO RECOMMENDED EDITOR S C H O I C E www.itpro.co.uk RECOMMENDS Toll Free Numbers USA : +1-877-777-0368 India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 Europe : +44-808-120-3958 C o p y r i g h t 1999-2014 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d. Cyberoam & Cyberoam logo are registered trademarks of Cyberoam Technologies Pvt. Ltd. Ltd. /TM: Registered trade marks of Cyberoam Technologies Pvt. Ltd. Technologies or of the owners of the Respective Products/Technologies. Although Cyberoam attempted to provide accurate information, Cyberoam assumes no responsibility for accuracy or completeness of information neither is this a legally binding representation. Cyberoam has the right to change, modify, transfer or otherwise revise the publication without notice. www.cyberoam.com I sales@cyberoam.com