Next generation firewall (infosecurity 2013)
-
Upload
motiv -
Category
Technology
-
view
262 -
download
3
description
Transcript of Next generation firewall (infosecurity 2013)
MOTIV BIEDT WEERBAARHEID EN MONITORING
VOOR UW GEBRUIKERSNETWERK OF
DATACENTER
NEXT GENERATION SECURITY
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES MALWARE FOUND
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES BOTNETS ATTACK
SECURITY CHALLENGES GEBRUIK VAN DIVERSE
APPLICATIES
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES TRADITIONELE FIREWALL
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES IPSEC VPN & IDENTITY
AWARENESS
Identity Awareness
NEXT GENERATION FIREWALL MUST HAVE . . .
15 JAAR VOOROP IN ICT
SECURITY
[Confidential] For designated groups and individuals
Enforcement
Multi-layer controls for strong security
Different People – Different needs
Involve & Engage users in the security
process
People
Practical and relevant to daily operations
Policies
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES NEXT GENERATION FIREWALL
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES IPSEC VPN & IDENTITY
AWARENESS
Identity Awarenes
s
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES IPS & APPLICATION CONTROL
User Access
Internet Applications Usage
Sensitive Data
Mobile Access
Network Threat Prevention
Gran
ular V
isibility
Identity Awareness
DLP
Mobile Access
SmartEvent
IPS
Anti-Bot
Antivirus
Application Control
URLF
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES MULTI LAYERED THREAT
PREVENTION
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES THREAT MANAGEMENT
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES IPSEC VPN & IDENTITY
AWARENESS
Identity Awareness
SECURITY CHALLENGES PROTECT AGAINST EXPLOIT OF
VULNERABILITIES IN: WORD, EXCEL, PDF,
BROWSERS, OPERATING SYSTEMS...
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES BLOCK MALWARE FILE DOWNLOAD AND
ACCESS TO MALWARE CONTAINING SITES
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES DISCOVER AND STOP BOT ATTACKS
SECURITY CHALLENGES FIGHT AGAINST UNKNOWN THREATS !
15 JAAR VOOROP IN ICT
SECURITY
Security Gateway
Internet
Download file sent to Threat Emulation
File Inspected in virtual sandbox
New malware signature sent to ThreatCloud
New attack discovered
Malware is blocked on
the gateway
Monitor unexpected behavior:
Network activity
File system & registry
changes
Process activity
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES POWERING THREAT PREVENTION SOFTWARE
BLADES WITH REAL-TIME SECURITY
INTELLIGENCE
SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION
15 JAAR VOOROP IN ICT
SECURITY
Sec.Aas platform – Security Gateways
Weerbaarheid
& Monitoring
Security Gateway
STANDAARD
Preventie
Security Gateway
NEXT GEN
Preventie
Security Gateway
THREAT
Preventie
Firewall
VPN
Identity Aware
Firewall
VPN
Identity Aware
Firewall
VPN
Identity Aware
IPS
App Control
IPS
App Control
Malware Filters
URL Filters
Spam Filters
Botnet Filters
Optioneel (maatwerk): Data Leakage Protection Endpoint Protection Mobile Access Threat Emulation
15 JAAR VOOROP IN ICT
SECURITY
15 JAAR VOOROP IN ICT
SECURITY
SECURITY MANAGEMENT PLATFORM
BRONNEN: THREAT CLOUD & NCSC
INCIDENT / RESPONSE
WEERBAARHEID & MONITORING
Sec. Aas Platform - samenvatting
Wrap-up • Geavanceerde cyberaanvallen zijn steeds lastiger te
signaleren en blokkeren;
• Motiv Next Generation platform blokkeert aanvallen met de beste Next Generation Technologie en security experts van Motiv;
• Dreigingen worden direct gemitigeerd dankzij security intelligence van ThreatCloud en opvolging van beveiligingsadviezen van NCSC;
• 24X7 monitoring met incident/response;
• Overzichtelijke compliancy rapportages.
15 JAAR VOOROP IN ICT
SECURITY