Presentation is loading. Please wait.

Presentation is loading. Please wait.

Why It’s Time to Upgrade to a Next-Generation Firewall

Similar presentations


Presentation on theme: "Why It’s Time to Upgrade to a Next-Generation Firewall"— Presentation transcript:

1 Why It’s Time to Upgrade to a Next-Generation Firewall Eric Crutchlow Senior Product Manager

2 Why It’s Time to Upgrade to a Next-Generation Firewall
Eric Crutchlow Senior Product Manager, Network Security

3 Can your firewall tell you …
Other speakers on data – consistency with other speakers (Mike Mac/Yanchenson) -

4 Can your firewall tell you …
“Something came in over port 80. Do you know what it is?” “What is your social media presence/exposure?” Other speakers on data – consistency with other speakers (Mike Mac/Yanchenson) -

5 Can your firewall tell you …
“Something came in over port 80. Do you know what it is?” “What is your social media presence/exposure?” “What are you allowing outbound from your network? Other speakers on data – consistency with other speakers (Mike Mac/Yanchenson) -

6 Can your firewall tell you …
“Something came in over port 80. Do you know what it is?” “What is your social media presence/exposure?” “What are you allowing outbound from your network? … over SSL? Other speakers on data – consistency with other speakers (Mike Mac/Yanchenson) -

7 Can your firewall tell you …
“Something came in over port 80. Do you know what it is?” “What is your social media presence/exposure?” “What are you allowing outbound from your network? … over SSL? “What portion of your bandwidth is consumed by video?” Other speakers on data – consistency with other speakers (Mike Mac/Yanchenson) - “Is anyone playing social or other browser games?

8 Can your firewall tell you …
“Something came in over port 80. Do you know what it is?” “What is your social media presence/exposure?” “What are you allowing outbound from your network? … over SSL? “What portion of your bandwidth is consumed by video?” Other speakers on data – consistency with other speakers (Mike Mac/Yanchenson) - “Is anyone playing social or other browser games? “Is there P2P traffic on your network?”

9 What Are Your Employees Doing?
25% of office Internet traffic is non-business related 50% of surveyed companies said at least 30% of their bandwidth is being consumed by social networking traffic Blogging Facebook Twitter IM Streaming Video Streaming Music Browser Games During the day – employees are “just” downloading files… or surfing … or IM’ing Bandwidth Cost PRODUCTIVITY 9

10 What’s On Your Network? Application Chaos SSL Traffic Port 80/443
So many on Port 80 Application Chaos SSL Traffic Port 80/443 Of course the problem is that almost all of these applications look to the network like legitimate web applications, and what’s an important productivity tool to one user, may be a threat-laden time-sink for another. Traditional networking approaches haven’t really had the sophistication to sort this out, which has lead to all sorts of trouble when it comes to protecting your network. “Bad?” “Good?” 10

11 SECURITY: Malware Continues to Thrive
$$ Financial Gain Zeus Botnet “Beyond financial” Goals Duqu, Aurora, Stuxnet 49% of breaches incorporated malware 83% of victims were targets of opportunity Verizon Business RISK report 2011

12 Small Networks, Large Targets

13 Small Malware, Large Networks
Lockheed Martin/RSA Breach 2011 Recruitment Plan 2011.xls “Lockheed Martin said on May 27 that it detected a ‘significant and tenacious attack on its information systems network.’” – Info Security Magazine “In March RSA admitted that an “advanced persistent threat” attack had extracted information related to its Secure ID two-factor authentication products.” APT = Advanced Persistent Threat

14 Small Malware, Large Networks
Lockheed Martin/RSA Breach 2011 Recruitment Plan 2011.xls Spear Phishing Exploits Flash Drops in an APT “Lockheed Martin said on May 27 that it detected a ‘significant and tenacious attack on its information systems network.’” – Info Security Magazine “In March RSA admitted that an “advanced persistent threat” attack had extracted information related to its Secure ID two-factor authentication products.” Lockheed Martin Breach Exfiltrates RSA Token data APT = Advanced Persistent Threat

15 Can Your Firewall See the Threats?
Attack Vectors Through Seemingly Safe Applications

16 Can Your Firewall See the Threats?
Attack Vectors Through Seemingly Safe Applications

17 Why Do These Problems Persist?
Hidden traffic in SSL Spear-Phishing Browser Vulnerability Flash 0-Day Vulnerability Phishing User Education Excel Exploit PDF Vulnerability Threats over uncommon ports Hijacked Ad Servers

18 Why Do These Problems Persist?
Hidden traffic in SSL Spear-Phishing Browser Vulnerability Flash 0-Day Vulnerability Phishing User Education Excel Exploit PDF Vulnerability Threats over uncommon ports Hijacked Ad Servers

19 INTRUSION PREVENTION SSL DECRYPTION SCAN ALL TRAFFIC SECURITY

20 FINGERPRINT APPLICATIONS IDENTIFY USERS VISUALIZE TRAFFIC
SECURITY FINGERPRINT APPLICATIONS IDENTIFY USERS VISUALIZE TRAFFIC APPLICATION AWARENESS SonicWALL 2011 All Rights Reserved

21 APPLICATION AWARENESS
SECURITY APPLICATION AWARENESS HIGH THROUGHPUT NO LATENCY ANY SIZE NETWORK PERFORMANCE SonicWALL 2011 All Rights Reserved

22 What is a Next-Generation Firewall
NGFW FEATURES Stateful Inspection Intrusion Prevention Application Control SSL Decryption/Inspection By Gartner’s definition, a NGFW must include all of the following: Full Stateful Packet Inspection I.E., must have traditional Firewall capabilities Intrusion Prevention Fast, enterprise quality Deep Packet Inspection and prevention for Intrusions Application Control Ability to block/allow applications by identifying the specific applications, not relying on Port or Protocol SSL Decryption Ability to inspect encrypted traffic (man in the middle) and take policy action Beyond the Strict Definition of NGFW Gartner generally wants to exclude Gateway Anti-Virus from the definition Palo Alto, Fortinet, and SonicWALL accept that in the tight definition, but all three companies offer the ability to have more complete anti-malware scanning if the users desires for greater security Only SonicWALL can do so without dragging performance to unacceptable levels Only SonicWALL can inspect in real time any file size regardless of size of box (enterprise, mid-enterprise, small branch office) SonicWALL also goes beyond just Application Control by offering Application Control, Throttling, Analysis and Visualization

23 What is a Next-Generation Firewall
NGFW FEATURES Stateful Inspection Intrusion Prevention Application Control SSL Decryption/Inspection By Gartner’s definition, a NGFW must include all of the following: Full Stateful Packet Inspection I.E., must have traditional Firewall capabilities Intrusion Prevention Fast, enterprise quality Deep Packet Inspection and prevention for Intrusions Application Control Ability to block/allow applications by identifying the specific applications, not relying on Port or Protocol SSL Decryption Ability to inspect encrypted traffic (man in the middle) and take policy action Beyond the Strict Definition of NGFW Gartner generally wants to exclude Gateway Anti-Virus from the definition Palo Alto, Fortinet, and SonicWALL accept that in the tight definition, but all three companies offer the ability to have more complete anti-malware scanning if the users desires for greater security Only SonicWALL can do so without dragging performance to unacceptable levels Only SonicWALL can inspect in real time any file size regardless of size of box (enterprise, mid-enterprise, small branch office) SonicWALL also goes beyond just Application Control by offering Application Control, Throttling, Analysis and Visualization “By year-end 2014 [Next Generation Firewalls] will rise to 35% of the installed base, with 60% of new purchases being NGFWs.” - Gartner NGFW Research Note

24 Application Traffic Visualization

25 Network Analysis Tools
Do I have P2P on my Network?

26 Network Analysis Tools
Do I have P2P on my Network? YES

27 Immediate Application Control
Do I have P2P on my Network? YES

28 Network Analysis Tools
“Who’s watching YouTube?”

29 Network Analysis Tools
“Who’s watching YouTube?”

30 User Identification Single Sign On (AD/LDAP Integration) Local Login
Identify Top Bandwidth users

31 Identify Top Bandwidth Users

32 Connection Tracking by Country

33 Trace & Identify Network Connections

34 Control Your Network, Users & Traffic

35 Control Your Network, Users & Traffic
Applications Categories

36 Control Your Network, Users & Traffic
Applications User Groups Categories

37 Control Your Network, Users & Traffic
BW Manage Allow/Deny Users Applications User Groups Categories

38 Control Your Network, Users & Traffic
BW Manage Allow/Deny Users Applications User Groups Categories Schedules

39 Off-box application traffic analytics
On-box reporting Quick sample “right now” Application control For a single device Today SonicWALL offers: Reassembly Free Deep Packet Inspection Application Intelligence and Control Onboard Visualization Customers were asking us about integration with third party flow analytics tools such as Solarwinds, What’s Up Gold, Fluke Networks, Network Manage, Vineyard Networks, and also Plixer. We developed an IPFIX exporter for the firewall and started talking to these companies. What we found was that our templates 1) were very rich and 2) not many if any company had done this. If we did this on the firewall, these companies did not need to put an agent or appliance on the network. Onboard visualization is an ideal tool … To take a quick sample to determine what is currently being transmitted across the firewall. To not only analyze the traffic but also take action via the application control features. For customers who are only interested in the traffic through the SonicWALL firewall However, there’s also a need for off-box tool Historical advanced reporting, troubleshooting and forensics On archived data Across multiple devices Off-box reporting Historic advanced reporting Trouble shooting, forensics Schedule customer reports Across multiple devices

40 Architecture Makes a Difference
Traditional Firewalls with Modules NGFW Integrated Engine Stateful Inspection Engine Decompression IPS Module AV Module DPI ENGINE IPS SSL Decryption Threat Prevention URL Filtering App Visualization Application Control buffering buffering buffering

41 Pattern Definition Language Interpreter Deep Packet Inspection Engine
The “RFDPI” Engine Signature Signature Input Packet Output Packet Pattern Definition Language Interpreter TCP Reassembly Postprocessors Preprocessors Deep Packet Inspection Engine Policy Decision API Massively Scalable Multi-Core Architecture

42 Multi-core Branch Office Next Generation Firewall
Branch NGFW: NSA 220 & 250M Multi-core Branch Office Next Generation Firewall NSA 220/W SECURITY & APPLICATION CONTROL NSA 250M/W

43 Branch NGFW: NSA 220 & 250M NSA 220 Series Equipment Consolidation
Hardware Failover ISP Failover Load Balancing Centralized Management Secure Remote Access Clean n Wireless NSA 220 Series NSA 250M Series

44 SuperMassive E10000 Series World’s First 10Gbps Threat Prevention Platform First 30 Gbps Application Intelligence Platform

45 SonicWALL Next-Generation Firewalls
SuperMassive™ E10000 Series E-Class NSA Series NSA Series TZ Series Data centers, ISPs E10100 E10200 E10400 E10800 Medium to large organizations NSA E8510 NSA E8500 NSA E7500 NSA E6500 NSA E5500 Branch offices and medium sized organizations NSA 4500 NSA 3500 NSA 2400MX NSA 2400 NSA 220/250M Small and remote offices TZ 210 Series

46 SonicGRID: Security Protection at Scale
6,000,000+ CloudAV Threat Sgtrs. 25,000 Onboard Threat Family Sgtrs. Application Signatures World Renowned Expertise Active industry research contributor 100% IP ownership of all signatures 46

47 SonicWALL WAN Acceleration
WXA 500 Live CD WXA 2000 WXA 4000 WXA 5000

48 SonicWALL Clean Wireless
SonicPoint-Ni SonicPoint-Ne SonicPoint-N Dual Radio

49 Next Generation Firewall
SECURITY APPLICATION AWARENESS PERFORMANCE

50 Take a Step Towards an NGFW
Secure Upgrade Program Contact nearest Dell SonicWALL Reseller

51 The Net Sec Challenge – Enterprise
The SonicWALL Network Security Challenge works like this… Generally for deployments with more than 100 users… E5500 and above, the SME version will work differently mostly using existing mechanisms but pulled into a single offer, with a name that we promote the hell out of: Drop in an eval unit for 30 days, Generate the Audit report, describing what is getting through the old firewall Convert the prospect to a buyer using the Secure Upgrade Plus offer Consult on or manage their rules/policies conversion… or simply direct customer to the Converter Tool site Offer them Loyalty Bundle preferred pricing as a way of welcoming them to SonicWALL We’re working on vertically-focused versions of the audit report as we take the program forward And of course, we’ll replicate and promote this process against all competitors

52 The Net Sec Challenge – Enterprise
The SonicWALL Network Security Challenge works like this… Generally for deployments with more than 100 users… E5500 and above, the SME version will work differently mostly using existing mechanisms but pulled into a single offer, with a name that we promote the hell out of: Drop in an eval unit for 30 days, Generate the Audit report, describing what is getting through the old firewall Convert the prospect to a buyer using the Secure Upgrade Plus offer Consult on or manage their rules/policies conversion… or simply direct customer to the Converter Tool site Offer them Loyalty Bundle preferred pricing as a way of welcoming them to SonicWALL We’re working on vertically-focused versions of the audit report as we take the program forward And of course, we’ll replicate and promote this process against all competitors

53 The Net Sec Challenge – Enterprise
The SonicWALL Network Security Challenge works like this… Generally for deployments with more than 100 users… E5500 and above, the SME version will work differently mostly using existing mechanisms but pulled into a single offer, with a name that we promote the hell out of: Drop in an eval unit for 30 days, Generate the Audit report, describing what is getting through the old firewall Convert the prospect to a buyer using the Secure Upgrade Plus offer Consult on or manage their rules/policies conversion… or simply direct customer to the Converter Tool site Offer them Loyalty Bundle preferred pricing as a way of welcoming them to SonicWALL We’re working on vertically-focused versions of the audit report as we take the program forward And of course, we’ll replicate and promote this process against all competitors

54 The Net Sec Challenge – Enterprise
The SonicWALL Network Security Challenge works like this… Generally for deployments with more than 100 users… E5500 and above, the SME version will work differently mostly using existing mechanisms but pulled into a single offer, with a name that we promote the hell out of: Drop in an eval unit for 30 days, Generate the Audit report, describing what is getting through the old firewall Convert the prospect to a buyer using the Secure Upgrade Plus offer Consult on or manage their rules/policies conversion… or simply direct customer to the Converter Tool site Offer them Loyalty Bundle preferred pricing as a way of welcoming them to SonicWALL We’re working on vertically-focused versions of the audit report as we take the program forward And of course, we’ll replicate and promote this process against all competitors

55 The Net Sec Challenge – Enterprise
The SonicWALL Network Security Challenge works like this… Generally for deployments with more than 100 users… E5500 and above, the SME version will work differently mostly using existing mechanisms but pulled into a single offer, with a name that we promote the hell out of: Drop in an eval unit for 30 days, Generate the Audit report, describing what is getting through the old firewall Convert the prospect to a buyer using the Secure Upgrade Plus offer Consult on or manage their rules/policies conversion… or simply direct customer to the Converter Tool site Offer them Loyalty Bundle preferred pricing as a way of welcoming them to SonicWALL We’re working on vertically-focused versions of the audit report as we take the program forward And of course, we’ll replicate and promote this process against all competitors

56 The Net Sec Challenge – Enterprise
The SonicWALL Network Security Challenge works like this… Generally for deployments with more than 100 users… E5500 and above, the SME version will work differently mostly using existing mechanisms but pulled into a single offer, with a name that we promote the hell out of: Drop in an eval unit for 30 days, Generate the Audit report, describing what is getting through the old firewall Convert the prospect to a buyer using the Secure Upgrade Plus offer Consult on or manage their rules/policies conversion… or simply direct customer to the Converter Tool site Offer them Loyalty Bundle preferred pricing as a way of welcoming them to SonicWALL We’re working on vertically-focused versions of the audit report as we take the program forward And of course, we’ll replicate and promote this process against all competitors

57 Q&A


Download ppt "Why It’s Time to Upgrade to a Next-Generation Firewall"

Similar presentations


Ads by Google