Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTRODUCING F-SECURE POLICY MANAGER

Similar presentations


Presentation on theme: "INTRODUCING F-SECURE POLICY MANAGER"— Presentation transcript:

1 INTRODUCING F-SECURE POLICY MANAGER
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 1 INTRODUCING F-SECURE POLICY MANAGER Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

2 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 2 Agenda Corporate Security Information Security Threats What is cybercrime? A typical day at the office What is F-Secure Policy Manager? Policy Manager terminology Components Features What is new in Policy Manager 6? Another typical day at the office Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

3 CORPORATE INFORMATION SECURITY
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 3 CORPORATE INFORMATION SECURITY Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

4 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 4 Security Aspects Corporate security is divided into two groups Physical security (e.g. Security guards) Information security (e.g. IT systems) Bringing those two groups under one roof is essential to guarantee a secure company environment F-Secure focuses on corporate information security Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

5 Information Security Threats
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 5 Information Security Threats Viruses and worms still the largest threat Network and worms File and macro viruses Mobile phone & handheld viruses Spyware and spam emerging as real threats Various tools that enable hacking, spying and eavesdropping Back-door trojans Password breaking software Network scanners Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

6 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 6 Corporate Risks Information sharing Viruses are spreading very fast Unauthorized access to confidential information Internet access Eavesdropping on data in transit Network worms Hacking tools for dummies Mobility Intrusions to data devices outside corporate premises Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

7 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 7 Cybercrime on the Rise More and more businesses and private persons become victims of computer criminals Defacements Credit card frauds Stolen identities Access to confidential information Taking over somebody’s computer/network Using somebody’s computer to launch attacks Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

8 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 8 Computer Crime Case Queensland A computerised waste management system in Australia was hacked in October 1999 Hacker remotely opened floodgates, flooding raw sewage waste to a golf course and to the lawn of a local hotel Case Fermi National Accelerator Lab, Illinois A computer intrusion was done to a nuclear research facility in USA The computers of the weapons test lab was used to store MP3 music files and porn movies A British teenager was convicted for this in 2004 Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

9 A Normal Day at the Office
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 9 A Normal Day at the Office Unprotected Mobile Host Worm traffic Normal traffic Web Server x Unprotected File Server Unprotected Hosts The above infection scenario shows a corporation with no information security management Outdated virus definitions (both on hosts and servers) Unpatched systems (vulnerable to worm attacks No personal firewalls installed on hosts Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

10 INTRODUCING POLICY MANAGER
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 10 INTRODUCING POLICY MANAGER Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

11 What is F-Secure Policy Manager?
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 11 What is F-Secure Policy Manager? F-Secure Policy Manager is a scalable system to manage corporate information security from a central point It can be used to keep security software on hosts up-to-date, manage configurations and monitor corporate domains Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

12 F-Secure Policy Manager 6.x
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 12 F-Secure Policy Manager 6.x Policy Manager Server Automatic Update System Automatic Update Agent Automatic Update Server Automatic Update Proxy Policy Manager Proxy Policy Manager Web Reporting Policy Manager Console Certificate Wizard F-Secure Workstation Security Applications Management Agent Anti-Virus Client Security VPN+ Automatic Update Agent Anti-Virus for Mimesweeper uses F-Secure Anti-Virus for Servers installed on the same computer to scan network traffic (the product itself is not centrally manageable!) VPN: Virtual Private Network F-Secure Gateway Security Applications Management Agent Internet Gatekeeper Anti-Virus for MS Exchange Anti-Virus for Mimesweeper Automatic Update Agent Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

13 Policy Manager Terminology
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 13 Policy Manager Terminology System components F-Secure Policy Manager Server (PMS) F-Secure Policy Manager Web Reporting (PMWR) F-Secure Policy Manager Console (PMC) F-Secure Management Agent (FSMA) F-Secure Automatic Update System (AUSYS) F-Secure Automatic Update Agent (AUA) F-Secure Automatic Update Server (AUS) F-Secure Automatic Update Proxy (AUP) Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

14 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 14 Core Components Policy Manager Server (PMS) Management Agent (FSMA) Policy Manager Console (PMC) Web Reporting (PMWR) Central data repository Acts as link between PMC and FSMA hosts Creates wide range of graphical reports Installed with PMS during installation Used to administer the policy domain Java-based graphical user interface Enforces the security policies on the host Provides the end user interface Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

15 F-Secure Automatic Update System
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 15 F-Secure Automatic Update System Installed on PMS and managed hosts Automatically installed (always required) Periodically checks for database updates Automatic Update Agent (AUA) Automatic Update Server (AUS) Automatic Update Proxy (AUP) Installed on PMS (automatically) Receives updates from AUA Provides database updates for AVCS 6 only AVCS: Anti-Virus Client Security Installed on dedicated PM Proxy Receives updates from AUS Provides database updates for AVCS 6 only Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

16 Policy Manager 6 Core Features
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 16 Policy Manager 6 Core Features Centralized Security Management Centralized software distribution First time installations with F-Secure Push Installation Policy based installations and updates Hotfix distributions Centralized policy configuration and distribution Managing all point applications settings and restrictions from a single graphical interface Policy domain monitoring Policy Manager status information, alerts and host properties Creating textual and graphical reports on host events Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

17 Policy Manager 6 Core Features
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 17 Policy Manager 6 Core Features Automatic Update Mechanism Fully automated and distributed updates Virus definition updates Spyware definitions updates Virus news Automatic update failover mechanism for managed hosts Data integrity All software packages, updates and policies are digitally signed Policy data signed with wrong keys is rejected and alerted Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

18 Anti-Virus Client Security 6 Core Features
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 18 Anti-Virus Client Security 6 Core Features Virus and Spyware Protection Real-time scanning Virus and Spyware HTTP traffic (no HTTPs) Registry monitoring Internet Shield Intrusion Prevention (IDS/IPS) Personal Firewall Application Control (Trojan defence) Automatic Update Mechanism Virus and Spyware updates Virus news Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

19 What is new in Policy Manager 6?
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 19 What is new in Policy Manager 6? Centrally managed Anti-Spyware Spyware Quarantine Centrally managed web traffic scanning Host based HTTP scanning Enhanced network security Network Quarantine for INA Cisco Network Admission Control (NAC) support INA: Intelligent Network Access Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

20 What is new in Policy Manager 6?
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 20 What is new in Policy Manager 6? Virus Outbreak Management Virus news on PMC Automatic detection of vulnerable hosts Improved database update mechanism F-Secure Automatic Update Server F-Secure Policy Manager Proxy (centrally manageable) MSI package export from PMC Allows software distribution with AD Note: F-Secure Anti-Virus Proxy form used in previous Policy Manager versions is still supported and needed, if you want to use a proxy server for AVCS 5.x. Policy Manager Proxy and Anti-Virus Proxy can be installed on the same machine (needs to be a server operating system) Discontinued features Commdir installation (aka. shared directory mode) support dropped (Commdir migration process will be discussed during this course) Windows NT4 support dropped (Both PMS and PMC installations) Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

21 Another Day at the Office
F-Secure Policy Manager Course v.3.00 Introducing Policy Manager Page 21 Another Day at the Office Managed Mobile Host Worm traffic Policy traffic Web Server x x F-Secure Policy Manager Managed Hosts The above infection scenario, all corporate hardware is secured with central management All hosts are running distributed firewall Virus definitions updates are automated Note: Even if a worm would sneak itself behind the corporate firewall, it would not be able to spread in the internal network => personal firewalls and virus real-time protection prevents the spreading Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |

22 F-Secure Policy Manager Course v.3.00
Introducing Policy Manager Page 22 Summary Corporate Security Information Security Threats What is cybercrime? A typical day at the office What is F-Secure Policy Manager? Policy Manager terminology Components Features What is new in Policy Manager 6? Another day at the office Copyright © 2005 F-Secure Corporation. All rights reserved. F-Secure Corporation | Tammasaarenkatu 7 | PL 24 | FIN Helsinki | Finland Tel | Fax | |


Download ppt "INTRODUCING F-SECURE POLICY MANAGER"

Similar presentations


Ads by Google