Complete Network Security for Banks

Slides:



Advertisements
Similar presentations
Introducing Quick Heal Terminator.
Advertisements

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Cyberoam Complete Network Security for Banks. Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Chapter 7: Using Windows Servers to Share Information.
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Web Content Security Unlock the Power of the Web
Securing Information Systems
Barracuda NG Firewall ™
Chapter 40 Internet Security.
Securing Information Systems
Chapter 7: Using Windows Servers
BUILD SECURE PRODUCTS AND SERVICES
CompTIA Security+ Study Guide (SY0-401)
Trend Micro Consumer 2010 Easy. Fast. Smart.
Barracuda Firewall The Next-Generation Firewall for Everyone
Web Content Security Unlock the Power of the Web
UTM Content Security Gateway
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Critical Security Controls
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
CONNECTING TO THE INTERNET
Instructor Materials Chapter 7 Network Security
Threat Management Gateway
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Information Security 101 Richard Davis, Rob Laltrello.
Firewalls.
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
Redefining NGFW/UTM Security
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Introducing ProxyClient
Check Point Connectra NGX R60
Complete Network Security for Banks
Implementing Client Security on Windows 2000 and Windows XP Level 150
Intrusion Detection system
Firewalls Chapter 8.
(With Hybrid Network Support)
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Comodo Dome Data Protection
Presentation transcript:

Complete Network Security for Banks Cyberoam Complete Network Security for Banks 1

Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security Solution Range 2 2

Dimension - 1 – External threats External Threats – Attackers are after financial gain Targeting the Internal User Blended threats over multiple protocol Email: Over 90 % mail is spam carrying spyware, phishing, viruses, worm HTTP - Drive-by downloads, Pharming, Spyware via P2P sites IM: Malicious links and attachments FTP – Malicious uploads & downloads Q1: Point Solutions? A combination? or UTM? 3

Dimension - 2 – Insider Threats Insider Threats – Over 50% threats are from insiders Most attackers are current or former employees Majority of insiders plan their activities in advance using remote access Methods –Using someone else’s computer, Social engineering, Unattended terminal Malicious Intent: Selling corporate/customer data for financial gain User Ignorance: Indiscriminate surfing = Malware, Spyware Q.2. Would you settle for Plain Security if you had the choice of Identity-based security? Attacks are for financial gain – particularly in banks where vast amounts of money or personal data is handled Dimension – 2 – Insider Threats In 87% cases insiders employed simple, legitimate user commands to carry out the incidents In only a small number of cases was a more technical knowledge of network security required. For example, very few cases were carried out via a script or program (9%), and only slightly more involved spoofing13 or flooding14 (13%). There was no evidence that any insider scanned computer systems to discover vulnerabilities prior to the incident. • In 70% of cases studied, the insiders exploited or attempted to exploit systemic vulnerabilities in applications and/or processes or procedures (e.g., business rule checks, authorized overrides) to carry out the incidents. In 61% of the cases, the insiders exploited vulnerabilities inherent in the design of the hardware, software, or network. • In 78% of the incidents, the insiders were authorized users with active computer accounts at the time of the incident. In 43% of the cases, the insider used his or her own username and password to carry out the incident.15 • However, there were some cases in which the insider used other means beyond his or her user account to perpetrate the harm. Twentysix percent of the cases involved the use of someone else’s computer account, physical use of an unattended terminal with an open user account, or social engineering (i.e., gaining access through manipulation of a person or persons who can permit or facilitate access to a system or data).16 • Only 23% of the insiders were employed in technical positions17, with 17% of the insiders possessing system administrator/root access within the organization. • Thirty-nine percent of the insiders were unaware of the organizations’ technical security measures.18 4

Dimension – 3 – Remote Office Security Remote Office Security – Greater Granularity and Control over system resources High Security Levels at par with Head Office External threats Internal threats Limited Technical Resources at Remote Office Centralized control and visibility required Regulatory Compliance: BS 7799/ ISO 27001, Basel II Norms, PCI-DSS Q. 3. Are your remote offices as secure as the Head Office? At what cost?

60% corporate data lies unprotected on endpoints Dimension – 4 – Safe Guarding Your EndPoints 60% corporate data lies unprotected on endpoints Lost USBs Medical records of 741 patients lost by a hospital 9000 USB sticks found in people's pockets at the local dry cleaners in UK Lost Multimedia Discs Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Wrong Email Attachment Bank employee accidentally sent sensitive customer details to wrong email address Lost iPods 12,500 handheld devices forgotten at the back of taxis every 6 months in UK

Data At Risk Dimension – 4 –Safe Guarding Your Network EndPoints What Places Data At Risk? Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Unintentional Malicious Applications Insiders Web, Mail, IM, P2P, Printing, FTP Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Data At Risk • Intellectual property related to R&D • Business plans, RFP / Tender quotes • Product launch dates and roadmap • Customer data

Core Banking System Components Datacenter Branches Application Developers Desktops, Branch Servers Core-Banking Application WAN, Internet OS, Database Alternative Channels Internet-Banking ATM Branch User/Admins System Administrators Network Administrators

Bank X– Case Study Challenges Existing Firewall inadequate for 1500 users. To be replaced or not? Limitations of IP-based security – No tracing of malicious users, No reporting on Net use No Anti-Malware / Content Filtering / Bandwidth Management / Multiple link management No Endpoint Security Cyberoam Solution 2 Cyberoam CR 1500i appliances act as Proxy. Active-Active, High Availability mode. Firewall, IPS, Anti-Virus & Anti-Spam, Content Filtering SSL-VPN Secure Remote Clientless, Access Threat Free Tunnelling prevents malware CR Protects Customer data in DMZ and LAN, does Load Balancing for 2 ISP’s On-appliance reporting and Identity-based Surfing policies Protection in dynamic and Wi-fi environments When Port 80 allowed – all traffic allowed 1500 users and protection from Cisco PIX Faced limitations of IP-based policies - blanket policies for blocking or allowing access (Check Notes for implication) No anti-malware / content filtering / bandwidth management / multiple link management Faced issues of inappropriate Internet and Bandwidth usage No reporting to show – Internet usage pattern Bandwidth usage pattern VLAN reports Unable to trace activity to user Hence no change in policies based on activity

Cyberoam Security to X Bank Confidentiality – Only Authorized users may access Restricted Zonal access –User Identity, VLAN Incident Management – Identity-based logging & reporting Device Control – Block unauthorized file copies, USBs etc. Application Control – Authorized use of Applications Only Summary of Benefits Prevents unauthorized access, leakage / damage to information Reduces the risk of human error, theft, fraud, misuse of infrastructure Zero-hour threat detection and alerts with username Ensures Quick and Suitable Response Ongoing monitoring with username reports

Cyberoam Unified Threat Management

What is Cyberoam? Comprehensive Security with Performance-Effectiveness-Granularity Firewall-VPN-IPS Gateway Anti-virus & Antispam Content Filtering & Bandwidth Management High-Availability & Multiple Link Management On-Appliance Reporting 2. Identity-based Security 3. Comprehensive Branch Office Security 13 13

Dimension 1 Firewall-VPN-IPS 14 14

Why Cyberoam Firewall-VPN-IPS? Dimension 1 Why Cyberoam Firewall-VPN-IPS? Enterprise-class performance 6 Gbps Firewall Throughput, 2.5 Gbps IPS Throughput Certifications ICSA certified Firewall Checkmark certified Enterprise UTM Interoperability with 3rd party VPN - VPNC certified Benefits Prevents file uploads and data leakage via IM IPS signatures to prevent abnormal activity Works on Layer 8 – The Human layer Allows users to carry their access rights anywhere in the network

Anti-virus & Anti-Spam Dimension 1 Anti-virus & Anti-Spam 16 16

Why Cyberoam Anti-Virus and Anti-Spam? Dimension 1 Why Cyberoam Anti-Virus and Anti-Spam? Anti-Virus: 99 % Anti-Virus detection rate; Zero-hour protection Virus Outbreak Detection – Zero-hour protection Anti-Spam: 98 % Spam detection rate – Low False Positive Scans SMTP, POP3, IMAP with Recurrent Pattern Detection (RPDTM) Content-agnostic and language independent – Image spam and emerging spam Benefits in detail: Instant user identification for zero-hour protection Less load on sys admin Ease to user Data Loss Protection Differing levels of Control Low False Positives Certification Checkmark certified Anti-virus and Anti-spam

Dimension 1 Content Filtering 18 18

Why Cyberoam Content Filtering? Database of millions of sites – 82 + categories HTTP upload control Categorizes Google cached pages with dynamic URLs Prevents Proxy surfing eg: tunnel proxy utility, open proxy, web proxy. Dimension 1 Certifications Checkmark certified Content Filtering Network Products Guide award - 2008 Benefits Prevents entry of malware through unrestricted surfing Policies based on user identity Prevents Data Leakage Other Benefits: Local database reduces latency and dependence on network connectivity Category wise customized denied messages

Multiple Link Management Bandwidth Management & Multiple Link Management 20 20

Why Cyberoam? Bandwidth Management Dimension 1 Why Cyberoam? Bandwidth Management Committed and burstable bandwidth Restricts bandwidth usage by proper allocation on requirements basis Prevents Bandwidth Choking Controls cost – prevents excessive bandwidth usage User Identity in Security Assigns bandwidth to critical users and applications – supports business agility Application and Identity-based bandwidth allocation 21

Advanced Multiple Gateway Features Dimension 1 Advanced Multiple Gateway Features Auto gateway failover Weighted round robin load balancing Policy routing per application, user, source and destination Gateway status on dashboard No restriction on number of WAN Ports Schedule based bandwidth assignment What does it solve? Provides continuous connectivity Security over multiple ISP links 22

Identity-based Security Why Cyberoam? Dimension - 2 Identity-based Security 23 23

Why Identity? – AAA through Cyberoam UTM Security Authentication by Username – including Wi-Fi Authorization - Access Rights based on pre-defined corporate policies Username – Not IP Addresses Need-to-Use basis Across distributed locations Accounting – Centralized Logging and Reporting with Username Shows Who is Doing What even in Dynamic Environments DHCP - Wi-Fi - Shared Machine Scenarios Eg. Land Records User

25

Data Leakage Control & Reporting (HTTP Upload)

Branch Office Security Why Cyberoam? Dimension - 3 Branch Office Security 27 27

Why Cyberoam? Dimension 3 Branch Office Security Comprehensive security Branch user visibility and controls at HQ Proven interoperability with 3rd party VPNs – VPNC certified WAN optimization at branches Bandwidth efficiency Simplified Operations – No need for technical resource Remote web-GUI management

Dimension 3 Secure Remote Access IPSec & SSL VPN on UTM Appliance Anywhere Secure Access to telecommuters, road warriors, partners Threat Free Tunneling Technology – Scans endpoint for malware Clientless VPN Full or limited access based on user work profile High scalability Easy to use and manage