Using Internet Layer 8 Reporting

Slides:



Advertisements
Similar presentations
Tracking Vehicles/Handset Throughout Nigeria Presentation.
Advertisements

Introducing Quick Heal Terminator.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Designed By: Technical Training Department
1 Enabling Secure Internet Access with ISA Server.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Norman SecureSurf Protect your users when surfing the Internet.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Network security Product Group 2 McAfee Network Security Platform.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
The Claromentis Digital Workplace An Introduction
Centralized Logging and Reporting for Managed Security Services Providers.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
OFFICE 365 APP BUILDER PROFILE: Druva
Security fundamentals
Barracuda NG Firewall ™
Chapter 7: Using Windows Servers
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Network Security (the Internet Security)
Data and database administration
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Basic Policy Overview Palo Alto.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Welcome To : Group 1 VC Presentation
Getting Started with LANGuardian
IS4550 Security Policies and Implementation
Identity & Access Management
Firewalls Routers, Switches, Hubs VPNs
IS4680 Security Auditing for Compliance
AbbottLink™ - IP Address Overview
COMPLETE BUSINESS TEXTING SOLUTION
iSecurity Password-Reset Training
Presentation transcript:

Using Internet Layer 8 Reporting SCOTIA Middle East Limited. LAN Management Using Internet Layer 8 Reporting

2. Internet Layer 8 Reporting. Agenda 1. Scotia Client Base. 2. Internet Layer 8 Reporting. 3. Technical Description Internet Layer 8 Reporting. 4. UTM Dash-Board. 5. Defining Objects. Reports ;– 6.1 Dash-Board. 6.2 Report Samples ( 1 – 3 ). 6.3 Generated Reports. Benefits of LAN Management System. Proposal. Any Other Questions.

1. Scotia Client Base. UK British Foreign and Commonwealth Office ( FCO ) – Basra / Baghdad, Iraq. Kyrgyz Republic Emergency Services. Restoration of Emergency Services ( thro FCO / DFID ) Pakistan Restoration Emergency Services after Earthquake Oct 2005. Setting up ERRC to ensure Transparency for Donators. Setting up Emergency Telecommunications in Northern Pakistan. USA Department of State, Washington / Baghdad Embassy. - Setting up High Tech Security / Telecom Systems. Oil Companies Shell / Chevron / Mobil / Texaco / Agip / Conoco Phillips. Oil Service Companies Schlumberger / Intel / Willbros / African Oil Field Services / Weatherford / Dredger International. Nigerian Government Projects PTF / NCC / NDDC / Niger Delta States / Alscon / Asferro / Le Meridien Hotel Uyo. Airlines Lufthansa / United Airlines.

Summary. Capability to provide a Priority to Internet / LAN users within the Company :- Class 1 – Senior Management. Class 2 – Middle Management. Class 3 – Management. Class 4 – Consultants. Class 5 – Principle / Senior Engineers. Class 6 / 8 – As Defined by the Company. Barring of Internet Sites to all / dedicated Staff, during Working Hours :- Chat Sites. Yahoo. Audio / Video Sites, ect. Provision of Detailed Reports on Internet use, from the Largest User to the Least usage . The Following Presentation provides the Detail of the above issues.

2. INTERNET LAYER 8 REPORTING…….. Internet Layer 8 Reporting entails reporting network activities referencing the Human Layer, that is identifying activities based on the users rather than confusing codes. Current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. An organization's overall security is only as strong as its weakest link – the user. In order to address the concerns of gaining visibility and controls on user activity in the network, the Layer 8 technology has been derived out of the need for a more robust network security system which can include a user's human identity as part of the firewall rule matching criteria. By definition, Layer 8 Technology treats user identity the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username. 

3. Technical Description Internet Layer 8 Reporting. This is a simple example of a network system with UTM layer 8 Reporting.

4. UTM Dash-Board.

5. Defining Individual Company Objects Computer hosts and other devices in the network are been defined. Internet connections services and connection schedule are also defined for hosts.

6.1 Reporting Dashboard.

6.1 Report Sample Number 1.

6.1 Report Sample Number 2.

6.1 Report Sample Number 3.

Mail Usage IM Usage FTP Usage VPN Internet Usage Blocked Web Attempts 6.3 Reports Available to be Generated ( Discuss with Management ). Web Usage Mail Usage IM Usage FTP Usage VPN Internet Usage Blocked Web Attempts Blocked IM Attempts Attacks Spam Virus Event Search Engine

7. Benefits of LAN Management System. Identification of attackers/victims with username. Instant visibility for administrators into source of attacks etc. Controlling who is doing what within the network. Allowing creation of identity-based Company Policies. Reporting to track identity-based usage, problems, intrusions ect. Integrated Security over Single Device, all security features can be centrally configured and managed from a single firewall. Layer 8 combines all security features thus enabling the administrator to control security policies including auditing for user movements joining / leaving / promotion within the Company etc.

Benefits…. Adding Speed to security – Due to the lack of granular identity features, IT teams often waste time in knowing source of attacks and attackers in case of a security incident. Since Layer 8 offers instant visibility into source of attacks while identifying victims/attackers by username, thus proactive remediation of security incidents. Security in Wi-Fi environments – secures organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Employee / Management network access.

Benefits…. Boosting productivity – content and application filtering feature manages indiscriminate Internet surfing by users through custom policy setting for users and groups, thereby setting access limitations based on time duration and predefined blocked sites across 82+ categories.  User, time and role-based bandwidth management - this approach will prevents users from consuming huge amounts of bandwidth for non-productive surfing and downloads. Instant Messaging Controls allow the administrator to control who can chat with whom over text chat, webcam, file transfer. Users can be divided into classes where network availability could be based on user class level.

Benefits…. Logging and reporting – Layer 8 identity-based reporting, pinpoints precise network activity for each and every user. Its dashboard shows all network attacks on a single screen with third level drill-down reports (1000+ reports) for investigating the attacks, and the users behind them. Regulatory Compliance – Through Layer 8 identification and controls, the appliances enable enterprises to comply with regulatory compliance norms such as HIPAA, CIPA, PCI-DSS, GLBA, etc.

Any Questions.