Threat Ready: The Benefits of Segmentation

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
How to protect your Virtual Datacenter Michiel van den Bos.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Dell Connected Security Solutions Simplify & unify.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
VMware NSX and Micro-Segmentation
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Micro segmentation with Next Generation Firewall and Vmware NSX
Security Vulnerabilities in A Virtual Environment
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
SDN & NFV Driving Additional Value into Managed Services.
Check Point vSEC STORY [Protected] Non-confidential content.
Security fundamentals
OIT Security Operations
CompTIA Security+ Study Guide (SY0-401)
Chapter 6: Securing the Cloud
Stop Cyber Threats With Adaptive Micro-Segmentation
What is it ? …all via a single, proven Platform-as-a-Service.
Juniper Software-Defined Secure Network
Barracuda Firewall The Next-Generation Firewall for Everyone
Critical Security Controls
Cloud adoption NECOOST Advisory | June 2017.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Hybrid Management and Security
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Basic Policy Overview Palo Alto.
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
1.
Infrastructure as a Service
Best Practices for Securing Hybrid Clouds
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Bill Banks | Security Engineer
Virtualization & Security real solutions
CompTIA Security+ Study Guide (SY0-401)
Prevent Costly Data Leaks from Microsoft Office 365
VMware NSX and Micro-Segmentation
IS4550 Security Policies and Implementation
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Company Overview & Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Forensics Week 12.
Concept of VLAN (Virtual LAN) and Benefits
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Firewalls Routers, Switches, Hubs VPNs
The Next Generation Cyber Security in the 4th Industrial Revolution
Contact Center Security Strategies
How to Mitigate the Consequences What are the Countermeasures?
Improve Patient Experience with Saama and Microsoft Azure
Windows 10 Enterprise E3 for Small and Medium Business
NSX Data Center for Security
<Service provider solution name>
DATS International Portfolio.
Introduction to Network Security
Security Delivery Platform for the Micro-segmented Data Center
Test 3 review FTP & Cybersecurity
The Zero-Trust Model Redefining InfoSec.
6. Application Software Security
Presentation transcript:

Threat Ready: The Benefits of Segmentation Burwood Group, Inc. Threat Ready: The Benefits of Segmentation

Agenda Burwood Intro Segmentation Overview Perimeter Segmentation Data Center Segmentation Micro-Segmentation Communication Restrictions vs Security Benefits 9/17/2018 The Benefits of Segmentation

Our Perspective: IT Trends Increased demand for IT to add strategic value to the organization Focus on leveraging innovation and technology outside the enterprise (inside-out to outside-in) Increased data availability demands quantitative insights Heightened end-user technology expectations Impact of mobile device market explosion Demand for fast access to data and applications from any consumer device Move towards the cloud Move from traditional infrastructure to converged (or hyper-converged) infrastructure Cloud-platform adoption leads to security concerns Increased “as a service” technology consumption 9/17/2018 Burwood Group Overview

Our Point of View Burwood Group Business Processes Knowledge Technology Ecosystem To achieve its strategic goals, an organization’s technology investments must lead directly to specific business and clinical outcomes. To achieve an outcome, the organization’s technology must be designed, built and managed to deliver knowledge to the end user. Burwood Group integrates an organization’s technology ecosystem and business processes and knowledge to enable its people to perform in the unique context of their environment. We KNOW that tech investments MUST lead directly to specific outcomes. The tech MUST be designed to deliver that “knowledge” to the end user. Burwood can integrate the tech ecosystem. 9/17/2018 Burwood Group Overview

Segmentation Overview Credible Resource (Wikipedia) “Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security.” Burwood Organizing your network based on applications, users, content, or business function Applying security to this organization by enforcing restrictions between network segments on a need to know basis https://en.wikipedia.org/wiki/Network_segmentation All of this is based on zero-trust and CIA 9/17/2018 The Benefits of Segmentation

Zero Trust Secure Access All resources are accessed in a secure manner regardless of location Access Restrictions Least privilege or “need-to-know” restrictions Verify Ensure users, applications, and content are all legitimate Inspect & Log Record all access and user activity From Del – don’t have to limit to three zones, can subdivide

Segmentation Overview What does this mean to your organization? Are you applying segmentation now? Are you applying security between your network segments? 9/17/2018 The Benefits of Segmentation

Perimeter Segmentation Most organizations are already segmenting their perimeter The implementation of a DMZ is segmentation 9/17/2018 The Benefits of Segmentation

Perimeter Segmentation Already utilizing the Zero-Trust Model Deny “Untrust” to “Trust” Restrict “Untrust” to “DMZ” Restrict “DMZ” to “Trust” Common practice and easy implementation 9/17/2018 The Benefits of Segmentation

Perimeter Segmentation Securing all perimeter traffic from external threats Why is this only at the perimeter? Issues Only 20% of an organizations network traffic traverses the perimeter firewall This leaves 80% of traffic unfiltered, unrestricted, and insecure Arkin VMware reference 9/17/2018 The Benefits of Segmentation

Data Center Segmentation This is where the most critical assets reside Malicious users know this and their end goal is the data center Malware is targeted and designed to spread 9/17/2018 The Benefits of Segmentation

Data Center Segmentation Recent example of an outbreak that could have been prevented Healthcare customer hit with Qakbot Virus designed to spread through fileshares and and removable drives Steals information and opens a backdoor to the compromised machine Infected machines could be cleaned As soon as they were cleaned, they would be infected again by spreading of malware 9/17/2018 The Benefits of Segmentation

Data Center Segmentation Initial infection may not have been prevented but propagation of malware could be Concept of network “bulkheads” 9/17/2018 The Benefits of Segmentation

Data Center Segmentation Prevent the propagation of malware Increased visibility Granular traffic restrictions 9/17/2018 The Benefits of Segmentation

Data Center Segmentation 9/17/2018 The Benefits of Segmentation

Data Center Segmentation Steady State Quarterly Review: Re-occurring Health-checks New Feature implementations Expanded Education Convert to App Restrictons Project Work: SSL Decryption Review policies and logs Convert to application enforcement Create custom applications Implement Next-Generation Security Security Cleanup and Management Review and Configure: Firewall Policy Cleanup Firewall documentation Security logging Centralized reporting Utilize Security Suite Configuration: Content ID Threat Prevention APT Protection URL Filtering User Restrictions Migrate/Transition Project Work: - Discover Current State - Migrate/Install NGFW - Design Migration Plan - Migrate/Cutover Test and Validate Operate/ Manage Stateful Inspection 9/17/2018 The Benefits of Segmentation 17

Micro Segmentation Data Center Segmentation is for North-South traffic Micro Segmentation is for East-West traffic Traffic within a virtual environment Traffic on the same logical network (intra-VLAN inspection) 9/17/2018 The Benefits of Segmentation

Micro Segmentation Unconstrained communication Little or no lateral controls inside perimeter Low priority systems are targeted first. Attackers can move freely around the data center. Internet 10110100110 101001010000010 1001110010100 Attackers then gather and exfiltrate data over weeks or even months. Data Center Perimeter The Benefits of Segmentation

Micro Segmentation Why can’t we have individual firewalls for every VM? With traditional technology, this is operationally infeasible. Expensive and protect North-South traffic and not East-West Physical firewalls Internet Slow, costly, and complicated Virtual firewalls Hypervisor VM Data Center Perimeter The Benefits of Segmentation

Micro Segmentation VDI - A converged infrastructure means virtual desktops run on the same infrastructure as servers VDI Data Center Perimeter Internet East West VMware NSX and Palo Alto Networks

Micro Segmentation Additional Benefits Technologies that provide micro segmentation also provide data center automation Provide the first step for hybrid, public/private cloud environments 9/17/2018 The Benefits of Segmentation

Communication Restrictions and Security Layer 3/4 vs Layer 7 firewall Virtually all manufacturers will agree that port and protocol is not enough security today Locking policies down to known applications communicating across known ports is paramount 9/17/2018 The Benefits of Segmentation

Communication Restrictions and Security Context security includes more than network traffic Applications Content URL filtering, Antivirus, Anti-Spyware, IPS Users These items all work together to provide a secure zero-trust network architecture 9/17/2018 The Benefits of Segmentation

Benefits Segmentation allows us to organize and secure our networks Creating network bulkheads to limit propagation Increased restrictions to comply with least privilege and Zero-Trust Micro segmentation provides visibility into areas of the network we previously could not see Implementing a phased approach to the installation of these services is key 9/17/2018 The Benefits of Segmentation

Contact Us Justin Flynn Manager, Sales Engineering Burwood Group, Inc. jflynn@burwood.com 312.327.4657