GX6116 Product Announcement and High Performance Network Protection Strategy IBM Internet Security Systems Greg Adams.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Stephen S. Yau CSE , Fall Security Strategies.
Host Intrusion Prevention Systems & Beyond
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Department Of Computer Engineering
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
by Evolve IP Managed Services
SANS Technology Institute - Candidate for Master of Science Degree Implementing and Automating Critical Control 19: Secure Network Engineering for Next.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
The Voice Security Company Kirk Vaughan Product Director –VoIP SIP Application Security.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
What is FORENSICS? Why do we need Network Forensics?
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Web Application Firewall (WAF) RSA ® Conference 2013.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Network security Product Group 2 McAfee Network Security Platform.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SIEM Rotem Mesika System security engineering
OIT Security Operations
CompTIA Security+ Study Guide (SY0-401)
Proventia Network Intrusion Prevention System
Critical Security Controls
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
AT&T Premises-Based Firewall Enhanced SBS Solution
Real-time protection for web sites and web apps against ATTACKS
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
CCNET Managed Services
CompTIA Security+ Study Guide (SY0-401)
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Company Overview & Strategy
Securing the Threats of Tomorrow, Today.
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Intrusion Prevention Systems
DATS International Portfolio.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AT&T Firewall Battlecard
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

GX6116 Product Announcement and High Performance Network Protection Strategy IBM Internet Security Systems Greg Adams

Customer Driven Network Protection Roadmap Provide Protection for areas of my network formerly unsecured due to performance / cost Network IPS Appliances Line expansion 10mbit to 10gbit Enhance my protection with innovation & integration in new areas Anomaly Detection Platform Integration Insider Threat Protection Proventia Mail Integrated Security, Focus on firewall features SSLVPN Granular controls Protect me where other vendors have failed Message: Here are the products we are planning for the carrier market. Blade-based IPS Network core & carrier focus Crossbeam IBM BladeCenter Virtualization Give me protection for tomorrow’s networks 2 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Proventia Network IPS Continuum: The Most Complete Portfolio Available How a customer benefits from an integrated portfolio: Talk about ROI, TCO, reduced cost of management Better Protection Protect each segment of the network Consistent Naming for Attacks Simple Reporting – 1 System Automated Updates – XPU’s Lower Cost Fewer Resources for a Single Management System to handle all devices Automation (Updates, Trust X-Force) Single Reporting System Single process to manage security alerts EZ Implementation Same GUI throughout Single System to Manage Deployment Services Managed Security Services Certified Technical Support 4 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Because All “High Speed” IPS’ Are Not Equal Introducing Protection Capacity – the ability to stop threats at high speeds 5 IBM Internet Security Systems Proprietary and Confidential Information - 2007

At Every Layer of Your Network 16 ports allows 8 segments to be secured, establishing compliance control points within a companies network Protection at 6G allows protection on high speed networks and applications Fiber Networks VoIP Video Conferencing E-Commerce Data-warehousing 6 IBM Internet Security Systems Proprietary and Confidential Information - 2007

The Network Administrator The GX6116: Because Your Job Depends Upon the Reliability of the Network! Maximum Network Reliability Configurable maximum latency Passive Bypass Active Bypass (August availability) High-Availability pairs IDS and simulation mode Prioritized network availability Design for The Security Team AND The Network Administrator 7 IBM Internet Security Systems Proprietary and Confidential Information - 2007

The GX6116: The Task at Hand – Create the Fastest IPS without Compromising Protection 8 IBM Internet Security Systems Proprietary and Confidential Information - 2007

The GX6116: How Did We Achieve Performance & Protection? 9 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Combined & Parallel Processing GX6116 - Multiple Analysis Engines Combined & Parallel Processing Dedicated - Network Processing Unit Protocol Analysis Module 10 IBM Internet Security Systems Proprietary and Confidential Information - 2007

What to Expect Next Q2 of 2007 Provide protection to GX6116 areas of my network formerly unsecured due to speed / cost GX6116 GA 6/8/2007 Firmware 2.0 High port density, 16 1 gig SFP ports High protection speed, 6 gigabits Low latency Small packet performance engineered Configurable maximum latency threshold Enhance my protection with innovation & integration in new areas Protect me where other vendors have failed Give me protection for tomorrow’s networks 11 IBM Internet Security Systems Proprietary and Confidential Information - 2007

What to Expect Next Provide protection to areas of my network formerly unsecured due to speed / cost Enhanced Carrier / Telco Portfolio Carrier protocol support IPS service delivery in Carrier Ethernet environments R&D targeted at provider infrastructure threats Carrier based MSS services Re-branded MSS services for carriers Crossbeam IPS Protection domains and virtual network support Support for multi-core processors from Crossbeam Multi-gig performance using SWIPS on Crossbeam Enhance my protection with innovation & integration in new areas Protect me where other vendors have failed Give me protection for tomorrow’s networks 13 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Performance Isn’t Everything… We Keep a Keen Eye on the “Bad Guy” The threat landscape continues to evolve “Bad Guy” also means… “The Insider” Portfolio Extends well beyond Network IPS to combat the changing landscape Multifunction security (Proventia M) Vulnerability Assessment Anomaly Detection Content Security Mail Security Server Protection Desktop Protection Managed Security Services Professional Security Services 16 IBM Internet Security Systems Proprietary and Confidential Information - 2007

The Changing Threat Landscape – Monitored by the X-Force http://www.iss.net/evolvingthreat/ 17 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Defining the Insider Threat Insider opening a critical application for external availability Unauthorized user logging into critical apps Hacker gaining authorized privileges to critical apps Insider running a web server that distributes DVDs Trusted systems misused because of faulty configurations Server-initiated transactions 18 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Problem Insider Threat Billions spent to secure systems against outsiders Firewalls, VPNs, etc. Insiders present unaddressed threat – that can be even more damaging No way to measure intended use vs. actual use Authorized users not monitored on the network Insiders with unnecessary network privileges Outsider who gains authorized privileges Lack of visibility to IT users and their activities Rogue applications & assets Peer-to-peer file sharing, VOIP Crumbling perimeter: Internal network access Integration with business partners Mobile workers Authorized users with anomalous behavior Off-hours or high volume access to sensitive data 19 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Traditional Solutions Fall Short and Are Too Expensive to Maintain Perimeter defenses focused on the outsider Database logging & manual inspection Historical review of user activities Damage already done Only shows database activity; no view into context of what happened to compromised information (where did it go?) Build a security team dedicated to investigations & audit IT auditors (as opposed to infosec specialists on the perimeter security team) Focused on a checklist audit requirements vs. business enablement Extra cost & little connection to your IT protection strategy Systems operate independently of firewalls, IPS, VPNs, etc. 20 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Solution: Combined IBM Proventia Network Anomaly Detection & Network IPS Monitor and protect traffic across the enterprise network Special focus on critical assets and services Finance, HR, CRM, Intellectual Property, etc. Identify insider misuse or abuse of resources Out-of-the-box analysis and reporting Custom user-built policies (based on critical assets) Anomalies from the baseline norm Visibility to know your network Open-ended search engine for all network traffic Real-time forensics User activity logs to enable detailed investigations 21 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Solution: IBM Proventia Network Anomaly Detection Integrated Security & Protection strategy Centralized management with Proventia SiteProtector Management Don’t re-create the wheel with an internal security team Leverage your existing protection by integrating internal security with firewall, IPS, etc. Correlate internal events with alerts from perimeter protection Automated Response Quarantine threat by blocking connection at router or switch Block vulnerabilities with firewall or intrusion prevention Scan affected clients and servers for new vulnerabilities 22 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Solution: IBM Proventia Platform Layered security Identify threatening behavior of authorized users Recognize suspicious activities of compromised users Outsiders who gain access to authorized privileges Identify unusual behavior of authorized users and systems 23 IBM Internet Security Systems Proprietary and Confidential Information - 2007

Thank you! Greg Adams