Defending high value targets in the cloud using IP Reputation

Slides:



Advertisements
Similar presentations
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Advertisements

Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Unified Logs and Reporting for Hybrid Centralized Management
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Norman SecureSurf Protect your users when surfing the Internet.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Barracuda Load Balancer Server Availability and Scalability.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Basic Network Gear Created by Alex Schatz. Hub A hub is a very basic internetworking device. Hubs connect multiple machines together and allow them to.
BOTNET DEFENSE FROM THREATSTOP & JUNIPER Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Chapter 1: Explore the Network
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
Barracuda NG Firewall ™
What’s New in Fireware v
Chapter 1: Explore the Network
DISA Cyclops Program.
Unit 3 Virtualization.
Chapter 1 Introduction to Networking
Instructor Materials Chapter 1: Explore the Network
Lab A: Planning an Installation
Network Security Solution
Barracuda Web Security Flex
Top 5 Open Source Firewall Software for Linux User
Cloud Firewall.
Working at a Small-to-Medium Business or ISP – Chapter 8
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
CONNECTING TO THE INTERNET
Data Center Firewall.
Real-time protection for web sites and web apps against ATTACKS
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Chapter 1: Explore the Network
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Introduction to Networking
Firewalls.
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Introduction to Cloud Computing
Virtualization & Security real solutions
Your Business Opportunity
Unit 27: Network Operating Systems
UNM Enterprise Firewall
Sizing …today. T: Here’s how. .
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
Contact Center Security Strategies
Chapter 4: Protecting the Organization
Firewalls Jiang Long Spring 2002.
Networking and Security
AT&T Dedicated Internet (ADI)
Implementing Firewalls
AT&T Firewall Battlecard
Presentation transcript:

Defending high value targets in the cloud using IP Reputation ThreatSTOP Tom Byrnes, Founder and CEO 1 1

Summary ThreatSTOP: Using Cloud derived intelligence to deliver IP block-lists to firewalls to protect against current threat sources. Sorteo Games: Private Virtualized cloud service providing mobile and online gaming, as well as back-end processing for regulated lottery games. Vyatta: Physical and Virtual firewalls providing infrastructure services to run both. 1/17/2019

Set up for Demo Placeholder 1/17/2019

Asymmetric Net-Warfare FireWall LB LAN FireWall LB Access Router Firewall HTML FTP Mail HTML FTP Mail LAN 1/17/2019

Sorteo Games Sorteo Games Games: leading provider of regulated server-based wireless, Web and electronic lottery systems and services in Latin America proprietary technology combining server-based gaming, with wireless connectivity currently holds two national lottery systems and distribution licenses and operates the leading government regulated revenue generating national lottery wireless & interactive channels and electronic lottery terminals in Mexico. 1/17/2019

Botnet Defense Cloud Enables firewalls to block all traffic to and from known criminal sites 1. Aggregate threat feeds from public and proprietary monitors 2. Produce predictive, real-time threat list by proprietary correlation engine 3. Deliver threat list to firewalls via DNS (patent-pending) 4. Firewalls block inbound/ outbound traffic 5. Customer logs become part of ThreatSTOP defense network 5 1 ThreatSTOP Botnet Defense Cloud service, uses IP reputation, updated in real-time and automatically distributed via DNS, enabling firewalls to: protect networks against botnets and criminal malware block outbound “call homes” to command and control block incoming reconnaissance and attacks prevents data theft increases network “goodput” reduce network load and attack surface reduce capital and operational costs 2 4 3 1/17/2019 6

Vyatta Vyatta : software-based, open-source, network operating system works on standard x86 hardware works on common virtualization platforms VMware Xen & XenServer Red Hat KVM AMI for Amazon provides a complete enterprise-class routing and security feature set capable of scaling from DSL to 20Gbps performance used by thousands of physical and virtual infrastructures around the world, from small enterprise to Fortune 500 customers 1/17/2019

Sorteo Games WAN 1/17/2019

The Problem Sorteo Games is a high value, high visibility target Needs to be well protected, and auditable Has to ensure compliance with regulations limiting geographic access Thousands of attack scans and password cracking attempts per day Needs to be accessible to consumers, mobile, and retail But How? 1/17/2019

The Solution We did this independently, but this slide, taken from Chris Brenton’s presentation on The Basics of Virtualization Security, available on the CSA website, describes the architecture we used, excluding the addition of ThreatSTOP https://cloudsecurityalliance.org/wp-content/uploads/2011/11/virtualization-security.pdf 1/17/2019

US Datacenter The US Datacenter provides backend processing and the web/wap servers as well as SMS gateway services. A cluster of Vyatta firewalls on Dell hardware firewall both the public and private IP address space, and provide internal VPN connections to other Sorteo Games sites. Separate hardware, still protected by the Vyatta cluster, provide the connections to payment processors. All connections are filtered through he Vyattas, and protected by ThreatSTOP. 1/17/2019

US Office The US Office provides typical Office Automation and Development services. All servers are virtualized and clustered. A cluster of Vyatta firewalls as VMs, one on each ESXi node firewall private IP address space, and provide internal VPN connections to other Sorteo Games sites. All connections are filtered through the Vyattas, and protected by ThreatSTOP. 1/17/2019

Mexico Datacenter The Mexico Datacenter handles the actual issuance of tickets and manages the interface to the lottery. The hosts are doubly secured by a hardware VPN to the US Datacenter and all, except the ESXi host and the Vyatta VM, are behind a Vyatta firewall, with strictly limited connections to only those systems absolutely needed. Security policy is enforced at both the Vyatta VM and the Vyattas in the US Datacenter. This location has no Internet access, and so does not run ThreatSTOP. 1/17/2019

Asymmetric Net-Warfare Firewall FireWall LB LAN FireWall LB Access Router HTML FTP Mail HTML FTP Mail LAN 1/17/2019

The Result Thanks to the “cloak of invisibility” attackers think there’s “nothing to see, move along now”, and so the average volume of attacks and scans decreased by a factor of 3, and attacks are far less persistent, so the baseline is even lower. 1/17/2019

Port Distribution 1/17/2019

Drilldowns 1/17/2019

In VPC 1/17/2019

Applications Proactive security Cost/Bandwidth reduction for hosted services Geographic Filtering Reporting across multiple locations and facility types Forensics 1/17/2019

Demo 1/17/2019

Summary Vyatta provides single platform that can be used across physical and virtual infrastructure, with same UI and feature set ThreatSTOP provides cloud service delivering security of the cloud, to the cloud Sorteo Games has a secure service enabling customers to play wherever, whenever, and however suits them NOTHING BUT NET! 1/17/2019

Thank You Tom Byrnes, CEO tomb@threatstop.com 760-542-1550 x 4242 Cell: 760-402-3999 1/17/2019