NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?

Slides:



Advertisements
Similar presentations
Application Usage and Risk Report 7 th Edition, May 2011.
Advertisements

Next Generation FWs Against Modern Malware and Threads Hakan Unsal – Technical Security Consultant Tunc Cokkeser – Regional Sales Manager.
Palo Alto Networks Jay Flanyak Channel Business Manager
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
True Unified Threat Management
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
MIGRATION FROM SCREENOS TO JUNOS based firewall
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
A Guide to major network components
What Are We Missing? Practical Use of the Next-Generation Firewall: Controlling Modern Malware and Threats Jason Wessel – Solutions Architect.
Meet the Next Generation Firewall (NGFW)
Barracuda Networks Steve Scheidegger Commercial Account Manager
Palo Alto Networks Product Overview Karsten Dindorp, Computerlinks.
Norman SecureSurf Protect your users when surfing the Internet.
TAILORED SECURITY FOR CRITICAL ASSETS SRX SERIES SERVICES GATEWAYS FOR THE HIGH END PRESENTER NAME DECEMBER 29, 2013.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Using Windows Firewall and Windows Defender
What Did You Do At School Today Junior?
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
AWS Cloud Firewall Review Architecture Decision Group October 6, 2015 – HUIT-Holyoke-CR 561.
Firewall Security.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Synchronized Security Revolutionizing Advanced Threat Protection
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Palo Alto Networks SLO WUG NG Silvester Drobnič, CHS d.o.o.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Blue Coat Cloud Continuum
Firewall requirements to secure IPv6 networks – finished playing! LANCom seminar, Maribor Ides Vanneuville, Palo Alto Networks – Next-Generation firewall.
Barracuda NG Firewall ™
Basic Policy Overview Palo Alto.
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Sizing …today. T: Here’s how. .
Software-Defined Secure Networks in Action
Firewalls Routers, Switches, Hubs VPNs
Healthcare Cloud Security Stack for Microsoft Azure
The MobileIron® Threat Detection difference:
Hosted Security.
Presentation transcript:

NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?

Agenda The Changing Landscape NGFWs Juniper AppSec How to Choose

Changing Landscapes… …of applications and threats

Applications/Threats Changed; Firewalls Not BUT…applications have changed Ports ≠ Applications IP Addresses ≠ Users Packets ≠ Content The gateway at the trust border is the right place to enforce policy control Sees all traffic Defines trust boundary Need visibility and control !!!

Web 2.0, Enterprise 2.0 Headaches for CISOs 1.Driven by new generation of addicted Internet users – smarter than you? 2.Full, unrestricted access to everything on the Internet is a right 3.They’re creating a giant social system - collaboration, group knowledge 4. Mobile device use exacerbates the problem – how to control them? 5.Large enterprises need new architectural solutions – suite for huge 6.Not waiting around for IT support or confirmation – IT is irrelevant 7.Result - a Social Enterprise full of potential risks … and rewards

Real-Life Reasons Source: Academic Freedom or Application Chaos (2nd Edition, March 2011) Palo Alto Networks 67% of the apps use port 80, port 443, or hop ports

Consensus among Analysts Move to next-generation firewalls at the next refresh opportunity – whether for firewall, IPS, or the combination of the two. -Gartner Forrester’s Forrsights Security Survey indicates that the standalone IPS market is a relatively mature space but that the next- generation firewall markets are expanding …we anticipate a consolidation of firewalls and IPS to create an even more advanced multifunction security gateway. -Forrester DigiNotar, Google, Playstation Network, RSA, Comodo, Epsilon, Lockheed Martin, Many more…

Make the FW Useful Again! 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation

Why it has to be the firewall? 1.Path of least resistance - build it with legacy security boxes 2.Applications = threats 3.Can only see what you expressly look for 4.Can’t “allow, but…” IPS Applications Firewall 1.Most difficult path - can’t be built with legacy security boxes 2.Applications = applications, threats = threats 3.Can see everything 4.Can “allow, but…” IPSFirewall Applications Traffic decision is made at the firewall No application knowledge means bad decisions…

NGFWs

What is what?! Stateful Firewall IPS UTM Application Firewall / Application Proxy Next Generation Firewall (NGFW)

Stateful Firewall: blind, packet filters only

IPS: evasions, decryption issues Permissive rule base Inspect encrypted traffic Circumvention possible Source: NSS Labs - Q Network Intrusion Prevention System Test Executive Summary

UTM: adding more stuff doesn’t solve the problem “More stuff” doesn’t solve the problem Firewall “helpers” have limited view of traffic Complex and costly to buy and maintain Putting all of this in the same box is just slow Still no visibility or control of enterprise 2.0 Internet

Application Proxy: slow + focused on few apps only Proxy sits between the application source and destination Intercepting traffic (terminating and re-initiating) Limited set of applications Low performance Deep knowledge of protocols

Next Generation Firewalls New Modules New Architectures User identification Application Identification Content identification Rulebase consolidation Analyse encrypted traffic Both CTS and STC directions

And the Nominees are… NFGW = FW + IPS in the same box NGFW = FW + IPS integrated + Security Modul NGFW = Brand new architectures

FW & IPS issues Positive control – firewall like – Define what is allowed, block everything else Negative control – IPS like – Find it and block it – Great for blocking attacks – Bad for controlling applications – Ergo > Adding a bunch of application signatures to an IPS does not make it a firewall Application become evasive

FW & IPS issues, cont’d Model – Keep the FW + add an IPS style helper Problem – FW still allows traffic on unusual ports – Not smart enough to recognize applications – Must run all signatures on all ports – Performance issue – Management issue – Only blocking is possible

Real NGFWs Provide a Better Approach to IPS Integrating IPS into the firewall is NOT simply about convenience…it’s a necessity True integration of IPS with the NGFW solves problems that traditional IPS can’t 1. Controls threats on non-standard ports 2. Proactively reduces the attack surface 3. Controls the methods attackers use to hide 4. Integrates multiple threat prevention disciplines 5. Provides visibility and control of unknown threats

How to choose …Buyers Guide

Things to consider before buying NGFW 1.Identify and control applications on any port 2.Identify and control circumventors 3.Decrypt outbound SSL 4.Identify and control applications sharing the same connection 5.Provide application function control 6.Deal with unknown traffic by policy 7.Scan for viruses and malware in allowed collaborative applications 8.Enable the same application visibility and control for remote users 9.Make network security simpler, not more complex with the addition of application control 10.Deliver the same throughput and performance with application control active

Juniper AppSec

Customer Priorities Juniper Security Solutions Addressing the Evolving Threat Landscape Visibility into Web 2.0 Threats Scalable Policy Enforcement & Management Control of Application Usage Rapid Response to New Threats AppSecure Software Security Research Teams SRX Security Service Gateways

AppSecure direction Understand security risks Address new user behaviors Application Intelligence from User to Data Center Subscription service includes all modules and updates Juniper Security Lab provides 800+ application signatures Subscription service includes all modules and updates Juniper Security Lab provides 800+ application signatures AppTrack AppDoS IPS Block access to risky apps Allows user tailored policies Prioritize important apps Rate limit less important apps Protect apps from bot attacks Allow legitimate user traffic Remediate security threats Stay current with daily signatures AppFW AppQoS

INTEGRATED APPLICATION INTELLIGENCE: AppSecure

APPLICATION VISIBILITY

Thank you! Resources & Further readings Enterprise Strategy Group: The Network Application Security Architecture Requirement NSS Labs: Q IPS Group Test Juniper Networks: ESG - The Network Application Security Architecture Requirement Palo Alto Networks: Academic Freedom or Application Chaos?