SANS Technology Institute GDWP Presentation 1 GIAC Enterprises Network Deployment Phase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
Controlling access with packet filters and firewalls.
Fine Tuned Machines Wireless & Network Security Integration Solution Overview Offense – FTM March 6 th, 2010.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Implementing Unified Messaging Joseph Blanchard Joseph Mancuso S. Paul Petroski.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Technology With Vision September 18, 2002 Hillside, NJ Chaim E. Fried Sr. Network Architect, Firewall integration.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
An Introduction to IBM Systems Director
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Security fundamentals Topic 10 Securing the network perimeter.
Security - IDS Refresh Project Phil Healey Date of Greenlight Meeting.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
1 ForeScout Technologies Inc. Frontline Defense against Network Attack Tim Riley, Forescout.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Jeff Wettlaufer Sr. Technical Product Manager System Center SESSION CODE: MGT308 B T jeffwettlaufer E
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
WAVECOM©2005. All rights reserved 1 Intelligent Device Management Service Offer Emmanuel Walckenaer April Lisboa.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Kevin Watson and Ammar Ammar IT Asset Visibility.
On Firewalls Fred Baker and Paul Hoffman draft-ietf-opsawg-firewalls-01.txt.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Security fundamentals
OIT Security Operations
Lesson 15 Total Cost of Ownership
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
Campus Communications Fabric
Click to edit Master subtitle style
Lesson 15 Total Cost of Ownership
Introduction to Networking
Protecting the Enterprise while lowering the bottom line.
Tailor slide to customer industry/pain points
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Transform your school with the power of the cloud
IS4680 Security Auditing for Compliance
Check Point Connectra NGX R60
Implementing Firewalls
Presentation transcript:

SANS Technology Institute GDWP Presentation 1 GIAC Enterprises Network Deployment Phase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees

SANS Technology Institute GDWP Presentation 2 Objectives Protect the Critical Assets Manage Recurring Costs Minimize Implementation Time Ensure Supportability

SANS Technology Institute GDWP Presentation 3 Protect Critical Assets Layered Approach to Perimeter Security Architecture –3 Layers: Routers, Firewalls, IPS DMZ Zones (segregation) for additional visibility and protection IPS instead of IDS allows for protection instead of detection

SANS Technology Institute GDWP Presentation 4 Manage Recurring Costs Purchasing a product that includes maintenance of signatures and updates Building an architecture around an all-in-one device Selecting a vendor which provides options for long-term support

SANS Technology Institute GDWP Presentation 5 Minimize Implementation Time All-in-One Solution consolidates firewall and IPS –Reduces the complexity –Reduces acquisition time Purchase and Own Solution –Reduces acquisition time –May need to address long-term support (MSSP)

SANS Technology Institute GDWP Presentation 6 Ensure Supportability IBM ISS offers –MSSP Option Native (not partner) –All-in-One Device –Additional Features –Staff Familiarity

SANS Technology Institute GDWP Presentation 7 Conclusion All-in-One Solution from IBM ISS –Exceeds the requirements –Simplifies implementation –Reduces recurring costs –Long-Term Support Options Available