Man kann nur schützen was man sieht - oder Zentrales Entschlüsseln von SSL/TLS Verkehr Rethinking Security
|
|
- Stephanie Roberts
- 5 years ago
- Views:
Transcription
1 Man kann nur schützen was man sieht - oder Zentrales Entschlüsseln von SSL/TLS Verkehr Rethinking Security Stepan Svihla Sr. Sales Engineer Central & Eastern Europe
2 Corporate Overview THE ESSENTIAL ELEMENT OF YOUR SECURITY Gigamon is leading the convergence of networking and security. Our next generation network packet broker helps make threats more visible, deploy resources faster and maximize performance. HQ FOUNDED EMPLOYING SERVING NAMED Santa Clara California, USA employees Over 2,800 customers Market leader GLOBAL OFFICES CEO PATENTS VERTICALS 20 Countries *Feb 2018: Offices, employee and patent information **Q1 2018: Customer count Paul Hooper 51 Global patents issued Public Sector Financial Services Healthcare Retail Technology Service Providers 2018 Gigamon. All rights reserved. 2
3 Trusted by the World s Leading Organizations Gigamon Customers 7 of the top ten Global Banks 8 of the top ten largest Tech Companies 8 of the top ten Healthcare Providers 83 of the Fortune of the top ten U.S. Federal Agencies 8 of the top ten Mobile Phone Network Operators Customer data from April List sources available upon request Gigamon. All rights reserved. 3
4 Gigamon Customers Today Enterprise Federal Service Provider TECH GENERAL / MISC. RETAIL / SERVICE FINANCE HEALTH 2018 Gigamon. All rights reserved. 4
5 TM Gigamon Ecosystem Partners Security and Vulnerability Management Service Provider Performance Management Infrastructure 2018 Gigamon. All rights reserved. 5
6 The Data-in-Motion Dilemma Volume + Speed + Threats = Complexity + Risk + Cost Network Data Security tools do not scale as fast as data Volume Emergence of Big Data Data Center transition to 100Gb Internet of Things Machine to Machine 6.7ns available to process a network packet on a 100Gb link 6.8ZB of global data center traffic in 2016* 1.7PB of M2M traffic in 2017** Security Tool Time * Cisco Global Cloud Index: Forecast and Methodology, White Paper. Cisco. Feb ** Statista Global machine-to-machine (M2M) data traffic from 2014 to 2019 (in petabytes per month) 2018 Gigamon. All rights reserved. 6
7 Today s Limitations Data Overload Yet Limited Visibility Irrelevant traffic Irrelevant traffic Irrelevant traffic SIEM APM / NPM IPS/APT/WAF LIMITED VISIBILITY LIMITED VISIBILITY LIMITED VISIBILITY DATA Physical, Virtual and Cloud Infrastructure 2018 Gigamon. All rights reserved. 7
8 New Levels of Security and Performance increased performance increased performance increased performance 141 Only relevant traffic 141 Only relevant traffic 141 Only relevant traffic IPS/APT/WAF SIEM APM / NPM 1 2 GigaSECURE SECURITY DELIVERY PLATFORM 3 Hell o Hel lo FULL VISIBILITY Hell o DATA He llo Physical, Virtual and Cloud Infrastructure He llo Hell o 2018 Gigamon. All rights reserved. 8
9 Classical Deployment Remote sites Internet Public cloud WAF IPS Firewall DLP Routers Spine switches ATP SIEM Leaf switches Forensics Virtualized server farm 2018 Gigamon. All rights reserved. 9
10 Security Delivery Platform Explained Remote sites Internet Public cloud WAF ATP IPS SIEM DLP Forensics Firewall Routers SECURITY DELIVERY PLATFORM Spine switches Leaf switches Virtualized server farm Reach physical, virtual and cloud Metadata for improved forensics Targeted inspection Detection of encrypted threats Inline mode for visibility and control 2018 Gigamon. All rights reserved. 10
11 GigaSECURE Security Delivery Platform Remote sites Internet Public cloud WAF ATP IPS SIEM DLP Forensics Firewall API Routers GIGASECURE SECURITY SECURITY DELIVERY DELIVERY PLATFORM PLATFORM Spine switches Leaf switches Virtualized server farm Reach Physical, physical, virtual Virtual and cloud and Cloud Metadata for improved Engine forensics Application Targeted Session inspection Filtering Detection SSL of encrypted Decryption threats Inline Inline mode for visibility Bypass and control 2018 Gigamon. All rights reserved. 11
12 Gigamon Data-in-Motion Visibility Platform Tools & Applications S ecurity E xperience M anagem ent P erform ance M onitoring A nalytics Tools and A pplications A PI Orchestration GigaVUE-FM API NSX Manager vcenter Traffic Intelligence Adaptive Packet Filtering Application Session Filtering De-duplication FlowVUE GTP Correlation Header Stripping Masking NetFlow and Metadata Generation Slicing SSL Decryption Tunneling Flow Mapping Clustering Inline Bypass GigaStream Visibility Nodes Intelligent Visibility Public Cloud Virtual Traffic Aggregators Network TAPs Any Network Data Center, Hybrid and Private Cloud Public Cloud Service Provider Networks Remote Sites 2018 Gigamon. All rights reserved. 12
13 RDY POWER TAP1 TAP2 TAP3 TAP4 ON/OF F USB RDY PWR FAN PTP PPS M/S Stack/PTP Mgnt / Con G1 / G2 G3 / G4 X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12 RDY POWER A1 B1 M1 A2 B2 M2 X1/X2 X3/X4 H/S The Core Product : Deployment Options Small Deployments Typical Data Center Deployments Large Data Center and Service Provider Deployments GigaVUE-HC1 10 / 100 / 1000Mb Copper 1 / 10Gb Fiber GigaVUE-HC2 10 / 100 / 1000Mb Copper 1 / 10Gb Fiber 40Gb & 100Gb Fiber GigaVUE-HC3 10Gb using breakouts* 40Gb Fiber 100Gb Fiber 2018 Gigamon. All rights reserved. 13
14 GigaVUE TA Series Features PORT EXPANSION Half-RU 16 x 10Gb patch panel option for 40Gb ports 12 x 10Gb Patch panel module for 16 M x 10Gb Series Patch Panel GigaVUE-TA10 G-TAP M Series PNL-M341 Patch Panel G-TAP M Series PNL-M343 Patch Panel GigaVUE-TA40 GigaVUE-TA Gigamon. All rights reserved. 14
15 Use Cases
16 Eliminate SPAN Port Contention Few Span Ports, Many Tools Without Gigamon With Gigamon Switch with two SPAN session limitation Intrusion Detection System (IDS) Application Performance Management VoIP Analyzer Packet Capture Switch with two SPAN ports Intrusion Detection System (IDS) Application Performance Management VoIP Analyzer Packet Capture Customer is unable to use all tools! Customer has complete visibility for all tools! 2018 Gigamon. All rights reserved. 16
17 Limited Access to Environment Limited Tool Ports, Many Switches Without Gigamon With Gigamon Switch 1 Switch 1 Switch 2 Switch 2 Switch 3 Switch 3 Analysis tool with only 2 NICs Switch 4 Analysis tool with only 2 NICs Switch 4 Switch 5 n Switch 5 n Limited Connectivity to Full Environment Pervasive Access Can Connect to All Points in the Environment 2018 Gigamon. All rights reserved. 17
18 Run Multiple POCs in Parallel Accelerate Certification Of New Tools Without Gigamon With Gigamon POC #1 Vendor X Tool POC #2 Vendor Y Tool POC #3 Vendor Z Tool POC #1 Vendor X Tool Tool tested w/ NW Segment 4 weeks Tool tested w/ same NW Segment 4 weeks Tool tested w/ same NW Segment 4 weeks POC #2 Vendor Y Tool POC #3 Vendor Z Tool 1 month 2 month 3 month Customer performs each Proof-of-Concept (POC) serially at different times using different data 1 month 2 month 3 month Customer is able to run multiple POCs concurrently using same data 2018 Gigamon. All rights reserved. 18
19 Change Media and Speed 10, 40 Or 100Gbps Traffic To 1Gbps or 10Gbps Tools Without Gigamon Intrusion Detection System (IDS) With Gigamon GigaVUE Matches Your Network to Your Tools 10Gb 1Gb Application Performance Management VoIP Analyzer Packet Capture Intrusion Detection System Application Performance Management VoIP Monitor Packet Capture Customer migrates to a 10Gb network and 1Gb monitoring tools become useless Customer able to extend the life of their 1Gb network and security tools 2018 Gigamon. All rights reserved. 19
20 The Core Product: Inline Bypass Overview SCALING INLINE SECURITY TOOLS E.g. WAN router E.g. Firewall IPS IPS WAF Scalability Maximize tool efficiency Increase scale of security inspection tools Integrate inline, out-of-band, flow-based tools and metadata E.g. IPS E.g. WAF E.g. AT P E.g. Core switch ATP ATP ATP Operational Agility Add, remove, and upgrade tools seamlessly Migrate tools from detection to prevention modes (and vice-versa) Consolidate multiple points of failure into a single, bypass-protected solution *IPS: Intrusion Prevention System WAF: Web Application Firewall ATP: Advanced Threat Prevention 2018 Gigamon. All rights reserved. 20
21 Example Use Case for GigaVUE-HC2 Intrusion Prevention Systems Internet NetFlow Collector Intrusion Detection System Edge Routers NetFlow Generation SSL Decryption GigaStream Inspection Data Loss Prevention Core Switches Out-of-Band Malware 2018 Gigamon. All rights reserved. 21
22 Gigamon Inline SSL Visibility Solution SSL Session Leg 2 (encrypted) Inline Tool Group (decrypted traffic) 3 1 SSL Session Leg 1 (encrypted) 2 Web Monitor Tool (decrypted traffic) Highlights Servers and clients located internally or externally Private keys not needed RSA, DH, PFS can be used Supports inline and out-of-band tools 2 Out-of-Band Tool (decrypted traffic) Encrypted traffic Decrypted traffic Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change Gigamon. All rights reserved. 22
23 Gigamon SSL Decryption Key Benefits Automatic SSL / TLS detection on any port or application Scalable interface support (1Gb 100Gb) Decrypt once. Feed many tools Strong crypto support: PFS, DHE, Elliptic Curve ciphers Certificate validation and revocation lists: strengthens organizations security posture Strong privacy compliance: categorize URL before decryption 2018 Gigamon. All rights reserved. 23
24 Respecting Data Privacy: URL Categorization File sharing Website (e.g. Dropbox) Internet Webroot Banking Website (e.g. Citi) Health care Website (e.g. Aetna) Inline tool (decrypted traffic) Supports up to 83 Web categories (Finance, Government ) Flexible policies based on multiple parameters (IP, Ports, VLAN, domain, categories) Whitelists and blacklists with over 5000 domain names 2018 Gigamon. All rights reserved. 24
25 NetFlow/IPFIX Generation Without Gigamon With Gigamon Challenges: High impact on routers and switches for generating NetFlow records Routers / switches generate sampled NetFlow which is inadequate for security Some routers do not support NetFlow, others have proprietary flow methods Without NetFlow, you can only instrument parts of your network for Deep Packet Inspection (DPI) Generating NetFlow Information: With NetFlow, you know where you need to DPI. Enable end-to-end security enforcement with visibility into every flow Ideal to detect Command and Control communications Validated with I ndustry-leading SIEM and NetFlow forensics collectors 2018 Gigamon. All rights reserved. 25
26 NetFlow Usage Network Monitoring Security Application Monitoring Network and capacity planning User/group monitoring and trending Troubleshooting network capacity problems Validation of QoS / ToS parameters Anomalous network behavior detection Attack discovery and mitigation Identification of compromised hosts Application discovery Application performance and impact monitoring Cloud performance monitoring Accounting Billing & Charge back 2018 Gigamon. All rights reserved. 26
27 NetFlow Generation Application Standards-based Flow Summarization & Analytics Flow Metadata Unsampled (1:1) NetFlow / IPFIX generation to detect low-and-slow attacks Filter records based on configurable parameters to predetermined tools Offload NetFlow/IPFIX generation from overloaded network infrastructure SIEM and NetFlow Forensics Integration Enable end-to-end security enforcement with visibility into every flow Ideal to detect Command and Control communications Validated with industry-leading SIEM and NetFlow forensics collectors Advanced Information Elements Optionally export URL info into custom elements in generated records Export records to up to six collectors supporting NetFlow v5 / v9 and IPFIX Leverage LLDP / CDP information to pinpoint network source 2018 Gigamon. All rights reserved. 27
28 Metadata Engine Without Gigamon With Gigamon Volume, types and amount of data overwhelm SIEMs Metadata Engine Benefits: High Performance Cost Savings Full visibility, better security 2018 Gigamon. All rights reserved. 28
29 Metadata Extensions - URL and Response Codes URL & HTTP RESPONSE CODES Identify suspicious communication to malicious servers Uncover Denial of Service & compromise of internal web servers Key Benefits Export URL collection from HTTP & SIP messages Detect possible server compromise with Redirects Detect potential DoS attacks if server unavailable Baseline normal activity and detect anomalies EXTRACTED FIELDS All Response codes including: 100 Continue 101 Switching Protocols 200 OK 201 Created 202 Accepted 203 Non-Authoritative Information (since HTTP/1.1) 204 No Content 301 Moved Permanently 302 Found 400 Bad Request 401 Unauthorized 402 Payment Required 403 Forbidden 404 Not Found 406 Not Acceptable 409 Conflict 2018 Gigamon. All rights reserved. 29
30 Metadata Extensions - DNS DNS EXTRACTED FIELDS C&C Bots DNS Discover malicious communications to C&C servers using DNS transactions dnsidentifier dnsopcode dnsresponsecode dnsqueryname dnsresponsename dnsresponsettl dnsresponseipv4addr dnsresponseipv6addr dnsdatalen Key Benefits Uncover domain lookups for malicious C2 servers Identify endpoints beaconing to C2 servers Identify suspicious DNS servers with low TTLs Identify rogue DNS servers in the network 2018 Gigamon. All rights reserved. 30
31 Metadata Extensions - Certificate Anomalies HTTPS CERTIFICATES Analyze HTTPS certificates for bad or suspicious certificates EXTRACTED FIELDS sslcertificatesubject sslcertificatevalidnotbefore sslcertificatevalidnotafter sslcetificateserialnumber sslcertificatesignaturealgorithm sslcertificatesubjectpubalgorithm sslcertificatesubjectpubkeysize sslcertificatesubjectaltname sslservernameindication Key Benefits Identify expired certificates in network Identify self signed certificates in network Identify certificates using weak cipher algorithms Identify anomalies and mismatches in certificate fields 2018 Gigamon. All rights reserved. 31
32 VMware ESX and NSX Visibility into virtualized Data Ceneter and the Private Cloud
33 Network Traffic Visibility For Cross Network Workloads Challenges VM VM VM VM VM VM SERVER SERVER VIRTUALIZE Hypervisor Hypervisor HOST HOST Switch Switch TRADITIONAL VISIBILITY SPAN on Switch Ports Physical TAPs VIRTUAL VISIBILITY CHALLENGES Blind spots for Inter-Host VM traffic Blind spots for Intra-Host VM traffic (blade center) Security and Application Monitoring are forcing considerations!!! 2018 Gigamon. All rights reserved. 33
34 Virtual Visibility: More Important Than Ever 5 REASONS WHY YOU MUST CARE 1. Security no longer an after-thought during virtualization 2. Increasing VM density with mission-critical workloads 3. Visibility into VM-VM traffic needed for Security and Application Performance Monitoring (APM) 4. Creating new virtual instances of tools affects workload performance 5. Automated visibility after VM migration GigaVUE-VM IDS VIRTUAL IDS VM1 VIRTUAL ANTI- MALWARE VIRTUAL APM VM VIRTUAL SWITCH HYPERVISOR HOST VIRTUAL SWITCH HYPERVISOR HOST ANTI-MALWARE APM 2018 Gigamon. All rights reserved. 34
35 SSL decryption: East- West- Traffic Decryption of East-West-Traffic within vmware Complete Visibility Architecture tweaking GigaVUE-VM GigaVUE-VM IDS HYPERVISOR HYPERVISOR ANTI-MALWARE HOST HOST APM 2018 Gigamon. All rights reserved. 35
36 GigaVUE-VM Light Footprint Virtual Machine, Not Kernel Module 2018 Gigamon. All rights reserved. 36
37 GigaVUE-VM: Virtual Workload Monitoring Enhanced for Software Defined Data Centers (SDDC) Virtual Traffic Policies vcenter integration Bulk GigaVUE-VM onboarding Virtual traffic policy creation Internet Tunneling SERVER I SERVER II Private Cloud GigaVUE-FM Automatic migration of monitoring policies Application Performance Network Management Security Production Network Tools and Analytics 2018 Gigamon. All rights reserved. 37
38 Key Benefits Securing Virtual Traffic in the Software Defined Data Center Visibility into inter-host or intra-host virtual traffic Pervasive Visibility Virtual + Physical Automated Visibility into virtual traffic with dynamic service insertion Help preserve investment of your security and monitoring infrastructure 2018 Gigamon. All rights reserved. 38
39 Amazon Web Services Visibility into Public Cloud
40 Visibility Hot Spots in a Sample Web Application East-West Hot Spots North-South Hot Spots 2018 Gigamon. All rights reserved. 40
41 Public Cloud Visibility Challenges and Gigamon Solution AWS AWS Region Region VPC ELB VPC ELB Web Tier ELB Tool Tier Gigamon Visibility Platform Web Tier ELB Visibility Tool Tier Tier GigaVUE-FM App Tier App Tier RDS RDS Tool Tier AZ AZ Inability to access all traffic Discreet vendor monitoring agents per instance Impacts workload and VPC performance Increases complexity Static visibility with heavy disruption Consistent way to access network traffic Distribute traffic to multiple tools Customize traffic to specific tools Elastic Visibility as workloads scale-out Elastic Load Balancing (ELB) Subnet Instances Tool Amazon Relational Database Service (RDS) Availability Zone (AZ) 2018 Gigamon. All rights reserved. 41
42 Deployment Examples: Hybrid Cloud Visibility Preserve Tool Investment AWS Region On-premise Data Center VPC ELB Web Tier 3 Visibility Tool Tier Tier Amazon EC2 APIs Amazon CloudWatch 1 2 GigaVUE-FM 1 2 Integrate with Amazon APIs Deploy Visibility Tier ELB App Tier RDS 3 Tool Tier 4 4 Tunneling Tool Tier 3 4 Copy EC2 instance traffic Aggregate and distribute customized traffic to tools AZ Elastic Load Balancing (ELB) Subnet Instances Tool Amazon Relational Database Service (RDS) Availability Zone (AZ) VPN Gateway VPN Connection Router Data Center 2018 Gigamon. All rights reserved. 42
43 2016 Gigamon. All rights reserved. Deployment Examples: Multi-VPC Visibility 2018 Gigamon. All rights reserved. 43
44 Multi-Cloud Deployments
45 Multi-cloud: Centralized Visibility and Security PRESERVE TOOL INVESTMENT Applications SecOps VPC Applications Web tier Visibility tier Tool tier Visibility tier Web tier Web tier Visibility tier GigaVUE-FM App tier Amazon CloudWatch Azure API Management AWS Direct Connect Azure ExpressRoute On-Premises Data Center Security, Performance Management, and Analytics Tools 2018 Gigamon. All rights reserved. 45
46 Multi-cloud: Hybrid Cloud Visibility PRESERVE TOOL INVESTMENT Elastic Load Balancing Web tier Visibility tier Amazon CloudWatch On-Premises Data Center GigaVUE-FM Azure API Management Visibility tier Azure Load Balancing Web tier Elastic Load Balancing Azure Load Balancing App tier Amazon RDS Tool tier Tunneling Tool Tier Tunneling Tool tier App tier Azure SQL Database Availability Zone Region Virtual Network 2018 Gigamon. All rights reserved. 46
47 2018 Gigamon. All rights reserved. 47
48 2018 Gigamon. All rights reserved. 48
The Gigamon Visibility Platform
The Gigamon Visibility Platform See what matters. Andrea Baraldi - Sales Engineer Marco Romagnoli Sales Director 1 Safe Harbor Statement Any forward-looking indication of plans for products is preliminary
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationSolution Overview Gigamon Visibility Platform for AWS
Solution Overview Gigamon Visibility Platform for Background With the rapid evolution of the public cloud that brings instant advantages of economies of scale, elasticity and agility, IT and data center
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationProduct Brief GigaVUE-VM
Product Brief GigaVUE-VM Active Visibility for Virtual Workloads With exponential growth in virtualized traffic within the data center, a primary challenge for the centralized monitoring infrastructure
More informationData Sheet Gigamon Visibility Platform for AWS
Data Sheet Gigamon Visibility Platform for Overview The rapid evolution of Infrastructure-as-a-Service (IaaS), or public clouds, brings instant advantages of economies of scale, elasticity, and agility
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationData Sheet GigaSECURE Cloud
Data Sheet GigaSECURE Cloud Intelligent network traffic visibility that enables enterprises to extend their security posture to Microsoft The rapid evolution of Infrastructure-as-a-Service (IaaS) brings
More informationAutomated Traffic Visibility for SDDC Solution Guide
Automated Traffic Visibility for SDDC Solution Guide COPYRIGHT Copyright 2016 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationAligning Agency Cybersecurity Practices with the Cybersecurity Framework
POINT OF VIEW Aligning Agency Cybersecurity Practices with the Cybersecurity Framework Leveraging Gigamon to Align Cybersecurity Budgets with Desired Business Outcomes 2013-2017 Gigamon. All rights reserved.
More informationUse Cases Application And Service Monitoring Eliminate contention for network data. Centralize Netflow/IPFIX Generation
X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12 X13/X14 X15/X16 X17/X18 X19/X20 X21/X22 X23/ C1 C2 C3 USB CON MGMT PTP C4 C5 STACK STACK P/S PPS(IN) C1 C2 C3 C4 C5 C6 C7 C8 X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12
More informationUse Cases Application And Service Monitoring Eliminate contention for network data. Centralize Netflow/IPFIX Generation
X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12 X13/X14 X15/X16 X17/X18 X19/X20 X21/X22 X23/ C1 C2 C3 USB CON MGMT PTP C4 C5 STACK STACK P/S PPS(IN) C1 C2 C3 C4 C5 C6 C7 C8 X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12
More informationInfrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation
Infrastructure Blind Spots Continue to Fuel Personal Data Breaches Sanjay Raja Lumeta Corporation Why Is Real-Time Network & Cloud Situational Awareness Critical? Today s business drivers enable a greater
More informationIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots Юлий Явич, IXIA 1 Enterprise Carriers/ Service Providers 74 45 15 of the Fortune 100 of the top 50 carriers of the top 15 NEMs NEMs Customer Focused
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationImperva SecureSphere Appliances
Imperva SecureSphere Appliances DATASHEET Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior and resiliency for demanding data center environments. With fail open interfaces,
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationCisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics
Solution Overview Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics BENEFITS Gain visibility across all network conversations, including east-west and north-south
More informationBIG MON CONTROLLERS BIG MON ANALYTICS NODE. Multi-Terabytes L2-GRE 1/10/25/40/100G ETHERNET SWITCH FABRIC. Optional BIG MON BIG MON SERVICE NODES
Modern Packet Recorder: Enhancing Data Security and Privacy Compliance OVERVIEW In response to the stringent corporate governance and compliance requirements for how IT data is secured, controlled, and
More informationUsing Visibility To Turn The Tables on Cybercriminals
SESSION ID: SPO-W07B Using Visibility To Turn The Tables on Cybercriminals Johnnie Konstantas Director, Security Solutions Gigamon Inc. Twitter: @jkonstantas Agenda Turning the tables on cybercriminals
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More information1V0-642.exam.30q.
1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized
More informationDDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud
SSL Orchestrator DDoS Hybrid Defender All-in-one solution designed to deliver increased visibility into encrypted traffic Comprehensive DDoS protection, tightly-integrated on-premises and cloud Converts
More informationMcAfee Virtual Network Security Platform
McAfee Virtual Network Security Platform Complete threat detection for cloud networks McAfee Virtual Network Security Platform is a complete network threat and intrusion prevention system (IPS) solution
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape More data, more danger. Data proliferation brings many new opportunities but also many downsides: more data breaches, more sophisticated
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape 5 big cyber security trends for 2018 More data, more danger. Data proliferation brings many new opportunities but also many downsides:
More informationPolicy Enforcer. Product Description. Data Sheet. Product Overview
Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.
More informationCLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY
CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationGigamon Metadata Application for IBM QRadar Deployment Guide
Gigamon Metadata Application for IBM QRadar Deployment Guide COPYRIGHT Copyright 2018 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationWEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM
SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationThe Why, What, and How of Cisco Tetration
The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is
More information75% 64% Data Sheet GigaVUE-HC1
CRPS 460W AC Gold USB PWR FAN PTP PPS M/S Mgnt / Con Stack/PTP G1 / G2 G3 / G4 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12 PPS(IN) P/S CRPS 460W AC Gold Data Sheet 75% 64% (front) (rear) of organizations believe
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationSecurity for the Cloud Era
Security for the Cloud Era Make the Most Out of Your Cloud Journey Fadhly Hassim Sales Engineer South East Asia & Korea Barracuda Networks Current Weather Situation Customer Provisions & Manage On-Premises
More informationSteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN
Data Sheet SteelConnect The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming
More informationSecuring the Software-Defined Data Center
Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationSECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry
SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below
More informationVMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no
LHC3296BUS OVH: Shields Up! Building a True Security Barrier in the Cloud Chris Romano, Principal Systems Engineer #VMworld #LHC3296BUS VMworld disclaimer This presentation may contain product features
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationAutomated Response in Cyber Security SOC with Actionable Threat Intelligence
Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent
More informationSecurity: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration
Security: A Driving Force Behind Moving to the Cloud Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration 2017, Amazon Web Services, Inc. or its affiliates.
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationProduct Guide Revision B. McAfee Cloud Workload Security 5.0.0
Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationSECURING THE MULTICLOUD
SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationCato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.
Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces
More informationADC im Cloud - Zeitalter
ADC im Cloud - Zeitalter Applikationsdienste für Hybrid-Cloud- und Microservice-Szenarien Ralf Sydekum, SE Manager DACH, F5 Networks GmbH Some of the Public Cloud Related Questions You May Have.. It s
More informationARIA SDS. Application
ARIA SDS Packet Intelligence Application CSPi s ARIA SDS Packet Intelligence (PI) application enhances an organization s existing network security capabilities by enabling the monitoring of all network
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationVISION ONE: SECURITY WITHOUT SACRIFICE
VISION ONE: SECURITY WITHOUT SACRIFICE DATA SHEET Amplify your security without changing a cable. Vision ONE provides IT Operations the ability to deploy resources where they are needed most and secure
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationData-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device. Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks
Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks Your Monitoring Strategy Must Change How can you maintain
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationGigaVUE-FM. Data Sheet
SAS 1TB 7.2x Data Sheet Available as a virtual or hardware appliance 6 Orchestration and Management of the Gigamon Visibility Platform The Gigamon Visibility Platform delivers pervasive visibility across
More informationSoftware-Defined Secure Networks in Action
Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationWHITEPAPER AMAZON ELB: Your Master Key to a Secure, Cost-Efficient and Scalable Cloud.
WHITEPAPER AMAZON ELB: Your Master Key to a Secure, Cost-Efficient and Scalable Cloud www.cloudcheckr.com TABLE OF CONTENTS Overview 3 What Is ELB? 3 How ELB Works 4 Classic Load Balancer 5 Application
More informationALIENVAULT USM FOR AWS SOLUTION GUIDE
ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management
More informationCisco Nexus Data Broker
Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationCloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer
Cloud, SDN and BIGIQ Philippe Bogaerts Senior Field Systems Engineer Virtual Editions TMOS/LTM 12.0 Highlights 1 NIC support Azure Marketplace Kernel Independent driver Enhanced Hypervisor support F5 Networks,
More informationValidating the Security of the Borderless Infrastructure
SESSION ID: CDS-R01 Validating the Security of the Borderless Infrastructure David DeSanto Director, Product Management Spirent Communications, Inc. @david_desanto Agenda 2 The Adversary The Adversary
More information25 Best Practice Tips for architecting Amazon VPC. 25 Best Practice Tips for architecting Amazon VPC. Harish Ganesan- CTO- 8KMiles
25 Best Practice Tips for architecting Amazon VPC 25 Best Practice Tips for architecting Amazon VPC Amazon VPC is one of the most important feature introduced by AWS. We have been using AWS from 2008 and
More informationSOC AUTOMATION OF THREAT INVESTIGATION
SOC AUTOMATION OF THREAT INVESTIGATION White Paper When a Security Operations Center (SOC) is shown on TV, it has a specific portrayal. There is a large wall full of screens. World maps showing the threat
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2673BU Clearing Cloud Confusion Nick King and Neal Elinski #VMworld #LHC2673BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationConnection Logging. Introduction to Connection Logging
The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: Introduction to, page 1 Strategies, page 2 Logging Decryptable Connections
More informationCompute - 36 PCPUs (72 vcpus) - Intel Xeon E5 2686 v4 (Broadwell) - 512GB RAM - 8 x 2TB NVMe local SSD - Dedicated Host vsphere Features - vsphere HA - vmotion - DRS - Elastic DRS Storage - ESXi boot-from-ebs
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationExam Name: VMware Certified Associate Network Virtualization
Vendor: VMware Exam Code: VCAN610 Exam Name: VMware Certified Associate Network Virtualization Version: DEMO QUESTION 1 What is determined when an NSX Administrator creates a Segment ID Pool? A. The range
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationIntelligent Edge Protection
Intelligent Edge Protection Sicherheit im Zeitalter von IoT und Mobility September 26, 2017 Flexible consumption Beacons, sensors and geo-positioning Driven by agile DevOps Mobile users, apps and devices
More informationSecuring VMware NSX MAY 2014
Securing VMware NSX MAY 2014 Securing VMware NSX Table of Contents Executive Summary... 2 NSX Traffic [Control, Management, and Data]... 3 NSX Manager:... 5 NSX Controllers:... 8 NSX Edge Gateway:... 9
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationConnection Logging. About Connection Logging
The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: About, page 1 Strategies, page 2 Logging Decryptable Connections with SSL
More informationQualys Cloud Platform
Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new
More informationMcAfee Cloud Workload Security Product Guide
Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationSecurity Considerations for Cloud Readiness
Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution
More informationCheck Point 4800 with Gigamon Inline Deployment Guide
Check Point 4800 with Gigamon Inline Deployment Guide COPYRIGHT Copyright 2016 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationSIEM Product Comparison
SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology
More information