FlowMon ADS implementation case study

Size: px
Start display at page:

Download "FlowMon ADS implementation case study"

Transcription

1 FlowMon ADS implementation case study Kamil Doležel AdvaICT, a.s. Brno, Czech Republic Abstract FlowMon ADS implementation provides completely new insight into networks of all sizes. Its benefits have been already proven in many businesses, as well as in universities s networks. I will describe our experience with implementation of this solution, while focusing on challenges we were facing and problems we have solved. Keywords: FlowMon, ADS, AdvaICT, Invea-Tech, implementation, praxis, experience, NetFlow. 1 Introduction FlowMon ADS is a complex solution representing efforts of Invea-Tech, AdvaICT and Masaryk University. In contrast to other security solution at network level, it analyzes behavior of network devices instead of checking known sequence of bytes inside packet payload. FlowMon ADS can also analyze encrypted communication, where other solutions are useless. 2 Problems solved by FlowMon ADS 2.1 Veletrhy Brno Current solutions in place: By the date of the implementation Veletrhy Brno had implemented many standard security measures at the network including firewall, host antivirus, IDS Main challenge Any problems detected by firewall, IDS or antivirus were difficult to analyze further, gathering evidence was impossible. Their main pain was the identification of the device which initiated the attack, which was then spreading across network, infecting other computers. They lacked even basic network visibility FlowMon ADS implementation Proposed solution: FlowMon Probe FlowMon ADS Security and Protection of Information 2011

2 2.1.4 Points of monitoring Network infrastructure in Veletrhy Brno was configured as multiple star with 1 GB fibre interlinks. They have also been using many Wi-Fi routers to provide wireless connectivity to their customers. We had to identify where is or are the optimal points for NetFlow collection. Cisco backbone switch and DMZ switch were identified as optimal to cover most of the important traffic for behavioural analysis Actual connection Two Cisco switches, we had identified before, were configured to mirror traffic into one port, where we connected monitoring interface of FlowMon Probe Configuration It took 1 hour to fully configure FlowMon ADS to operational state. Additional fine-tuning of several specific detection methods was necessary to be performed a week later Benefits Benefits for Veletrhy Brno after 3 months They no longer need to manually analyze network to find which device originally initiated network scan or attack, they can visualize it through FlowMon ADS web interface. Any problem with loss of connection, overloaded Wi-Fi routers, etc. is immediately reported. They have history of every single flow that has been captured and stored, so they can use this as an evidence of incidents, which has happened. 2.2 Masaryk University Main Challenges Since any academical networks are open to outside world, they suffered from network scans, botnets, and especially from dictionary attacks to SSH service. They also tried other solutions like Enterasys DCC, but they were not suitable for such open environment, as the requirement was to provide all logs from SSH servers for further analysis. This was impossible since anyone can bring PC, plug in into university network and run SSH server. Another challenge was to identify what machines are acting as servers on their network and what machines are behaving as clients. Estimated number of network devices to monitor was estimated to be more than 10, Implementation Proposed solution MyNetScope ADS (more powerful version of FlowMon ADS) Point of monitoring We have started monitoring single faculty at the start to prove, that the solution really solves problems faced and to ensure it can handle massive amount of traffic (flows). Few months later MyNetScope ADS was monitoring all ingress and egress traffic for whole university. Security and Protection of Information

3 2.2.4 Benefits Benefits for Masaryk university after 1 ½ year Easy identification of servers and clients on the network by utilizing computation of long term behavioural profiles. Information about FTP, SFTP servers providing data to outside world as well as any other server types are reported, thanks to flow pairing (flow pairing: who initiated communication to particular network port is client and who responded on that port is server). SSH dictionary attacks are detected over whole network and attacker s IP s are reported. This method works even, if attack is distributed or performed with very low intensity in time. Again potentially compromised machines via SSH are reported. Network devices in university network, which are scanning, attacking or spreading botnets, are reported as well. (Chuck Norris botnet was first identified by Masaryk University). 2.3 Internet Service Provider ISP Main challenges This ISP has more than 3,500 clients, which connect their own computers. ISP has no control over them, while still have to provide reliable service. ISP had been trying to solve problems with many customers utilizing P2P networks for illegal data sharing 24/7. Additional pains included clients infected with viruses, botnets and computers sending SPAM. Generally ISP also needs to: Know real utilization of their infrastructure to plan peering bandwidth. Keep expenses low by eliminating customers, which are consuming too much bandwidth for illegal activities; to save costs Implementation Proposed solution FlowMon Probe Desktop 10/100/1000 TAP. FlowMon Collector R FlowMon ADS 102. Collector with 4TB of storage was used, as an average number of flow/second was around More memory and additional CPU was also needed to have enough computing power for anomaly detection Point of monitoring The link between perimeter router and accounting/policing system was identified as the most suitable place to monitor. We had to connect TAP between these devices, providing us complete mirror of all the traffic. The main advantage of the TAP was that we could easily identify which traffic was ingress and which was egress. We could also monitor private address area, as NAT was performed at perimeter router. 28 Security and Protection of Information 2011

4 2.3.4 Benefits After 1 month of Proof of Concept Identification of p2p traffic, even when it was encrypted. Identification of 20+ computers which were part of botnet network, other were infected by virus scanning network. Several computers were hitting DNS server with enormous number of DNS request/second single IP issued more than 400 DNS requests per second. Some computers also sent malformed DNS requests without compliance with according RFC standard. Detection of one successful SSH attack to billing/policing server placed on backbone; in a few minutes this server started massive network scan completely blocking all the ISP bandwidth, which led to 3 hours outage. Unfortunately during PoC ADS technology was still not included into NOC (Network Operational Centre) processes, so no action was taken by ISP after breach over SSH was detected by FlowMon ADS. 2.4 Other benefits Many other customers reported following benefits: Problem at VMware ESX At 10:00 AM all virtual machines were slowed down. VMware was able to export NetFlow data directly into FlowMon Collector. FlowMon ADS identified very high traffic between two virtual machines. It was caused by incorrectly set backup time. Backup took place between 2 VM guests. Instead of 10:00PM, admin did set the backup to take place at 10:00AM Unable to monitor complex MPLS network Company with 80 locations connected using MPLS reported occasional network slow-downs in several offices, unable to use Cisco IP telephony. MPLS provider denied the problem. Gateway routers at all 80 locations were configured to generate NetFlow, which were collected in the head office by FlowMon ADS Collector. Since NetFlow bandwidth ratio to monitored traffic is 1:500, it did not create any problems with link speed. FlowMon provided real usage of all MPLS links, confirming that SLA was not fulfilled by the service provider. (high latencies for traffic, which had to be prioritized packets marked with correct IP Precedence 5 did arrive to other end at IP Precedence 0 sometimes; several MPLS links did not have bandwidth according to contract). Security and Protection of Information

5 2.4.3 Problems with outgoing SPAM Company was using MS Exchange for services with SMTP running for legacy applications. Several times they appeared on SPAM list, unable to identify the source of the problem. FlowMon ADS identified the source of SPAM by utilizing dedicated method. Problem had been identified as it was caused one notebook infected with yet unknown virus. Additionally they had configuration problem at firewall, where they set rule for port 25 blocking incorrectly Unexpectedly high link usage Very high Internet link usage was reported most of the time. One solution was to upgrade its speed. After the upgrade problem was still there. After 1 st day of monitoring was absolutely clear, that the excessive load was caused by 2 computers utilizing the link to 100% all the time downloading from rapidshare, hotfiles, etc. After corrective action average link utilization went down to 3% proving that the upgrade was not necessary Policy compliance Many companies forbid to use Instant messengers, Skype and other possibly dangerous software. It is not easy to check, if employees are not circumventing such policies. After 14 days run of FlowMon ADS, several computers running ICQ and Skype tunnelling through ports 80 and 443 were identified. Additionally 2 PC also used anomization services to browse inappropriate websites. 3 Conclusion This article proves that behavioural analysis of network traffic (NetFlow) can provide major benefit for organizations of all sizes. Above described solution is already being used by many different companies on daily basis. FlowMon ADS works as an independent solution, providing non intrusive, passive monitoring of the network. It significantly improves overall network security detecting many threats and incidents, which cannot be detected by any pattern based detection methods (IDS/IPS, antiviruses, etc.). FlowMon ADS can also analyze encrypted traffic (i.e. SSH attacks method), where classical systems fail. References [ 1 ] NetFlow, [ 2 ] FlowMon ADS and FlowMon Probes and Collectors specification, and [ 3 ] What is Network Behavioral Analysis?, 30 Security and Protection of Information 2011

Flows at Masaryk University Brno

Flows at Masaryk University Brno Flows at Masaryk University Brno Jan Vykopal Masaryk University Institute of Computer Science GEANT3/NA3/T4 meeting October 21st, 2009, Belgrade Masaryk University, Brno, Czech Republic The 2nd largest

More information

Next Generation Network Traffic Monitoring and Anomaly Detection. Petr Springl

Next Generation Network Traffic Monitoring and Anomaly Detection. Petr Springl Next Generation Network Traffic Monitoring and Anomaly Detection Petr Springl springl@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects

More information

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your

More information

From Signature-Based Towards Behaviour-Based Anomaly Detection (Extended Abstract)

From Signature-Based Towards Behaviour-Based Anomaly Detection (Extended Abstract) From Signature-Based Towards Behaviour-Based Anomaly Detection (Extended Abstract) Pavel Minarik, Jan Vykopal Masaryk University CZECH REPUBLIC minarik@ics.muni.cz / vykopal@ics.muni.cz INTRODUCTION It

More information

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Handbook HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Part 3: Network Traffic Monitoring or Packet Analysis? by Pavel Minarik, Chief Technology Officer at Flowmon Networks www.flowmon.com In previous two

More information

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow

More information

Flow-based Traffic Visibility

Flow-based Traffic Visibility Flow-based Traffic Visibility Operations, Performance, Security Pavel Minařík, Chief Technology Officer What is Flow Data? Modern method for network monitoring flow measurement Cisco standard NetFlow v5/v9,

More information

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

Driving Network Visibility

Driving Network Visibility Flowmon Price List EUR Driving Network Visibility Flowmon Hardware Appliances... 2 Flowmon Virtual Appliances... 3 Flowmon Cloud... 3 Flowmon ADS Anomaly Detection System... 4 Flowmon DDoS Defender...

More information

Network Security Monitoring with Flow Data

Network Security Monitoring with Flow Data Network Security Monitoring with Flow Data IT Monitoring in Enterprises NPMD (Network Performance Monitoring & Diagnostics) SNMP basics Flow data for advanced analysis and troubleshooting Packet capture

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

DDoS Protection in Backbone Networks

DDoS Protection in Backbone Networks DDoS Protection in Backbone Networks The Czech Way Pavel Minarik, Chief Technology Officer Holland Strikes Back, 3 rd Oct 2017 Backbone DDoS protection Backbone protection is specific High number of up-links,

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE

ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE AGENDA Network Traffic Analysis: What, Why, Results Malware in the Heart of Europe Bonus Round 2 WHAT: NETWORK TRAFFIC ANALYSIS = Statistical analysis,

More information

CNIT 50: Network Security Monitoring. 2. Collecting Network Traffic: Access, Storage, and Management

CNIT 50: Network Security Monitoring. 2. Collecting Network Traffic: Access, Storage, and Management CNIT 50: Network Security Monitoring 2. Collecting Network Traffic: Access, Storage, and Management Topics A Sample Network for a Pilot NSM System IP Addresses and Network Address Translation Choosing

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Validation of the Network-based Dictionary Attack Detection

Validation of the Network-based Dictionary Attack Detection Validation of the Network-based Dictionary Attack Detection Jan Vykopal vykopal@ics.muni.cz Tomáš Plesník plesnik@ics.muni.cz Institute of Computer Science Masaryk University Brno, Czech Republic Pavel

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Maximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope

Maximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer Lancope Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NetFlow in Action h Network Operations

More information

WAFA X3 Evolution Grade of Service. 13 October 2008

WAFA X3 Evolution Grade of Service. 13 October 2008 Evolution Grade of Service 13 October 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Evolution Service. It enables

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

HX Grade of Service W3a & Sesat2 Middle East. 16 Jan 2008

HX Grade of Service W3a & Sesat2 Middle East. 16 Jan 2008 HX Grade of Service W3a & Sesat2 Middle East 16 Jan 2008 1 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the BENTLEY HX Service.

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

Monitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks

Monitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks Monitoring and diagnostics of data infrastructure problems in power engineering Jaroslav Stusak, Sales Director CEE, Flowmon Networks 35,000 kilometers of electric power, which feeds around 740,000 clients...

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

Grades of Service at a glance

Grades of Service at a glance 1st August 2013 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Bentley X3 Evolution Service. It enables people to easily

More information

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Cisco Cyber Range. Paul Qiu Senior Solutions Architect Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I

More information

AplombTech Smart Router Manual

AplombTech Smart Router Manual AplombTech Smart Router Manual (Version: 1.0) 1 Version & Purpose Version Manual version V 1.0 Explanation Corresponds to the initial version of device Purpose This manual describes the function features

More information

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

Securing CS-MARS C H A P T E R

Securing CS-MARS C H A P T E R C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout

More information

CtrlS Datacenters Placement Questions And Answers

CtrlS Datacenters Placement Questions And Answers DATA CENTER Q1. What is Data Center? Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the companys information

More information

Bentley Walker StarCom Grade of Service. 4 th June 2010

Bentley Walker StarCom Grade of Service. 4 th June 2010 Bentley Walker StarCom Grade of Service 4 th June 2010 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Star Com Service.

More information

SUMMARY OF SERVICES PROVIDED

SUMMARY OF SERVICES PROVIDED SUMMARY OF SERVICES PROVIDED Desktop Desktop Included Anti-Virus Software license for all PC s Anti-Spyware License for all PC s Automated managed distribution of monthly Windows updates Unlimited Remote

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : 640-861 Title : CCDA Cisco Certified Design Associate Vendors : Cisco Version : DEMO Get Latest &

More information

Seceon s Open Threat Management software

Seceon s Open Threat Management software Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

Introduction to Network Discovery and Identity

Introduction to Network Discovery and Identity The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Analyze & prioritize alerts across various sources The cornerstone of security

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

SonicWALL / Toshiba General Installation Guide

SonicWALL / Toshiba General Installation Guide SonicWALL / Toshiba General Installation Guide SonicWALL currently maintains two operating systems for its Unified Threat Management (UTM) platform, StandardOS and EnhancedOS. When a SonicWALL is implemented

More information

CYBERSECURITY RISK LOWERING CHECKLIST

CYBERSECURITY RISK LOWERING CHECKLIST CYBERSECURITY RISK LOWERING CHECKLIST The risks from cybersecurity attacks, whether external or internal, continue to grow. Leaders must make thoughtful and informed decisions as to the level of risk they

More information

Cisco Security Monitoring, Analysis and Response System 4.2

Cisco Security Monitoring, Analysis and Response System 4.2 Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

The Eight Components of a Strong Cyber Security Defense System

The Eight Components of a Strong Cyber Security Defense System The Eight Components of a Strong Cyber Security Defense System SEG Secure Email Gateway An appliance that provides anti-spam and anti-malware protection. It is installed on top of a corporation s Email

More information

PrecisionAccess Trusted Access Control

PrecisionAccess Trusted Access Control Data Sheet PrecisionAccess Trusted Access Control Defeats Cyber Attacks Credential Theft: Integrated MFA defeats credential theft. Server Exploitation: Server isolation defeats server exploitation. Compromised

More information

Cisco SA 500 Series Security Appliances

Cisco SA 500 Series Security Appliances Cisco SA 500 Series Security Appliances An All-in-One Security Solution to Secure Your Small Business The Cisco SA 500 Series Security Appliances, part of the Cisco Small Business Pro Series, are comprehensive

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take

More information

Logical Network Design (Part II)

Logical Network Design (Part II) Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Introduction to Network Discovery and Identity

Introduction to Network Discovery and Identity The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, on page 1 Uses for Host, Application, and User Discovery and Identity

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

Chapter 5 Advanced Configuration

Chapter 5 Advanced Configuration Chapter 5 Advanced Configuration This chapter describes how to configure the advanced features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. Configuring Advanced Security The modem router

More information

24/7 Instant Technical Support Designed for Non-Geeks

24/7 Instant Technical Support Designed for Non-Geeks Fast & Flawless: iprotector 24/7 Instant Technical Support Designed for Non-Geeks RESCUECOM s ground breaking, revolutionary software and flawless service means you get the support you need, the moment

More information

EN6200 Series Feature Sheet

EN6200 Series Feature Sheet + 7500 Successful Installation EN6200 Series Feature Sheet Security Solutions Antivirus UTM AAA User Management VPN Connectivity www.tacitine.com EN 6200 Series Unified Threat Management with AAA Hotspot

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Synchronized Security

Synchronized Security Synchronized Security 2 Endpoint Firewall Synchronized Security Platform and Strategy Admin Manage All Sophos Products Self Service User Customizable Alerts Partner Management of Customer Installations

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

NIP6000 Next-Generation Intrusion Prevention System

NIP6000 Next-Generation Intrusion Prevention System NIP6000 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices, such

More information

WhatsUpGold. v14.3. Getting Started Guide

WhatsUpGold. v14.3. Getting Started Guide WhatsUpGold v14.3 Getting Started Guide Contents Welcome to WhatsUp Gold Network and application infrastructures have become some of the most critical elements in business strategy. High reliance on network

More information

Unlocking the Power of the Cloud

Unlocking the Power of the Cloud TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business The

More information

Simple and Powerful Security for PCI DSS

Simple and Powerful Security for PCI DSS Simple and Powerful Security for PCI DSS The regulations AccessEnforcer helps check off your list. Most merchants think they are too small to be targeted by hackers. In fact, their small size makes them

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

IronPort C100 for Small and Medium Businesses

IronPort C100 for Small and Medium Businesses I R O N P O R T E M A I L S E C U R I T Y A P P L I A N C E S S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Cyber Security. Our part of the journey

Cyber Security. Our part of the journey Cyber Security Our part of the journey The Journey Evolved Built on the past Will be continued Not always perfect Small Steps moving forward The Privileged How to make enemies quickly Ask before acting

More information

UTM 5000 WannaCry Technote

UTM 5000 WannaCry Technote UTM 5000 WannaCry Technote The news is full of reports of the massive ransomware infection caused by WannaCry. Although these security threats are pervasive, and ransomware has been around for a decade,

More information

Network Defenses 21 JANUARY KAMI VANIEA 1

Network Defenses 21 JANUARY KAMI VANIEA 1 Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 First, the news The Great Cannon of China https://citizenlab.org/2015/04/chinas-great-cannon/ KAMI VANIEA 2 Today Open System Interconnect (OSI) model

More information

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter

More information

Introducing LXI to your Network Administrator

Introducing LXI to your Network Administrator Introducing LXI to your Network Administrator Aug 3, 2013 Edition Notice of Rights/Permissions: All rights reserved. This document is the property of the LXI Consortium and may be reproduced, but unaltered,

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Active Flow Monitoring Version 9 Modified: 2017-01-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Forensic Network Analysis in the Time of APTs

Forensic Network Analysis in the Time of APTs SharkFest 16 Forensic Network Analysis in the Time of APTs June 16th 2016 Christian Landström Senior IT Security Consultant Airbus Defence and Space CyberSecurity Topics - Overview on security infrastructure

More information

Network Visibility or Advanced Security?

Network Visibility or Advanced Security? Network Visibility or Advanced Security? TechDays 2017 Roman Cupka, Regional Country Manager SEE roman.cupka@flowmon.com Who We Are Founded in 2007 as a University Spinoff International Network & Security

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical

More information

Edge for All Business

Edge for All Business 1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or

More information