High risk, unwanted and even malicious applications are hiding like parasites on many organizations' networks.

Similar documents
FIREWALL BEST PRACTICES TO BLOCK

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget.

XG Firewall and SD-WAN

FIREWALL BEST PRACTICES TO BLOCK

Next-Gen Firewall Buyers Guide

Sizing Guideline. Sophos XG Firewall XG Series Appliances. Sophos Firewall OS Sizing Guide for XG Series appliances

Sizing Guidelines. Sophos XG Firewall - XG Series Appliances. Sophos Firewall OS Sizing Guide for XG Series appliances

Sophos MSP Connect. One flexible MSP program to connect you and your customers to one complete and simple security solution.

Server Protection Buyers Guide

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Sophos Pricing and Ordering Made Simple Partner FAQ

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

CUSTOMER CASE STUDY. Sophos and Wave 9 Make Managing 20 Schools Easier and More Secure. Customer-at-a-Glance

From Firewall to Cloud, Diocese of Brooklyn Enthusiastically Embraces Unified Sophos Security Across its Parishes and Schools

Sophos XG Firewall Licensing

Endpoint Security Buyers Guide

APP-ID. A foundation for visibility and control in the Palo Alto Networks Security Platform

Consolidating to a Best of Breed Security System

Synchronized Security: Outsmart Hackers by Coordinating Your Defenses

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

Security and Compliance for Office 365

Use Cases. E-Commerce. Enterprise

IBM Security Network Protection Solutions

CASE STUDY. Customer-at-a-Glance. Industry. Sophos Solutions. Fitas Flax Indústria e Comércio Ltda. Brazil. Manufacturing

Cisco s Appliance-based Content Security: IronPort and Web Security

Sophos Gateway Comparison

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

Retail Stores & Restaurant Chains

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

Use Cases. Media & Telecom. Enterprise

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Automated Context and Incident Response

The McGill University Health Centre (MUHC)

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

BUILDING A NEXT-GENERATION FIREWALL

Australian Signals Directorate (ASD) Top 35 Reference Card

Sophos Intercept X. Stopping Active Adversaries An explanation of features included in Sophos Intercept X. Last updated 22th June 2017 v1.

SIEM: Five Requirements that Solve the Bigger Business Issues

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Voice, Video and Data Convergence:

Operating Instructions APX 120

Machine-Powered Learning for People-Centered Security

Database Discovery: Identifying Hidden Risks and Sensitive Data

Synchronized Security

with Advanced Protection

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

Protecting Your SaaS Investment: Monitoring Office 365 Performance

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

ForeScout ControlFabric TM Architecture

CSA for Mobile Client Security

McAfee Advanced Threat Defense

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Cisco Firepower NGFW. Anticipate, block, and respond to threats

The Cognito automated threat detection and response platform

Operating Instructions APX 320/530/740

Take Back Control: Increase Security, Empower Employees, Protect the Business

The State of Endpoint

Securing Your Amazon Web Services Virtual Networks

Defend Against the Unknown

The State of Cloud Monitoring

Improved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis

ACTIONABLE SECURITY INTELLIGENCE

INFINIT Y TOTAL PROTECTION

Sophos Secure Gateway Comparison

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

A Guide to Closing All Potential VDI Security Gaps

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

Enterprise WAN Optimization >

Use Cases. Finance. Enterprise

Solution Brief: XG Firewall

Use Cases. Transportation. Enterprise

Use Cases. Energy & Utilities. Enterprise

Features. HDX WAN optimization. QoS

Kerio Control. Unified Threat Management without Complexity. Presenters name. Presented by

Securing Your Microsoft Azure Virtual Networks

Sophos Central Admin. help

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

2018 Edition. Security and Compliance for Office 365

Advanced Malware Protection: A Buyer s Guide

Sophos Central Admin. help

SophosLabs 2019 Threat Report

Coordinated Threat Control

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

Securing Your Most Sensitive Data

Table of Content. Market Trend

Mission Defense via Information-Centric Security

How can we gain the insights and control we need to optimize the performance of applications running on our network?

Synchronized Security

The Problem with Privileged Users

Automating the Top 20 CIS Critical Security Controls

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Training UNIFIED SECURITY. Signature based packet analysis

CSE 565 Computer Security Fall 2018

Meraki Z-Series Cloud Managed Teleworker Gateway

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Deception: Deceiving the Attackers Step by Step

Transcription:

High risk, unwanted and even malicious applications are hiding like parasites on many organizations' networks. That's because most next-gen firewalls are failing to do their job. They can't identify specific applications and at best are only able to identify the protocol such as HTTP, HTTPS/SLL, UDP or TCP. Which is of no use to a network admin trying to see what security, compliance and productivity risks are present on their network. What are these parasitic applications? Why can't next-gen firewalls see them? And what can you do to make sure you identify every single app on your network?

How Big Is the Parasite Problem? 45% of network traffic goes unidentified on the average corporate network. In other words, the average organization can t identify or classify almost half of the applications running on its network. For a small or medium sized organization that could mean tens or hundreds of unknown applications running on the network. The applications don t need to be actively malicious to pose a problem for your network. Many of them will put additional strain on valuable network bandwidth, but not actively seek to cause harm, while others can open security holes by using unsanctioned connections. And for a quarter of organizations this picture is even worse 70% of their network traffic is going unidentified. The image below shows what a typical firewall dashboard looks like in regard to information on applications. Most likely you have seen something similar in your current or previous firewalls. Top Applications Application Name Percentage of Application General UDP 25.45% General HTTP Management 24.26% General DNS 17.8% General TCP 14.39% Service RCP Services (IANA) 8.86% Bit Torrent Protocol - UDP Activity 1 (Reqs SIB 5)-63 1.6% Conventional firewall dashboard showing categories that could not be identified. In this example roughly 90% of network traffic cannot be identified beyond broad categories, which is of no use to those looking for more detail to prioritize mission-critical applications and restrict unwanted ones. So why can t your firewall identify these applications? The vast majority of modern firewalls use signatures to detect applications (similar to traditional antivirus products) which has an obvious downside if the application doesn t match a known signature then the firewall can t tell you what it is. Some applications use clever techniques to constantly change their traffic patterns and the manner in which they connect outside your organization to evade detection. Other applications use encryption to avoid detection or pretend to be a common web browser so they can pass through the firewall freely. Finally, there are applications that have recently changed, are bespoke or just too obscure to be identified. Whatever the reason, these hidden applications pose a threat to the performance of your network, legitimate applications and in some cases can also create security or compliance risks for the wider corporate network. 2

Why Admins Are Worried 84% of IT managers agree lack of app visibility is a serious security concern. It should come as no surprise that the vast majority of IT managers are worried about these hidden applications running on their organization s network. ÌÌ ÌÌ ÌÌ ÌÌ They may represent a security concern either as a direct threat or malicious app, or enable unsanctioned Shadow IT putting data at risk or creating other security risks They may be adversely impacting the performance of your network, utilizing bandwidth and host resources They may represent a compliance, productivity, or liability issue if users are using these apps for illegal, inappropriate, or unsanctioned activity They may be important mission critical applications that you are unable to properly prioritize with QoS (Quality of Service) and traffic shaping to ensure top performance IT managers also cite further concerns in addition to security worries caused by lack of network visibility: 52% are worried about loss of productivity as a result of unknown network traffic. Users accessing social media apps or playing games on the corporate network causes an obvious productivity loss for the perpetrators, in addition to the additional strain on bandwidth. 42% are concerned about legal liability or compliance issues due to potentially illegal or inappropriate content. Users streaming or downloading copyrighted and illegal content could have wider implications for the organization. 3

Common Network Parasites to Watch Out For 4 in 10 IT managers worry they can t account for their bandwidth consumption. Now we ve seen why these hidden applications can put your network at risk, let s take a look at the more common types of application and specific examples for each. Instant Messaging (IM) and conference apps e.g. Skype, TeamViewer IM and conferencing apps are notoriously evasive to ensure they can punch through most firewalls unconstrained. Of course, every organization now depends heavily on some form of IM and conferencing application suite as part of day-to-day business, so being able to identify and prioritize VoIP and screen sharing for these applications is important. At the same time, unsanctioned IMs not only run the risk of productivity loss, but can also represent a Shadow IT security or compliance risk as users are able to connect with and transfer files to people outside of your organization with little or no oversight. Peer-to-peer clients e.g. BitTorrent, utorrent Peer-to-Peer (P2P) clients are most often utilized to share illegal or copyrighted content, and are carefully designed to mask their traffic and activity. In addition, these applications can easily hoover up significant amounts of bandwidth. This category of unseen applications represents an enormous compliance and liability risk, productivity and resource challenge, and a significant security risk if compromised downloads are entering your network through these tools. Proxy and Tunnel Clients e.g. Psiphon, Ultrasurf, Hotspot Shield Encrypted cloud proxy servers are designed to mask a user s identity, location, and activity. Many people take advantage of these services to bypass geo-location restrictions e.g. watching Netflix shows only available in the US despite your physical location being in Europe. They are also frequently utilized by rogue users to bypass your firewall which is often blind to the encrypted traffic, enabling them to freely access inappropriate or illegal content. Gaming Platforms e.g. Steam, Origin Gaming platforms give users access to thousands of games posing an obvious risk to productivity as well as bandwidth strain for streaming-based games or multiplayer-focused games. These are just a few examples of applications that can t be identified, intentionally or not and can have a negative effect on your organization s network. 4

Solving the Visibility Problem 67% of Sophos customers have discovered over 100 unwanted applications. 1 While next-gen firewalls need to rely on deep packet inspection, pattern matching, and signatures to try and identify applications as they traverse the network, the endpoint is in the unique position where it inherently knows with absolute clarity exactly what executables are generating all network traffic. Hence the solution, a rather obvious matter of connecting the endpoint with the firewall to share this valuable information. Fortunately, at Sophos, we have the technology in place to simply and effectively enable this: Synchronized Security. Sophos Synchronized Security is a revolutionary new approach to IT security that enables security products to share information and work together to provide realtime insights, unparalleled protection, and automated incident response. Sophos Synchronized App Control displaying all network applications One of the first Synchronized Security innovations, Security Heartbeat, connects Sophos Central managed endpoints with Sophos XG Firewall to share endpoint health status, enabling instant identification of systems at risk. When a compromise is detected at either the endpoint or the firewall, traffic light style indicators and alerts are issued in real-time, immediately identifying the computer, user, and process involved. And perhaps the most important benefit of Security Heartbeat, is that the firewall can include endpoint health status in firewall rules, enabling automated response, either limiting access or completely isolating the compromised system until it can be cleaned up. This has reduced response time from hours to seconds and helps reduce the risk of infections spreading to other parts of the network. 1 Sophos customers using XG Firewall and Sophos Endpoint with Synchronized App Control enabled. 5

Another Synchronized Security innovation is Synchronized App Control. As the name implies, Synchronized App Control leverages Sophos unique Synchronized Security ecosystem to effectively and elegantly solve the problem with identifying unknown, evasive or custom application traffic on the network. Synchronized App Control leverages its information sharing ability with the Endpoint to determine the source of unidentified app traffic on the network, effectively removing this thick veil covering networks today. It s the first major breakthrough in network application visibility and control since the next-gen firewall was conceived. When a Sophos Central managed endpoint connects to a network with an associated XG Firewall, it will establish a Security Heartbeat connection to share health and security status and telemetry. In addition, the endpoint will now also use this connection to share the identity of all network applications with the firewall. Where the firewall can t confirm the identity of the application using traditional signature techniques because the application is evasive, custom, new or using a generic connection, the app information provided by the endpoint will be utilized to identify, classify and control it. Where possible, the applications shared by the endpoint will be automatically classified into an appropriate category. This will automatically subject the newly identified and classified application to any app control policies that are already being enforced on the firewall. For example, an evasive BitTorrent client will be automatically assigned to the Peer-to-Peer application category. And if the firewall has an app control policy in effect to block Peer-to- Peer apps, the new BitTorrent traffic will be automatically blocked without any intervention by the network administrator. Another notorious problem app is Psiphon which is extremely effective at evading firewall controls utilizing a variety of connection schemes. It s instantly revealed with Synchronized App Control so you can easily block it. 6

The Benefits 90% of Sophos customers say they now have greater control over their network traffic. 2 Identify Unknown Apps Synchronized App Control reveals all the apps that are currently going unseen on the network including all new apps as well as tunneling, proxy and VPN applications that often use encryption to bypass firewall control creating an enormous blindspot as well as a variety of compliance, performance, and security risks. If there are existing policies in place to block or traffic shape these types of applications, the newly identified applications falling into this category will be subject to the same policies automatically. In addition, the users and hosts involved will be easily identified enabling intervention and education where appropriate. Prioritize Custom Apps Synchronized App Control will immediately identify custom business applications that are completely invisible to your current firewall such as finance, CRM, ERP, manufacturing and other networked applications that are important to your organization. For the first time, Synchronized App Control provides an opportunity to apply traffic shaping and QoS policies to ensure these missioncritical applications are getting appropriate priority and optimal performance. Control Evasive Apps Synchronized App Control will automatically discover all evasive applications that are continuously changing the way they connect and communicate in order to evade detection and control. In effect, Synchronized App Control puts an end to these tactics once and for all. Regardless of how evasive these apps try to be, they will be completely unable to evade Synchronized App Control. 2 Sophos customers using XG Firewall and Sophos Endpoint with Synchronized App Control enabled. 7

Summary Next-gen firewalls are failing to detect parasite applications that are hiding on organizations networks. Which opens these organizations up to potential compliance violations and legal issues, as well as putting security at risk and causing bandwidth wastage. Sophos turns on the spotlight so the applications have nowhere to hide you get 100% visibility of the applications running on your network, so you can prioritize, assign and block applications as needed. It s a major breakthrough in network visibility and control that leaves other next-gen firewalls lost in the fog. "No other company is close to delivering this type of communication between endpoint and network security products. Chris Christianson Vice President of security programs at IDC Learn more at sophos.com/xgfirewall United Kingdom and Worldwide Sales Tel: +44 (0)8447 671131 Email: sales@sophos.com North America Sales Toll Free: 1-866-866-2802 Email: nasales@sophos.com Australia and New Zealand Sales Tel: +61 2 9409 9100 Email: sales@sophos.com.au Asia Sales Tel: +65 62244168 Email: salesasia@sophos.com Copyright 2018 Sophos Ltd. All rights reserved. Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is a registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners. 2018-11-14 WP-NA (RP)