Infoblox as Part of the Ecosystem

Similar documents
Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Authoritative IPAM QuickStart

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Infoblox: Company Update. Thomas Gerch Account Executive Infoblox, Date 30 march, 2017 Bern

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

Device Discovery for Vulnerability Assessment: Automating the Handoff

ForeScout ControlFabric TM Architecture

WHITE PAPER. Why Infoblox for DDI. It is time to migrate from BIND and Microsoft

Qualys Cloud Platform

Integration with McAfee DXL

McAfee epolicy Orchestrator

Cisco Firepower NGFW. Anticipate, block, and respond to threats

DHS Automated Information Sharing (AIS) Program

Cisco ACI App Center. One Platform, Many Applications. Overview

SYMANTEC DATA CENTER SECURITY

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview

Proactive Approach to Cyber Security

SOLUTIONS FOR FEDERAL NETWORKS SECURE CONTROL ANALYZE

Transforming Security from Defense in Depth to Comprehensive Security Assurance

The threat landscape is constantly

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Sustainable Security Operations

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

McAfee Public Cloud Server Security Suite

Policy Enforcer. Product Description. Data Sheet. Product Overview

Integration with Tenable Security Center

THE ACCENTURE CYBER DEFENSE SOLUTION

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Best Practices in Securing a Multicloud World

Cisco Cloud Application Centric Infrastructure

SIEM Solutions from McAfee

Integration with ForeScout

Datacenter Security: Protection Beyond OS LifeCycle

McAfee Cloud Workload Security Product Guide

5 Steps to Government IT Modernization

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

McAfee Endpoint Threat Defense and Response Family

Stop Threats Before They Stop You

Designing and Building a Cybersecurity Program

SIEM: Five Requirements that Solve the Bigger Business Issues

Symantec Network Access Control Starter Edition

Compare Security Analytics Solutions

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

SECURE HYBRID CLOUD Solution

Securing the Software-Defined Data Center

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

Kaspersky Security for Virtualization Frequently Asked Questions

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Enhanced Threat Detection, Investigation, and Response

Enterprise & Cloud Security

Manufacturing security: Bridging the gap between IT and OT

ForeScout Extended Module for Splunk

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

GDPR: An Opportunity to Transform Your Security Operations

WHITEPAPER. Top Reasons Why Enterprises Must Automat DNS, DHCP and IP Address Management

The Why, What, and How of Cisco Tetration

Automating Security Practices for the DevOps Revolution

PALANTIR CYBERMESH INTRODUCTION

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Symantec Network Access Control Starter Edition

Reinvent Your 2013 Security Management Strategy

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

2018 Cisco and/or its affiliates. All rights reserved.

Best Practices for Successful IP Address Management (IPAM) WHITE PAPER

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

NIST Special Publication

Everything visible. Everything secure.

Symantec Advanced Threat Protection: Endpoint

Microsoft Security Management

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Deep Security Integration with Sumo Logic

Medigate and Palo Alto Networks Integration

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

McAfee Advanced Threat Defense

Qualys Cloud Platform

Cisco Tetration Analytics

VMware Hybrid Cloud Solution

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

The McAfee MOVE Platform and Virtual Desktop Infrastructure

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

Cisco Advanced Malware Protection against WannaCry

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Implementing Infoblox Data Connector 2.0

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Stopping Advanced Persistent Threats In Cloud and DataCenters

How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Tenable for Google Cloud Platform

Cisco Firepower NGFW. Anticipate, block, and respond to threats

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Snort: The World s Most Widely Deployed IPS Technology

Transcription:

Infoblox Core Exchange Infoblox Core Exchange is a highly-interconnected set of ecosystem integrations that extend security, increase agility, and provide situational awareness for more efficient operations, on-premises and in the cloud. It provides visibility across the entire network including virtualized or cloud deployments, remove silos between network and security teams, improve agility, automates IT workflows, enables faster remediation to threat and network changes and provide better ROI on IT and security investments already made. Cybersecurity Ecosystem Infoblox Core Exchange Overview Threat data feeds for use in ecosystem SIEM Threat Intel Platforms Firewall SIEM Vulnerability Scanner Device Discovery Grid Member DNS/DHCP with ActiveTrust NAC Network Infrastructure (Switches, Routers, Firewalls etc.) Endpoint Security Internal Clients APT/Malware Detection Security teams deal with thousands of alerts each day from various systems and tools they use. Knowing which alerts to prioritize and address first is a challenge. Often, it is a manual process to get the data from various disparate sources, piece them together and understand the broader picture. Today s organizations also use varied deployments and architectures from physical to virtual to cloud. Knowing what s on the network and getting visibility into these diverse architectures is critical to securing the network.

Core network services like DNS, DHCP and IPAM contains a gold mine of network data that shows exactly what devices are on the network, where they are on the network, what they are doing and if there is any malicious activity happening on the network. Sharing this valuable network and security intelligence, and network context with the broader security ecosystem can enable prioritization and help remediate threats faster. Infoblox integrations with the broader security ecosystem allow customers to: Proactive protection against cyberattacks Improve speed of response by threat intelligence and DNS indicators of compromise sharing Prioritization based on Critical contextual data Better ROI from security investments already made Advanced Threat Detection FireEye NX Series FireEye shares advanced persistent threats (APTs) communication to malicious domains with Infoblox ActiveTrust. Infoblox ActiveTrust blocks, logs events or takes appropriate action on these threats. Flexible policy enforcement. Identification of infected devices. Defense and remediation built into IT systems and processes. Threat Intelligence sharing ThreatConnect Infoblox ActiveTrust receives data on malicious domains and IP addresses from ThreatConnect. ActiveTrust blocks DNS communications to these malicious domains and addresses. DNS policy enforcement on ThreatConnect identified malicious domains and IP addresses. Identification of infected devices. Block more threats. Cisco Threat Intelligence Director Cisco TIP platform receives malicious host names, IP addresses and URLs from Infoblox TIDE (Threat Intelligence and Data Exchange.) Cisco Threat Intelligence Director can now forward this information to block or monitor more threats. Reduce the number of alerts to review. Improves situational awareness in an organization. Improves overall security posture.

Check Point ThreatCloud Check Point ThreatCloud receives mali- cious host names, IP addresses and URLs from Infoblox TIDE. Check Point ThreatCloud can now block or monitor more threats. Reduce the number of alerts to review. Improves situational awareness in an organization. Improves overall security posture. Windows Server 2016 Windows Server 2016 is enriched with host name, IP addresses and URLs from Infoblox TIDE. Block and monitor threats. Reduce number of alerts to review. Improve situational awareness and overall. security posture. Infoblox TIDE External Threat feeds (SURBL, OpenPhish, ThreatTrack, Farsight) Infoblox ActiveTrust receives threat data from third-party sources. This third-party data is then managed from within Infoblox TIDE. Collect, manage and curated threat intelligence in a single platform. Maximize resources by giving back time to the security operations and threat intelligence team. SIEM LogRhythm SIEM LogRhythm receives information on IP address, DNS request and responses and infected devices from Infoblox. This information can be used by LogRhythm to perform analysis and take action. Visibility into device activity regardless of where that log data was generated. Visibility into security events, threat intelligence feed of malicious domains and IP addresses. Splunk with Infoblox ATC and Dossier Splunk receives security events detected by ActiveTrust cloud in CEF or JSON format. Splunk also receives context on indicators of compromise (IoC) from Infoblox Dossier. These security events provide context on indicators of compromise. Leverage threat intel data for context on IoCs and prioritize response. Improve visibility and leverage advanced filtering capabilities, thus improving operational efficiency.

McAfee ESM McAfee receives networking and DNS security events, IP addresses, DHCP fingerprint from Infoblox. McAfee ESM can then perform comprehensive threat data correlation and detection and efficient incident response based on real risk. Visibility into threat data, IP address, DHCP fingerprint, lease history, and more to assess risk and prioritize alerts. Threat data correlation to prioritize, investigate, and respond to stealthy threat and simplify actions. Vulnerability Management Vulnerability Scanner: Qualys, Rapid7, Tenable Security Center Infoblox provides information on IP addresses, Network devices and malicious events to Rapid7/Qualys. Rapid7/Qualys uses the information to automate scanning when malicious activity is detected, even if it is in between scheduled scans. Leverage context to prioritize action. Automate response to network and malicious events. Improved efficacy of security investments already made. Network Access Control (NAC) CISCO ISE Infoblox receives user/device and network context from Cisco ISE. Infoblox enriches pxgrid with network context. Automated response to Infoblox security events. Expand visibility of network and users and devices. Enhance security-response and timeliness. ForeScout Infoblox enriches ForeScout with IPAM and DNS security events. ForeScout can use that information to get context to prioritize threats and take action, reducing time to containment. Consistent policy enforcement. Context for prioritization of threats. Eliminates silos between network and security tools.

Next Generation Endpoint Security Carbon Black Infoblox detects malware communications being made via DNS and informs Carbon Black. Carbon Black can identify the malicious processes, quarantine the endpoint or take other actions. Identify and prevent DNS-based endpoint communications to malicious domains. Automatically respond to endpoint threats, reducing dwell time. McAfee epo Deploy Infoblox ActiveTrust Endpoint Agent using McAfee epo. Enables remediation and policy actions at the DNS level using ActiveTrust Cloud. Automates and simplifies the deployment of Infoblox ActiveTrust Endpoint Agent for large enterprises. Mass deployment for mutual customers. Easily plugs into existing workflow processes. Next Generation Firewall Palo alto Networks NGFW Palo Alto NGFW receives malicious host names, IP addresses and URLs from Infoblox TIDE. Enable customers to block or monitor threats. Reduce the number of alerts to review. Improves situational awareness in an organization. Improves overall security posture. McAfee DXL Infoblox ActiveTrust with McAfee DXL Infoblox publishes critical data on network and DNS security events along with context over McAfee DXL. Enables ecosystem to quickly respond to network events and threats, improving operational efficiency. Automatic notification when threats are detect- ed, enabling faster response. Contextual information to help prioritize threats and policy actions.

Infoblox TIDE/Dossier over DXL Infoblox TIDE sends TIDE and Dossier lookup requests over DXL fabric in XML/ JSON/STIX format. Facilitate effective protection for both the network and endpoint domains. Visibility across both network and endpoint domains. Remediation and policy actions enabling faster response to threats. Enables customers to break silos between security tools. Network automation and Cloud ecosystem integrations Networks ops team have 100s of network tools in their environment but these tools work in silos and hence, it is difficult to get complete visibility into entire infrastructure at a single place. Today s organizations also use varied deployments and architectures from physical to virtual to cloud. Knowing what s on the network and getting visibility into these diverse architectures is critical to and automating IT workflows, thus improving agility of the network team. Infoblox integrations with broader Network Automation and Cloud ecosystem allows customers to: Get visibility into extended infrastructure. Automate IT workflows in private/public/hybrid environment. Improve agility Perform more efficient audit and compliance. Next Generation Firewall VMWare Infoblox DDI allocates an IP address and sends it to the VM along with the DNS host record. vcenter Server then creates VM that runs on ESXi host using the newly allocated IP address and DNS record. Ensures consistency and visibility in hybrid deployments (on-prem, virtual, and/or cloud) Automate manual processes Speeds time to deployment AWS Route 53 Infoblox Grid and Route 53 communi- cate with each other at regular interval to provide visibility into DNS and IPAM for Route 53 in NIOS. Automated Migration from Route 53 to Infoblox DNS. Seamless migration by bridging gap between Enterprise IT and Cloud teams. Unified visibility by presenting the user a single console to view on-prem and Route 53 Public Cloud DNS.

AWS instances (API Proxy) Performs vdiscovery of AWS instances to ensure no duplicate addresses are assigned. Automates IPAM and DNS provisioning for AWS VPC and EC2 instances. Eliminates error by preventing the chances of overlapping IP addresses in hybrid cloud environment. Lessens manual processes. Speeds time to deployment Azure Infoblox Grid and Microsoft Azure communicate with each other to provide unified visibility and management across all platforms. Visibility into IP and DNS information for Azure VMs automatically. Centralized management of DNS servers that are on-prem and in Azure. Efficient utilization of cloud resources across multiple clouds (Azure, AWS, VMWare, OpenStack.) OpenStack Infoblox receives request for to create/ destroy VMs and Infoblox contacts NIOS for next available IP and creates DNS Records for VM. OpenStack Spins up VM on Hypervisor (Eg: KVM) and VM makes DHCP request after it starts up. Ensures consistency and visibility in hybrid deployments (on-prem, virtual, and/or cloud.) Lessens manual processes. Speeds time to deployment. Docker Automated IP address provisioning and IPAM integration with Infoblox for better visibility for container and micro services. Ensures consistency and visibility in hybrid deployments (on-prem, virtual, and/or cloud.) Visibility into the container cloud. Avoid IP conflicts and container routing issues. Speeds time to deployment. Cisco ACI Ease of network deployment based on IP addresses and DHCP information received from Infoblox. Visibility into devices and IP addresses. Ease of network management, thereby improving operational efficiency. Infoblox NetMRI integration with Cisco ACI: Discovery Rest API discovery of Cisco ACI information Visibility of Tenant, Bridge Domain, Application Profile, and Endpoint Groups (EPG) in Infoblox IPAM Visibility for both traditional and ACI environment. Improved operational efficiency.

Cisco DNA Center Synchronize IP Address Pools between DNA Center and Infoblox. Infoblox as the IP Address Manager for DNA Center. Automatic IP addresses resources are allocation and release. Policy based deployment in single operation, which improves operating efficiency. Cisco Tetration Analytics Enrichment of Cisco Tetration with IPAM and DNS data. Tetration discovered Endpoints, inventory, Application Dependency mapping (ADM) and flow data to enrich Infoblox compliance engine. Enhanced visibility into IPAM and DNS information. Visibility into endpoints, ADM, network devices, DNS and endpoint, ensuring continuous compliance. Cisco CloudCenter End-to-end workload deployment with IPAM and DNS updates. Elimination of manual network configuration Automatic infrastructure deployment. Summary Network and Security Ops team face numerous challenges including lack of agility, lack of visibility, ineffective threat intelligence, lack of context for prioritization. Through a highly interconnected contextual ecosystem, Infoblox Core Exchange enables integrated solutions that extend security, increase agility, and achieve situational awareness for more efficient operations, in on-prem, cloud and hybrid environments. It removes silos between various network and security tools, enables near real-time actions for automating IT workflows, provides visibility into extended infrastructure and improves ROI for value of existing investments in security and networking. Note: The integrations require one or more relevant Infoblox products to be able to pass necessary information to the tools mentioned above. Infoblox integrations support a variety of options including REST APIs, STIX/TAXII, JSON, XML and CSV formats, syslog and third party propriety methods, to ensure interoperability. To learn more, please visit Technology Alliance Partner page. About Infoblox Infoblox delivers Actionable Network Intelligence to enterprises, government agencies, and service providers around the world. As the industry leader in DNS, DHCP, and IP address management (DDI), Infoblox provides control and security from the core empowering thousands of organizations to increase efficiency and visibility, reduce risk, and improve customer experience. Corporate Headquarters: +1.408.986.4000 1.866.463.6256 (toll-free, U.S. and Canada) info@infoblox.com www.infoblox.com