Next generation firewall (infosecurity 2013)

Preview:

DESCRIPTION

Next Generation Firewalls bieden ‘Application Control’ als extra technologie naast standaard zaken zoals packetfiltering, VPN en IPS. Met Application Control is het perfect mogelijk om te differentiëren op welke internetapplicaties de firewall actief moet zijn, en hoe de applicatie dan mag worden gebruikt. Zo kan bellen via Skype worden toegestaan, terwijl de mogelijkheden voor chatten en filesharing via Skype worden geblokkeerd.

Citation preview

MOTIV BIEDT WEERBAARHEID EN MONITORING

VOOR UW GEBRUIKERSNETWERK OF

DATACENTER

NEXT GENERATION SECURITY

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES MALWARE FOUND

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES BOTNETS ATTACK

SECURITY CHALLENGES GEBRUIK VAN DIVERSE

APPLICATIES

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES TRADITIONELE FIREWALL

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES PROTECT AGAINST

UNAUTHORIZED ACCES

NEXT GENERATION FIREWALL MUST HAVE . . .

15 JAAR VOOROP IN ICT

SECURITY

[Confidential] For designated groups and individuals

Enforcement

Multi-layer controls for strong security

Different People – Different needs

Involve & Engage users in the security

process

People

Practical and relevant to daily operations

Policies

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES NEXT GENERATION FIREWALL

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES PROTECT AGAINST

UNAUTHORIZED ACCES

User Access

Internet Applications Usage

Sensitive Data

Mobile Access

Network Threat Prevention

Gran

ular V

isibility

Identity Awareness

DLP

Mobile Access

SmartEvent

IPS

Anti-Bot

Antivirus

Application Control

URLF

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES MULTI LAYERED THREAT

PREVENTION

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES THREAT MANAGEMENT

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES PROTECT AGAINST

UNAUTHORIZED ACCES

SECURITY CHALLENGES PROTECT AGAINST EXPLOIT OF

VULNERABILITIES IN: WORD, EXCEL, PDF,

BROWSERS, OPERATING SYSTEMS...

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES BLOCK MALWARE FILE DOWNLOAD AND

ACCESS TO MALWARE CONTAINING SITES

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES DISCOVER AND STOP BOT ATTACKS

SECURITY CHALLENGES FIGHT AGAINST UNKNOWN THREATS !

15 JAAR VOOROP IN ICT

SECURITY

Security Gateway

Internet

Download file sent to Threat Emulation

File Inspected in virtual sandbox

New malware signature sent to ThreatCloud

New attack discovered

Malware is blocked on

the gateway

Monitor unexpected behavior:

Network activity

File system & registry

changes

Process activity

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES POWERING THREAT PREVENTION SOFTWARE

BLADES WITH REAL-TIME SECURITY

INTELLIGENCE

SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION

15 JAAR VOOROP IN ICT

SECURITY

Sec.Aas platform – Security Gateways

Weerbaarheid

& Monitoring

Security Gateway

STANDAARD

Preventie

Security Gateway

NEXT GEN

Preventie

Security Gateway

THREAT

Preventie

Firewall

VPN

Identity Aware

Firewall

VPN

Identity Aware

Firewall

VPN

Identity Aware

IPS

App Control

IPS

App Control

Malware Filters

URL Filters

Spam Filters

Botnet Filters

Optioneel (maatwerk): Data Leakage Protection Endpoint Protection Mobile Access Threat Emulation

15 JAAR VOOROP IN ICT

SECURITY

15 JAAR VOOROP IN ICT

SECURITY

SECURITY MANAGEMENT PLATFORM

BRONNEN: THREAT CLOUD & NCSC

INCIDENT / RESPONSE

WEERBAARHEID & MONITORING

Sec. Aas Platform - samenvatting

Wrap-up • Geavanceerde cyberaanvallen zijn steeds lastiger te

signaleren en blokkeren;

• Motiv Next Generation platform blokkeert aanvallen met de beste Next Generation Technologie en security experts van Motiv;

• Dreigingen worden direct gemitigeerd dankzij security intelligence van ThreatCloud en opvolging van beveiligingsadviezen van NCSC;

• 24X7 monitoring met incident/response;

• Overzichtelijke compliancy rapportages.

15 JAAR VOOROP IN ICT

SECURITY

Recommended