Intrusion Prevention Intrusion Prevention for for Service

  • View
    951

  • Download
    0

Embed Size (px)

DESCRIPTION

 

Text of Intrusion Prevention Intrusion Prevention for for Service

untitled

Secure IP Infrastructure is Critical for VoIP

Intrusion Prevention Intrusion Prevention for for

Service ProvidersService Providers

CONFIDENTIAL

TippingPoint TippingPoint The CompanyThe Company

The Proven Leader in Intrusion Prevention (NASDAQ: TPTI) Launched industrys first intrusion prevention solution, January 2002 Only Vendor Awarded NSS Gold for Intrusion Prevention, January 2004

Deep Domain Expertise and Experienced Management Networking, security and software knowledge from industry-leading

companies such as Cisco, SANS, NetSpeed, Alcatel, IBM, Efficient, Motive

Best-of-breed Technology and Execution Tens of millions of dollars invested in core technology R&D Highly parallel, custom packet-processing ASIC technology Patent-pending technologies that deliver unmatched performance

CONFIDENTIAL

Select TippingPoint Customers and AwardsSelect TippingPoint Customers and Awards

AwardsAwards

CONFIDENTIAL

SecurityRisk Gap

The Security Risk Gap is Growing ExponentiallyThe Security Risk Gap is Growing Exponentially

New security demands exceed IT capacity

Increasing rate of new vulnerabilities

Decreasing time to patch them Walk-in worms, e-mail attacks Rogue applications stealing IT

resources

Traditional tools cant fully mitigate todays security challenge

Perimeter firewalls are porous (e.g. allow port 80) and cant handle the core

Comprehensive patching is impossible

Not all end-points under IT control

Time, Business Growth

S e cu r i t

y De m a

n d s

Line speed Intrusion Prevention closes the gap

IT Security CapacityIT Security Capacity

CONFIDENTIAL

UnityOne Closes the Security Risk GapUnityOne Closes the Security Risk Gap

Network Performance is Accelerated

System Up-time is Maximized Emergency Patching Triage is

Eliminated

Plug-and-Play Operation No tuning required

Time, Business Growth

S e cu r i t

y De m a

n d s

IT Security CapacityIT Security Capacity

Business Continuity is assured and the cost of security operations is reduced

U p - t i me

P e r f

N o T r iag e

P l u g an d P l a

y

CONFIDENTIAL

UnityOne IP Service Control UnityOne IP Service Control

Ultra-High PerformanceCustom Hardware

5 Gbps Throughput Switch-Like Latency 2M Sessions Total Flow Inspection 10K Parallel Filters

Bandwidth Management

Intrusion Prevention

Content-based QOS

IP ServiceControl

Service providers demanduncompromising performance,

reliability, and protection

CONFIDENTIAL

Intrusion PreventionIntrusion Prevention

Performs Total Inspection at Layers 2-7 Protects Subscriber Desktop Vulnerabilities

Quarantine Infected Subscribers to a Walled-Garden Protects Network Equipment Vulnerabilities Protects Server Vulnerabilities Protects Against Anomalous Traffic

Behavior

Protect: Applications and

Operating Systems Subscriber Desktops Broadband Network

Elements Email, News, DNS Servers Real time VoIP Security

ROI Components: Reclaimed Infrastructure

Capacity (Router, Server) Eliminate Emergency

Patching Fewer Help Desk Calls Fewer Truck Rolls Reduced Subscriber

Churn

Bandwidth Management

Intrusion Prevention

Content-based QOS

IP ServiceControl

CONFIDENTIAL

Bandwidth ManagementBandwidth Management

Increases Network Performance Even When Not Under Attack

Rate Limits Non-Mission Critical Applications Controls Peer-to-Peer Traffic Controls unauthorized Instant Messaging Controls Rogue Applications Eliminates Misuse and Abuse

Protect: Bandwidth Server Capacity Mission-Critical TrafficROI Components:

Reclaimed Infrastructure Capacity

Reduced Bandwidth Expense

Bandwidth Management

Intrusion Prevention

Content-based QOS

IP Service Control

CONFIDENTIAL

Identify: Specific Applications Premium Subscribers Content PartnersROI Components:

Incremental Revenue from Subscribers

Incremental Revenue from Application and Content Partners

ContentContent--based QOSbased QOS

Identify specific sessions Based on Application, Subscriber, Content, existing QOS markings

Notify Service Control Elements Eliminate dependence on Client knowledge of network rules

Add or modify marking for appropriate QOS priority in the network Set DSCP/TOS, 802.1P/Q VLAN, MPLS tags

Enforce QOS by prioritizing queues using CBR and VBR

Bandwidth Management

Intrusion Prevention

Content-based QOS

IP Service Control

CONFIDENTIAL

Secure Cable HSD NetworksSecure Cable HSD Networks

CONFIDENTIAL

Secure DSL NetworksSecure DSL Networks

CONFIDENTIAL

UnityOne-2000

UnityOne-2000

UnityOne-2400

BusinessCustomer #1

BusinessCustomer #2

BusinessCustomer #3

Service with Network-Based Managed Secure Service provided via UnityOne Solutions

Redundant Network Links

Security Management System (SMS)

Centralized Network Management for Managed Secure Service

NetworkNetwork--Based Model: Managed Secure ServiceBased Model: Managed Secure Service

Internet

CONFIDENTIAL

Automatic Digital VaccineAutomatic Digital Vaccine SANS CERT Vendor Advisories Bugtraq VulnWatch PacketStorm Securiteam

Digital Vaccine Automatically

Delivered to Customers

Vulnerability Analysis

Raw Intelligence Feeds

Vaccine Creation

Scalable distribution network using Akamais 9,700 servers in 56 countries

@RISKWeekly Report

CONFIDENTIAL

Performance Protection Performance Protection Rogue Application Control ExampleRogue Application Control Example

Protects mission-critical application bandwidth

Controls misuse and abuse

Generates report graphs for each virtual pipe

Unlimited number of virtual pipes

0

20

40

60

80

100

120

140

160

180

200

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

1

:

0

0

7

:

0

0

1

3

:

0

0

1

9

:

0

0

M

b

p

s

(

A

v

e

r

a

g

e

p

e

r

H

o

u

r

)

OracleE-mailHTTPP2P Rate LimitKazaaeDonkeyWinMX

CONFIDENTIAL

Security and Bandwidth ManagementSecurity and Bandwidth Managementfor Improved Cash Flowfor Improved Cash Flow

Reduced Bandwidth Expense P2P rate-limiting can reduce

egress bandwidth by 20% Reduced Capital Investment

Reduced upstream bandwidth reclaims 10-30% of equipment investment

Virus and worm mitigation can save up to 20% of edge device CPU utilization

Reduced Support Costs Fewer help desk calls Fewer truck rolls

Incremental Revenue Enables VoIP rollout Reduces subscriber and VoIP

churn

Lost Revenue- HSD Churn

- VoIP Churn

Support Costs

CapitalInvestment

PositiveCash Flow

WithoutTippingPoint

WithTippingPoint

BandwidthExpense

Support Costs

CapitalInvestment

PositiveCash Flow

BandwidthExpense

Investment inTippingPoint

CONFIDENTIAL

UnityOne Security Management System (SMS)UnityOne Security Management System (SMS)

CONFIDENTIAL

UnityOne Product LineUnityOne Product LineIntrusion Prevention Systems

Security Management System

2.0 Gbps4x10/100/1000

Copper/Fiber

1.2 Gbps4x10/100/1000

Copper/Fiber

400 Mbps4x10/100/1000

Copper/Fiber

200 Mbps2x10/100

Copper

50 Mbps1x10/100

Copper

2.0 Gbps20x10/100/1000

Copper/Fiber

5.0 Gbps4x10/100/1000

Copper/Fiber 3Q04

CONFIDENTIAL

UnityOne Features and Benefits SummaryUnityOne Features and Benefits Summary

A) Virtual Patches Protect Unpatched Vulnerable Hosts B) Zero-Day Protection against Unknown Attacks and DOSC) Maintain Evergreen Protection

Digital Vaccine Updates

All