31
MOTIV BIEDT WEERBAARHEID EN MONITORING VOOR UW GEBRUIKERSNETWERK OF DATACENTER NEXT GENERATION SECURITY 15 JAAR VOOROP IN ICT SECURITY

Next generation firewall (infosecurity 2013)

  • Upload
    motiv

  • View
    262

  • Download
    3

Embed Size (px)

DESCRIPTION

Next Generation Firewalls bieden ‘Application Control’ als extra technologie naast standaard zaken zoals packetfiltering, VPN en IPS. Met Application Control is het perfect mogelijk om te differentiëren op welke internetapplicaties de firewall actief moet zijn, en hoe de applicatie dan mag worden gebruikt. Zo kan bellen via Skype worden toegestaan, terwijl de mogelijkheden voor chatten en filesharing via Skype worden geblokkeerd.

Citation preview

Page 1: Next generation firewall (infosecurity 2013)

MOTIV BIEDT WEERBAARHEID EN MONITORING

VOOR UW GEBRUIKERSNETWERK OF

DATACENTER

NEXT GENERATION SECURITY

15 JAAR VOOROP IN ICT

SECURITY

Page 2: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES

Page 3: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES MALWARE FOUND

Page 4: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES BOTNETS ATTACK

Page 5: Next generation firewall (infosecurity 2013)

SECURITY CHALLENGES GEBRUIK VAN DIVERSE

APPLICATIES

15 JAAR VOOROP IN ICT

SECURITY

Page 6: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES TRADITIONELE FIREWALL

Page 7: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES PROTECT AGAINST

UNAUTHORIZED ACCES

Page 9: Next generation firewall (infosecurity 2013)

NEXT GENERATION FIREWALL MUST HAVE . . .

15 JAAR VOOROP IN ICT

SECURITY

Page 10: Next generation firewall (infosecurity 2013)

[Confidential] For designated groups and individuals

Enforcement

Multi-layer controls for strong security

Different People – Different needs

Involve & Engage users in the security

process

People

Practical and relevant to daily operations

Policies

15 JAAR VOOROP IN ICT

SECURITY

Page 11: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES NEXT GENERATION FIREWALL

Page 12: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES PROTECT AGAINST

UNAUTHORIZED ACCES

Page 15: Next generation firewall (infosecurity 2013)

User Access

Internet Applications Usage

Sensitive Data

Mobile Access

Network Threat Prevention

Gran

ular V

isibility

Identity Awareness

DLP

Mobile Access

SmartEvent

IPS

Anti-Bot

Antivirus

Application Control

URLF

15 JAAR VOOROP IN ICT

SECURITY

Page 16: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES MULTI LAYERED THREAT

PREVENTION

Page 17: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES THREAT MANAGEMENT

Page 18: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES PROTECT AGAINST

UNAUTHORIZED ACCES

Page 20: Next generation firewall (infosecurity 2013)

SECURITY CHALLENGES PROTECT AGAINST EXPLOIT OF

VULNERABILITIES IN: WORD, EXCEL, PDF,

BROWSERS, OPERATING SYSTEMS...

15 JAAR VOOROP IN ICT

SECURITY

Page 21: Next generation firewall (infosecurity 2013)

SECURITY CHALLENGES BLOCK MALWARE FILE DOWNLOAD AND

ACCESS TO MALWARE CONTAINING SITES

15 JAAR VOOROP IN ICT

SECURITY

Page 24: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES DISCOVER AND STOP BOT ATTACKS

Page 25: Next generation firewall (infosecurity 2013)

SECURITY CHALLENGES FIGHT AGAINST UNKNOWN THREATS !

15 JAAR VOOROP IN ICT

SECURITY

Page 26: Next generation firewall (infosecurity 2013)

Security Gateway

Internet

Download file sent to Threat Emulation

File Inspected in virtual sandbox

New malware signature sent to ThreatCloud

New attack discovered

Malware is blocked on

the gateway

Monitor unexpected behavior:

Network activity

File system & registry

changes

Process activity

15 JAAR VOOROP IN ICT

SECURITY

Page 27: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY CHALLENGES POWERING THREAT PREVENTION SOFTWARE

BLADES WITH REAL-TIME SECURITY

INTELLIGENCE

Page 28: Next generation firewall (infosecurity 2013)

SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION

15 JAAR VOOROP IN ICT

SECURITY

Page 29: Next generation firewall (infosecurity 2013)

Sec.Aas platform – Security Gateways

Weerbaarheid

& Monitoring

Security Gateway

STANDAARD

Preventie

Security Gateway

NEXT GEN

Preventie

Security Gateway

THREAT

Preventie

Firewall

VPN

Identity Aware

Firewall

VPN

Identity Aware

Firewall

VPN

Identity Aware

IPS

App Control

IPS

App Control

Malware Filters

URL Filters

Spam Filters

Botnet Filters

Optioneel (maatwerk): Data Leakage Protection Endpoint Protection Mobile Access Threat Emulation

15 JAAR VOOROP IN ICT

SECURITY

Page 30: Next generation firewall (infosecurity 2013)

15 JAAR VOOROP IN ICT

SECURITY

SECURITY MANAGEMENT PLATFORM

BRONNEN: THREAT CLOUD & NCSC

INCIDENT / RESPONSE

WEERBAARHEID & MONITORING

Page 31: Next generation firewall (infosecurity 2013)

Sec. Aas Platform - samenvatting

Wrap-up • Geavanceerde cyberaanvallen zijn steeds lastiger te

signaleren en blokkeren;

• Motiv Next Generation platform blokkeert aanvallen met de beste Next Generation Technologie en security experts van Motiv;

• Dreigingen worden direct gemitigeerd dankzij security intelligence van ThreatCloud en opvolging van beveiligingsadviezen van NCSC;

• 24X7 monitoring met incident/response;

• Overzichtelijke compliancy rapportages.

15 JAAR VOOROP IN ICT

SECURITY