Upload
others
View
8
Download
0
Embed Size (px)
Citation preview
Application Intelligence, Control
and Visualization
Patrick Sweeney
February, 2011
Technology Trends
Impacts to Productivity & ROI
Bandwidth
Performance
Availability
Efficiency
Manageability
Security
Security is an Ongoing Challenge
Ripped from the Headlines
CONFIDENTIAL All Rights Reserved
http://www.esecurityplanet.com/headlines/article.php/3907811/Most-Large-Companies-Were-Hacked-in-2010.htm
Security is an Ongoing Challenge
Ripped from the Headlines
Confidential - All Rights Reserved
http://www.guardian.co.uk/technology/2010/jan/14/google-hacking-china-cyberwar
Malware Lurks in Social Networks
CONFIDENTIAL All Rights Reserved
Set-up: Create bogus celebrity LinkedIn profiles
Lure: Place link to celebrity “videos” in profile
Attack: Download of “codec” required to view video
Infect: Codec is actually Malware
Result: System compromised
The Problem…
Programmers make mistakes
Malware exploits mistakes
CONFIDENTIAL All Rights Reserved
Vulnerabilities are in the software everyone uses everyday…
Problem
Solution
SonicWALL Security Center provides
up-to-minute information about viruses,
vulnerabilities, and spyware
Result: Relentless, Unyielding Malware
SonicWALL Security Center www.sonicwall.com/securitycenter.asp
A Typical Day in 2010
What Are Your Employees Doing?
Blogging
IM
Streaming video
Streaming audio
Downloading files
Playing games
Personal Webmail
Time spent on Facebook was greater than time
spent on Google sites for the first time in history.
(comScore, August 2010 )
Together Facebook.com and Google.com
accounted for 14% of all Internet visits last week.
(Hitwise, March 2010 )
Copyright 2010 SonicWALL Inc. All Right Reserved.
The Problems Today:
Security and Productivity
CONFIDENTIAL All Rights Reserved
What are the THREATS?
Where is this TRAFFIC coming from?
What APPLICATIONS are really on my network?
Where is ALL my BANDWIDTH going?
Application Chaos
IT Controls Challenged
Unacceptable AppsAcceptable Apps
Who Chooses What Applications are Good or Bad?
Requires a completely new paradigm focused on users and applications
Overcoming Application Chaos…
What is a Next-Generation Firewall
By Gartner’s definition, a NGFW must include all of the following:
Full Stateful Packet Inspection
I.E., must have traditional Firewall capabilities
Intrusion Prevention
Fast, enterprise quality Deep Packet Inspection and prevention for Intrusions
Application Control
Ability to block/allow applications by identifying the specific applications, not relying on Port or Protocol
SSL Decryption
Ability to inspect encrypted traffic (man in the middle) and take policy action
Beyond the Strict Definition of NGFW
Gartner generally wants to exclude Gateway Anti-Virus from the definition
Palo Alto, Fortinet, and SonicWALL accept that in the tight definition, but all three companies offer the ability to have more complete anti-malware scanning if the users desires for greater security
Only SonicWALL can do so without dragging performance to unacceptable levels
Only SonicWALL can inspect in real time any file size regardless of size of box (enterprise, mid-enterprise, small branch office)
SonicWALL also goes beyond just Application Control by offering Application Control, Throttling, Analysis and Visualization
CONFIDENTIAL All Rights Reserved
Gartner coined the term “Next-Generation Firewall”
SonicWALL Next-Generation Firewall
CONFIDENTIAL All Rights Reserved
??
? ?
? ?
?
ControlIdentify Categorize
Application ChaosMany on Port 80
Re-Assembly Free
Deep Packet
Inspection
SonicWALL Next-Generation Firewall
CONFIDENTIAL All Rights Reserved
??
? ?
? ?
?
Application ChaosMany on Port 80
ControlIdentify Categorize
Re-Assembly Free
Deep Packet
Inspection
SonicWALL Next-Generation Firewall
CONFIDENTIAL All Rights Reserved
Malware BlockedCloud-based
Extra-Firewall
Intelligence
Application ChaosMany on Port 80
ControlIdentify Categorize
Re-Assembly Free
Deep Packet
Inspection
SonicWALL Next-Generation Firewall
CONFIDENTIAL All Rights Reserved
Malware Blocked
Users/Groups PolicyApplication ChaosMany on Port 80
ControlIdentify Categorize
Cloud-based
Extra-Firewall
Intelligence
Re-Assembly Free
Deep Packet
Inspection
SonicWALL Next-Generation Firewall
CONFIDENTIAL All Rights Reserved
Critical Apps: Prioritized Bandwidth
Acceptable Apps: Managed Bandwidth
Unacceptable Apps: Blocked
Users/Groups PolicyApplication ChaosMany on Port 80
Visualize &
Manage Policy
ControlIdentify Categorize
Cloud-based
Extra-Firewall
Intelligence
Malware Blocked
Re-Assembly Free
Deep Packet
Inspection
The Power of Seeing - Application Visualization
CONFIDENTIAL All Rights Reserved
App Flow Monitor: Real Time Analysis of
Exactly What is Happening
CONFIDENTIAL All Rights Reserved20
CONFIDENTIAL All Rights Reserved
CONFIDENTIAL All Rights Reserved
CONFIDENTIAL All Rights Reserved
What it All Means…
Trends in technology are driving the applications into the cloud and the use of social media is now a requirement to conduct business
Problem: IT is experiencing challenges with managing their networks as:
THREATS are getting more sophisticated
APPLICATION chaos is occurring on corporate networks
BANDWIDTH is being sucked by for non-productive applications
No way to know where network TRAFFIC coming from
CONFIDENTIAL All Rights Reserved
SonicWALL Next-Generation Firewall with
Application Intelligence, Control and Visualization
Take Action
View Gartner Videocast: Bringing Order to Application Chaos
White Papers, Data Sheets, Case Studies, Best Practices, Screen Shots, Webinars
www.sonicwall.com/us/products/solutions/Application_Intelligence_Control.html
CONFIDENTIAL All Rights Reserved
SonicWALL Next-Generation Firewall
CONFIDENTIAL All Rights Reserved
Critical Apps: Prioritized Bandwidth
Acceptable Apps: Managed Bandwidth
Unacceptable Apps: Blocked
Users/Groups PolicyApplication ChaosMany on Port 80
Visualize &
Manage Policy
ControlIdentify Categorize
Cloud-based
Extra-Firewall
Intelligence
Malware Blocked
Re-Assembly Free
Deep Packet
Inspection