26

Application Intelligence, Control

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Application Intelligence, Control
Page 2: Application Intelligence, Control

Application Intelligence, Control

and Visualization

Patrick Sweeney

February, 2011

Page 3: Application Intelligence, Control

Technology Trends

Impacts to Productivity & ROI

Bandwidth

Performance

Availability

Efficiency

Manageability

Security

Page 4: Application Intelligence, Control

Security is an Ongoing Challenge

Ripped from the Headlines

CONFIDENTIAL All Rights Reserved

http://www.esecurityplanet.com/headlines/article.php/3907811/Most-Large-Companies-Were-Hacked-in-2010.htm

Page 5: Application Intelligence, Control

Security is an Ongoing Challenge

Ripped from the Headlines

Confidential - All Rights Reserved

http://www.guardian.co.uk/technology/2010/jan/14/google-hacking-china-cyberwar

Page 6: Application Intelligence, Control

Malware Lurks in Social Networks

CONFIDENTIAL All Rights Reserved

Set-up: Create bogus celebrity LinkedIn profiles

Lure: Place link to celebrity “videos” in profile

Attack: Download of “codec” required to view video

Infect: Codec is actually Malware

Result: System compromised

Page 7: Application Intelligence, Control

The Problem…

Programmers make mistakes

Malware exploits mistakes

CONFIDENTIAL All Rights Reserved

Vulnerabilities are in the software everyone uses everyday…

Problem

Solution

SonicWALL Security Center provides

up-to-minute information about viruses,

vulnerabilities, and spyware

Page 8: Application Intelligence, Control

Result: Relentless, Unyielding Malware

SonicWALL Security Center www.sonicwall.com/securitycenter.asp

A Typical Day in 2010

Page 9: Application Intelligence, Control

What Are Your Employees Doing?

Blogging

Facebook

Twitter

IM

Streaming video

Streaming audio

Downloading files

Playing games

Personal Webmail

Time spent on Facebook was greater than time

spent on Google sites for the first time in history.

(comScore, August 2010 )

Together Facebook.com and Google.com

accounted for 14% of all Internet visits last week.

(Hitwise, March 2010 )

Copyright 2010 SonicWALL Inc. All Right Reserved.

Page 10: Application Intelligence, Control

The Problems Today:

Security and Productivity

CONFIDENTIAL All Rights Reserved

What are the THREATS?

Where is this TRAFFIC coming from?

What APPLICATIONS are really on my network?

Where is ALL my BANDWIDTH going?

Page 11: Application Intelligence, Control

Application Chaos

IT Controls Challenged

Unacceptable AppsAcceptable Apps

Who Chooses What Applications are Good or Bad?

Page 12: Application Intelligence, Control

Requires a completely new paradigm focused on users and applications

Overcoming Application Chaos…

Page 13: Application Intelligence, Control

What is a Next-Generation Firewall

By Gartner’s definition, a NGFW must include all of the following:

Full Stateful Packet Inspection

I.E., must have traditional Firewall capabilities

Intrusion Prevention

Fast, enterprise quality Deep Packet Inspection and prevention for Intrusions

Application Control

Ability to block/allow applications by identifying the specific applications, not relying on Port or Protocol

SSL Decryption

Ability to inspect encrypted traffic (man in the middle) and take policy action

Beyond the Strict Definition of NGFW

Gartner generally wants to exclude Gateway Anti-Virus from the definition

Palo Alto, Fortinet, and SonicWALL accept that in the tight definition, but all three companies offer the ability to have more complete anti-malware scanning if the users desires for greater security

Only SonicWALL can do so without dragging performance to unacceptable levels

Only SonicWALL can inspect in real time any file size regardless of size of box (enterprise, mid-enterprise, small branch office)

SonicWALL also goes beyond just Application Control by offering Application Control, Throttling, Analysis and Visualization

CONFIDENTIAL All Rights Reserved

Gartner coined the term “Next-Generation Firewall”

Page 14: Application Intelligence, Control

SonicWALL Next-Generation Firewall

CONFIDENTIAL All Rights Reserved

??

? ?

? ?

?

ControlIdentify Categorize

Application ChaosMany on Port 80

Re-Assembly Free

Deep Packet

Inspection

Page 15: Application Intelligence, Control

SonicWALL Next-Generation Firewall

CONFIDENTIAL All Rights Reserved

??

? ?

? ?

?

Application ChaosMany on Port 80

ControlIdentify Categorize

Re-Assembly Free

Deep Packet

Inspection

Page 16: Application Intelligence, Control

SonicWALL Next-Generation Firewall

CONFIDENTIAL All Rights Reserved

Malware BlockedCloud-based

Extra-Firewall

Intelligence

Application ChaosMany on Port 80

ControlIdentify Categorize

Re-Assembly Free

Deep Packet

Inspection

Page 17: Application Intelligence, Control

SonicWALL Next-Generation Firewall

CONFIDENTIAL All Rights Reserved

Malware Blocked

Users/Groups PolicyApplication ChaosMany on Port 80

ControlIdentify Categorize

Cloud-based

Extra-Firewall

Intelligence

Re-Assembly Free

Deep Packet

Inspection

Page 18: Application Intelligence, Control

SonicWALL Next-Generation Firewall

CONFIDENTIAL All Rights Reserved

Critical Apps: Prioritized Bandwidth

Acceptable Apps: Managed Bandwidth

Unacceptable Apps: Blocked

Users/Groups PolicyApplication ChaosMany on Port 80

Visualize &

Manage Policy

ControlIdentify Categorize

Cloud-based

Extra-Firewall

Intelligence

Malware Blocked

Re-Assembly Free

Deep Packet

Inspection

Page 19: Application Intelligence, Control

The Power of Seeing - Application Visualization

CONFIDENTIAL All Rights Reserved

Page 20: Application Intelligence, Control

App Flow Monitor: Real Time Analysis of

Exactly What is Happening

CONFIDENTIAL All Rights Reserved20

Page 21: Application Intelligence, Control

CONFIDENTIAL All Rights Reserved

Page 22: Application Intelligence, Control

CONFIDENTIAL All Rights Reserved

Page 23: Application Intelligence, Control

CONFIDENTIAL All Rights Reserved

Page 24: Application Intelligence, Control

What it All Means…

Trends in technology are driving the applications into the cloud and the use of social media is now a requirement to conduct business

Problem: IT is experiencing challenges with managing their networks as:

THREATS are getting more sophisticated

APPLICATION chaos is occurring on corporate networks

BANDWIDTH is being sucked by for non-productive applications

No way to know where network TRAFFIC coming from

CONFIDENTIAL All Rights Reserved

SonicWALL Next-Generation Firewall with

Application Intelligence, Control and Visualization

Page 25: Application Intelligence, Control

Take Action

View Gartner Videocast: Bringing Order to Application Chaos

White Papers, Data Sheets, Case Studies, Best Practices, Screen Shots, Webinars

www.sonicwall.com/us/products/solutions/Application_Intelligence_Control.html

CONFIDENTIAL All Rights Reserved

Page 26: Application Intelligence, Control

SonicWALL Next-Generation Firewall

CONFIDENTIAL All Rights Reserved

Critical Apps: Prioritized Bandwidth

Acceptable Apps: Managed Bandwidth

Unacceptable Apps: Blocked

Users/Groups PolicyApplication ChaosMany on Port 80

Visualize &

Manage Policy

ControlIdentify Categorize

Cloud-based

Extra-Firewall

Intelligence

Malware Blocked

Re-Assembly Free

Deep Packet

Inspection