3. WatchGuard - Take Back Your Application in
Transcription
3. WatchGuard - Take Back Your Application in
Get In Control: Introducing XTM 11.4 Terry Leung Regional Director Southern China Agenda • • • • • What’s wrong with today’s network security Users and applications are out of control WatchGuard’s solution XTM 11.4 feature overview Competitive positioning Networks Lack Adequate Controls IT is facing… • Bandwidth use that is growing unexpectedly • Advanced malware outbreaks • Web applications tunneling through network controls • Increased occurrence of rogue networks/endpoints • Lack of effective security policies across the organization How Do You Add Controls Without Constraining Business Productivity? Block Skype, Facebook, and other insecure social networking apps Authenticate users to all networks including Terminal Services & WLAN Deploy consistent security policy with centralized management templates Preempt network attacks with URL filters, web reputation services, antispam, AV, rogue wireless AP scans, and strong IPS See the network and react quickly with config history/rollback, auto-email reports, efficient logging, and more Extend the Power of Your Firewall! Fireware XTM 11.4 Delivers More Control New Feature Why YOU Benefit! Application Control Limits network resources consumed by insecure and/or non-business related applications New IPS Technology (scanning all ports, global IPS configuration) Stops MORE threats with LESS administrative effort Rogue Wireless Access Point Detection for XTM 2 Series-W Reduce risk from wireless network threats and comply with PCI security standards. More Authentication Options Better able to adjust network access as appropriate for specific users or groups Config History/Rollback Know your history…control your future…enjoy peace of mind. Added Template Options with Centralized Management Drive security policy conformance and efficient management for MSSP and large installations Logging and reporting enhancements Auto-email reports and more scalable logging support more informed network administration Users and Applications are Out of Control! Unfettered App Use Should Worry You • You lose countless hours of productivity to nonbusiness apps • Many apps tunnel right past your firewall • You lack visibility in what apps do on your network • Most malware propagates via 3rd party and web apps 927,000,000 105,822 man yrs 1575 life spans (per month) Businesses have GOOD reason to be concerned about use of applications! In 2009, malicious web sites increased by 200% or more 55% of disclosed vulnerabilities affect web apps 77% of web sites with malcode are hijacked legitimate sites. 57% of data-stealing happens over the web 76% of breaches target web apps Sources: X-Force, Websense, Whitehat Security, Imperva, & 7Scan What’s Your Web 2.0 Policy? • A quarter of companies have no policy • IT decides policy 40% of the time • When you have a policy, can you enforce it? Source: Forrester Research, Forrsights Security Survey, Q3 2010 Current Controls Too Coarse Already implemented Ability to block or allow use of a particular application for the whole company 65% Ability to block or allow use of a particular application based on user's identity Ability to allow specific functions of the application Ability to block or allow specific content within the application Ability to control extent of use (e.g., time or bandwidth utilized) Planning to implement in the next 12 months 15% 54% 17% 40% 38% 30% 40% 17% 40% Source: Forrester Research, Forrsights Security Survey, Q3 2010 17% 25% 14% 12% No plans 52% Introducing Application Control • Identify, control, and report on 1500+ applications • Allow or block aren’t your only options – apply policy-based scheduling or QoS. • Granular control of applications behaviors. • Not just signature based. Behavioral detection spots sneaky apps Application Control Use Cases WG Application Control lets you: Block usage of all peer to peer applications Allow Marketing department access to Facebook Limit streaming media application usage to restricted hours Report on the top 10 applications used in the company Allow MSN Instant Messaging, but disallow file transfer over MSN Instant Messaging Granular Control Application Control Feature Customer Benefit Block specific applications at global, department, group, and individual levels Keep productivity high; prevent security threats Control sub-functions, e.g. allow access to MSN, but block MSN File Transfer Balance of permissiveness and threat mitigation Control access to applications or sub-functions by department Create, enforce, and monitor fine-grained acceptable use policies. Control access to applications by time of day. Productivity during key business hours, employee perks during off-hours. Control applications by category Ease of use Centralized management of Application Control Enforce a consistent application control policy across multiple locations. Automatic updates of application signatures Maintain a consistent security posture in a world of dynamic applications Detailed application usage reporting Monitor adherence to acceptable use policies—by user, group, department, etc Key Applications 2,300 signatures covering 1,500 unique applications Category Example Applications Instant Messaging QQ; MSN; Yahoo; GoogleTalk Mail/Collaboration Hotmail; Gmail; Yahoo; MS Exchange Web 2.0 Facebook; LinkedIn; Twitter P2P Gnutella, Foxy, Thunders, Series, Winny; Bittorrent; Remote Access Terminals TeamViewer; GoToMyPC Database MS SQL; Oracle File Transfer Peercast; Megaupload Voice Over IP Skype Streaming Media QuickTime; YouTube; Hulu Games Xbox Live; Second Life Network Mgt MS Update; Adobe; Norton; McAfee Web bypass Ultrasurf; Avoidr; Circumventor, Tor Approved applications Unapproved or harmful applications Reputation Enabled Defense for HTTP Reputation Enabled Defense for HTTP • Cloud-based analysis of web sites using WatchGuard’s ReputationAuthority servers • Improves HTTP performance • Configured in the Subscription Services menu of Policy Manager and in your HTTP proxy configuration • Supported only for XTM devices 16 WatchGuard Training Reputation Enabled Defense for HTTP • URLs are assigned a reputation score with a value between 1 and 100 by the ReputationAuthority • RED configuration must specify threshold values for “bad reputation” and “good reputation” • URLs with a reputation score that exceeds your “bad reputation” threshold are blocked before any virus scanning occurs, reducing resource load on device • URLs with a reputation score that lower than your “good reputation” threshold bypass virus scanning, improving speed of loading web pages 17 WatchGuard Training Send Feedback to ReputationAuthority Servers • When you enable Reputation Enabled Defense, the default configuration enables the XTM device to send the results of your local Gateway AntiVirus scans to WatchGuard servers • If you have Gateway AntiVirus, but do not have Reputation Enabled Defense, you can still send Gateway Anti-Virus scan results to WatchGuard • Scan results are sent to WatchGuard as encrypted data 18 WatchGuard Training That’s not all folks…. More New Visibility and Network Control Features Enhanced Authentication Features Businesses are organized in human terms, not computer terms, but too many security devices ignore this. Fireware XTM 11.4 has a variety of new authentication features to allow administrators to construct, enforce, monitor, and report on security policies that are organized by users and groups rather than by IP subnets, hosts, host ranges, or network zones. Terminal Services Authentication SSO with Manual Authentication 802.1x Authentication Multiple AD Domain Support LDAP over SSL Support Distinguishing Users on Terminal Services or Citrix Users may try to hide behind Terminal Services or Citrix. Can the right security policy be applied to them? Hi! My Name Is 192.168.51.127 • When used in a Terminal Services or Citrix environment, user identity is associated with traffic at the XTM appliance and policy is applied correctly • Allows consistent deployment of security policy across all network segments, including where thin clients are used. Reducing the Insider Risk: Secure LDAP Traffic • Secures the LDAP operation between client and server with an SSL tunnel. • Encrypts information (eg. domain name and password) that is passed in clear text during traditional LDAP authentication - preventing this key information from being sniffed and providing better protection against internal security breaches. Supporting Users on Multiple Platforms “My company supports both Windows and Mac users. Can I build user-based firewall policies for all of them?” • Allows users to authenticate manually (port 4100 over HTTPS) even when SSO is configured. • Delivers more comprehensive support of customer environments, including access from “offnetwork” domains and nonMicrosoft clients. Multiple AD Domain Support Some companies have multiple Active Directory domains. Can one firewall enforce security policies across all of them? • Multiple AD domains can be configured so as to allow customers to physically segment user information between groups (administrators/pupils in a school) or companies while deploying common policy at the firewall. 802.1X Authentication: Tighter Wireless Security • Requires authentication prior to putting users on the WLAN network – 802.1X enables port-based network access control. • 802.1X authenticator support for AP 1, AP2, and wireless guest (select from WPA Enterprise, WPA2 Enterprise or WPA/WPA2 Enterprise). • Authenticate to RADIUS (with EAP support) or local database. • Supports EAP-TLS, EAP-PEAP and EAP-TTLS. New IPS: More Coverage, Easy to Use Businesses need rock-solid protection against network attacks! • New IPS engine and signature provider • Global configuration covers all ports and protocols • Much easier to configure • Greater efficacy and faster response to new threats Configuration History and Rollback Sometimes, the admin needs to turn back the clock! • Management Server stores previous versions of device configurations • Indexed list of configs is timestamped and shows which configs were sent to devices (vs. configs created but not pushed to devices) • Promotes peace of mind; allows easy reversion in the event of a misconfiguration or change in business needs Reporting for Better Visibility, Easier Compliance Are the key people in the business getting the information they need, in a timely manner? • New report scheduling • New reports for App Control, IPS, DHCP lease activity • Email notification of ready reports • Enhancements to systematically remove diagnostic logs from log server How Does It Stack Up to Competitors? Application Control Company By the Numbers Comments WatchGuard 1500 + Applications 2300 + Signatures Granular control Attached to Firewall Policies Palo Alto Networks 1000 + Applications •Very Expensive •Lacks networking features Fortinet 1200 + Applications •Closest to WG UI •IPS service required Sonicwall 2700 Signatures •Multiple signatures per application •Intermixed with IPS •Difficult to use • Battlecards available at the partner portal, including Palo Alto Networks • Will be updated for 11.4 launch Today’s WatchGuard for Today’s Businesses Fireware XTM 11.4 advances WatchGuard’s vision of extensible threat management, helping businesses combat threats, enhance productivity, and focus on business goals. Superior Security Superior Manageability and Visibility Enhanced Authentication State of the Art Policy Enforcement What does it all mean? The Internet is a thorny thicket! Businesses face lots of competing pressures and forces WatchGuard products help companies define their relationship with the Internet It all comes down to policy 3 Phases of Policy Definition Enforcement Auditing WatchGuard has great tools and products for all three phases of policy! Conclusion Threat Landscape + Design Principles = WatchGuard Products We defeat the threats—and the competition WatchGuard is watching out for you! …and we greatly value your partnership!