Top Banner
Next Generation Security Layered Security with Granular Control Wayne Wilkening Manager, Systems Engineering [email protected]
24

Next Gen Security – Layered Security with Granular Control

Apr 12, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Next Gen Security – Layered Security with Granular Control

Next Generation SecurityLayered Security with Granular Control

Wayne WilkeningManager, Systems Engineering

[email protected]

Page 2: Next Gen Security – Layered Security with Granular Control

The Threat Landscape

Page 3: Next Gen Security – Layered Security with Granular Control

Compromised Endpoints

How Your Network is Compromised

Compromised “Good”

Site

Malware Hosting Site

Page Visit

Malware Request

Exploit

Malware

Page 4: Next Gen Security – Layered Security with Granular Control

Packet Chaos

Page 5: Next Gen Security – Layered Security with Granular Control
Page 6: Next Gen Security – Layered Security with Granular Control
Page 7: Next Gen Security – Layered Security with Granular Control

Real-time Application Visibility

Page 8: Next Gen Security – Layered Security with Granular Control

Highly Efficient Single-Pass RFDPI Security Engine Proven & Proprietary Reassembly Free Deep Packet Inspection

Preprocessors

PostprocessorsTCP Reassembly

Policy Decision Deep Packet Inspection Engine

Pattern Definition Language Interpreter

Signature SignatureInput Packet Output Packet

Stable Throughput vs. Buffering Proxy Engines

Low-Latency Ultra-Scalable Single Pass Deep Packet Inspection Engine

Linearly Scalable on a Massively Multi-Core Architecture

1 Core 96 Cores

Page 9: Next Gen Security – Layered Security with Granular Control

50%

50%

Network-based Malware Protection

ATTACK ANY File

Page 10: Next Gen Security – Layered Security with Granular Control

99%

Network-based Malware Protection

ATTACK

ANY File

Send Alert &Drop ConnectionDROP

!

Page 11: Next Gen Security – Layered Security with Granular Control

25%

75%

CloudAssist™ Malware Protection

ATTACK

0e7ccbf78167faac97f7a45f977681d9

SonicWALL GRIDCloudAssist Database

Executable File

MD5

Page 12: Next Gen Security – Layered Security with Granular Control

75%

25%

CloudAssist™ Malware Protection

ATTACK

0e7ccbf78167faac97f7a45f977681d9

SonicWALL GRIDCloudAssist Database

43.5M+ Signatures

!Send Reply to Drop ConnectionExecutable File

DROP

Page 13: Next Gen Security – Layered Security with Granular Control

Whether it was the “Snowden Effect” & “NSA Spying Scandal”, or simply the best effort to start safeguarding our online privacy from would be attackers and thieves, a significant amount of Internet traffic today is now encrypted via HTTPS. In fact there are initiatives to “encrypt everything”, and even Internet search engines, like Google, have altered their search algorithms to prioritize HTTPS sites in their search results.

Encrypted Traffic

Page 14: Next Gen Security – Layered Security with Granular Control

Typical SSL Negotiation

14

Page 15: Next Gen Security – Layered Security with Granular Control

Proxied SSL Negotiation

Resign

Page 16: Next Gen Security – Layered Security with Granular Control

Compromised Endpoints

Next-generation firewall (NGFW) Breaks the malware cycle, provides comprehensive security

Compromised “Good”

Site

Malware Hosting Site

Page Visit

Malware Request

Exploit

Malware

SSL

Decr

yptio

n

URL Filtering

Intrusion Prevention

Network Anti-Virus

Cloud Anti-Virus

Botnet Filtering

Protected Endpoints

Page 17: Next Gen Security – Layered Security with Granular Control

AV Enforcement: A Critical Layer

Page 18: Next Gen Security – Layered Security with Granular Control

Cloud configuration and reporting of client AV

Page 19: Next Gen Security – Layered Security with Granular Control

Challenge: Explosion of zero-day threats*

Designed to evade sandbox analysis and detection Target not just Windows environments but also mobile and

connected devices Hide in encrypted and unencrypted traffic Hide in more file types, of any file size* Source: Dell Security 2016 Threat Report

Page 20: Next Gen Security – Layered Security with Granular Control

Capture - Advanced Threat Protection• Cloud service detects and blocks zero-day threats at the gateway• Multi-engine sandbox detects more threats than single sandbox technology• Broad file type analysis and platform support• Option to block until verdict at the gateway

Page 21: Next Gen Security – Layered Security with Granular Control

Increased effectiveness against zero-day threats

Multi-engine advanced threat analysis detects more threats, can’t be evadedo Virtualized sandboxo Full system emulationo Hypervisor level analysis

Broad file type and OS environment analysis, no file size limitationo PE, MS Office, PDF, archives, JAR, APKo Windows, Android and Mac OS

Automated and manual file submission

Page 22: Next Gen Security – Layered Security with Granular Control

2012 NGFW

2013 NGFW

2014 NGFW

The NSS Security Value Map – Consistent Leaders

2015 NGFW

Page 23: Next Gen Security – Layered Security with Granular Control

Response Time Matters!

23

Date issued SonicWALL Cisco Fortinet Palo Alto Astaro / Sophos Checkpoint Juniper Symantec McAfee Barracuda WatchGuard

2963983 4/26/2014 Not Enrolled Not Enrolled

2934088 2/19/2014 Not Enrolled Not Enrolled

2914486 11/27/2013 Not Enrolled Not Enrolled

2896666 11/5/2013 Not Enrolled Not Enrolled

2887505 9/17/2013 Not Enrolled Not Enrolled

2847140 5/3/2013 Not Enrolled Not Enrolled

2794220 12/29/2012 Not Enrolled Not Enrolled

2719615 6/12/2012 Not Enrolled Not Enrolled

2639658 11/3/2011 Not Enrolled Not Enrolled

Key

Green First 48 Hours

Yellow 48 to 96 Hours

Red >96/Unknown

Microsoft MAPP Program Summary

From: http://technet.microsoft.com/en-us/security/dn568129

Data as of 8/12/2016

MS Security

Advisory

Vendor

Page 24: Next Gen Security – Layered Security with Granular Control

@SonicWALL

@SonicWALL and One Identity

@SonicWALLandOneIdentity

www.sonicwall.com