architecting security across global networks

164
Confidentiality level C1 | 8 August 2011 1 Architecting Security across global networks Presented by Marco Ermini 8 August 2011

Upload: arco-rmini

Post on 19-Jan-2017

70 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Architecting Security across global networks

Confidentiality level C1 | 8 August 20111

Architecting Security

across global networks

Presented by Marco Ermini8 August 2011

Page 2: Architecting Security across global networks

Confidentiality level C1 | 8 August 20112

A huge topic: where to start?

“Divide et impera”

Page 3: Architecting Security across global networks

Confidentiality level C1 | 8 August 20113

A huge topic: where to start?

• This will not be about how to architect a network, or about network

security in general - it is about network visibility.

“Divide et impera”

Page 4: Architecting Security across global networks

Confidentiality level C1 | 8 August 20114

A huge topic: where to start?

• This will not be about how to architect a network, or about network

security in general - it is about network visibility.

• You land in this complex company (or you acquire it) and you divide

your tasks:

“Divide et impera”

Page 5: Architecting Security across global networks

Confidentiality level C1 | 8 August 20115

A huge topic: where to start?

• This will not be about how to architect a network, or about network

security in general - it is about network visibility.

• You land in this complex company (or you acquire it) and you divide

your tasks:

1. Identify the networks

“Divide et impera”

Page 6: Architecting Security across global networks

Confidentiality level C1 | 8 August 20116

A huge topic: where to start?

• This will not be about how to architect a network, or about network

security in general - it is about network visibility.

• You land in this complex company (or you acquire it) and you divide

your tasks:

1. Identify the networks

2. Identify the challenges

“Divide et impera”

Page 7: Architecting Security across global networks

Confidentiality level C1 | 8 August 20117

A huge topic: where to start?

• This will not be about how to architect a network, or about network

security in general - it is about network visibility.

• You land in this complex company (or you acquire it) and you divide

your tasks:

1. Identify the networks

2. Identify the challenges

3. Identify the alternatives

“Divide et impera”

Page 8: Architecting Security across global networks

Confidentiality level C1 | 8 August 20118

Architecting Securityacross global networks

Identify the networks

Identify the challenges

Identify the alternatives

Page 9: Architecting Security across global networks

Confidentiality level C1 | 8 August 20119

Identify the networks

• Network maps anyone?

Page 10: Architecting Security across global networks

Confidentiality level C1 | 8 August 201110

Identify the networks

• Network maps anyone?

Page 11: Architecting Security across global networks

Confidentiality level C1 | 8 August 201111

Identify the networks

• Network maps anyone?

Page 12: Architecting Security across global networks

Confidentiality level C1 | 8 August 201112

Identify the networks

• Network maps anyone?

Page 13: Architecting Security across global networks

Confidentiality level C1 | 8 August 201113

Identify the networks

Page 14: Architecting Security across global networks

Confidentiality level C1 | 8 August 201114

Identify the networks

• Asset DB anyone?

Page 15: Architecting Security across global networks

Confidentiality level C1 | 8 August 201115

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

Page 16: Architecting Security across global networks

Confidentiality level C1 | 8 August 201116

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

Page 17: Architecting Security across global networks

Confidentiality level C1 | 8 August 201117

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

Page 18: Architecting Security across global networks

Confidentiality level C1 | 8 August 201118

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

cs_os_name cs_os_versionnumber

SOLARIS 10 IDM-AP3-P | SOLARIS 10 9/10 10 9/10 | 10 9/10

SOLARIS 10 177

SOLARIS 10 1/06 820

SOLARIS 10 10/08 1413

SOLARIS 10 10/08 | SOLARIS 10 10/08 1

SOLARIS 10 10/09 1554

SOLARIS 10 11/06 2164

SOLARIS 10 3/05 35

SOLARIS 10 5/08 259

SOLARIS 10 5/08 | SOLARIS 10 5/08 3

SOLARIS 10 5/09 725

SOLARIS 10 6/06 278

SOLARIS 10 8/07 397

SOLARIS 10 8/11 3

SOLARIS 10 9/10 3442

SOLARIS 10 IDM-AP3-P | SOLARIS 10 9/10 1

SOLARIS 10 X64 10

SUN SOLARIS 10 4

Page 19: Architecting Security across global networks

Confidentiality level C1 | 8 August 201119

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

Page 20: Architecting Security across global networks

Confidentiality level C1 | 8 August 201120

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

Page 21: Architecting Security across global networks

Confidentiality level C1 | 8 August 201121

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

Page 22: Architecting Security across global networks

Confidentiality level C1 | 8 August 201122

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

Page 23: Architecting Security across global networks

Confidentiality level C1 | 8 August 201123

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

Page 24: Architecting Security across global networks

Confidentiality level C1 | 8 August 201124

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

– No way to do an automatic import, therefore many departments don’t use it

Page 25: Architecting Security across global networks

Confidentiality level C1 | 8 August 201125

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

– No way to do an automatic import, therefore many departments don’t use it

– It relies on a special tool to fetch the data, but the tool is not ubiquitous

Page 26: Architecting Security across global networks

Confidentiality level C1 | 8 August 201126

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

– No way to do an automatic import, therefore many departments don’t use it

– It relies on a special tool to fetch the data, but the tool is not ubiquitous

– Almost 35000 entries, but no one knows if the data is qualitatively relevant

Page 27: Architecting Security across global networks

Confidentiality level C1 | 8 August 201127

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

– No way to do an automatic import, therefore many departments don’t use it

– It relies on a special tool to fetch the data, but the tool is not ubiquitous

– Almost 35000 entries, but no one knows if the data is qualitatively relevant

– No one is accountable for the data, only for the Asset DB tool in itself

Page 28: Architecting Security across global networks

Confidentiality level C1 | 8 August 201128

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

– No way to do an automatic import, therefore many departments don’t use it

– It relies on a special tool to fetch the data, but the tool is not ubiquitous

– Almost 35000 entries, but no one knows if the data is qualitatively relevant

– No one is accountable for the data, only for the Asset DB tool in itself

• There is a disconnection between who created and maintains the system,

and the business objectives of it

Page 29: Architecting Security across global networks

Confidentiality level C1 | 8 August 201129

Identify the networks

• Asset DB anyone?

• Examples of our Asset DB:

– “OS”, “OS version number”, “support group”, “IP address” and “DB version” are free

text fields

– “OS”: circa 240 counted, without including the version number!

– “DB” and “Computers” counted as different entities

– 80+ support groups (!!!) many of which clearly legacy or duplicated

– No unique correspondence between Asset DB entry and physical reality

– IP address field has space for only one entry (!!!)

– No way to do an automatic import, therefore many departments don’t use it

– It relies on a special tool to fetch the data, but the tool is not ubiquitous

– Almost 35000 entries, but no one knows if the data is qualitatively relevant

– No one is accountable for the data, only for the Asset DB tool in itself

• There is a disconnection between who created and maintains the system,

and the business objectives of it

Page 30: Architecting Security across global networks

Confidentiality level C1 | 8 August 201130

Identify the networks

Page 31: Architecting Security across global networks

Confidentiality level C1 | 8 August 201131

Identify the networks

• Which hosts are still used, which ones are legacy?

Page 32: Architecting Security across global networks

Confidentiality level C1 | 8 August 201132

Identify the networks

• Which hosts are still used, which ones are legacy?

• What is the usage of the hosts?

– Which one needs to stay on the same subnets/logical networks?

– Which one needs to be kept separated?

Page 33: Architecting Security across global networks

Confidentiality level C1 | 8 August 201133

Identify the networks

• Which hosts are still used, which ones are legacy?

• What is the usage of the hosts?

– Which one needs to stay on the same subnets/logical networks?

– Which one needs to be kept separated?

• Which vulnerabilities have the hosts?

– Can you detect them?

– Can you patch them?

Page 34: Architecting Security across global networks

Confidentiality level C1 | 8 August 201134

How is the network planned?

Page 35: Architecting Security across global networks

Confidentiality level C1 | 8 August 201135

How is the network planned?

• Legacy not just in the hosts, also in the networks

Page 36: Architecting Security across global networks

Confidentiality level C1 | 8 August 201136

How is the network planned?

• Legacy not just in the hosts, also in the networks

• Was there a policy when the network was planned?

– Was the policy actually usable?

– Did they use it?

Page 37: Architecting Security across global networks

Confidentiality level C1 | 8 August 201137

How is the network planned?

• Legacy not just in the hosts, also in the networks

• Was there a policy when the network was planned?

– Was the policy actually usable?

– Did they use it?

• Firewall based versus routing based

Page 38: Architecting Security across global networks

Confidentiality level C1 | 8 August 201138

How is the network planned?

• Legacy not just in the hosts, also in the networks

• Was there a policy when the network was planned?

– Was the policy actually usable?

– Did they use it?

• Firewall based versus routing based

Page 39: Architecting Security across global networks

Confidentiality level C1 | 8 August 201139

How is the network planned?

• Legacy not just in the hosts, also in the networks

• Was there a policy when the network was planned?

– Was the policy actually usable?

– Did they use it?

• Firewall based versus routing based

Page 40: Architecting Security across global networks

Confidentiality level C1 | 8 August 201140

How is the network planned?

• Legacy not just in the hosts, also in the networks

• Was there a policy when the network was planned?

– Was the policy actually usable?

– Did they use it?

• Firewall based versus routing based

Page 41: Architecting Security across global networks

Confidentiality level C1 | 8 August 201141

Firewall-based network

Page 42: Architecting Security across global networks

Confidentiality level C1 | 8 August 201142

Firewall-based network

• Pros (supposed…):

Page 43: Architecting Security across global networks

Confidentiality level C1 | 8 August 201143

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

Page 44: Architecting Security across global networks

Confidentiality level C1 | 8 August 201144

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

Page 45: Architecting Security across global networks

Confidentiality level C1 | 8 August 201145

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

Page 46: Architecting Security across global networks

Confidentiality level C1 | 8 August 201146

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

Page 47: Architecting Security across global networks

Confidentiality level C1 | 8 August 201147

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

Page 48: Architecting Security across global networks

Confidentiality level C1 | 8 August 201148

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

Page 49: Architecting Security across global networks

Confidentiality level C1 | 8 August 201149

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

– Rules just accumulate, possibly duplicate and overlap and shadow each other

Page 50: Architecting Security across global networks

Confidentiality level C1 | 8 August 201150

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

– Rules just accumulate, possibly duplicate and overlap and shadow each other

– Lots of personnel/operational efforts

– Difficult to implement security/monitoring/compliance tools

Page 51: Architecting Security across global networks

Confidentiality level C1 | 8 August 201151

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

– Rules just accumulate, possibly duplicate and overlap and shadow each other

– Lots of personnel/operational efforts

– Difficult to implement security/monitoring/compliance tools

– Waste of IP addresses

Page 52: Architecting Security across global networks

Confidentiality level C1 | 8 August 201152

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

– Rules just accumulate, possibly duplicate and overlap and shadow each other

– Lots of personnel/operational efforts

– Difficult to implement security/monitoring/compliance tools

– Waste of IP addresses

– Projects get bored and just ask for “allow all”

Page 53: Architecting Security across global networks

Confidentiality level C1 | 8 August 201153

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

– Rules just accumulate, possibly duplicate and overlap and shadow each other

– Lots of personnel/operational efforts

– Difficult to implement security/monitoring/compliance tools

– Waste of IP addresses

– Projects get bored and just ask for “allow all”

– No real visibility!

Page 54: Architecting Security across global networks

Confidentiality level C1 | 8 August 201154

Firewall-based network

• Pros (supposed…):

– Each application/network is “separate”

– Only allowed IP/port pairs can establish a session

– Possible to implement a precise change management for firewall requests

– Possible to implement monitoring of connections

• Cons (certain!):

– Lots of firewalls are needed!

– Rules just accumulate, possibly duplicate and overlap and shadow each other

– Lots of personnel/operational efforts

– Difficult to implement security/monitoring/compliance tools

– Waste of IP addresses

– Projects get bored and just ask for “allow all”

– No real visibility!

– No real security!

Page 55: Architecting Security across global networks

Confidentiality level C1 | 8 August 201155

Architecting Securityacross global networks

Identify the networks

Identify the challenges

Identify the alternatives

Page 56: Architecting Security across global networks

Confidentiality level C1 | 8 August 201156

No real visibility

Page 57: Architecting Security across global networks

Confidentiality level C1 | 8 August 201157

No real visibility

• You cannot really enforce protocols on the firewalls

Page 58: Architecting Security across global networks

Confidentiality level C1 | 8 August 201158

No real visibility

• You cannot really enforce protocols on the firewalls

• You cannot possibly TAP all of these interfaces

Page 59: Architecting Security across global networks

Confidentiality level C1 | 8 August 201159

No real visibility

• You cannot really enforce protocols on the firewalls

• You cannot possibly TAP all of these interfaces

• Even if you TAP them, they will bypass you

Page 60: Architecting Security across global networks

Confidentiality level C1 | 8 August 201160

No real visibility

• You cannot really enforce protocols on the firewalls

• You cannot possibly TAP all of these interfaces

• Even if you TAP them, they will bypass you

• Projects tend to skip the processes if they are too complex

Page 61: Architecting Security across global networks

Confidentiality level C1 | 8 August 201161

No real visibility

• You cannot really enforce protocols on the firewalls

• You cannot possibly TAP all of these interfaces

• Even if you TAP them, they will bypass you

• Projects tend to skip the processes if they are too complex

• When NAT/NATP is used, it becomes complex to understand real sources

and destinations

Page 62: Architecting Security across global networks

Confidentiality level C1 | 8 August 201162

No real security

Page 63: Architecting Security across global networks

Confidentiality level C1 | 8 August 201163

No real security

• You will have to choose what to protect and what not

Page 64: Architecting Security across global networks

Confidentiality level C1 | 8 August 201164

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

Page 65: Architecting Security across global networks

Confidentiality level C1 | 8 August 201165

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

Page 66: Architecting Security across global networks

Confidentiality level C1 | 8 August 201166

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

Page 67: Architecting Security across global networks

Confidentiality level C1 | 8 August 201167

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

Page 68: Architecting Security across global networks

Confidentiality level C1 | 8 August 201168

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

• Subject to DoS attacks

Page 69: Architecting Security across global networks

Confidentiality level C1 | 8 August 201169

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

• Subject to DoS attacks

• Often traffic spoofing is disabled – firewall used as routers

Page 70: Architecting Security across global networks

Confidentiality level C1 | 8 August 201170

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

• Subject to DoS attacks

• Often traffic spoofing is disabled – firewall used as routers

• Does not understand OSI Layer 4 and above

Page 71: Architecting Security across global networks

Confidentiality level C1 | 8 August 201171

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

• Subject to DoS attacks

• Often traffic spoofing is disabled – firewall used as routers

• Does not understand OSI Layer 4 and above

• End to end encryption takes out the usefulness of the firewall

Page 72: Architecting Security across global networks

Confidentiality level C1 | 8 August 201172

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

• Subject to DoS attacks

• Often traffic spoofing is disabled – firewall used as routers

• Does not understand OSI Layer 4 and above

• End to end encryption takes out the usefulness of the firewall

• Network borders are blurred

Page 73: Architecting Security across global networks

Confidentiality level C1 | 8 August 201173

No real security

• You will have to choose what to protect and what not

• Often reduced to only “perimeter defence”

• Projects will tend to bypass monitored points seeking for simplicity in

deployment

• If you enable logging on big pipes, you will get huge amount of data

• Firewalls tends to become congestion points

• Subject to DoS attacks

• Often traffic spoofing is disabled – firewall used as routers

• Does not understand OSI Layer 4 and above

• End to end encryption takes out the usefulness of the firewall

• Network borders are blurred

• Lacking proper access control mechanisms

Page 74: Architecting Security across global networks

Confidentiality level C1 | 8 August 201174

Architecting Securityacross global networks

Identify the networks

Identify the challenges

Identify the alternatives

Page 75: Architecting Security across global networks

Confidentiality level C1 | 8 August 201175

Different security policy

Page 76: Architecting Security across global networks

Confidentiality level C1 | 8 August 201176

Different security policy

• Divide the network into sensitivity zones

Page 77: Architecting Security across global networks

Confidentiality level C1 | 8 August 201177

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

Page 78: Architecting Security across global networks

Confidentiality level C1 | 8 August 201178

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

Page 79: Architecting Security across global networks

Confidentiality level C1 | 8 August 201179

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

Page 80: Architecting Security across global networks

Confidentiality level C1 | 8 August 201180

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

Page 81: Architecting Security across global networks

Confidentiality level C1 | 8 August 201181

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

Page 82: Architecting Security across global networks

Confidentiality level C1 | 8 August 201182

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

Page 83: Architecting Security across global networks

Confidentiality level C1 | 8 August 201183

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

Page 84: Architecting Security across global networks

Confidentiality level C1 | 8 August 201184

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

– Application-aware tools – Next Generation Firewalls

Page 85: Architecting Security across global networks

Confidentiality level C1 | 8 August 201185

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

– Application-aware tools – Next Generation Firewalls

– Select and slice the data that you want to analyse – in real time!

Page 86: Architecting Security across global networks

Confidentiality level C1 | 8 August 201186

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

– Application-aware tools – Next Generation Firewalls

– Select and slice the data that you want to analyse – in real time!

– Identify to which user a traffic belongs to

Page 87: Architecting Security across global networks

Confidentiality level C1 | 8 August 201187

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

– Application-aware tools – Next Generation Firewalls

– Select and slice the data that you want to analyse – in real time!

– Identify to which user a traffic belongs to

– Deal with encryption

Page 88: Architecting Security across global networks

Confidentiality level C1 | 8 August 201188

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

– Application-aware tools – Next Generation Firewalls

– Select and slice the data that you want to analyse – in real time!

– Identify to which user a traffic belongs to

– Deal with encryption

– Keep a forensic registration of the traffic – you may need it!

Page 89: Architecting Security across global networks

Confidentiality level C1 | 8 August 201189

Different security policy

• Divide the network into sensitivity zones

– Front ends, back ends, “crown jewels” area, office LAN access, Guest access, etc.

• Simplify the requirements

– Identify what is really important and what can be “drawn together”

• Take the responsibility and accountability for simplification

• Secure the end point too!

• Employ better tools for network monitoring

– Database Activity Monitoring, Web Application Firewall, Network Forensics tools, etc.

– Application-aware tools – Next Generation Firewalls

– Select and slice the data that you want to analyse – in real time!

– Identify to which user a traffic belongs to

– Deal with encryption

– Keep a forensic registration of the traffic – you may need it!

– Produce NetFlow/PCAPs for SIEM tools

Page 90: Architecting Security across global networks

Confidentiality level C1 | 8 August 201190

Example of simplified network segregation

Page 91: Architecting Security across global networks

Confidentiality level C1 | 8 August 201191

Example of simplified network segregation

• Traffic flows for delivered

applications

Page 92: Architecting Security across global networks

Confidentiality level C1 | 8 August 201192

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 93: Architecting Security across global networks

Confidentiality level C1 | 8 August 201193

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 94: Architecting Security across global networks

Confidentiality level C1 | 8 August 201194

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 95: Architecting Security across global networks

Confidentiality level C1 | 8 August 201195

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 96: Architecting Security across global networks

Confidentiality level C1 | 8 August 201196

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 97: Architecting Security across global networks

Confidentiality level C1 | 8 August 201197

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 98: Architecting Security across global networks

Confidentiality level C1 | 8 August 201198

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 99: Architecting Security across global networks

Confidentiality level C1 | 8 August 201199

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

Page 100: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011100

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 101: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011101

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 102: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011102

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 103: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011103

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 104: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011104

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 105: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011105

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 106: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011106

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 107: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011107

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

Page 108: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011108

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 109: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011109

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 110: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011110

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 111: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011111

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 112: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011112

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 113: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011113

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 114: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011114

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

Page 115: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011115

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

Page 116: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011116

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

Page 117: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011117

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

Page 118: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011118

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

Page 119: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011119

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

Page 120: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011120

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

Page 121: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011121

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

Page 122: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011122

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

Page 123: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011123

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

Page 124: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011124

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

Page 125: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011125

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

Page 126: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011126

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

Page 127: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011127

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

Page 128: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011128

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

– Vulnerability Scanners

Page 129: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011129

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

– Vulnerability Scanners

Page 130: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011130

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

– Vulnerability Scanners

– Two factors authentication

Page 131: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011131

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

– Vulnerability Scanners

– Two factors authentication

Page 132: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011132

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

– Vulnerability Scanners

– Two factors authentication

– Captive portal

Page 133: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011133

Example of simplified network segregation

• Traffic flows for delivered

applications

– Internet application to allow

customers’ self service provisioning

– Outsourced management of the

office LAN to a third party

– Mobile customer with a dedicated

APN, accessing a mobile

management platform

• Security point of controls

– Next Generation Firewalls/IPSes

– Web Application Firewalls/DoS

protection

– Session Registration

– NAC

– Database Activity Monitoring

– Vulnerability Scanners

– Two factors authentication

– Captive portal

Page 134: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011134

Multiple applications deployment – old approach

Page 135: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011135

Multiple applications deployment – old approach

Page 136: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011136

Multiple applications deployment – old approach

Page 137: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011137

Multiple applications deployment – new policy

Page 138: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011138

Multiple applications deployment – new policy

Page 139: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011139

Multiple applications deployment – new policy

Page 140: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011140

Security Monitoring with the new policy

Page 141: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011141

Security Monitoring with the new policy

Page 142: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011142

Security Monitoring with the new policy

Page 143: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011143

Security Monitoring with the new policy

Page 144: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011144

Next evolution?

Page 145: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011145

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

Page 146: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011146

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

Page 147: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011147

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

Page 148: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011148

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

Page 149: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011149

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

• Capacity can scale to 768 x 10

Gb/sec ports

• However, real throughput

depends on the fabric

connectors (generally 40

Gb/sec)

Page 150: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011150

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

• Capacity can scale to 768 x 10

Gb/sec ports

• However, real throughput

depends on the fabric

connectors (generally 40

Gb/sec)

Page 151: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011151

Next evolution?

• Fabric path interception

• Packets are routed and

switched only on the main

switching/routing instance

• There is no switching or routing

happening on the access switch

• Capacity can scale to 768 x 10

Gb/sec ports

• However, real throughput

depends on the fabric

connectors (generally 40

Gb/sec)

• Could we do that?

Page 152: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011152

Next evolution?

Page 153: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011153

Next evolution?

• Interchangeable 1+10 Gb/sec ports

Page 154: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011154

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

Page 155: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011155

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

Page 156: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011156

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

Page 157: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011157

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

• Higher ports density xBalancer

Page 158: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011158

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

• Higher ports density xBalancer

• Real application detection on the xBalancer/Director Pro

Page 159: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011159

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

• Higher ports density xBalancer

• Real application detection on the xBalancer/Director Pro

• “Passive checks” for tool failures

Page 160: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011160

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

• Higher ports density xBalancer

• Real application detection on the xBalancer/Director Pro

• “Passive checks” for tool failures

• Correlation of sources/destinations/NAC tokens with real users (AD

accounts)

Page 161: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011161

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

• Higher ports density xBalancer

• Real application detection on the xBalancer/Director Pro

• “Passive checks” for tool failures

• Correlation of sources/destinations/NAC tokens with real users (AD

accounts)

• Real distributed management common for bypasses, TAPs, etc.

Page 162: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011162

Next evolution?

• Interchangeable 1+10 Gb/sec ports

• 10 Gb/sec iBypass HD

• Chassis-based bypass/load balancer

• Programmable bypass or TAP

• Higher ports density xBalancer

• Real application detection on the xBalancer/Director Pro

• “Passive checks” for tool failures

• Correlation of sources/destinations/NAC tokens with real users (AD

accounts)

• Real distributed management common for bypasses, TAPs, etc.

• APIs and connections with SIEM tools

Page 163: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011163

Page 164: Architecting Security across global networks

Confidentiality level C1 | 8 August 2011164

Thank you