how to select a security visibility solution

24
How to Select a Security Visibility Solution Are you asking the right questions? June 2016

Upload: netscout

Post on 13-Apr-2017

106 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: How to Select a Security Visibility Solution

How to Select a Security Visibility SolutionAre you asking the right questions?

June 2016

Page 2: How to Select a Security Visibility Solution

AGENDA HIGHLIGHTS

• Why security visibility?• The case for packet flow switching• How to formulate your requirements• Key requirements for inline security • Case study and takeaways

Ksenia CoffmanProduct Marketing ManagerNETSCOUT

SPEAKERS:

2©2016 NETSCOUT

Page 3: How to Select a Security Visibility Solution

3

SECURITY ATTACK TRENDS

Source: Arbor Networks (2016): Worldwide Infrastructure Security Report, vol. XI

©2016 NETSCOUT

Page 4: How to Select a Security Visibility Solution

EVOLVING NEEDS

©2016 NETSCOUT ° CONFIDENTIAL & PROPRIETARY 4

The need to optimize packet flow

Complex security scenarios

Active, passive and hybrid security

Archiving and spooling

New and more security tools

Security threats: Bigger, faster, more complex

Page 5: How to Select a Security Visibility Solution

State of network security threats

Are we better off than two years ago?

Page 6: How to Select a Security Visibility Solution

SECURITY WITHOUT VISIBILITY

• Individual silos of security and single points of failure• Complex configuration and change management

6©2016 NETSCOUT

Page 7: How to Select a Security Visibility Solution

Why Security Visibility: The Case for Packet Flow Switching

Page 8: How to Select a Security Visibility Solution

8

WHAT IS A PACKET FLOW SWITCH?Network Centralized Tools

Application Performance Management

Network Performance Management

Customer Experience Management

Security

From the Network To the Tools

An Appliance to Optimize Packet Flow

©2016 NETSCOUT

Page 9: How to Select a Security Visibility Solution

MATRIX SWITCHES

• Entry-level packet broker: NPB software + COTS• Does not scale for advanced capabilities and performance

Application Performance Management

Network Performance Management

Customer Experience Management

Security

Packets Not Reaching Tools

ADVANCED FUNCTIONALITY MISSING

9

Network Centralized Tools

Page 10: How to Select a Security Visibility Solution

SOFTWARE BASED MONITORING SWITCH

• The software based monitoring switch adds compute capabilities to matrix-switches• Lack hardware acceleration behind every port • Difficult and costly to scale

1010

PERFORMANCE DEGRADES

Application Performance Management

Network Performance Management

Customer Experience Management

Security

Network Centralized Tools

Page 11: How to Select a Security Visibility Solution

TRUE PACKET FLOW SWITCHINGNetwork Centralized ToolsPFS

Security

NGFW

IDS

IPS

Page 12: How to Select a Security Visibility Solution

Network Centralized Tools

Application Performance Management

Network Performance Management

Customer Experience Management

Security

SLICING: Remove unnecessary payload

SlicingPFS

Filtering

Replication

Slicing Stripping

Speed Conversion Aggregation Load Balance

De-Duplication©2016 NETSCOUT

Page 13: How to Select a Security Visibility Solution

Network Centralized Tools

Application Performance Management

Network Performance Management

Customer Experience Management

Security

STRIPPING: Enable processing of encapsulated packets

StrippingPFS

Filtering

Replication

Slicing Stripping

Speed Conversion Aggregation Load Balance

De-Duplication©2016 NETSCOUT

Page 15: How to Select a Security Visibility Solution

WHAT ABOUT PERFORMANCE?

Traffic grows Performance degrades

Page 16: How to Select a Security Visibility Solution

CAN YOU HANDLE TRAFFIC GROWTH?

Traffic Grows

13

Tools overrun, limited load balancing

Page 17: How to Select a Security Visibility Solution

DO YOU SUPPORT INLINE SECURITY?

Inline tools Single Points of Failure

14©2016 NETSCOUT

Page 18: How to Select a Security Visibility Solution

WHAT ABOUT HEALTH CHECKS & TRIGGERS?

• Both positive and negative health checks are required

• Conditional triggers are key

• Each security system in the tool chain should have a different trigger

17©2016 NETSCOUT

Page 19: How to Select a Security Visibility Solution

CAN YOUR SYSTEM SUPPORT TOOL CHAINING?

Inline Monitor

Inline Network

Aggregated Traffic

2 4 6

71

3 5

Inline Tool Chain

NGFW LB Group1 Web

8

NGFW Web Gateway IPS

IPS

IN IN IN

18

IM IM IM IM IM IM

©2016 NETSCOUT

Page 20: How to Select a Security Visibility Solution

Case study

Page 21: How to Select a Security Visibility Solution

21

CASE STUDY: Large Private Cloud

• Unified packet plane achieves complete visibility

Page 22: How to Select a Security Visibility Solution

PACKET FLOW SWITCHING FOR SECURITY VISIBILITYNetwork Security Systems

Security

NGFW

IDS

IPS

PFS 2204

PFS 4204

Unified Packet Plane

TriggersNetwork bypass Health Check Tool chainingActive inline

Filtering

Replication

Slicing Stripping

Speed Conversion Aggregation Load Balance

De-Duplication

ENT ERPR I S E . N E T SCOUT. COM

Page 23: How to Select a Security Visibility Solution

THE RIGHT SECURITY VISIBILITY SOLUTION:

• Helps retain investment in existing security systems

• Simplifies adds, tests and changes

• Supports both performance assurance and cybersecurity

Page 24: How to Select a Security Visibility Solution

Additional Resources

EN TE RPR I S E . N E T SCOUT. COM

• Listen to the live webinar here• Enterprise Networks: No Tool Left Behind