1 / 25

Network Management Visibility and Compliance

Network Management Visibility and Compliance. Network Management For Virtualized Environment. But … What happens when …. Network – Availability and VISIBILITY. Application Team. Server Team. Server/Application/Database issue? Too Many devices to lookout for ? Validating configuration ?

arich
Télécharger la présentation

Network Management Visibility and Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Management Visibility and Compliance Network Management For Virtualized Environment

  2. But … What happens when ….. Network – Availability and VISIBILITY Application Team Server Team • Server/Application/Database issue? • Too Many devices to lookout for ? • Validating configuration ? • Physical to Virtual appliance? • Issue? Release Managers Security ? NetworkEngineers Audit ? ? WAN Network Patch andSecure Trouble-shoots ValidateConfigs Provisionand Update Blame Game… UpdateConfigs ? Not sure? It must be the network! ? ? Data Center 1 Data Center 2 Remote Offices

  3. Overall Goal: To provide network visibility and provide business with compliance to reduce incidents network Management is complex !! Struggles facing Operators and Administrators: • Unable to identify incidents Inability to centralize the configuration management • Disparate view and reports • Managing Network Complexities • Too many devices and policy to manage.

  4. Logs Logs Logs – No Reports “This is what you get” “This is what you want” “Here are all your events. Please take a look at them andlet me know if you find anything strange. “Of all the millions incoming events I think you need to take a look at this one.”

  5. JunOS Space/STRM Juniper’s network management Solution 1 EFFICIENTLY MANAGE JUNIPER DEVICES 2 Automate & Simplify The Network 3 Network Visibility Juniper Advantage Business Compliance 3 Key Values

  6. We manage Juniper devices better than anyone else!!! Deep Element Management JS Network management platform Junos Space FCAPS Framework Provision, Monitor, and Manage Network Elements • Fault Configuration Accounting Performance Security FCAPS Model SSL/TLS Space Platform Features AAA Built-in Firewall SSHv2 SNMPv3

  7. Manage it all…from a single console Unified management across routing, switching & security infrastructure • Inventory management • Device templates • Software image mgmt • Full configuration of devices/interfaces • Provisioning • Topology • Etc. Up to 15,000 Devices / 500 concurrent users … Per system/cluster Single pane-of-glass orchestration • One sign-on… One user interface Juniper Unique! All controlled from your browser Junos Space

  8. EASILY MANAGE ACROSS THE ENTIRE SECURITY POLICY lifecycle • Monitor • Upgrade • Update • Firewall Policies • VPN Policies • NAT Policies • IPS Policies • AppFW Policies Maintain Create Security Director Remediate Deploy • 1000’s of Policies • 1000’s of VPN’s • Publish Policies • Verify Policies • Push Policies • Update Policies • Take Action • Enable IPS • Enable AppFW Monitor • Logging & Reporting • STRM Integration

  9. Junos Space Security Director AUTOMATES • Delivers scalable and responsive security management • Improves the reach, ease, and accuracy of security policy administration • Enables quick and intuitive web-based management of security policy lifecycle Firewall management IPsec VPN management Network Address Translation (NAT) management Intrusion prevention (IPS) signature management Application-level policy management + Publish WorkFlow: Manage policy work by role for better accuracy

  10. Simplify management and increase productivity… without being tethered to a console! Manage Devices Easily Manage Anytime … anywhere! Use Junos Space on your Apple or Android* Device! • Quickly view and respond to Junos Space alarms • Take action … wherever you are • Perform device-specific operations such as: • Device inventory • Configuration • Interface status • Device pings • …and more Juniper Unique! * Android Coming Soon Download the Junos Space App at http://itunes.apple.com/us/app/junos-space/id446923660?mt=8

  11. STRM has two different Functions: Log Management Provides long term collection, archival, search and reporting of events, application data and compliance Threat Management Security Information and Event Management (SIEM) Correlation of event and flow data Asset profiling Integration with Reputation data Network Behavior Analysis & Application Visibility Support for flow collection Anomaly detection based on: Thresholds Behavior Juniper Security & Application Visibility SolutionSTRM – “Security Threat Response Manager” Integrates Mission Critical Network & Security Data Silos Security Information & Event Management Log Management Log Management STRM Network Behavior Analysis & Application Visibility

  12. Networking events Security logs Operating Systems/Host logs Applications User and asset Security map utilities: Maxmine (provides geographies) Shadownet Botnet Customization logs through generic Device Support Module (DSM) Adaptive Logging Exporter (ALE) event and flow Collection Compliance Templates Forensics Search Policy Reporting

  13. Log Management Log Management Advanced Reporting • 500+ Out of the box report templates • Fully customizable reporting engine: creating, branding and scheduling delivery of reports • Events and Time Series Reports • Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA • Reports based on control frameworks: NIST, ISO and CoBIT • Executive Reports • Vendor Specific Reports • Routers/Switches • VPN/SSL • Firewalls/IDP • UTM • Application • Database • Access

  14. STRM correlation of data sources creates offenses (129) Offenses are a complete history of a threat or violation with full context about accompanying network, asset and user identity information Offenses are further prioritized by business impact The Key to Data Management: Reduction and Prioritization SIEM STRM Previous 24hr period of network and security activity (2.7M logs)

  15. SIEM Use Case: Complex Threat Detection Sounds Nasty… But how do we know this? The evidence is a single click away. Buffer Overflow Exploit attempt seen by Snort Network Scan Detected by QFlow Total Security Intelligence Convergence of Network, Event and Vulnerability data Targeted Host Vulnerable Detected by Nessus

  16. Network Behavior Analysis Flows for Network Intelligence • QoS Monitoring • Detection of day-zero attacks that have no signature • Policy monitoring and rogue server detection • Visibility into all attacker communication • Passive flow monitoring builds asset profiles & auto-classifies hosts • Network visibility and problem solving (not just security related)

  17. Keeping the Business Running/Complaint Visibility and compliance Good Control Awareness Efficiency Process Hygiene Pro-Active … Real Time Tools Compliance/Accountability

  18. What makes Juniper Unique… So You Can… Automate & Simplify The Network Reduce Costs & Meet SLAs Increase Networking Agility

  19. Extensive FM operations: • Alarms • Events • Notifications • Outages • Dashboard • View Fault management • Filter • Acknowledge • Clear • Escalate • Forward • Reports/Charts

  20. Maintains central archive of config file versions from all devices Configuration management • Backup • Restore • Edit • Compare versions • Export • Delete Extensive Change Management… Automatically detects device changes and synchronizes Presents all configuration knobs to the user via a graphical editor • Changes can be scheduled or committed to the device immediately

  21. HW/SW License Inventory • Deep • Discovery • Template Designer/ Administrator Configuration management • Automated Script Management • Centralized Image Management

  22. Extensive Audit and User Management Accounting management Audit Logs User Management • Different users can be authorized to view/access different sets of devices • Permission Labels are assigned to users and devices • The user sees only those devices they’ve been assigned to • Every user action is audit logged • Statistical widgets for quick visualization • Tabular views with sorting and filtering for detailed forensics • Data can be exported

  23. Real-time and historical Performance Monitoring Performance management • Benefits • Create, view, and edit customized reports • Provide views of your service level metrics for various time periods and by categories • Provide regularly scheduled statistical reports on collected data Performance data collected includes: • Response Time • SNMP Node & Interface Data • Border Gateway Protocol (BGP) • Open Short Path First (OSPF) • Power

  24. Preserve network integrity with full featured network access control Security management Configure all of the security components within a device… including IPv6 tunnels, firewall filters, stateful firewalls, etc. Integrated Security Includes: • HTTPS • Authenticate Device with RSA Keys • Enhanced Security between Space and Devices (SSHv2 connections) • Secure passwords for users • Servers can be configured to authenticate against LDAP/AD service, RSA Secure ID, etc.

More Related