1 / 11

Network Security Solutions for Efficient Traffic Management and Protection

Discover the latest solutions for managing and securing network traffic, including Allot NetEnforcer, Bluecoat Phishing Solution, and Fortinet FortiGate-3600. Learn how these tools can help improve network performance, enforce policies, and protect against phishing attacks.

hobsons
Télécharger la présentation

Network Security Solutions for Efficient Traffic Management and Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WINS Monthly Meeting11/5/2004

  2. Agenda • Introductions • Widener Internet Solution • Allot NetEnforcer (Accounting/Shaping/Steering) • Allot Cache Server Pool • Fortigate 3600 • Bluecoat Phishing Solution • Bluecoat Spyware Solution • Intermute Spyware Solution • Question & Answers

  3. Introductions • Name • Title • Location

  4. Widener Internet Solution

  5. Allot NetEnforcer (Accounting/Shaping/Steering) • Implement Application- and IP-Based AccountingThe NetAccountant software add-on for the NetEnforcer collects traffic data per session, gathering information on source address, destination address, application type and policy. Use your owen application or the NetAccountant Reporter to create tabular and graphical reports for capacity planning and resource management. • Three Steps to Policy-Powered NetworkingPolicy-Powered Networking lets you efficiently manage traffic crossing the LAN/WAN boundary of an enterprise network. The process of implementing a Policy-Powered Networking solution includes three steps: • 1. Monitor network and bandwidth usageUse the NetEnforcer's NetWizard setup utility to auto-discover applications in your network. Using this information, you can determine which protocols affect your network performance and should be managed. • 2. Define policies that link business priorities to computing needsUse the QoS Policy Form to quickly define QoS attributes for the desired policies. Assign minimum and maximum percentages of bandwidth, and prioritize traffic from 1 to 10. For additional policy definition, use the Policy Editor to define policies based on addresses, protocols, VLAN tags, Type of Service, or time of day.  • 3. Enforce the rulesLet NetEnforcer examine all traffic crossing the WAN link. Upon matching a traffic session with a rule, NetEnforcer forwards the packets per the specified policy actions. Continually monitor network resources using NetEnforcer's Traffic Monitor and refine policies to maintain maximum network control and application performance.

  6. Allot Cache Server Pool • Policy-Based Load Balancing Software • Transparently distribute client traffic to Web server farms Distribution of traffic according to individual server capabilities Assure 100% uptime by automatically rerouting down-server traffic • Web and other Internet-based server farms are a critical company resource. However, increased complexity of server farms and the need for improved server performance have created the need for network managers to more efficiently control and distribute server traffic.

  7. Widener Fortigate 3600 Interfaces 10/100Base-T Ports 1 1000Base-SX Ports (Fiber) 4* 1000Base-T Ports (Copper) 2 System Performance Concurrent sessions 1,000,000 New sessions/second 25,000 Firewall throughput (Gbps) 4Gbps 168-bit Triple-DES throughput (Mbps) 600 Unlimited concurrent users • Policies 50,000 Schedules 256 • Installed in July • Detects, quarantines, and eliminates viruses and • worms in real-time. Scans incoming and • outgoing email attachments (SMTP, POP3, • IMAP), HTTP and FTP traffic including web-based • email, and encrypted VPN tunnels – without • degrading Web performance • Detection and prevention of over 1300 intrusions • and attacks, including DoS and DDoS attacks, • based on user-configurable thresholds. Automatic • updates of IPS signatures from FortiProtect • Network • Processes all Web content to block inappropriate • material and malicious scripts via URL blocking • and keyword/phrase blocking • Industry standard stateful inspection firewall • Industry standard PPTP, L2TP, and IPSec VPN • support • FortiGate units can be deployed in conjuction • with existing firewall and other devices to • provide antivirus, content filtering, and other • content-intensive applications Fortinet FortiGate-3600 – Product of the Year - Gold Award – Enterprise firewall system searchNetworking.com February 2004 A fortress in a box – FortiGate 3600 offers a smorgasbord of security services on one machine FCW.com October 2003

  8. Bluecoat Phishing • What is a Phishing Attack? • A phishing attack is an attempt by fraudsters to fool a user into divulging confidential information over the Internet. Phishing attacks often start by spammers sending out email messages and asking customers to “confirm” their account information by clicking on a link found in the message. The user is then asked to enter their personal information such as name, social security number, bank account number, password, and PIN. Once captured spammers can use this information to deplete bank accounts, charge credit cards, and steal user identities. • Blue Coat keeps employees safe while on the Internet at work. The ProxySG can be configured to deflect phishing attacks in two ways. Earlier (and less sophisticated) phishing attacks employ the use of a pop-up ad to request additional information. The ProxySG provides a pop-up blocking feature that allows you to permit only required pop-ups such as those needed for Outlook Web mail. • The second method to control phishing scams by the ProxySG is to recognize and display the origin of any secondary form presented to the user. The ProxySG does this by determining the origin of any Web site that has a form and then posting a banner noting the origin. Because the most recent phishing scams deploy a separate form when requesting personal user information, the ProxySG can prompt the user with the origin address (URL or IP) of the form. Typically, a legitimate site with a form will be displayed with the actual URL such as www.cnn.com. An IP address displayed indicates that a user is being redirected to another server and should use extreme care. The banner is only displayed if the page contains a form.

  9. Bluecoat Spyware Solution • What is Spyware? • Spyware is a general term for software that covertly monitors the actions of a PC. Spyware can either be deployed with or without the consent of the user. Commercial spyware (also known as adware) occurs when a user accepts (often through an arcane license agreement) the placement of software agents on their PC in exchange for free software. Usually the software being downloaded provides no business benefit to a corporation. The no-cost version of Kazaa desktop client, for example, requires the user to accept downloads of numerous spyware (adware) agents. • Blue Coat provides the necessary on-proxy performance and policy extensions required for URL filtering to comprehensively block Websites known to host spyware and adware. The Blue Coat ProxySG supports five leading on-proxy URL filtering databases, plus custom categories, overrides and exceptions to advise, coach and enforce users. • Administrators can block ‘Drive-by-Installs’ from any locations that may be installing Spyware. By blocking downloads of .CAB, .OCX, .EXE and .DLL files the installation of spyware can be prevented.

  10. Intermute Spyware Solution • Spyware in the Corporation, the latest Enterprise Threat • It is no secret that spyware has promoted itself from simply a PC nuisance to a high-level enterprise problem. IT and network managers are seeing the enterprise implications of desktop spyware - and realizing that staggering costs and risks are associated with spyware running on corporate PCs. • Productivity is declining in organizations where PC users suffer from spyware distractions, sluggish, infested computers, and broken Internet connections that can result from manual attempts to remove spyware from PCs. IT help desk staffs are being flooded with calls for assistance with PCs that "don't work", are painfully slow, or have web browsers behaving strangely. In addition, after years of defending the corporate network from outside threats such as hackers and viruses, spyware threats are now routinely found running within the walls of the organization. Spyware easily slips past traditional network security barriers. Spyware is threatening organizations confidential information, productivity and overall network integrity. Traditional security solutions can't stop spyware. • InterMute, Inc. ▪ 100 Grossman Drive ▪ Braintree, MA 02184 ▪ www.intermute.com

  11. Questions & Answers • Next Meeting Friday Dec 3rd

More Related