1 / 87

InstantScan Content Manager

InstantScan Content Manager L7 Networks service@L7-Networks.com L7 Networks Inc. Agenda Company Profile L7 Missions L7 Investors Layer-7 Content Manager Part-I Market Demand Part-II Solutions Part-III Successful Cases Appendix-I Layer-7 App. Appendix-II Product Spec.

Télécharger la présentation

InstantScan Content Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. InstantScan Content Manager L7 Networks service@L7-Networks.com L7 Networks Inc.

  2. Agenda Company Profile • L7 Missions • L7 Investors Layer-7 Content Manager • Part-I Market Demand • Part-II Solutions • Part-III Successful Cases • Appendix-I Layer-7 App. • Appendix-II Product Spec. • Appendix-III Patents

  3. Missions: Internal Network Security InstantScan Content Mgr. Catching Internal Thieves: Employee internet content / behavior management InstantLock Co-Defender Defending Internal Attacks: Isolate virus-infected PCs Internal Threats InstantBlock Application Firewall Preventing External Attacks/Thieves: Unified threat management InstantQos Bandwidth Mgr. Shaping Internal Traffic: Manage P2P / streaming / VoIP / … by layer-7 in-depth classification External Threats

  4. L7 Investors

  5. InstantScan Content Manager L7 Networks Inc.

  6. Part-IMarket Demands Catching the Internal Thieves

  7. What are your employees doing at work? employee productivity killer Internet Explorer for web sites Outlook for emails Looking for info for work? Check out stock price first! network performance killer Communicating for work? Speak to lovers first! MSN for chats BT, ED2K, Xunlei Download a movie back home for fun!!

  8. Survey & Studies • Heavy Usage • Gartner: >30% enterprise, <1% control (2005) • Radicati Group: >80% enterprise (2008) • Security Theats • WORM_KELVIR.A • WORM_FATSO.A • …

  9. 1. Employees with low productivity

  10. 2. Information Leakage or Virus Price Book

  11. 3. Bandwidth stealers for downloads • P2P downloads • Illegal music • Illegal movies • …… • …… • Bandwidth inadequate for • HTTP • Email • ERP • ……

  12. Plug & Play Firewall 2005/03/25: NBL Editor’s Choice Beat Facetime, Akonix 2005/12/01: National Innovation Awards L7 Content Manager (stealth mode) switch

  13. 5-Step Content Management Step.4 Content Mgmt. Step.1 Discovery Step.2 Normalization Step.3 Behavior Mgmt. Step.5 Report Analysis Anti-Virus MSN file transfer File Recording IM Game IM Chat Chat Recording IM Streaming Keyword block P2P Bandwidth Mgmt. 35 Mbps 20 Mbps 10 Mbps Real-time Learning Layer-7 to Layer-4 Normalization Interactive Behavior Mgmt. Deep Content Inspection Offline Report / Analysis

  14. 1. Employees with low productivity Instantly respond to employees in Chat windows even IS doesn’t have an IP address

  15. 2. Information Leakage or Virus Price Book Instant Warning

  16. 3. Bandwidth stealers for downloads • P2P downloads • Illegal music • Illegal movies • …… • …… After installing InstantScan • Mission critical app. • HTTP • Email • ERP • ……

  17. Part-IISolutions

  18. Solutions manage / filter / record / audit employee’s IM & Web behaviors and contents to increase their productivity built-in backend reports for 3-level analysis: (1) index for productivity, performance, security; (2) dashboards for summary; (3) detailed reports for inspection Employee Productivity highspeed UTM hardware platform with intelligent 3-tier arch. for performance, availability, and reports Layer-7 Visibility understand the real applications running by your employees Network Performance Internal Security limit P2P / P2SP traffic and guarantee mission critical traffic such as ERP, VoIP, Web traffic prevent internal network users from virus/worm or information leakage by P2P / tunnel software, spyware, WebMail, WebIM, etc.

  19. Painless Installation? WebSense / BlueCoat / FaceTime / IM Logic / Akonix require to setup every client to connect to the IM Proxy Spam Wall Tunneled IM cannot be managed Virus Wall IM@HTTP cannot be managed IM Proxy data path Inline-IDP Firewall/VPN Check website for comparison Content Mgmt. IM Proxy What if IM is tunneled in WebMSN/Mail/HTTP/…? Web Proxy What if IM behaves like Web Proxy?

  20. Step 0. No Modification of Networks IM in port-80, proxy, socks4/5 can still be managed Even in wireless/dhcp env, still can be managed by AD Management Server DHCP Server Firewall/Router Proxy IS switch AD Server switch

  21. 3-Tier Architecture Friendly user interfaces Powerful reporting and alerts Plug & play installation without modifying network arch.

  22. 5-Step Content Management Step.4 Content Mgmt. Step.1 Discovery Step.2 Normalization Step.3 Behavior Mgmt. Step.5 Report Analysis Anti-Virus MSN file transfer File Recording IM Game IM Chat Chat Recording IM Streaming Keyword block P2P Bandwidth Mgmt. 35 Mbps 20 Mbps 10 Mbps Real-time Learning Layer-7 to Layer-4 Normalization Interactive Behavior Mgmt. Deep Content Inspection Offline Report / Analysis

  23. Step 1. Discovery (App. View) Watch applications’ sessions and highlight tunneled IM sessions

  24. Step 2. Setup L7 Policy Scheduled updates to Application Patterns to manage application usage by defined time schedules

  25. Step 3.1 Setup IM Policy for Individuals IM management for individuals by (1) specific IM accounts, (2) learning, (3) registration, (4) AD name, (5) AD group

  26. Step 3.2 Setup IM Behavior Mgmt. Define permission levels to facilitate individual IM policy deployment

  27. Step 3.3 Setup IM Peers Limit the peer for chat by individuals or groups

  28. Step 3.4 Self-Defined Policy Violation Warning Messages Multi-language support for all languages

  29. Step 3.4 Setup Bandwidth Pipes Divide outbound bandwidth pipes by mouse drags Divide inbound bandwidth pipes by mouse drags

  30. Step 4.1 Setup IM Chat Content Management Right click to define your own chatting keywords / groups

  31. Step 4.2 Setup IM File Transfer Content Management Right click to define your own filename keywords/groups

  32. Step 4.3 Setup IM File Transfer Anti-Virus Anyone who is infected with virus will be notified the name of the virus

  33. Step 5.1 Multi-level Auditing Levels 3-levels: admin/mis/audit to separate operating and auditing parties

  34. Step 5.2 Ranking by app. usage

  35. Step 5.3 Ranking by traffic volume

  36. Step 5.4 Scheduled Reports in HTML/PDF/XLS Formats

  37. Step 5.4 Scheduled Reports in HTML/PDF/XLS Formats

  38. Part-IIISuccessful Cases

  39. Accounting & Auditing Anyone who is auditing others should have themselves well-audited so as to assist customers to be compliant to various regulations.

  40. Manufacturing Confidential information should be kept as private as possible. InstantScan is able to detect varieties of tunneled software which may cause a lot of security holes for information leakage.

  41. Semiconductor Confidential design sheet is the core technology of IC design and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.

  42. IC Design Confidential design sheet is the core technology of IC design and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.

  43. Banking & Stocks With a heavy usage of IM across the stock transactions, they do need a tool to log and record what the customers have issued to the brokers, and what the brokers have spoken to the internal dealers.

  44. Photodiode Confidential design sheet is the core technology of Photodiode and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.

  45. Electronics Confidential price book is the core value of us to sale the chips and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.

  46. Media Confidential news are invaluable if they are kept in secret. However, journalists communicate largely with IM so they can share the resources. What is worse, internal staffs may also use IM to tell other staffs in other companies. However, IM is extremely convenient for communications among internal staffs. We need L7 to control them.

  47. Spin-off from the D-Link corporation, Alpha continued to sue VIA Technology for the stolen confidential designs. In the mean time, Alpha Networks put 4 InstantScan boxes at the outbound links to control the use of IM so as to gather the information of IM usage. As the largest multi-level company in the world, Amway continued to make itself conform to the toughest regulations in order to keep its electrical communications as secure as possible, just like what it had done to web and emails.

  48. Confidential patents are invaluable if they are kept in secret. Biochemistry has become the most emergent Industry that can boost revenue in the century. Just like what health-care industry has emphasized, the data of the patient or people under experiments is extremely proprietary and never be leaked to anyone else. L7’s InstantScan helps to control the usage of IM.

  49. Benefits for Deploying InstantScan • Discovery • See who is actually using the network for what, especially in multi-culture environments which mix a huge number of applications. • L7 Firewall: IM / P2P / Tunnel / Streaming / VoIP / File-Transfer / … • Effective control the applications in your networks, either blocking or shaping • Content Manager: IM & Web • Selectively log/record employees' activities and contents for regulations and compliance. • Actively control the activities/contents instead of just logging/recording to prevent confidential information leakage while improving productivity. • Report & Analysis • log and archive for potential legal discovery needs or other purposes • Indication of employees' policy violations or productivity.

More Related