+ All Categories
Home > Documents > Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems,...

Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems,...

Date post: 02-Aug-2018
Category:
Upload: vuongdien
View: 230 times
Download: 0 times
Share this document with a friend
75
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID Cisco IronPort Security Appliances Cisco IronPort
Transcript
Page 1: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID

Cisco IronPort Security Appliances

Cisco IronPort

Page 2: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2

Corporate Border

Branch Office

Applications and Data

Corporate Office

Policy

Limites traditionnelles de l‘entreprise

Attackers CustomersPartners

Page 3: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3

Corporate Border

Branch Office

Applications and Data

Corporate Office

Policy

Mobilité and Collaborationdissolvent les frontières d‘Internet

Attackers Customers

Home Office

Coffee Shop

Airport

Mobile User Partners

Page 4: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4

Corporate Border

Branch Office

Applications and Data

Corporate Office

Policy

Le Cloud Computing dissoutles limites du Data Center

Attackers

Home Office

Coffee ShopCustomers

Airport

Mobile User Partners

Platformas a Service

Infrastructureas a Service

Xas a Service

Softwareas a Service

Page 5: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5

Un Business Sans Frontières

Corporate Border

Branch Office

Applications and Data

Corporate Office

Policy

Attackers

Home Office

Coffee ShopCustomers

Airport

Mobile User Partners

Platformas a Service

Infrastructureas a Service

Xas a Service

Softwareas a Service

Page 6: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6

L‘architecture Cisco pour la Sécurité Réseau

Policy

Corporate Border

Branch Office

Applications and Data

Corporate Office

Policy(Access Control, Acceptable Use, Malware, Data Security)

AttackersCoffee Shop

Customers

Airport

Mobile User Partners

Platformas a Service

Infrastructureas a Service

Xas a Service

Softwareas a Service

Home Office

Page 7: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7

Sécurité Email - Cisco Ironport Série C

Appliances sur site

En mode ‗hosted‘

Modèle Hybrid

Leader reconnu

99% renouvellement et de satisfaction

Infrastructure dédié pour chacun de nos clients dans le cloud

Page 8: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8

Gartner Magic QuadrantSecure Email Gateway, 2010

The Magic Quadrant is copyrighted 2009 by

Gartner, Inc. and is reused with permission.

The Magic Quadrant is a graphical

representation of a marketplace at and for a

specific time period. It depicts Gartner‟s

analysis of how certain vendors measure

against criteria for that marketplace, as

defined by Gartner. Gartner does not endorse

any vendor product or service depicted in the

Magic Quadrant, and does not advise

technology users to select only those vendors

placed in the "Leaders” quadrant. The Magic

Quadrant is intended solely as a research

tool, and is not meant to be a specific guide

to action. Gartner disclaims all warranties,

express or implied, with respect to this

research, including any warranties of

merchantability or fitness for a particular

purpose.

This Magic Quadrant graphic was published

by Gartner, Inc. as part of a larger research

note and should be evaluated in the context

of the entire report. The Gartner report is

available upon request from Cisco.

Page 9: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9

Architecture de sécurité E-MailCisco IronPort Série C

Ma

nag

em

en

tDéfense

Anti-Virus

CISCO IRONPORT ASYNCOS™

POUR EMAIL

Protection

des donnéesMessagerie

sécurisée

RELAIS DE

MESSAGERIE

Défense

Anti-Spam

Page 10: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10

Bounce Verification

Elimine les faux messages d‟erreur

DKIM Signing & Verification

Vérification de l‟émetteur

Vérification SPF

Vérification de la conformitéde la provenance de l‟e-

mail

HTML Sanitization

Elimine les URL usurpées

Validation Destinataires

Elimine les messages envoyés aux adresses e-mail invalides

Protection contre le vol d‟annuaire

Chiffrement TLS

Chiffrement passerelle à passerelle

Cisco IronPort AsyncOSRelais de messagerie robuste — Outils de sécurité intégrés

Listes utilisateur―Allow‖ et ―Block‖ / Quarantaine de

spam

Contrôles utilisateur

FonctionnalitésLDAP

LDAP referrals, annuairesLDAP multiples, assistant

d‟installation

Performances

10 000 connexionssimultannées

Files d‟attentes par domaines de destination

Réémission intelligente

Utilisation complète des possibilités matérielles

Virtual Gateway

Protection de la réputationclient

Page 11: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11

Sécurité Multi-couchesPréventive + Réactive = “Defense in Depth”

Préventive : Réputation

Réaction immédiate aux menaces

Très haute performance

1ère ligne de défense

Bloque ou limite le débit

Réactive : Moteur d‘analyse

S‟adapte avec le temps

CPU intensive

Couche plus fine

Détruit ou Quarantaine

Ma

nag

em

en

tDéfense

Anti-Virus

CISCO IRONPORT ASYNCOS™

POUR EMAIL

Protection

des donnéesMessagerie

sécurisée

Défense

Anti-Spam

Objectif :

Taux de capture important

ET

Le moins de faux positifs

Page 12: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12

IronPort Reputation Filters

85% des messages indésirables éliminés…

• Bonne note :

les mails sont délivrés

• Note intermédiaire :

limiter le débit puis

filtrer par l‘anti-spam

• Très mauvais:

rejetés à la connexion

• IronPort utilise l‟identité et la réputation de l‟émetteur

pour appliquer une politique

• Réponse efficace aux pics indésirables de trafic

Moteur

Anti-Spam

Mail entrants

Bons, mauvais, et

inconnus / suspicieux

Filtrage par

réputation

… avant qu‟ils n‟arrivent !

Sensorbase

Page 13: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13

IronPort Anti-Spam (IPAS)4 questions pour une protection > à 97%

IronPort

Anti-Spam

Solutions

Concurrentes

Quoi? Contenu du Message

Comment? Structure du message

Qui? Réputation Email

Où? Réputation Web

• Taux de Capture à 97% pour un taux de faux positifs < à 1/ 1 million

Source : Test Labs Octobre 2006, une étude de Messaging Media

• Pas de charge administrative

• Technologie MPR (Multi Pattern Recognition) contre le spam image

Page 14: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14

Défense multi-couches contre les virus

Préventive :

Virus Outbreak Filters

stoppe les attaques virales

avant la réception des

signatures anti-virus

Réactive :

Sophos Anti-Virus,

McAfee Anti-Virus

Man

ag

em

en

tDéfense

Anti-Virus

CISCO IRONPORT ASYNCOS™

POUR EMAIL

Protection

des donnéesMessagerie

sécurisée

Défense

Anti-Spam

Page 15: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15

Comment les Virus Outbreak Filters fonctionnent Quarantaine Dynamique en Action

T = 0–zip (exe) files

T = 5 mins-zip (exe) files

-taille 50 à 55 KB.

T = 10 mins–zip (exe) files

–taille 50 à 55KB

–“Prix” dans le nom

du fichier

T = 8 heures–Libérer les messages

si la signature

a été mise à jour

Messages

Scanned &

Deleted

Temps moyen de protection additionnelle …………… + de 13 heures

Sur un total d’attaques bloquées de ………………….. 248 alertes

Protection totale incrémentale ………………………… + de 134 jours

Page 16: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16

Anti-Virus traditionnels (signatures):

Sophos - McAfee

Moteurs intégrésHaute performance

Facile à déployer et à administrerInterface d‟administration intuitive

Vue unifiée via Mail Flow Monitor

Mises à jour automatiques

Coût total réduit grâce à la consolidation des fonctions

Page 17: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17

Protection des données

Man

ag

em

en

tDéfense

Anti-Virus

CISCO IRONPORT ASYNCOS™

POUR EMAIL

Protection

des donnéesMessagerie

sécurisée

Défense

Anti-Spam

Page 18: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18

Protection des données native

HautePerformance

Flexible

Granularité

Multi-critères

IronPort Content

Scanning Engine

Chiffrement

Archivage

BCC

Notiffication légale (disclaimer)

Suppression pièces jointes

Notification émetteur

Bounce Email

Suppression Email

Quarantaine

Interrogations

LDAP Filtres spécifiques au client

Conformité législation (HIPAA, SOX…)

Fuite d‟information

Pièces jointes non autorisées

Contenu illicite

Mails entrants/sortants

Actions

Page 19: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19

Protection des données

Page 20: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20

Couverture globale et mondiale

Adaptabilité

Plus d‟une centaine de profils de politiques prédéfinis

Politiques personnalisées

Page 21: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21

Facile d‘administration et d‘activation

Activation : un click suffit

Flux entrants/sortant, DLP une même interface

Page 22: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22

Rapports intégrés

Rapports par niveau de sévérité et politiques

Rapports en temps réels et ordonnancés

Page 23: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23

Facilité de recherche dans le détail

Recherche intuitive

Violation de la politique en

détail avec la localisation

Page 24: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24

Défense Anti-Phishing

Le filtre de Réputation Web

contenu dans IronPort Anti-

Spam offre une première

protection aux utilisateurs

contre le phishing.

DomainKeys (DKIM) permet

ensuite d‘authentifier les e-

mails en provenance de

l‘extérieur, comme de signer

les e-mails sortants.

SPF valide les domaines

ayant émis les messages.

Chiffrement de messages

pour une confidentialité

totale.

Ma

na

ge

me

nt

Défense

Anti-Virus

CISCO IRONPORT ASYNCOS™

POUR EMAIL

Protection

des donnéesMessagerie

sécurisée

Défense

Anti-Spam

Page 25: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25

Outils d‘administration Pour une réduction du coût total de possession

Message Tracking –

recherche de message

E-Mail Security Manager –

tableau de bord de politiques de

sécurité par groupe d‟utilisateurs

E-Mail Security Monitor –

nouveau système de rapports en

temps réel par boîtier

Série M – statistiques, reporting,

et tracking centralisés

Ma

na

ge

me

nt

Défense

Anti-Virus

CISCO IRONPORT ASYNCOS™

POUR EMAIL

Protection

des donnéesMessagerie

sécurisée

Défense

Anti-Spam

Page 26: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26

Tracking des messagesPour plus de visibilité

Qu‘est-il arrivé au mail que j‘ai

envoyé il y a 2 heures ?

Trace les messages individuels

Qui d‘autre a reçu des messages

similaires ?

Statistiques pour vérifier la

conformité

Page 27: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 27

IronPort Email Security Manager™

Définir ses politiques de sécurité par groupes

• Marquer et distribuer le spam

• Effacer les exécutables

• Archiver les messages

• Virus Outbreak Filters désacrivé pour les .doc

• Autoriser les fichiers audio

• Mettre en quarantaine les .exe

Catégories: par domaine,

utilisateur, ou groupe LDAP

IT

SALES

LEGAL

Page 28: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28

• Volumes e-mail

Compteurs spam

Violations de politiques

Rapports viraux

Données sur les e-mails

sortants

Rapports sur l‘état du

système

Une seule vuepour toute

l‟organisation

Analyse en temps réel du trafic e-mail et

des menaces de sécurité

Plusieurs niveaux de

détail possibles

Do

nn

ée

s m

ult

iple

s

Rapports consolidés

Cisco IronPort E-Mail Security MonitorUn système de reporting avancé

Page 29: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29

Des options de déploiment flexiblesAppliances ou services hébergés

SITECLIENT

Politiques Communes | Reporting Centralisé | Sécurité Cohérente

Appliances Série C

Hosted Email Security (SaaS)

HybridHosted Email

Security

VIAINTERNET

HybridHosted Email

Security

Page 30: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 30

Sécurité Web–

Cisco Ironport WSA & Scansafe

Appliances sur site

En mode ‗hosted‘

Modèle Hybrid

Leader reconnu

Le meilleur des mondes

Une implication réelle – la sécurité des nomades

Page 31: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31

Gartner Magic QuadrantSecure Web Gateway, 2010

The Magic Quadrant is copyrighted 2009 by

Gartner, Inc. and is reused with permission.

The Magic Quadrant is a graphical

representation of a marketplace at and for a

specific time period. It depicts Gartner‟s

analysis of how certain vendors measure

against criteria for that marketplace, as

defined by Gartner. Gartner does not endorse

any vendor product or service depicted in the

Magic Quadrant, and does not advise

technology users to select only those vendors

placed in the "Leaders” quadrant. The Magic

Quadrant is intended solely as a research

tool, and is not meant to be a specific guide

to action. Gartner disclaims all warranties,

express or implied, with respect to this

research, including any warranties of

merchantability or fitness for a particular

purpose.

This Magic Quadrant graphic was published

by Gartner, Inc. as part of a larger research

note and should be evaluated in the context

of the entire report. The Gartner report is

available upon request from Cisco.

Page 32: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 32

ChoixSupport d‘un grand

nombre de plateformes

SécuritéSécurité riche, granulaire,

intégrée à l‘infrastructure

ExpérienceConnexion intelligente,

automatique, always-on

Usage acceptable

Contrôle d‘accès

Intranet

Corporate File

Sharing

Accès autorisé

Prévention Fuite Info.

Prévention des

menaces

Sécurité Nomade –

Cisco AnyConnect Secure Mobility

Page 33: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 33

Le Nouveau Web

Branch Office

Applications and Data

Corporate Office

AttackersCoffee Shop

Customers

Airport

Mobile User Partners

Home Office

wWwWorld Wide Web

HTTP Is the New TCP

Page 34: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34

Les Défis Business sur le Web

Acceptable Use Control

MalwareProtection

Data LossPrevention

Politique

SaaS Access Control

Page 35: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Control

Security

Acceptable Use Controls

Malware Protection

Data Security

SaaS Access Controls

Centralized Management and Reporting

InternetSecure Mobility

Page 36: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 36

OptimisationMulti-Coeur

Authentification intégrée

NTLM/Active Directory

LDAP

Secure LDAP

Diminue la latence induite par l‟analyseanti-virale

Permet une analyse multi-moteuraugmentant la sécurité

Optimisé pour un contenu Web riche

Politiques par Identitées

Transparent, single sign-on (SSO) authentification Active Directory/LDAP

Guest, Re-Auth

Proxy Haute Performance, Authentification intégrée

Page 37: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37

80% of the web is uncategorized, highly dynamic or unreachable by web crawlers

80% du Web est non catégorisé,

hautement dynamique et innaccessible

par les moteurs de recherche

• Botnets

• Contenu dynamique

• Sites protégés par mot de passe

• Sites à faible durée de vie

Le Web ConnuCouvert à 20% par les listes

d‟URL

Page 38: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38

Control

Acceptable Use Controls

Data Security

SaaS Access Controls

Centralized Management and Reporting

InternetSecure Mobility

Security

Malware Protection

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Page 39: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39

La Menace Malware Continue de croître

237% d‟augmentation en „09

Plus de 70% des sites compromis sontlégitimes

Vulnérabilités Adobe PDF et Flash

54% des malwares s‟insère par iframes ou exploits

Cross-Site Scripting et Injection SQL Injection sont les attaques les plus utilisées

83% des sites web ont au moins unevulnérabilité sérieuse

Page 40: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40

Défense Anti-Malware en profondeur

Clients Infectés

Layer 4Traffic Monitor

Clients Web

Analyse par Réputation

Analyse par Signature

AnalyseComportementale

Page 41: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41

Cisco Network and Content Security Deployments

Analyse par Réputation et ComportementaleProtection J-zéro

Cisco SensorBase

Threat Operations Center

AdvancedAlgorithms

Web Reputation Scores-10 to +10

Cisco Security Intelligence Operations

Threat Telemetry

Threat Telemetry

Outbreak Intelligence

External Feeds

Identifying Malware Lurking in the Dark Web

New

Page 42: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42

Protection pour un monde 2.0Visibilité au delà de la menace initiale

Web pages are made up of objects coming from different sources

Objects can be images, executables, JavaScript…

Trusted Web SiteClient PCWeb servers not affiliated with

the trusted web site

(e.g. ad servers)

Web Reputation Filters Scan

each object, not just the initial

request

Compromised websites often grab malicious objects from external sources

Security means looking at each object individually, not just the initial request

Page 43: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43

La Réputation en ActionNew York Times: Victime d‟une attaque par publicité!

Pub semblant légitime provoquant3 redirections malicieuses

Destination finale : protection-check07.com

Technique de Scareware

Simulation d‟une analyse AV incitantl‟utilisateur à acheter la version complète pour nettoyer la machine.

Cisco Web Rep Score: -9.3

Action: BLOCK

Site NYT autorisé mais

blocage de la redirection

Page 44: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44

Le Moteur Cisco IronPort DVSDynamic Vectoring and Streaming

Analyse par Signature et Heuristique

Couverture étendue par une analyse multi-moteurs

Analyse le trafic chiffréen SSL pour unemeilleure protection

Expérience utilisateurperformante avec l‟analyse parallèlisée des moteurs

Mises à jour automatiques

Détection HeuristiqueAnalyse comportementale

DVS Engine

Analyse Parallèlle et au Fil de l‘eau

SignatureIdentifie les menaces connues

New

Page 45: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45

ANTI-VIRUS MAGIC QUADRANT

Virus Bulletin feb 2010

Page 46: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46

Internet

Users

Cisco IronPort S-Series

Network Layer Analysis

Anti-Malware PuissantPrévention contre le Trafic

―Phone-Home‖

Analyse tout trafic, port et protocole

Détection des malwares contournantle Port 80

Empèche le trafic de Botnet

Mises à jour automatiques

Génération Temps Réel de règlespar “Dynamic Discovery”

Détection des clients infectésLayer 4 Traffic Monitor

Inspection paquets et en-

têtes

Disponible sur ASA comme Botnet Traffic Filter

Page 47: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 47

Acceptable Use Controls

SaaS Access Controls

Centralized Management and Reporting

InternetSecure Mobility

Security

Malware Defense

Control

Data Security

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Page 48: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 48

Documents

Allow, block, log based on file metadata, URL category, user and web reputation

Multi-protocoles : HTTP(s), FTP, HTTP encapsulé

Documents

On-Box Common Sense Security

DLP Vendor Box

Internet

Partner site

Webmail

Internet

Deep content inspection: Structured and unstructured data matching

Performances : Works in tandem with accelerated on-box policies

Log

Allow

Block

Log

Allow

Block

Off-Box Advanced Data Security

Complete Data Security

Page 49: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49

Control

Data Security

Centralized Management and Reporting

InternetSecure Mobility

Security

Malware Defense

Acceptable Use Controls

SaaS Access Controls

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Page 50: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50

Adapté au contexte

Identité

Job Sites

Instant Message

P2P

Streaming Media

Human Resource

No FileTransfer

All

100 kbps/User

Facebook Lunch hour Temps

Objet

Application

Lieu

Priorité

New

New

New

Page 51: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51

Acceptable Use Controls for Web 2.0Cisco IronPort Web Usage Controls

Enforce Acceptable Use Policies

Reduce productivity loss

Reduce risk of legal liabilities

Control Web 2.0 traffic and web applications

Control bandwidth intensive streaming media traffic

Application Visibilityand Control

Deep application control, e.g., IM, Facebook, WebEx

Bandwidth control for streaming media

Site content ratings

URL Filtering URL database covering over 50M sites worldwide

Real-time on-box dynamic categorization for unknown URLs

Auto update every five minutes

New

Page 52: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52

Web Application Controls

Granular control over HTTP, HTTP(s), FTP applications

Dynamic signature updates maintained by Cisco SIO

Granular Control over Application Usage

Employee in Finance

Access Control Policy Access Control Violation

Instant Messaging

Facebook: Limited Apps

Video: 512 kbps max

File Transfer over IM

Facebook Chat, Email

P2P

New

Page 53: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 53

Control

Acceptable Use Controls

Data Security

Centralized Management and Reporting

InternetSecure Mobility

Security

Malware Defense

SaaS Access Controls

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Page 54: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54

Visibility | Centralized Enforcement | Single Source Revocation

SaaS Access ControlRegaining Visibility and Control Through Identity

Branch Office

Corporate Office

Home Office

SaaS Single Sign On

AnyConnect Secure Mobility Client

SaaS Single Sign OnRedirect @ Login

User Directory

No Direct Access

X

New

Page 55: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 55

Control

Security

Acceptable Use Controls

Malware Defense

Data Security

SaaS Access Controls

Centralized Management and Reporting

InternetSecure Mobility

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Page 56: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 56

Predominantly PC-based Client Support

URL-filtering client unable to address key use cases

Not integrated, requiresseparate VPN client

Limited Clients

Limited Security

No Access

Acceptable Use

Access Control

Data Loss Prevention

Threat Prevention

Traditional Mobile Web Security

No AccessAccess

Intranet

Corporate File Sharing

Page 57: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 57

Diverse EndpointSupport for Greater

Flexibility

Rich, Granular SecurityIntegrated

into the network

Always-on IntelligentConnection for Seamless

Experience andPerformance

Choice

Security

Experience

Acceptable Use

Access Control

Data Loss Prevention

Threat Prevention

Intranet

Corporate File Sharing

Access Granted

Cisco AnyConnect Secure Mobility Web Security with Next Generation Remote Access

WSA ASA

AnyConnect Client

New

Page 58: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58

Control

Security

Acceptable Use Controls

Malware Defense

Data Security

SaaS Access Controls

Centralized Management and Reporting

InternetSecure Mobility

Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway

Page 59: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 59

Reporting CentraliséManagement Centralisé

PolitiqueCentralisée

Délégationd‟Administration

InsightAcross Threats,

Data and Applications

ControlConsistent Policy Across Offices

and for Remote Users

VisibilityVisibility Across Different Devices,

Services, and Network Layers

Visibilité en Profondeur des

menaces

Capacités d‟analyse à postériori

Web Security ManagementSecurity Management Appliance (M-Series)

New

Page 60: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 61

Page 61: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 62

Page 62: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 63

Philosophie en Action

Page 63: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 64

A snapshot of client activity

Page 64: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 65

REFERENCES SERIE S en France

RENAULT /

TOTAL

8 boîtiers pour 100,000 users

Remplacement des boîtiers Netcache

Competition: Blue Coat et TrendMicro/Crossbeam

VINCI

2 boîtiers pour la filiale VINCI Construction pour 8,000 users

Nouvel accès Internet

Competition: Websense

CREDIT

AGRICOLE

4 appliances for 80 000 employees

Remplacement des boîtiers Netcache & ajout de fonctionnalités anti-malware

Competition: Secure Computing et Blue Coat

Page 65: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 66

REFERENCES SERIE S en France

AIRBUS

20 boîtiers sur 5 pays (45,000 users)

Remplacement des Netcache et ajout des fonctionnalités de sécurité anti virus et anti malware

Competition: Bluecoat

L’OREAL

4 boîtiers pour 50,000 users

Remplacement des boîtiers Bluecoat SG8100 dans la DMZ

Competition: existant Blue Coat

FACTEURS

CLES DE

SUCCES

Des fonctionnalités avancées de sécurité intégrées (Web reputation / WebRoot…)

Performance , pas de latence

Facile à administrer, interface conviviale

Page 66: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 67

Besoin de SaaS ?

Page 67: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 68

AVC New Applications OverviewPM Sales UpdateSeptember 2010

Page 68: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69

Social Networking Controls

Block Malware like ‗Farm Town‘ app ad that

redirects users to fake antivirus software

Allow/Block thousands of

Facebook Apps

Allow/Block

features like Chat,

Messaging, Video

& audio bandwidth

New

Page 69: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 70

Granular Facebook Controls

Can I block chat? YES!

Can I prevent the user from uploading/ or posting?

YES!

Can I control video? YES!

Can I block email? YES!

Can I block over 50K Facebook application? YES!

Page 70: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 71

New Application Type: Facebook

Edit

Facebook

Controls

Page 71: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 72

Granular Facebook Controls

Facebook Applications

Facebook Utilities

Page 72: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 73

Facebook Granular Controls“Applications”

Business

Community

Education

Entertainment

Games

Sports

Other

Utilities

Control 50K+ Facebook Applications

Page 73: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74

Facebook Granular Controls“Utilities”

Chat

Messages (Email)

Events

Notes

Video

3rd Applications

Photos

Page 74: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 75

Facebook Granular Controls“Places”

New Facebook Features? No Problem.

Page 75: Cisco IronPort Security Appliances - Information Store · Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Security Appliances Cisco

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 76


Recommended