+ All Categories
Home > Documents > Cisco IronPort Web Security Appliance - Katedra informan½ch

Cisco IronPort Web Security Appliance - Katedra informan½ch

Date post: 12-Feb-2022
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
25
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Cisco IronPort Web Security Appliance Hrvoje Dogan Consulting Systems Engineer, Emerging Markets East Cisco Advanced Technologies
Transcript
Page 1: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 1

Cisco IronPort Web Security Appliance

Hrvoje Dogan

Consulting Systems Engineer, Emerging Markets East

Cisco Advanced Technologies

Page 2: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 2

Cisco IronPort Secure Web GatewayAddressing Business Challenges

WebBusiness

Challenges

Secure

Against Malware

Control

Web Traffic and

Applications

Prevent

Data Breaches

Cisco IronPort S-Series

Page 3: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Cisco IronPort S-SeriesA Powerful, Secure Web Gateway Solution

Most effective defense against web-based malware

Visibility and control for acceptable use and data loss

High performance to ensure best end-user experience

Integrated solution offering optimum TCO

Management and Reporting

AsyncOS for Web

Acceptable Use Policy

Malware Defense

Data Security

Page 4: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 4

Acceptable Use EnforcementVisibility and Control for the Web and Web Applications

Management and Reporting

AsyncOS for Web

Acceptable Use Policy

Malware Defense

Data Security

Enterprise-class URL filtering

Applications and object filtering

Integrated identity and authentication

Page 5: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 5

URL Keyword Analysis

www.casinoonthe.net/Gambling

Introducing Cisco IronPort Web Usage ControlsA Spotlight for the Dark Web

Industry-leading URL database efficacy• 65 categories

• Updated every 5 minutes

• Powered by Cisco SIO

Real-time Dynamic Content Analysis Engine accurately identifies over 90% of Dark Web content in commonly blocked categories

Uncategorized

Dynamic Content Analysis Engine

GamblingAnalyze Site Content

Real-time Dynamic

Content Analysis

URL Lookup in Database

www.sportsbook.com/Gambling

URL Database

Uncategorized

Page 6: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 6

Dynamic Content Analysis (DCA) EngineIdentifies 90% of Objectionable Dark Web Content

High performance

• Optimized verdict pipeline

• Categorization verdicts in less than 10 milliseconds

• Imperceptible to user

Tuned for commonly blocked content

• Pornography and Adult

• Hate

• Gambling

• Proxy Avoidance

Analyzes content in human terms

• Advanced heuristic analysis based on content concept modeling

• Improved accuracy vs. simplistic keyword approach

Stops 50% more objectionable content*

*Source: Cisco SIO, based on data from customer production traffic

Page 7: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 7

Control

• Per user, per group policies

• Multiple actions:block, warn, monitor

• Time-based policies

• Unlimited custom categories

• Custom end-user notifications

Visibility

• Easy to understand reports

• Extensive logging

• Comprehensive alerting

Efficacy

• 200+ countries

• 50+ languages

• 65 categories

• Less than 1 in 1 million false positives

Cisco IronPort Web Usage ControlsLeading Efficacy, Rich Controls, Comprehensive Visibility

Page 8: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 8

Softwareas a Service

Web Application Control

Native control for HTTP, HTTP(s), FTP applications

Selective decryption of SSL traffic for security and policy

Policy enforcement for applications tunneled over HTTP—FTP, IM, video

Application traversal using policy-based HTTP CONNECT

Tunneled Applications

HTTP

Collaboration

ftp://ftp.funet.fi/pub/

Page 9: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 9

Integrated Identity and AuthenticationUser-Specific Acceptable Use and Data Security Policies

Authentication against LDAP servers

Transparent, single sign-on (SSO) authentication against Active Directory

Multi-realm sequencing

Multi-domain authentication

Guest policies

Re-Auth and Failed Auth policies

Define Acceptable Use and Data Security Policies using Rich Identity Constructs

NTLM/Active Directory

Page 10: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 10

Malware DefenseMultiple layers for Malware and Spyware Protection

Management and Reporting

AsyncOS for Web

Acceptable Use Policy

MalwareDefense

Data Security

Malware landscape

Multi-layered malware defense

Network layer phone-home prevention

Reputation filtering and signature scanning

Page 11: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 11

Multi-Layered Malware DefenseProtection Against Today’s Threats

Layer 4 Traffic Monitor

Web Reputation Filters

Dynamic Vectoring and Streaming

Engine

Detects malicious botnet traffic across all ports

Blocks 70 percent of known and unknown malware traffic at connection time

Blocks malware based on deep content analysis

Page 12: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 12

Detecting Existing ClientInfectionsPreventing ―Phone-Home‖ Traffic

Cisco IronPort Layer 4 Traffic Monitor

Scans all traffic, all ports, all protocols

Detects malware bypassing Port 80

Prevents botnet traffic

Powerful anti-malware data

Automatically updated rules

Real-time rule generation using ―Dynamic Discovery‖

Internet

Users

Network Layer

Analysis

Cisco IronPort S-Series

Packet and

Header Inspection

Page 13: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 13

Web Reputation FiltersPredictive, Real-Time Threat Prevention

URL Blacklists

URL Whitelists

Dynamic IP Addresses

Bot Networks

URL Behavior

Global Volume Data

Domain Registrar Information

Compromised Host List

Real-Time Cloud Analysis

Network Owners

Known Threat URLs

200+ Parameters

SensorBaseNetwork

SecurityModeling

Web ReputationScores (WBRS)

-10 to +10

Cisco Security

Intelligence Operations

Page 14: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 14

Protection For a Dynamic Web 2.0 WorldVisibility Beyond the Initial Threat

Web pages are made up of objects coming from different sources

Objects can be images, executables, JavaScript…

Trusted Web SiteClient PCWeb servers not affiliated

with the trusted web site

(e.g. ad servers)

Web Reputation Filters

Scan each object, not just

the initial request

Compromised websites often grab malicious objects from external sources

Security means looking at each object individually, not just the initial request

Page 15: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Cisco IronPort DVS EngineDynamic Vectoring and Streaming

Accelerated signature scanning

Parallel scans

Stream scanning

Multiple integrated verdict engines

McAfee and Webroot

Automated updates

Decrypt and scan SSL traffic

Selectively, based on category and reputation

Page 16: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 16

Complete Data SecuritySimplicity and Choice

Management and Reporting

AsyncOS for Web

Acceptable Use Policy

Malware Defense

Data Security

Data security imperative and reality

Simple on-box data security

Advanced off-box data security

Page 17: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Data SecurityOn-box Common Sense Security

Content metadata inspection, along with visibility and forensics

Allow , block, log

Based on file metadata, URL category, user and web reputation

Multi-protocol

HTTP(s), FTP, HTTP tunneled

Internet

www.mypartner.com

www.malwarrior.com

Allow, Block, Log

Users

Page 18: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 18

Common Sense PoliciesSimple Approach for Avoiding Web Data Breaches

Who? John Smith, Finance

FiscalPlan.xls

Webmail.com

HTTPS

(Encrypted)

John Smith, Finance

FiscalPlan.xls

Taxfirm.com

HTTPS

(Encrypted)

Jane Doe,Sales

CustomerList.doc

Personal-site.com,-9 Reputation score

FTP

What?

Where?

How?

Verdict

Page 19: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 19

Non-Human Initiated Data Breaches Critical Data Security Element

Block data loss from malicious phone-home activity

Prevent data-stealing malware from entering the network

Layer 4 Traffic Monitor

Web Reputation Filters

Dynamic Vectoring and

Streaming Engine

Gozi Trojan

Installs via PDF attachment

Encrypts itself to evade detection

Steals data from SSL streams Sinowal Trojan

Over 500,000 bank accounts compromised

Suspected ties to Russian Business Network

Trojan.PWS.ChromeInject.B

Installs via Firefox plug-in

Captures e-banking credentials

Page 20: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 20

Management and ReportingEnterprise-Wide Management and Visibility

Management and Reporting

AsyncOS for Web

Acceptable Use Policy

Malware Defense

Data Security

Enterprise-wide management

Roles-based administration and delegation

Detailed URL and threat reporting

User-level tracking and forensics

Page 21: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Block executables

Block sports sites 9am-5pm M-F

Decrypt HTTPS connections

Allow all URL categories

Exempt Adobe updates from authentication

Block all malware

Block FTP uploads

Allow media files

Route requests to partner siteMarketing

IT

Sales

Cisco IronPort Web Security ManagerSingle View of Policies for the Entire Organization

Configure granular policies based on a variety of parameters

Page 22: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 22

for IronPort

Critical Acceptable Use Reports

Real-time insights

- Visibility into web usage and trends

- Monitor acceptable use trends

- Identify risky user behavior

Extensive Forensic Capabilities

- Investigate acceptable use violations

- Drill down for further analysis

- Satisfy compliance requirements

Page 23: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 23

AsyncOS for Web PlatformPurpose-Built Performance

High-performance web proxy + cache

Multi-core scanning

Diverse form factors

Flexible deployments

AsyncOS for Web

Acceptable Use Policy

Malware Defense

Data Security

Management and Reporting

Page 24: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 24

Cap

acit

yan

d T

hro

ug

hp

ut

Right-Sized Hardware PlatformsRemote Office and Back Office (ROBO) to Enterprise

Multiple network integration options (transparent L4 re-direction options, PAC file, WPAD, WCCP)

Built-in system redundancy – RAID 10, dual power supplies

High availability – WCCP, DNS, L4

Flexible network routing

ROBO Regional HQ / Mid-Market Corporate HQ

Market Segment

1-1,000 users 1,000-10,000 users 10,000-30,000 users

Cisco IronPort S160 Cisco IronPort S360 Cisco IronPort S660

Page 25: Cisco IronPort Web Security Appliance - Katedra informan½ch

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 25


Recommended