Customer Story: University of Munster

K
1
forcepoint.com
Customer Story
Forcepoint NGFW Helps the University of Münster
Keep Its Network Open and Safe
This German university relies on Forcepoint to help manage its firewalls efficiently, keep its
network open, and protect against ransomware attacks and other cybercriminal activity.
Article 5 of the German constitution guarantees freedom of science, research and
teaching as fundamental right. This ensures German universities are at the forefront
of research and education, but also creates a challenge for security teams tasked with
staving off the cybersecurity threats they’re facing. Defending against targeted attacks
from cybercriminals and safeguarding the University of Münster’s network is a daunting
challenge for its small IT team. Yet, while other universities in Germany had to shut down
essential systems and services due to ransomware attacks, the University of Münster
stayed up, running and secure by relying on Forcepoint NGFWwith IPS.
CUSTOMER PROFILE:
One of the largest universities
in Germanywith some 45,700
students and 7,100 employees,
including 5,300 academics.
INDUSTRY:
Education
HQ COUNTRY:
Germany
PRODUCT:
Forcepoint Next Generation
Firewall (NGFW)
Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe
2
forcepoint.com
Public organizations in Germany, and especially universities, are
frequently targeted by cybercriminals looking to either deny and
degrade services, steal personal data or intellectual property, or to
extort money by interrupting educational activities. Unfortunately,
specialized hacker networks and foreign organizations found
universities a tempting target. These institutions often have
modern, powerful and wide-ranging networks, enabling malware
to spread very quickly, but the culture of open networks means
that it is difficult to establish powerful security controls. Due to
their prominence in research and development, universities also
offer a rich trove of data, another attraction for bad actors. Over the
last fewyears, multiple German universities have been forced to
shut down large parts of their IT infrastructure for a period of time,
leaving users with no access to email or remote connectivity.
This has caused massive disruptions in some cases and
demonstrated how difficult it is to balance network freedom
with the necessary security controls. The University of Münster,
however, managed this verywell. The IT team became aware of
the risks early and has built up more than 15 years’ experience of
protecting the unprotectable.
The search for a new firewall and IPS leads
to a solution that can handle more than
10 gigabits per second
Founded as a Jesuit seminary in 1588, the University of Münster
plays a significant role in the city of Münster, the state of North
Rhine-Westphalia, and German intellectual life. The university
is housed in more than 300 buildings throughout the city and is
home to the University of Münster Faculty of Medicine.
As one of the most prominent universities in Germany, the network
security team always made security a priority. Since 2004, the
university had an intrusion prevention system (IPS) and firewall
in place, but in 2012 began looking for a new solution. They
considered several vendors and went through proofs of concept
with some of them. In the PoCs, Forcepoint (then known as
Stonesoft) proved to be the most suitable solution.
One of the critical requirements was the need for an IPS that could
handle the volume of traffic and speed the university required—
more than 10 gigabits per second. The university has since
upgraded their external internet connection to 30 gigabit per
second and need to have full IPS protection on all that data without
slowing traffic down. Forcepoint showed it could handle the load
and after a successful proof of concept, the team moved forward
with Forcepoint NGFWwith systems integrator partner Avency.
The Forcepoint NGFW Security Management
Center makes the grade
Today, the university has four NGFW firewall appliances in two
clusters creating 6 virtual contexts. They’ve created secure
network areas for the datacenter and workstations, voice over IP,
guest and remote access services, internet of things, and internal
management, and will soon add an area for administrative staff.
Creating these separate virtual contexts allows the team to set
custom security policies, rules and controls depending on the
area’s function and requirements. However, the IPS configuration
is nearly the same across the contexts and nearly all traffic goes
through the deep packet inspection engines..
Enabling the set up and easy configuration of the virtual contexts
is Forcepoint’s NGFW Security Management Center (SMC).
“The SMC is one of the major benefits to the Forcepoint firewall
solution—it was key to our decision to choose Forcepoint,” said
Guido Wessendorf, Head of Network Security. “It’s very intuitive
to configure and monitor the whole system.”
“It was far better than the management tools of the othervendors
we considered at that time,” said Markus Speer, Head of Central
Network Services.
Challenges
A culture of freedom for science and
teaching means the network needs
to stay open.
Required IPS for >10Gb internet
traffic without slowing down.
Privacy rules prevent security
controls on student, faculty and
staff personal devices.
High profile ransomware attacks
crippled other German universities.
Approach
Implement Forcepoint Next
Generation Firewall with Intrusion
Prevention System.
Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe
3
forcepoint.com/contact
One of the ways the SMC makes managing the firewalls easier
is via its API function. Forcepoint has built a robust community
among the German universities in which security professionals
connect and exchange tips and hints to best manage their
Forcepoint firewalls. One of those tips was the usage of
recommended IP blocklists—the user community exchanged
scripts on how to import and install them via the Forcepoint API
into the SMC. This led to University of Münster seeing 100 million
discards (a firewall terminate or denial to malicious hosts) per day
just due the IP block list, out of a total 150 million denials each day.
“With only a small team, we need systems that manage much of
our daily activities automatically,” Wessendorf said. “The import
of the block list, automatic receiving of Forcepoint updates,
and the intrusion prevention policies all help us manage our
firewalls efficiently.”
Even in an unusually difficult security environment,
Forcepoint helps the University of Münster stay
ransomware-free
Making the security situation even more challenging for the team
is that a large number of the PCs, laptops, phones and tablets
used by the students, faculty and staff are “user-managed” not
“university-managed.” This means that there can be no specific
controls on the personal systems. Often firewalls will utilize HTTPs
decryption to look into web traffic data packets and find malicious
code, but it’s not possible in this scenario because of privacy
restrictions protecting personal PC usage.
During a normal study day, around 20,000 users are
simultaneously connected with their own, unprotected laptops,
tablets and smartphones to the university’s WiFi network. Those
devices and all the other approximately 30,000 registered
university end systems could be infected with ransomware that
needs to download additional keys or software in order to activate,
but is blocked from doing so by the Forcepoint firewall solution.
“The IP block lists we imported along with the built in Forcepoint
block lists, the Forcepoint Threatseeker Intelligence Network
updates and the IPS functionality all work together to stop
the attempts of malicious software on our systems to access
command and control functions and establish ransomware locally,”
Wessendorf explains. “Therefore, we assume, we’ve had no
ransomware situations yet, due to that fact.”
A supportive university community delivers
benefits to Forcepoint customers
When peers in similar security roles ask for a review of Forcepoint
NGFW, “Normally I invite them to come to my desk and let them
look at the solution,” explains Wessendorf. “The SMC shows how
easy it is to use, configure and manage—the demonstration speaks
louder than words.”
As one of the first universities in Germany to select and implement
the Forcepoint NGFW, the longevity of the relationship also
demonstrates the value. The university’s network security team
appreciates the ability to connect with the Forcepoint firewall
product development team in Finland. “We have an open
opportunity to share feature requests and give input into what we
will require in the coming years,” Speer said. “Having that direct
contact and deep working relationship with Forcepoint is really
an advantage.”
In addition to the product itself, the support from Forcepoint and
the community they’ve built around German universities using
NGFW is unique. The members are all experts in using NGFW and
the SMC so it’s a very good resource, according to Wessendorf.
“I really have to say this kind of support and cooperation is unheard
of in other university circles. It really produces benefits for its
members,” said Speer.
Results
› 150 million firewall blocks of
connections per day.
› No successful ransomware attacks.
› Part of a supportive German
university community around
Forcepoint network security.
“I really have to say this kind
of support and cooperation
is unheard of in other
university circles.”
MARKUS SPEER, HEAD OF CENTRAL
NETWORK SERVICES
© 2020 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
[WWU Münster-Customer-Story-US-EN] 04Nov2020
1 de 3

Recomendados

SEB Forcepoint Corporate Overview por
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
328 vistas13 diapositivas
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS por
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS IJNSA Journal
30 vistas7 diapositivas
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro... por
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
337 vistas7 diapositivas
Secure your network to secure your reputation and your income por
Secure your network to secure your reputation and your incomeSecure your network to secure your reputation and your income
Secure your network to secure your reputation and your incomeUnify
74 vistas1 diapositiva
Customer Story: Medical Device Company por
Customer Story: Medical Device CompanyCustomer Story: Medical Device Company
Customer Story: Medical Device CompanyKim Cook
97 vistas3 diapositivas
security_secure_pipes_frost_whitepaper por
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
532 vistas8 diapositivas

Más contenido relacionado

Similar a Customer Story: University of Munster

Mansour Alirfan5632632IntroductionProposalResults.docx por
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxinfantsuk
3 vistas54 diapositivas
Unique Security Challenges in the Datacenter Demand Innovative Solutions por
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
1.2K vistas12 diapositivas
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS por
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSIJNSA Journal
625 vistas8 diapositivas
Cisco amp for networks por
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
1K vistas10 diapositivas
Threat intelligence platform explained por
Threat intelligence platform explainedThreat intelligence platform explained
Threat intelligence platform explainedMindy Kam
368 vistas12 diapositivas
Implementing An Automated Distributed Firewall por
Implementing An Automated Distributed FirewallImplementing An Automated Distributed Firewall
Implementing An Automated Distributed FirewallGloria Young
1 vista44 diapositivas

Similar a Customer Story: University of Munster(20)

Mansour Alirfan5632632IntroductionProposalResults.docx por infantsuk
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docx
infantsuk3 vistas
Unique Security Challenges in the Datacenter Demand Innovative Solutions por Juniper Networks
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Juniper Networks1.2K vistas
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS por IJNSA Journal
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
IJNSA Journal625 vistas
Cisco amp for networks por Cisco Canada
Cisco amp for networksCisco amp for networks
Cisco amp for networks
Cisco Canada1K vistas
Threat intelligence platform explained por Mindy Kam
Threat intelligence platform explainedThreat intelligence platform explained
Threat intelligence platform explained
Mindy Kam368 vistas
Implementing An Automated Distributed Firewall por Gloria Young
Implementing An Automated Distributed FirewallImplementing An Automated Distributed Firewall
Implementing An Automated Distributed Firewall
Gloria Young1 vista
A novel secure e contents system for multi-media interchange workflows in e-l... por IJCNCJournal
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
IJCNCJournal265 vistas
An Overview of Information Systems Security Measures in Zimbabwean Small and ... por researchinventy
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
researchinventy30 vistas
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY por IJNSA Journal
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
IJNSA Journal70 vistas
Wireless Sensor Networks ( Wsn ) por Melissa Ward
Wireless Sensor Networks ( Wsn )Wireless Sensor Networks ( Wsn )
Wireless Sensor Networks ( Wsn )
Melissa Ward3 vistas
UCISA cyber incident response toolkit.pptx por ucisa
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
ucisa 282 vistas
Firewall buyers-guide por Andy Kwong
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
Andy Kwong79 vistas
Swot Analysis Of Risksense Inc. Essay por Sandy Simonsen
Swot Analysis Of Risksense Inc. EssaySwot Analysis Of Risksense Inc. Essay
Swot Analysis Of Risksense Inc. Essay
Sandy Simonsen3 vistas
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES por ijcsit
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
ijcsit776 vistas
INSECURE Magazine - 39 por Felipe Prado
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39
Felipe Prado43 vistas
Importance of Using Firewall for Threat Protection por HTS Hosting
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting24 vistas

Último

Spesifikasi Lengkap ASUS Vivobook Go 14 por
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14Dot Semarang
35 vistas1 diapositiva
Tunable Laser (1).pptx por
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptxHajira Mahmood
21 vistas37 diapositivas
DALI Basics Course 2023 por
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023Ivory Egg
14 vistas12 diapositivas
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... por
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...Vadym Kazulkin
70 vistas64 diapositivas
Attacking IoT Devices from a Web Perspective - Linux Day por
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 vistas68 diapositivas
.conf Go 2023 - Data analysis as a routine por
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
90 vistas12 diapositivas

Último(20)

Spesifikasi Lengkap ASUS Vivobook Go 14 por Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 vistas
DALI Basics Course 2023 por Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 vistas
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... por Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin70 vistas
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 vistas
.conf Go 2023 - Data analysis as a routine por Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk90 vistas
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... por NUS-ISS
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS28 vistas
Future of Learning - Yap Aye Wee.pdf por NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS38 vistas
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2214 vistas
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 vistas
The details of description: Techniques, tips, and tangents on alternative tex... por BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada110 vistas
AI: mind, matter, meaning, metaphors, being, becoming, life values por Twain Liu 刘秋艳
AI: mind, matter, meaning, metaphors, being, becoming, life valuesAI: mind, matter, meaning, metaphors, being, becoming, life values
AI: mind, matter, meaning, metaphors, being, becoming, life values
RADIUS-Omnichannel Interaction System por RADIUS
RADIUS-Omnichannel Interaction SystemRADIUS-Omnichannel Interaction System
RADIUS-Omnichannel Interaction System
RADIUS14 vistas
Empathic Computing: Delivering the Potential of the Metaverse por Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst449 vistas
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab11 vistas
Perth MeetUp November 2023 por Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price12 vistas
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi113 vistas

Customer Story: University of Munster

  • 1. 1 forcepoint.com Customer Story Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe This German university relies on Forcepoint to help manage its firewalls efficiently, keep its network open, and protect against ransomware attacks and other cybercriminal activity. Article 5 of the German constitution guarantees freedom of science, research and teaching as fundamental right. This ensures German universities are at the forefront of research and education, but also creates a challenge for security teams tasked with staving off the cybersecurity threats they’re facing. Defending against targeted attacks from cybercriminals and safeguarding the University of Münster’s network is a daunting challenge for its small IT team. Yet, while other universities in Germany had to shut down essential systems and services due to ransomware attacks, the University of Münster stayed up, running and secure by relying on Forcepoint NGFWwith IPS. CUSTOMER PROFILE: One of the largest universities in Germanywith some 45,700 students and 7,100 employees, including 5,300 academics. INDUSTRY: Education HQ COUNTRY: Germany PRODUCT: Forcepoint Next Generation Firewall (NGFW)
  • 2. Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe 2 forcepoint.com Public organizations in Germany, and especially universities, are frequently targeted by cybercriminals looking to either deny and degrade services, steal personal data or intellectual property, or to extort money by interrupting educational activities. Unfortunately, specialized hacker networks and foreign organizations found universities a tempting target. These institutions often have modern, powerful and wide-ranging networks, enabling malware to spread very quickly, but the culture of open networks means that it is difficult to establish powerful security controls. Due to their prominence in research and development, universities also offer a rich trove of data, another attraction for bad actors. Over the last fewyears, multiple German universities have been forced to shut down large parts of their IT infrastructure for a period of time, leaving users with no access to email or remote connectivity. This has caused massive disruptions in some cases and demonstrated how difficult it is to balance network freedom with the necessary security controls. The University of Münster, however, managed this verywell. The IT team became aware of the risks early and has built up more than 15 years’ experience of protecting the unprotectable. The search for a new firewall and IPS leads to a solution that can handle more than 10 gigabits per second Founded as a Jesuit seminary in 1588, the University of Münster plays a significant role in the city of Münster, the state of North Rhine-Westphalia, and German intellectual life. The university is housed in more than 300 buildings throughout the city and is home to the University of Münster Faculty of Medicine. As one of the most prominent universities in Germany, the network security team always made security a priority. Since 2004, the university had an intrusion prevention system (IPS) and firewall in place, but in 2012 began looking for a new solution. They considered several vendors and went through proofs of concept with some of them. In the PoCs, Forcepoint (then known as Stonesoft) proved to be the most suitable solution. One of the critical requirements was the need for an IPS that could handle the volume of traffic and speed the university required— more than 10 gigabits per second. The university has since upgraded their external internet connection to 30 gigabit per second and need to have full IPS protection on all that data without slowing traffic down. Forcepoint showed it could handle the load and after a successful proof of concept, the team moved forward with Forcepoint NGFWwith systems integrator partner Avency. The Forcepoint NGFW Security Management Center makes the grade Today, the university has four NGFW firewall appliances in two clusters creating 6 virtual contexts. They’ve created secure network areas for the datacenter and workstations, voice over IP, guest and remote access services, internet of things, and internal management, and will soon add an area for administrative staff. Creating these separate virtual contexts allows the team to set custom security policies, rules and controls depending on the area’s function and requirements. However, the IPS configuration is nearly the same across the contexts and nearly all traffic goes through the deep packet inspection engines.. Enabling the set up and easy configuration of the virtual contexts is Forcepoint’s NGFW Security Management Center (SMC). “The SMC is one of the major benefits to the Forcepoint firewall solution—it was key to our decision to choose Forcepoint,” said Guido Wessendorf, Head of Network Security. “It’s very intuitive to configure and monitor the whole system.” “It was far better than the management tools of the othervendors we considered at that time,” said Markus Speer, Head of Central Network Services. Challenges A culture of freedom for science and teaching means the network needs to stay open. Required IPS for >10Gb internet traffic without slowing down. Privacy rules prevent security controls on student, faculty and staff personal devices. High profile ransomware attacks crippled other German universities. Approach Implement Forcepoint Next Generation Firewall with Intrusion Prevention System.
  • 3. Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe 3 forcepoint.com/contact One of the ways the SMC makes managing the firewalls easier is via its API function. Forcepoint has built a robust community among the German universities in which security professionals connect and exchange tips and hints to best manage their Forcepoint firewalls. One of those tips was the usage of recommended IP blocklists—the user community exchanged scripts on how to import and install them via the Forcepoint API into the SMC. This led to University of Münster seeing 100 million discards (a firewall terminate or denial to malicious hosts) per day just due the IP block list, out of a total 150 million denials each day. “With only a small team, we need systems that manage much of our daily activities automatically,” Wessendorf said. “The import of the block list, automatic receiving of Forcepoint updates, and the intrusion prevention policies all help us manage our firewalls efficiently.” Even in an unusually difficult security environment, Forcepoint helps the University of Münster stay ransomware-free Making the security situation even more challenging for the team is that a large number of the PCs, laptops, phones and tablets used by the students, faculty and staff are “user-managed” not “university-managed.” This means that there can be no specific controls on the personal systems. Often firewalls will utilize HTTPs decryption to look into web traffic data packets and find malicious code, but it’s not possible in this scenario because of privacy restrictions protecting personal PC usage. During a normal study day, around 20,000 users are simultaneously connected with their own, unprotected laptops, tablets and smartphones to the university’s WiFi network. Those devices and all the other approximately 30,000 registered university end systems could be infected with ransomware that needs to download additional keys or software in order to activate, but is blocked from doing so by the Forcepoint firewall solution. “The IP block lists we imported along with the built in Forcepoint block lists, the Forcepoint Threatseeker Intelligence Network updates and the IPS functionality all work together to stop the attempts of malicious software on our systems to access command and control functions and establish ransomware locally,” Wessendorf explains. “Therefore, we assume, we’ve had no ransomware situations yet, due to that fact.” A supportive university community delivers benefits to Forcepoint customers When peers in similar security roles ask for a review of Forcepoint NGFW, “Normally I invite them to come to my desk and let them look at the solution,” explains Wessendorf. “The SMC shows how easy it is to use, configure and manage—the demonstration speaks louder than words.” As one of the first universities in Germany to select and implement the Forcepoint NGFW, the longevity of the relationship also demonstrates the value. The university’s network security team appreciates the ability to connect with the Forcepoint firewall product development team in Finland. “We have an open opportunity to share feature requests and give input into what we will require in the coming years,” Speer said. “Having that direct contact and deep working relationship with Forcepoint is really an advantage.” In addition to the product itself, the support from Forcepoint and the community they’ve built around German universities using NGFW is unique. The members are all experts in using NGFW and the SMC so it’s a very good resource, according to Wessendorf. “I really have to say this kind of support and cooperation is unheard of in other university circles. It really produces benefits for its members,” said Speer. Results › 150 million firewall blocks of connections per day. › No successful ransomware attacks. › Part of a supportive German university community around Forcepoint network security. “I really have to say this kind of support and cooperation is unheard of in other university circles.” MARKUS SPEER, HEAD OF CENTRAL NETWORK SERVICES © 2020 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of their respective owners. [WWU Münster-Customer-Story-US-EN] 04Nov2020