SlideShare una empresa de Scribd logo
1 de 30
Enable and Secure the New Internet
The Internet has Changed and getting more Complex (from text & file sharing to Unified Communications and Collaboration) Capabilities Network Behavior IM IM Aggregators Public IM VoIP Web Conferencing File Sharing Video Multimedia Text Chat Evasive Good Anonymizers Unified Communications Social Networking
The Social Generation: Networking or Not Working ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Findings – your biggest concern ,[object Object]
The Internet has Changed  ,[object Object],[object Object],[object Object]
Social Networking at Work ,[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns and Attitudes about Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
These Applications are Highly Evasive IM Sessions P2P Sessions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Which Present Significant Risks When Unmanaged Information Leakage Increasingly Complex Viruses, Malware, SPIM Inappropriate Content Commercially Motivated Intellectual Property Credit Card #, Personal Data, Social Security / NI # Employee Productivity Corporate AUP SEC 17a, FSA, HIPAA,  SOX, GLBA, NASD, MiFiD Compliance and eDiscovery Bandwidth Explosion / Cost
Key Requirements for Securing the New Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ FaceTime is an outstanding choice for organizations looking for fine-grained Web communication application controls”
Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Must-Have” Requirements for UC and Web 2.0
Key Requirements for Secure Web Gateway ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Gartner Secure Web Gateway Magic Quadrant, June 2007
Unified Security Gateway -  Secure & Enable the New Internet Unified Comms Web 2.0 URLFiltering Application Control Engine Enablement Visibility, Application Control & Enforcement Malware SocialNets Over 2000 Applications IM P2P Streaming Social Networking. Gateway Prevention Gateway Detection Enterprise class URL database ,[object Object],[object Object],Management and Reporting
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Pass-by Deployment Ensures Zero Latency Unified Security Gateway End Users Egress Switch Internet LDAP/AD Anti-Virus Archiving
USG Architecture – Security and Enablement Pg.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Physical Port Security/Flexibility Hardened FT OS State-of-the-art Application Inspection IM P2P Malware Web Hierarchical User/Group Policy
The USG Family – Small Business to Large Enterprise USG1030 USG220 USG320 USG530 Performance 250 1,000 5,000 Max Users Corporate  Headquarters  Max Throughput 100Mbps  200Mbps 400Mbps 10,000 600Mbps Small Business & Remote Offices
FaceTime’s Mission Help businesses realize the benefits of The New Internet  by delivering  enterprise solutions  that provide Unified Security, Management and Compliance across the  broadest set of applications  and modalities. ,[object Object],[object Object],Security ,[object Object],[object Object],Visibility &  Control ,[object Object],[object Object],Compliance
About FaceTime Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FaceTime is Mission Critical for Today’s Enterprises Over 1,500 customers and 7+ Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare
Thank you.
Real Time Communications Applications –  Masters of Evasive Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
USG:  Purpose-built for the New Internet  Identification Inspection Enablement Application Control Engine™ Application Identification Uses well-defined port/ protocol for IM Application Activity User traffic For User:  Joe in Sales Allow  only native MSN & within IM allow only PDF file transfers after AV scanning However, uses P2P protocol for file transfer within IM Policy Enforcement & Logging Packet Assembly Granular Policy Control Application Activity Identifier Signature Analysis Behavioral Analysis Port/Protocol Analysis
USG: Management, Security & Compliance For Greynets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Web Filtering Malware Control Application Control Archival & Compliance
USG: Optimized For Skype Identification Inspection Enablement Application Identification Port hopping Random session behavior  Application Activity User traffic For User:  John in Marketing Allow  Skype only for users in marketing group Policy Enforcement & Logging Greynet Dissector Packet Assembly Granular Policy Control Application Activity Identifier Signature Analysis Behavioral Analysis Port/Protocol Analysis Identify users
USG: Optimized For Greynets – Public IM Application Identification Uses well-defined port/ protocol for IM Application Activity User traffic For User:  Joe in Sales Allow  only native MSN & within IM allow only PDF file transfers after AV scanning However, uses P2P protocol for file transfer within IM Policy Enforcement & Logging Identification Inspection Enablement Greynet Dissector Packet Assembly Granular Policy Control Application Activity Identifier Signature Analysis Behavioral Analysis Port/Protocol Analysis
Granular Policy and Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example Policies for Internet Apps Application / Policy Allow/ Block Groups Content Control Time of Day Quota Max Bandwidth MSN Allow ALL AV, ILP, Logging ALL ALL ALL GoogleTalk Allow LEGAL AV, ILP, Logging 8am - 6pm All ALL All other IM Block NONE N/A N/A N/A N/A Skype Allow SALES N/A ALL ALL 1% BitTorrent Allow IT N/A ALL 4 hours 2% All other P2P Block NONE N/A N/A N/A N/A IPTV Block NONE N/A N/A N/A N/A Anonymisers Block NONE N/A N/A N/A N/A Webex Allow ALL N/A 8am - 6pm 4 hours 2% All other Web Conf Block NONE N/A N/A N/A N/A
Unified Security Gateway Deployment Topology Unified Security Gateway LDAP WORM Archive Policies Audit DMZ Egress Switch FaceTime Security Labs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],P2P LAN/WAN Perimeter Internet Public IM! Spyware/ Adware Unauthorized Public IM VoIP http://badurl.com/ Network Greynet Database  Enterprise IM

Más contenido relacionado

La actualidad más candente

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Peoplesoft Erp
Peoplesoft ErpPeoplesoft Erp
Peoplesoft ErpAppsian
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
6 Steps to SIP trunking security
6 Steps to SIP trunking security6 Steps to SIP trunking security
6 Steps to SIP trunking securityFlowroute
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network securityBev Robb
 
Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample PresentationRichard Smiraldi
 

La actualidad más candente (20)

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Peoplesoft Erp
Peoplesoft ErpPeoplesoft Erp
Peoplesoft Erp
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
6 Steps to SIP trunking security
6 Steps to SIP trunking security6 Steps to SIP trunking security
6 Steps to SIP trunking security
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample Presentation
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 

Destacado

Pivotingskyscrapers
PivotingskyscrapersPivotingskyscrapers
PivotingskyscrapersSpider22
 
DWI_Introduction Material_ver.01 (2)
DWI_Introduction Material_ver.01 (2)DWI_Introduction Material_ver.01 (2)
DWI_Introduction Material_ver.01 (2)Mohit Singh
 
Thoicuatiepthiso Lamgiaututainguyeninternet
Thoicuatiepthiso LamgiaututainguyeninternetThoicuatiepthiso Lamgiaututainguyeninternet
Thoicuatiepthiso LamgiaututainguyeninternetLe Thuy Hanh
 
Microtravel Profile
Microtravel  ProfileMicrotravel  Profile
Microtravel ProfileLe Thuy Hanh
 
Sales Presentation
Sales PresentationSales Presentation
Sales Presentationsjpfeufer
 
Press Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishPress Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishLe Thuy Hanh
 
Year To Date Comparison
Year To Date ComparisonYear To Date Comparison
Year To Date Comparisonnjhousehelper
 
Opening Microtravel
Opening MicrotravelOpening Microtravel
Opening MicrotravelLe Thuy Hanh
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guideChris Sparshott
 
My mother puts peanut butter in the freezer and forgets to change her clothes
My mother puts peanut butter in the freezer and forgets to change her clothesMy mother puts peanut butter in the freezer and forgets to change her clothes
My mother puts peanut butter in the freezer and forgets to change her clothesAnnette Kurman, APR, MBA, BSN
 
Profile Digimarketingjsc
Profile DigimarketingjscProfile Digimarketingjsc
Profile DigimarketingjscLe Thuy Hanh
 
IBM SaaS Interact With Colleague Via Updates Files
IBM SaaS Interact With Colleague Via Updates   FilesIBM SaaS Interact With Colleague Via Updates   Files
IBM SaaS Interact With Colleague Via Updates FilesChris Sparshott
 
Investor Relations 2.0 Jak to zacząć w Polsce?
Investor Relations 2.0 Jak to zacząć w Polsce?Investor Relations 2.0 Jak to zacząć w Polsce?
Investor Relations 2.0 Jak to zacząć w Polsce?Piotr Biernacki
 
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?Martina Rüdiger
 

Destacado (20)

Janice Davis Design
Janice Davis DesignJanice Davis Design
Janice Davis Design
 
Pivotingskyscrapers
PivotingskyscrapersPivotingskyscrapers
Pivotingskyscrapers
 
DWI_Introduction Material_ver.01 (2)
DWI_Introduction Material_ver.01 (2)DWI_Introduction Material_ver.01 (2)
DWI_Introduction Material_ver.01 (2)
 
Social Media
Social MediaSocial Media
Social Media
 
ESG Brochure
ESG BrochureESG Brochure
ESG Brochure
 
Thoicuatiepthiso Lamgiaututainguyeninternet
Thoicuatiepthiso LamgiaututainguyeninternetThoicuatiepthiso Lamgiaututainguyeninternet
Thoicuatiepthiso Lamgiaututainguyeninternet
 
Microtravel Profile
Microtravel  ProfileMicrotravel  Profile
Microtravel Profile
 
Sales Presentation
Sales PresentationSales Presentation
Sales Presentation
 
Cloud Computing and ROI
Cloud Computing and ROICloud Computing and ROI
Cloud Computing and ROI
 
Product Platform
Product PlatformProduct Platform
Product Platform
 
Press Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishPress Release Vietnam 2009 English
Press Release Vietnam 2009 English
 
Year To Date Comparison
Year To Date ComparisonYear To Date Comparison
Year To Date Comparison
 
Opening Microtravel
Opening MicrotravelOpening Microtravel
Opening Microtravel
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guide
 
gansu
gansugansu
gansu
 
My mother puts peanut butter in the freezer and forgets to change her clothes
My mother puts peanut butter in the freezer and forgets to change her clothesMy mother puts peanut butter in the freezer and forgets to change her clothes
My mother puts peanut butter in the freezer and forgets to change her clothes
 
Profile Digimarketingjsc
Profile DigimarketingjscProfile Digimarketingjsc
Profile Digimarketingjsc
 
IBM SaaS Interact With Colleague Via Updates Files
IBM SaaS Interact With Colleague Via Updates   FilesIBM SaaS Interact With Colleague Via Updates   Files
IBM SaaS Interact With Colleague Via Updates Files
 
Investor Relations 2.0 Jak to zacząć w Polsce?
Investor Relations 2.0 Jak to zacząć w Polsce?Investor Relations 2.0 Jak to zacząć w Polsce?
Investor Relations 2.0 Jak to zacząć w Polsce?
 
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
 

Similar a FaceTime Web 2.0

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
IBM Sametime and Facetime
IBM Sametime and FacetimeIBM Sametime and Facetime
IBM Sametime and FacetimeChris Sparshott
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5ObserveIT
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 

Similar a FaceTime Web 2.0 (20)

Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
IBM Sametime and Facetime
IBM Sametime and FacetimeIBM Sametime and Facetime
IBM Sametime and Facetime
 
Information Security
Information SecurityInformation Security
Information Security
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Proxy
ProxyProxy
Proxy
 
Proxy
ProxyProxy
Proxy
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 

Más de Chris Sparshott

2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winnersChris Sparshott
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winnersChris Sparshott
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event videoChris Sparshott
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Chris Sparshott
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?Chris Sparshott
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewChris Sparshott
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reductionChris Sparshott
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoChris Sparshott
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSChris Sparshott
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and SubscriptionChris Sparshott
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on BlackberryChris Sparshott
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBMChris Sparshott
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingChris Sparshott
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather informationChris Sparshott
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1Chris Sparshott
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureChris Sparshott
 

Más de Chris Sparshott (20)

IBM and Apache Spark
IBM and Apache SparkIBM and Apache Spark
IBM and Apache Spark
 
2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winners
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winners
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event video
 
IBM Acquisitions
IBM AcquisitionsIBM Acquisitions
IBM Acquisitions
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overview
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reduction
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demo
 
Cloud Computing IaaS
Cloud Computing IaaSCloud Computing IaaS
Cloud Computing IaaS
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaS
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and Subscription
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on Blackberry
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensing
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather information
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile Picture
 

Último

PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...yulianti213969
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGpriyakumari801827
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...lizamodels9
 

Último (20)

PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
 

FaceTime Web 2.0

  • 1. Enable and Secure the New Internet
  • 2. The Internet has Changed and getting more Complex (from text & file sharing to Unified Communications and Collaboration) Capabilities Network Behavior IM IM Aggregators Public IM VoIP Web Conferencing File Sharing Video Multimedia Text Chat Evasive Good Anonymizers Unified Communications Social Networking
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Which Present Significant Risks When Unmanaged Information Leakage Increasingly Complex Viruses, Malware, SPIM Inappropriate Content Commercially Motivated Intellectual Property Credit Card #, Personal Data, Social Security / NI # Employee Productivity Corporate AUP SEC 17a, FSA, HIPAA, SOX, GLBA, NASD, MiFiD Compliance and eDiscovery Bandwidth Explosion / Cost
  • 10.
  • 11. Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
  • 12. FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. The USG Family – Small Business to Large Enterprise USG1030 USG220 USG320 USG530 Performance 250 1,000 5,000 Max Users Corporate Headquarters Max Throughput 100Mbps 200Mbps 400Mbps 10,000 600Mbps Small Business & Remote Offices
  • 19.
  • 20.
  • 21. FaceTime is Mission Critical for Today’s Enterprises Over 1,500 customers and 7+ Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare
  • 23.
  • 24. USG: Purpose-built for the New Internet Identification Inspection Enablement Application Control Engine™ Application Identification Uses well-defined port/ protocol for IM Application Activity User traffic For User: Joe in Sales Allow only native MSN & within IM allow only PDF file transfers after AV scanning However, uses P2P protocol for file transfer within IM Policy Enforcement & Logging Packet Assembly Granular Policy Control Application Activity Identifier Signature Analysis Behavioral Analysis Port/Protocol Analysis
  • 25.
  • 26. USG: Optimized For Skype Identification Inspection Enablement Application Identification Port hopping Random session behavior Application Activity User traffic For User: John in Marketing Allow Skype only for users in marketing group Policy Enforcement & Logging Greynet Dissector Packet Assembly Granular Policy Control Application Activity Identifier Signature Analysis Behavioral Analysis Port/Protocol Analysis Identify users
  • 27. USG: Optimized For Greynets – Public IM Application Identification Uses well-defined port/ protocol for IM Application Activity User traffic For User: Joe in Sales Allow only native MSN & within IM allow only PDF file transfers after AV scanning However, uses P2P protocol for file transfer within IM Policy Enforcement & Logging Identification Inspection Enablement Greynet Dissector Packet Assembly Granular Policy Control Application Activity Identifier Signature Analysis Behavioral Analysis Port/Protocol Analysis
  • 28.
  • 29. Example Policies for Internet Apps Application / Policy Allow/ Block Groups Content Control Time of Day Quota Max Bandwidth MSN Allow ALL AV, ILP, Logging ALL ALL ALL GoogleTalk Allow LEGAL AV, ILP, Logging 8am - 6pm All ALL All other IM Block NONE N/A N/A N/A N/A Skype Allow SALES N/A ALL ALL 1% BitTorrent Allow IT N/A ALL 4 hours 2% All other P2P Block NONE N/A N/A N/A N/A IPTV Block NONE N/A N/A N/A N/A Anonymisers Block NONE N/A N/A N/A N/A Webex Allow ALL N/A 8am - 6pm 4 hours 2% All other Web Conf Block NONE N/A N/A N/A N/A
  • 30.

Notas del editor

  1. Facebook. Adding 1000 apps per month; 2000 are messaging related A major investment bank customer of ours estimates over 50% have a facebook acct Bell Canada has over 2000 employees using FaceBook
  2. New generation of Internet users are coming into our organization. A recent Survey
  3. When speaking to key administrators during the survey the following were of concern: Brand awareness Productivity of Staff – to much social activity Security – backdoor attacks via Malware / Worms – unsecured P2P and IM channels Information Leakage biggest concern
  4. Inbound Threats: Productivity Loss Broad new vectors for Malware distribution (Viruses, Worms, Spyware & Rootkits) Outbound Threats: Information Leakage Create holes for corporate & user information leakage Intellectual property loss User privacy concerns Corporate and Regulatory Non – Compliance Exposure : Invisible information channels Legal & Financial Risks
  5. Gaps in other security products – talk here
  6. FTOS: Purpose built for greynet applications Hardening the Linux shell Regulating the use of ports Preventing remote connections to the OS Greynet Traffic Detection: HTTP and real-time communication applications Detect applications that are port/channel agnostic, tunnel through HTTP, etc. Total visibility of all Internet traffic Policy Enforcement Engine Set, enforce polices and manage access for all channels Set and enforce policies at company, group and user levels for HTTP Centralized Management and Reporting Easy to use browser based management interface for all Internet channels Pre-defined and custom report generation capability Integration with 3rd party reporting applications
  7. 09/08/09
  8. Port Tunneling Enables the masquerading of IM/P2P traffic over popular protocols such as HTTP, Telnet, FTP which are typically allowed through Firewalls for business applications Application Level Firewalls can perform limited inspection for basic IM and P2P protocols, but keeping up with proprietary implementations is a challenge Random Session Behavior / Port Hopping Exhibit a non-deterministic behavior to bypass access-control policies on traditional security devices that look for applications on “well-known” ports Security administrators need complete knowledge of all the ports on which the application can “hop” over, and keep up with the increasing sophistication of these applications Onion Routing The goal of Onion Routing (OR) is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network. Onion Routing accomplishes this according to the principle of Chaum's Mix Cascades : messages travel from source to destination via a sequence of proxies ("onion routers"), which re-route messages in an unpredictable path. To prevent an adversary from eavesdropping on message content, messages are encrypted between routers. The advantage of Onion Routing (and Mix Cascades in general) is that it is not necessary to trust each cooperating Router; if one or more routers are compromised, anonymous communication can still be achieved. This is due to the fact that each Router in an OR network accepts messages, re-encrypts them, and transmits to another Onion Router. An attacker with the ability to monitor every Onion Router in a network might be able to trace the path of a message through the network, but an attacker with more limited capabilities will have difficulty even if he or she controls one or more Onion Routers on the message's path. Encryption Ensures privacy of message contents between end-points Bypasses traditional security measures
  9. Incoming traffic packets are captured and reassembled for further analysis by the Traffic Analyzer. (This part is similar to any network security device) Once reassembled, the traffic goes through the App Dissector Engine – this is our secret sauce. This engine includes two processes: The traffic goes through signature, behavioral and protocol analyses to identify the application. This is where app is identified based on ports/protocols and the behavior it exhibits on the network. Since greynets are highly evasive on the network, a combination of signature and stateful inspection of the traffic is necessary to accurately id the application. For e.g. Skype, a P2P application may use port 80 or any other port. Understanding the behavioral aspect (port hopping, packet alteration/sequencing, etc.). Once the application has been identified, the dissector then identifies the actual activity of the application – whether it is a file transfer happening over IM or just plain IM conversation. This is important as some of the IM apps like MSN use P2P protocol for file transfer – different than the native protocol used for IM conversation. Following the identification of the app activity, the appropriate policy for it is applied based on user that initiated that traffic resulting in allowing (with controls) or blocking the traffic.
  10. Incoming traffic packets are captured and reassembled for further analysis by the Traffic Analyzer. (This part is similar to any network security device) Once reassembled, the traffic goes through the App Dissector Engine – this is our secret sauce. This engine includes two processes: The traffic goes through signature, behavioral and protocol analyses to identify the application. This is where app is identified based on ports/protocols and the behavior it exhibits on the network. Since greynets are highly evasive on the network, a combination of signature and stateful inspection of the traffic is necessary to accurately id the application. For e.g. Skype, a P2P application may use port 80 or any other port. Understanding the behavioral aspect (port hopping, packet alteration/sequencing, etc.). Once the application has been identified, the dissector then identifies the actual activity of the application – whether it is a file transfer happening over IM or just plain IM conversation. This is important as some of the IM apps like MSN use P2P protocol for file transfer – different than the native protocol used for IM conversation. Following the identification of the app activity, the appropriate policy for it is applied based on user that initiated that traffic resulting in allowing (with controls) or blocking the traffic.
  11. Incoming traffic packets are captured and reassembled for further analysis by the Traffic Analyzer. (This part is similar to any network security device) Once reassembled, the traffic goes through the App Dissector Engine – this is our secret sauce. This engine includes two processes: The traffic goes through signature, behavioral and protocol analyses to identify the application. This is where app is identified based on ports/protocols and the behavior it exhibits on the network. Since greynets are highly evasive on the network, a combination of signature and stateful inspection of the traffic is necessary to accurately id the application. For e.g. Skype, a P2P application may use port 80 or any other port. Understanding the behavioral aspect (port hopping, packet alteration/sequencing, etc.). Once the application has been identified, the dissector then identifies the actual activity of the application Following the identification of the app activity, the appropriate policy for it is applied based on user that initiated that traffic resulting in allowing (with controls) or blocking the traffic.
  12. Incoming traffic packets are captured and reassembled for further analysis by the Traffic Analyzer. (This part is similar to any network security device) Once reassembled, the traffic goes through the App Dissector Engine – this is our secret sauce. This engine includes two processes: The traffic goes through signature, behavioral and protocol analyses to identify the application. This is where app is identified based on ports/protocols and the behavior it exhibits on the network. Since greynets are highly evasive on the network, a combination of signature and stateful inspection of the traffic is necessary to accurately id the application. For e.g. Skype, a P2P application may use port 80 or any other port. Understanding the behavioral aspect (port hopping, packet alteration/sequencing, etc.). Once the application has been identified, the dissector then identifies the actual activity of the application – whether it is a file transfer happening over IM or just plain IM conversation. This is important as some of the IM apps like MSN use P2P protocol for file transfer – different than the native protocol used for IM conversation. Following the identification of the app activity, the appropriate policy for it is applied based on user that initiated that traffic resulting in allowing (with controls) or blocking the traffic.
  13. BEST PRACTICES DEPLOYMENT 1: Deploy FTEE to ensure compliance and security Guarantee compliance with TrueCompliance TM Stop worms and viruses and block SPIM Stop rogue IM & P2P and block circumvention at the perimeter 2: Monitor and analyze usage patterns Who is using what networks? What features are being used? File transfer, VoIP, app sharing, etc. How much and what P2P usage is going on? 3: Formulate usage policies By user, network and capabilities 4: Implement and enforce policies IMA for logging and audit workflow RTG to control non-compliant use