Cisco IronPort Email & Web Security [PDF]

After Cisco IronPort. Groupware. Firewall. Cisco IronPort Email Security Appliance. Internet. Before Cisco IronPort. Ant

579 downloads 38 Views 10MB Size

Recommend Stories


Cisco Email Security Appliance
I want to sing like the birds sing, not worrying about who hears or what they think. Rumi

Cisco Email Security
Keep your face always toward the sunshine - and shadows will fall behind you. Walt Whitman

Cisco Web Security
Forget safety. Live where you fear to live. Destroy your reputation. Be notorious. Rumi

Cisco IronPort AsyncOS 7.6.3 for Email Release Notes
Open your mouth only if what you are going to say is more beautiful than the silience. BUDDHA

Cisco IronPort AsyncOS 7.8 for Security Management User Guide
Don't count the days, make the days count. Muhammad Ali

Cisco Email Security Appliances Data Sheet
Raise your words, not voice. It is rain that grows flowers, not thunder. Rumi

email security
It always seems impossible until it is done. Nelson Mandela

Download Cisco CCNA Security Simplified pdf
Happiness doesn't result from what we get, but from what we give. Ben Carson

[email protected] Web
No matter how you feel: Get Up, Dress Up, Show Up, and Never Give Up! Anonymous

Cisco APIC-EM Security
Never wish them pain. That's not who you are. If they caused you pain, they must have pain inside. Wish

Idea Transcript


Cisco IronPort Email & Web Security

Frédéric HER, CISSP Systems Engineer, Africa Cisco IronPort Solutions [email protected]

Presentation_ID

© 2009 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

1

Cisco IronPort Unparalleled Market Leadership ƒ IronPort funded in 2000, acquired by Cisco in 2007 IronPort Positioned in the “Leaders” Quadrant in Magic Quadrant Report

ƒ 20,000+ customers globally ƒ 400 million users protected

IronPort is positioned as a leading player in the messaging security appliance market

ƒ 40% of Fortune 100 companies ƒ 8 of the 10 largest Service Providers ƒ 7 of the 10 largest Banks

Named IronPort the market share leader in the email security appliance market

ƒ 99%+ customer renewal rates 2

The Cisco IronPort Story Application-Specific Security Gateways

BLOCK Incoming Threats: ƒ ƒ ƒ ƒ

Spam, Phishing/Fraud Viruses, Trojans, Worms Spyware, Adware Unauthorized Access

Internet

SensorBase (The Common Security Database)

APPLICATION-SPECIFIC SECURITY GATEWAYS EMAIL

WEB

Security Gateway

Security Gateway

MANAGEMENT Appliance

3

Cisco IronPort Email Security

Cisco IronPort Email Security Appliance

Presentation_ID

© 2009 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

4

Email Challenges Standard Email does not natively offer what is expected

Junk Mail

Privacy & Control

Viruses

Regulations 5

Cisco IronPort Consolidates the Network Perimeter For Security, Reliability and Lower Maintenance

Before Cisco IronPort

After Cisco IronPort

Internet

Internet

Firewall

Firewall Encryption Platform MTA

DLP Scanner

Anti-Spam Anti-Virus

DLP Policy Manager

Cisco IronPort Email Security Appliance

Policy Enforcement Mail Routing

Groupware

Users

Groupware

Users 6

Spam Trends 300

• Record spam volumes and criminal botnet activity

) s 250 n o il li b ( e 200 m u l o V m150 a p S y li a 100 D e g a r 50 e v A 0 8 0 n a J

8 0 b e F

8 0 -r a M

8 0 -r p A

8 0 y a M

8 0 n u J

8 0 lu J

8 0 g u A

8 0 p e S

8 0 -t c O

8 0 v o N

8 0 c e D

Month

9 0 n a J

9 0 b e F

9 0 -r a M

9 0 -r p A

9 0 y a M

9 0 n u J

9 0 lu J

9 0 g u A

9 0 p e S

9 0 -t c O

9 0 v o N 7

Spam Sophistication Increasing

TEXT SPAM

ATTACHMENT SPAM (PDF, EXCEL, MP3)

2005

2007 2006 IMAGE SPAM

2008 TARGETED ATTACKS

Your Equitable Your Equitable Bank account Bank account is closed, call is closed, us now at call us now at (802)354-4250 (802)354-4250

Your Equitable Bank account is closed, call us now at (802)354-4250

Image Spam

8

Cisco IronPort SensorBase

• Statistics on more than 30% of the world’s e-mail traffic • New threats & alerts detection • More than 200 parameters to build reputation scores

• Data Volume • Message Structure

E-Mail Reputation Filters Reputation Score

• Complaints • Blacklists, whitelists • Off-line data • URL blacklists & whitelists • HTML Content • Domain Info

Web Reputation Filters

Reputation Score

• Known “bad” URLs • Website history… 9

Email Security Architecture Cisco IronPort Email Security Appliance

MAIL TRANSFER AGENT

OUTBOUND CONTROL

Spam Defense

Virus Defense

CISCO IRONPORT ASYNCOS EMAIL PLATFORM

Data Loss Prevention

Management

INBOUND SECURITY

Secure Messaging

10

Cisco IronPort AsyncOS Revolutionary Email Delivery Platform

Traditional Email Gateways and Other Appliances

200 Connections

Disk I/O Bottlenecks

Low Performance/ Peak Delivery Issue

Cisco IronPort Email Security Appliances

1K – 10K Connections

Unable To Leverage Full Capability Components

CPU

High Performance/ Sure Delivery

Limited Solely By CPU Capacity

11

Advanced Controls for Security and Efficiency And to protect against the risk of being blacklisted Destination Controls

IronPort Virtual Gateways ? 163.24.127.3

Internet

163.24.127.3 Internet

163.24.127.4 163.24.127.5

1.

Protect internal servers

1.

Protects the reputation of a domain

2.

Rules per destination domain

2.

Relies on different IP addresses for sending messages

Email Authentication (DomainKeys, DKIM, SPF, SIDF) 12

Email Security Architecture Cisco IronPort Email Security Appliance

MAIL TRANSFER AGENT

OUTBOUND CONTROL

Spam Defense

Virus Defense

CISCO IRONPORT ASYNCOS EMAIL PLATFORM

Data Loss Prevention

Management

INBOUND SECURITY

Secure Messaging

13

Anti-Spam Defense in Depth

SensorBase Reputation Filtering

IronPort Anti-Spam

Verdict

Spam Blocked Before Entering Network

> 99% Catch Rate < 1 in 1 million False Positives

14

SensorBase Reputation Filtering Real Time Threat Prevention • Known good is delivered

Reputation Filtering

• Suspicious is rate limited & spam filtered

IronPort Anti-Spam

Incoming Mail

• Known bad is blocked

Good, Bad, and Unknown Email

Cisco’s Internal Email Experience:

Message Category Stopped by Reputation Filtering

%

Messages

93.1%

700,876,217

Stopped as Invalid recipients

0.3%

2,280,104

Spam Detected

2.5%

18,617,700

Virus Detected

0.3%

2,144,793

Stopped by Content Filter

0.6%

4,878,312

96.8%

728,797,126

3.2%

24,102,874

Total Threat Messages: Clean Messages Total Attempted Messages:

752,900,000

15

Email Security Architecture Cisco IronPort Email Security Appliance

MAIL TRANSFER AGENT

OUTBOUND CONTROL

Spam Defense

Virus Defense

CISCO IRONPORT ASYNCOS EMAIL PLATFORM

Data Loss Prevention

Management

INBOUND SECURITY

Secure Messaging

16

Cisco IronPort Virus Outbreak Filters The First Line of Defense

Early Protection with IronPort Virus Outbreak Filters

17

Multi-Layer Virus Defense Zero Hour Malware Prevention and AV Scanning

Virus Outbreak Filters

T = 5 mins T=0 -zip (exe) files

Anti-Virus

T = 15 mins

-zip (exe) files -zip (exe) files -Size 50 to 55 KB -Size 50 to 55KB -“Price” in the filename

An analysis over one year: Average lead time …………………………over 13 hours Outbreaks blocked ………………………291 outbreaks Total incremental protection ……………. over 157 days 18

Email Security Architecture Cisco IronPort Email Security Appliance

MAIL TRANSFER AGENT

OUTBOUND CONTROL

Spam Defense

Virus Defense

CISCO IRONPORT ASYNCOS EMAIL PLATFORM

Data Loss Prevention

Management

INBOUND SECURITY

Secure Messaging

19

Risks for the Organization Top Risk: Employees

Biggest Impact: Customer Data

Top Data Loss Types 5% 10%

4%

7%

Information marked Confidential

12%

4%

8% 4%

Personal client information

44%

21%

Personnel Information

Intellectual Property 20

Data Loss Prevention Comprehensive, Accurate, Easy

Comprehensive ƒ 100+ Pre-defined templates ƒ Regulatory compliance

Easy ƒ One-click activation ƒ Policy enable/disable

Accurate ƒ Multiple parameters ƒ Key words, proximity, etc. 21

Email Encryption Instant Deployment, Zero Management Cost Message pushed to recipient User opens secured message in browser Gateway encrypts message

Key is stored

User authenticates and receives message key

Cisco Registered Envelope Service

Decrypted message is displayed

ƒ Automated key management ƒ No desktop software requirements ƒ No new hardware required

22

Email Security Architecture Cisco IronPort Email Security Appliance

MAIL TRANSFER AGENT

OUTBOUND CONTROL

Spam Defense

Virus Defense

CISCO IRONPORT ASYNCOS EMAIL PLATFORM

Data Loss Prevention

Management

INBOUND SECURITY

Secure Messaging

23

Cisco IronPort Email Security Manager Single view of policies for the entire organization Categories: by Domain, Username, or LDAP

• Allow all media files • Quarantine executables

IT

• Mark and Deliver Spam • Delete Executables

SALES

• Archive all mail • Virus Outbreak Filters disabled for .doc files

LEGAL

“IronPort Email Security Manager serves as a single, versatile dashboard to manage all the services on the appliance.” – PC Magazine 24

Comprehensive Insight Unified Business Reporting Consolidated Reports

ƒ Real Time insight into email traffic and security threats ƒ Actionable drill down reports

Multiple data points

ƒ Single view across the organization Email Volumes Spam Counters Policy Violations Virus Reports Outgoing Email Data Reputation Service System Health View

25

Visibility Into Email Messages Message Tracking

What happened to the email I sent 2 hours ago?

9Track Individual Email Messages

Who else received similar emails?

9 Forensics to Ensure Compliance

26

Email Security Hosted Offerings

Cisco IronPort Hosted Email Security

Presentation_ID

© 2009 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

27

Choice Maximizes Flexibility Full Continuum of Deployment Options Appliances

Hosted

Hybrid Hosted

Managed

Award-Winning Technology

Dedicated SaaS Infrastructure

Best of Both Worlds

Fully Managed on Premises

Backed by Service Level Agreements 28

Cisco IronPort Web Security Overview

Cisco IronPort Web Security Appliance

Presentation_ID

© 2009 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

29

Malware Threat Distribution

Malware Infections

Email Vector

Web Vector

Time Malware infection vectors are shifting from email to Web 30

Malware Evades Legacy Defenses

URL classification is reactive, has low coverage Predictable, easy to classify

Traffic Volume

Hundreds of millions of sites Thousands of new sites per hour

Signatures are reactive and CANNOT keep up

Big Head Long Tail # of Sites

31

Exploited Websites An Invisible Threat

32

Drive-By Scareware

- Full-screen pop-up simulates real AV software, asks you to buy full version to clean machine. - Fakes scan of c:\ drive and pretends to find viruses even on Linux or Mac OS X! 33

The limits of legacy solutions

ƒ Low Performance – not suitable for current usage of Web ƒ High Latency ƒ Low Security: often only URL filtering ƒ ….or only Antivirus and no efficient protection against Malware

34

Next Generation Secure Web Gateway Before Cisco IronPort

After Cisco IronPort

Internet

Firewall

Internet

Firewall

Web Proxy & Caching Anti-Spyware Anti-Virus

Cisco IronPort WSA Anti-Phishing

URL Filtering Policy Management

Users

Users

All web security components in a single integrated platform 35

Web Security Architecture Cisco IronPort Web Security Appliance

PROXY CACHE

URL Filters

CISCO IRONPORT ASYNCOS WEB PLATFORM

Web Reputation Filters

Management

L4 Traffic Monitor

Anti-Malware System

36

High-Performance Web Proxy Connection Management & Optimized Storage Maintain Maintain pool pool of of persistent persistent TCP TCP connections connections (client (client and and server server side) side)

Handle Handle extremely extremely high high traffic traffic volumes volumes

Co-related Co-related object object storage storage and and high-performance high-performance caching caching

Significantly Significantly improved improved response response times times

Facts & Figures: – 100,000 simultaneous duplex TCP connections to easily handle traffic spikes – Average latency introduced to end user: 5-15 milliseconds 37

Web Security Architecture Cisco IronPort Web Security Appliance

PROXY CACHE

URL Filters

CISCO IRONPORT ASYNCOS WEB PLATFORM

Web Reputation Filters

Management

L4 Traffic Monitor

Anti-Malware System

38

Detecting Existing Client Infections

Users

ƒ Cisco IronPort Layer 4 Traffic Monitor • Scans all traffic, all ports, all protocols

Packet and Header Inspection Network Layer Analysis

• Detects malware bypassing Port 80 • Prevents botnet traffic

ƒ Powerful anti-malware data • Automatically updated rules • Real-time rule generation using “Dynamic Discovery”

Cisco IronPort S-Series

Internet

39

Web Security Architecture Cisco IronPort Web Security Appliance

PROXY CACHE

URL Filters

CISCO IRONPORT ASYNCOS WEB PLATFORM

Web Reputation Filters

Management

L4 Traffic Monitor

Anti-Malware System

40

Number of Webpages

Web: Huge, Growing and Transient

Dynamic Web User Generated & Web 2.0 Content

2005: Web 2.0 tipping point

Static Web Traditional Content Publishers Legacy URL Filtering Focus

1998 28 Million webpages

2000 1 Billion webpages

2008 1 Trillion webpages

Source: Multiple, including Cisco SIO, Google, Wikipedia

41

The Dark Web Challenge Legacy URL Filtering Effectiveness is Decreasing URL Lookup in Database

www.sportsbook.com/

URL Database

Gambling

Uncategorized

OBSCENE

PORN

ADULT

ƒ Legacy URL filtering primarily focuses on crawling and manual review/classification ƒ Databases add thousands of new URLs per day…while the web adds a Billion ƒ 95% of the web will be uncategorized by 2015

GAMBLING

42

Cisco IronPort Web Usage Controls Dynamic Categorization for the Dark Web URL Lookup in Database

www.sportsbook.com/

Gambling

URL Database

ƒ Industry-leading URL database efficacy

Uncategorized

URL Keyword Analysis

• 65 categories • Updated every 5 minutes • Powered by Cisco SIO

Gambling www.casinoonthe.net/

Uncategorized

Dynamic Content Analysis Engine

Analyze Site Content

ƒ Dynamic categorization identifies ~90% of Dark Web content in commonly blocked categories

Gambling

43

Cisco Security Intelligence Operations (SIO) Unmatched Visibility Drives Unparalleled Efficacy Cisco IronPort Web Security Appliances on Customer Premises Updates published every 5 minutes

Customer Administrators URL Categorization Requests

Uncategorized URLs

Cisco SIO

Analysis and Processing

Master URL Database

External Feeds

Crawler Targeting

Crowd Sourcing Manual Categorization

Web Crawlers

Traffic Data from Cisco IronPort Email Security Appliances, Cisco IPS, and Cisco ASA sensors

44

Web Security Architecture Cisco IronPort Web Security Appliance

PROXY CACHE

URL Filters

CISCO IRONPORT ASYNCOS WEB PLATFORM

Web Reputation Filters

Management

L4 Traffic Monitor

Anti-Malware System

45

Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial Threat

Web Reputation Filters Scan each object, not just the initial request Client PC

Trusted Web Site

ƒ Web pages are made up of objects coming from different sources ƒ Objects can be images, executables, JavaScript…

Web servers not affiliated with the trusted web site (e.g. ad servers)

ƒ Compromised websites often grab malicious objects from external sources ƒ Security means looking at each object individually, not just the initial request 46

Cisco IronPort DVS Engine Dynamic Vectoring and Streaming Spyware

Adware

Webroot

Trojans

Webroot +  McAfee

Worms

Viruses

McAfee

~35% Additional Coverage ƒ Multiple integrated verdict engines • McAfee and Webroot

ƒ Decrypt & scan SSL traffic • Selectively, based on category & reputation

ƒ Accelerated signature scanning • Parallel scans • Stream scanning

ƒ Automated updates 47

Cisco IronPort DVS Engine Multi-Layered Malware Defense ƒ

Deep content inspection

ƒ

High-performance scanning - Parallel scans - Stream scanning

ƒ

Multiple verdict engines

Webroot

IRONPORT IRONPORT DVS DVS ENGINE ENGINE

McAfee

VERDICT ENGINE “N”

- Integrated, on-box - Supported engines: Webroot, McAfee

Policy Policy Management Management

48

Usage of Ports 80 & 443 has changed

ƒ

A lot of applications traversing port 80 are not “web browsing”

ƒ

A lot of applications using port 80 are not business-related

ƒ

Nearly all companies include Webmail users – Malicious attached files?

ƒ

Instant Messaging is found in all companies – How do you keep it open while ensuring your network is not at risk?

ƒ

Web-based file transfer is growing fast (MegaUpload, Rapidshare…)

ƒ

Peer-to-Peer is still used heavily

49

Web Application Controls ƒ Native control for HTTP, HTTP(s), FTP applications ƒ Selective decryption of SSL traffic for security and policy

File Transfer Protocol

ƒ Policy enforcement for applications tunneled over HTTP—FTP, IM, video ƒ Application traversal using policy-based HTTP CONNECT

Understanding Web Traffic 50

50

HTTPS Scanning Selective, Based on Trust

Decrypted • Inspected • Re-encrypted Selectively on TRUST, Category, Source

Internet

Users

Web Server

Cisco IronPort WSA

Decrypted • Inspected • Re-encrypted Selectively on Category, Source

51

Cisco IronPort WSA Complete Data Security ƒ On-box Common Sense Security • Allow, block, log based on file metadata, URL category, user and web reputation • Multi-protocol: HTTP(s), FTP, HTTP tunneled Partner site

Log Allow Documents

Internet

Block

Webmail

ƒ Off-box Advanced Data Security • Deep content inspection: Structured and unstructured data matching • Performance optimized: Works in tandem with accelerated on-box policies Log Allow Documents

Internet

Block Content

Verdict

DLP Vendor Box 52

Web Security Architecture Cisco IronPort Web Security Appliance

PROXY CACHE

URL Filters

CISCO IRONPORT ASYNCOS WEB PLATFORM

Web Reputation Filters

Management

L4 Traffic Monitor

Anti-Malware System

53

Cisco IronPort Web Security Manager Single View of Policies for the Entire Organization Group by LDAP, Active Directory, Network • Block FTP • Allow Media files • Allow all URL categories

Marketing

• Block executables • Block gambling sites • Block all malware

Sales

• Allow Skype • Monitor all traffic • Allow executables

IT

• Allow all applications • Allow all protocols

54

Delegated Administration Flexibility to Support Organizational Requirements

Global administrator defines roles and access permissions

IT No Media

No FTP

SALES

No Webmail

Policy officer sets rules for users they manage

LEGAL

ƒ Assign administrators for groups of users, appliances, subnets, or destinations ƒ Fine-grained, role-based access control 55

Comprehensive Reporting ƒ In-depth Threat Visibility - Web Traffic Overview - Layer 4 Traffic Monitor - Anti-Malware Category and Threat Details - Client Malware Risk & Activity Detail - Website Activity and Detail

ƒ Extensive Forensic Capabilities - Investigate acceptable use violations - Drill down for further analysis - Satisfy compliance requirements

ƒ Detailed off-box analysis - Offload extensive data crunching - Top N and trend reporting for malware - Client, Source, Malware Name and Category for IronPort

56

Web Security Hosted Offerings

ScanSafe SaaS Web Security

is now part of Cisco Presentation_ID

© 2009 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

57

The leading SaaS Web security solution ƒ Pioneer

Awards

ƒ Leadership position: 34.5%

Market Share (IDC)

Security product  of the year 2008

ƒ 30Bn Web requests monthly ƒ Millions of users

Customers

ƒ Customers in 100+ countries ƒ 100% availability ƒ 200 million threats blocked

monthly

Partners

ƒ Award-winning

58

59

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.