hp next-generation network security...
TRANSCRIPT
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Next-GenerationNetwork SecuritySolutionsRadoslav GeorgievTechnical Consultant HP [email protected]
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
The Network Infrastructure Has Revolutionized
Mainframe Client/Server Web Computing
Mobile & Cloud Computing
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
The Network Security Industry Is Falling Short
Mainframe Client/Server Web Computing
Mobile & Cloud Computing
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
Your User Is the Biggest Risk for Infiltration
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5
Historically, TippingPoint Has Protected yourApps and Data
…in your Data Center …in your Campus Network …in your Branch Office
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
Now, TippingPoint Protects Users, Apps and Data
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What is a NGFW?
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
NGFW
2001 Today
NGIPS & NGFWUTM
Stateful Firewalls
HP TippingPoint NGIPS
Why HP TippingPoint NGFWEvolution of the Firewall
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
What is Next-Generation Firewall?
IntegratedIntegratedPolicyPolicy
Next Gen IPS Enterprise Firewall
DVLabs researchand feeds User and app
policy
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Why the HP TippingPointNext-Generation Firewall?
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
The Value HP TippingPoint Provides
Simple
Easy-to-use,configure and
install withcentralized
management
Reliable
NGIPS with99.99999%
network uptimetrack record
Effective
Industry leadingsecurity
intelligence withweekly DVLabs
updates
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12
Simplicity Matters• Deploys in minutes• Easy-to-manage graphical user
interface• Single enterprise management
solution for NGIPS and NGFWdevices
• Set and forget security
“60% of customers deploy withrecommended settings.” – Frost & Sullivan
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13
Effectiveness Matters
DVLabs Research & QA
2,000+ customers participating
~3,000+ independent researchers
• Over 8,100 filters of networkprotection right out of the box
• Over 3,000 securityresearchers focused onemerging threats
• Proven accuracy with no falsepositives
• Optimize network performanceand protect business criticalapplications
Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan
“0 false positives since being enabled 15 months ago.”– Sr. Network Security Engineer from Financial
Services
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14
Term Definition
Vulnerability Security flaw in a software program
Exploit Attack on a vulnerability to:•Gain unauthorized access•Create a denial of service
Exploit Filter Stops a single exploit•Easy to produce•Typically produced due to IPS engineperformance limitations•Results in missed attacks and falsepositives
Vulnerability Filter Stops all exploits attacking thevulnerability
HP TippingPoint Vulnerability Filter
Exploit of Vulnerable Application
VulnerabilityFalse Positives
Standard IPS ExploitFilter for Exploit A
Exploit AExploit B(missed by Exploit Filter A)
HP TippingPointVulnerability
Filter
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15
Our Zero-day Coverage Compared to Competition
Compiled from publicly verifiable data at http://www.microsoft.com/technet/security/current.aspx
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16
Reliability Matters• 99.99999% highly reliable
NGIPS engine• Inline deployment without
affecting network performance• 2 reliable modes of deployment• Routing Active-Passive high
availability• Transparent with bypass• Resilient hardware
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you