SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
WHITE PAPER




                                               Is Your Network Safe Behind Just A Firewall?


      Malware Threatens                        Malicious software or “malware” is the                               In essence, malware acts like a parasite
       Network Security                        biggest network security threat facing                               on a network. It is designed to infiltrate
                                               organizations today. Cybercriminals                                  a computer system without permission.
                                               target enterprises that hold a great deal                            Even the most well-intentioned employee
                                               of money or conduct a high volume of                                 may accidentally download malware –
                                               transactions on a daily basis. A network                             such as Zeus (Zbot) – from a Web site
                                               intrusion can cost an organization as                                or open it via an e-mail attachment. The
                                               much as $5 million. And, the damage                                  worm then slips past network security
                                               to a company’s reputation can be                                     measures and hides against the firewall.
                                               irreparable. Statistics show that if a                               Here, it collects data and absorbs
                                               major security breach occurs against                                 private information passing through,
                                               a U.S. enterprise, that organization                                 such as credit card numbers, account
                                               has a 90 percent chance of going out                                 numbers, or social security numbers.
                                               of business within two years. This is                                The worm then sends that information
                                               particularly alarming considering that                               back to the host, who then sells it to
                                               malware is currently the fastest-                                    criminals for identity fraud, e-scams, and
                                               growing trend in the misuse of                                       other personally invasive crimes.
                                               network resources.



      The Threat is Real                       This threat of malware is very real.                                 Just as federal regulators have made
                                               Private information is at risk without                               efforts to protect privacy through
                                               the proper network security measures.                                statutes such as HIPAA, Gramm-
                                               Unfortunately, a majority of anti-virus                              Leach-Bliley, and PCI DSS, compliance
                                               programs and network firewalls cannot                                 standards are moving toward required
                                               protect against intrusion risks beyond                               advanced network security measures.
                                               viruses and Trojan worms. Organizations
                                               have to be smarter than the criminals
                                               they’re up against.




                                                                                                                                                       © Windstream 2012




         DATE: 3.27.12 | REVISION: 1 | 009573_Is_Your_Network_Safe | CREATIVE: MF | JOB#: 9573 - Is Your Network Safe | COLOR: 4C | TRIM: 8.5” x 11”
WHITE PAPER




     A Firewall is Not Enough   Today’s malware is so advanced that a         network. If there is danger lurking
                                firewall alone will still leave a network      outside the front door (port connection)
                                vulnerable. A firewall provides a basic        and the data finds a way into the home
                                line of defense by allowing or blocking       (the network), it will cause an intense
                                connectivity to the network through           amount of damage. And, although it’s
                                port connections. Think of a firewall          not practical to check your guests’ bags,
                                like a house: it allows you to close and      it is necessary to scan all items entering
                                lock the doors and windows you don’t          your network to determine if they are
                                want outsiders to have access to, while       friend or foe because the network’s
                                keeping them open for welcome visitors.       health and safety rely on it.

                                The problem with this defense is that the
                                firewall does not investigate the data that
                                is allowed to enter the doors on the




          IDPS is the Answer    Intrusion Detection and Protection            In a 2009 survey, Forrester Research
                  to Malware    Systems (IDPS) are the newest line of         showed that IDPS is the second most
                                defense in network security and combine       in-demand security solution. Many of the
                                two levels of network protection into one:    solutions on the market today are either
                                intrusion detection and prevention. These     IPS or IDS. Windstream’s IDPS requires
                                systems identify and prevent malware          no additional equipment purchases, and
                                intrusion by examining information via        has the ability to provide powerful and
                                sensors within the network infrastructure.    efficient security while also being cost-
                                                                              effective for the customer. Windstream
                                An Intrusion Detection System (IDS)           offers an IDPS solution that outperforms
                                monitors activities on the network by         other products in the industry because
                                searching for malware and producing           of its ability to minimize risk and cost for
                                reports for the system administrator.         an organization.
                                Intrusion Prevention Sensors (IPS) actively
                                block the malware on the network,             IDPS is a substantial part of an
                                dropping the malicious data while still       enterprise security solution used to
                                allowing normal data to continue on the       protect the network. In order to set
                                network. With IDPS, the solution runs         up proper network security, layers
                                along the MPLS cloud. If the malware          of products, software, and solutions
                                is right on the network’s doorsteps, the      need to be in place that protect against
                                technology is efficient enough to detect       various threats. Firewalls, anti-virus
                                and prevent it from entering before the       programs, access controls, and an IDPS
                                data leaves the cloud.                        solution are all necessary to achieve
                                                                              effective network security.



                                                                                                        © Windstream 2012
WHITE PAPER




              How IDPS Works   An IDPS keeps risks away from                IDPS customer and Windstream’s
                               important data. It acts like a bouncer       security operations center are alerted.
                               standing outside of a bar checking IDs:      Windstream engineers contact the
                               it detects malware and prevents it from      customer about the malicious activity,
                               hanging out along the firewall. The IDPS      and also help remediate the problem.
                               is constantly scanning the network
                               for known threats. These threats are         Management of an IDPS is just as
                               identified in several ways, including         important as purchasing the solution
                               through customer-provided data or Web        itself. With current IDS or IPS solutions,
                               security solutions such as McAfee. It is     IT professionals need to sift through a
                               also continuously searching the network      wall of network data that likely contains a
                               for any possible anomalies.                  great deal of false positives – information
                                                                            that is classified as malicious, but is, in
                               Windstream’s IDPS sensors provide            fact, harmless. Windstream manages
                               “zero hour” protection for the customer      this process for the customer, and has
                               so an organization is protected as           a 99.9999 percent guarantee against
                               soon as threats are launched. When           false positives, ensuring that the IT
                               an anomaly is discovered, both the           professional’s time is spent in the most
                                                                            productive way possible.




                                                                                               INTERNET




                                                                                      FIREWALL &
                                                                                     IDPS PRIMARY

                                              SITE 3                      MPLS
                                                                              FIREWALL &
                                                                             IDPS PRIMARY


                                              SITE 1


                                                                                               INTERNET
                                                              EVENT
                                                           CORRELATION
                                                             SERVERS

                                                                            SITE 2




                               This diagram shows the network infrastructure and how the IDPS works in conjunction
                               with the firewall, and the MPLS cloud, in order to secure the network.




                                                                                                          © Windstream 2012
WHITE PAPER




                     The ROI of IDPS            The manpower and capital resources              In addition, purchasing an IDPS
                                                required to protect against the threat          solution is like buying insurance for an
                                                of malware is significant; however,              organization’s reputation. As malware
                                                Windstream’s IDPS provides network              evolves, network security must keep
                                                protection and a good return on                 pace. If not, companies will continue to
                                                investment for organizations. Since             be at risk for damage to their networks
                                                Windstream’s security engineers                 and reputations. One network security
                                                provide support for the IDPS, the need          breach can bring operations to a
                                                is eliminated for customers to hire             screeching stop. An IDPS works along
                                                additional IT staff, complete extra             with other network security measures
                                                levels of certification, or incur capital        in order to prevent this from happening
                                                costs associated with maintaining               and has proven to be the most effective
                                                multiple security devices and information       response in evading malware threats.
                                                security providers.



                           Conclusion           The best way to provide adequate                data theft. For more information on
                                                security for an organization is to stay         Windstream’s IDPS solution, or to have
                                                informed on threats, analyze                    Windstream evaluate the strength of
                                                vulnerabilities, and work with a partner        your network firewall, visit
                                                that can help you build your security           www.windstream.com.
                                                solution. IDPS is a crucial layer and
                                                Windstream offers the most advanced
                                                solution to protect your network against




    Quick Facts:
    In the first quarter of 2010, nearly 27 percent of malware attacks occurred in the United States – second only to Brazil. While 98
    percent of malware attacks are conducted by nondiscriminating automated systems, 2 percent are sophisticated hackers
    targeting a specific company network.

    Nonetheless, cybercrime acts continue to grow, and remain profitable for the hacker:
                Internet crime in the U.S. increased 23 percent in 2009
                Personal identity sells for $.40 per person on the black market
                Healthcare data, such as dental records, sells for $14 per person




009573 | 3/12                                                                                                             © Windstream 2012

Mais conteúdo relacionado

Mais procurados

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013Imperva
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging ThreatsLumension
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 

Mais procurados (20)

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Information security
Information securityInformation security
Information security
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 

Semelhante a Is Your Network Safe Behind Just A Firewall

Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Erik Ginalick
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityHeritageCyberworld
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 

Semelhante a Is Your Network Safe Behind Just A Firewall (20)

Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Data security
 Data security  Data security
Data security
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber security
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 

Mais de Windstream Enterprise

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Enterprise
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Enterprise
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Enterprise
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Enterprise
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Enterprise
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWindstream Enterprise
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...Windstream Enterprise
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWindstream Enterprise
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWindstream Enterprise
 
White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWindstream Enterprise
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelWindstream Enterprise
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingWindstream Enterprise
 

Mais de Windstream Enterprise (16)

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Maximizing it budget
Maximizing it budgetMaximizing it budget
Maximizing it budget
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
 
Product Information: Cloud Services
Product Information: Cloud ServicesProduct Information: Cloud Services
Product Information: Cloud Services
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHR
 
White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI Perspective
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. Michael
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol Broadcasting
 

Último

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Is Your Network Safe Behind Just A Firewall

  • 1. WHITE PAPER Is Your Network Safe Behind Just A Firewall? Malware Threatens Malicious software or “malware” is the In essence, malware acts like a parasite Network Security biggest network security threat facing on a network. It is designed to infiltrate organizations today. Cybercriminals a computer system without permission. target enterprises that hold a great deal Even the most well-intentioned employee of money or conduct a high volume of may accidentally download malware – transactions on a daily basis. A network such as Zeus (Zbot) – from a Web site intrusion can cost an organization as or open it via an e-mail attachment. The much as $5 million. And, the damage worm then slips past network security to a company’s reputation can be measures and hides against the firewall. irreparable. Statistics show that if a Here, it collects data and absorbs major security breach occurs against private information passing through, a U.S. enterprise, that organization such as credit card numbers, account has a 90 percent chance of going out numbers, or social security numbers. of business within two years. This is The worm then sends that information particularly alarming considering that back to the host, who then sells it to malware is currently the fastest- criminals for identity fraud, e-scams, and growing trend in the misuse of other personally invasive crimes. network resources. The Threat is Real This threat of malware is very real. Just as federal regulators have made Private information is at risk without efforts to protect privacy through the proper network security measures. statutes such as HIPAA, Gramm- Unfortunately, a majority of anti-virus Leach-Bliley, and PCI DSS, compliance programs and network firewalls cannot standards are moving toward required protect against intrusion risks beyond advanced network security measures. viruses and Trojan worms. Organizations have to be smarter than the criminals they’re up against. © Windstream 2012 DATE: 3.27.12 | REVISION: 1 | 009573_Is_Your_Network_Safe | CREATIVE: MF | JOB#: 9573 - Is Your Network Safe | COLOR: 4C | TRIM: 8.5” x 11”
  • 2. WHITE PAPER A Firewall is Not Enough Today’s malware is so advanced that a network. If there is danger lurking firewall alone will still leave a network outside the front door (port connection) vulnerable. A firewall provides a basic and the data finds a way into the home line of defense by allowing or blocking (the network), it will cause an intense connectivity to the network through amount of damage. And, although it’s port connections. Think of a firewall not practical to check your guests’ bags, like a house: it allows you to close and it is necessary to scan all items entering lock the doors and windows you don’t your network to determine if they are want outsiders to have access to, while friend or foe because the network’s keeping them open for welcome visitors. health and safety rely on it. The problem with this defense is that the firewall does not investigate the data that is allowed to enter the doors on the IDPS is the Answer Intrusion Detection and Protection In a 2009 survey, Forrester Research to Malware Systems (IDPS) are the newest line of showed that IDPS is the second most defense in network security and combine in-demand security solution. Many of the two levels of network protection into one: solutions on the market today are either intrusion detection and prevention. These IPS or IDS. Windstream’s IDPS requires systems identify and prevent malware no additional equipment purchases, and intrusion by examining information via has the ability to provide powerful and sensors within the network infrastructure. efficient security while also being cost- effective for the customer. Windstream An Intrusion Detection System (IDS) offers an IDPS solution that outperforms monitors activities on the network by other products in the industry because searching for malware and producing of its ability to minimize risk and cost for reports for the system administrator. an organization. Intrusion Prevention Sensors (IPS) actively block the malware on the network, IDPS is a substantial part of an dropping the malicious data while still enterprise security solution used to allowing normal data to continue on the protect the network. In order to set network. With IDPS, the solution runs up proper network security, layers along the MPLS cloud. If the malware of products, software, and solutions is right on the network’s doorsteps, the need to be in place that protect against technology is efficient enough to detect various threats. Firewalls, anti-virus and prevent it from entering before the programs, access controls, and an IDPS data leaves the cloud. solution are all necessary to achieve effective network security. © Windstream 2012
  • 3. WHITE PAPER How IDPS Works An IDPS keeps risks away from IDPS customer and Windstream’s important data. It acts like a bouncer security operations center are alerted. standing outside of a bar checking IDs: Windstream engineers contact the it detects malware and prevents it from customer about the malicious activity, hanging out along the firewall. The IDPS and also help remediate the problem. is constantly scanning the network for known threats. These threats are Management of an IDPS is just as identified in several ways, including important as purchasing the solution through customer-provided data or Web itself. With current IDS or IPS solutions, security solutions such as McAfee. It is IT professionals need to sift through a also continuously searching the network wall of network data that likely contains a for any possible anomalies. great deal of false positives – information that is classified as malicious, but is, in Windstream’s IDPS sensors provide fact, harmless. Windstream manages “zero hour” protection for the customer this process for the customer, and has so an organization is protected as a 99.9999 percent guarantee against soon as threats are launched. When false positives, ensuring that the IT an anomaly is discovered, both the professional’s time is spent in the most productive way possible. INTERNET FIREWALL & IDPS PRIMARY SITE 3 MPLS FIREWALL & IDPS PRIMARY SITE 1 INTERNET EVENT CORRELATION SERVERS SITE 2 This diagram shows the network infrastructure and how the IDPS works in conjunction with the firewall, and the MPLS cloud, in order to secure the network. © Windstream 2012
  • 4. WHITE PAPER The ROI of IDPS The manpower and capital resources In addition, purchasing an IDPS required to protect against the threat solution is like buying insurance for an of malware is significant; however, organization’s reputation. As malware Windstream’s IDPS provides network evolves, network security must keep protection and a good return on pace. If not, companies will continue to investment for organizations. Since be at risk for damage to their networks Windstream’s security engineers and reputations. One network security provide support for the IDPS, the need breach can bring operations to a is eliminated for customers to hire screeching stop. An IDPS works along additional IT staff, complete extra with other network security measures levels of certification, or incur capital in order to prevent this from happening costs associated with maintaining and has proven to be the most effective multiple security devices and information response in evading malware threats. security providers. Conclusion The best way to provide adequate data theft. For more information on security for an organization is to stay Windstream’s IDPS solution, or to have informed on threats, analyze Windstream evaluate the strength of vulnerabilities, and work with a partner your network firewall, visit that can help you build your security www.windstream.com. solution. IDPS is a crucial layer and Windstream offers the most advanced solution to protect your network against Quick Facts: In the first quarter of 2010, nearly 27 percent of malware attacks occurred in the United States – second only to Brazil. While 98 percent of malware attacks are conducted by nondiscriminating automated systems, 2 percent are sophisticated hackers targeting a specific company network. Nonetheless, cybercrime acts continue to grow, and remain profitable for the hacker: Internet crime in the U.S. increased 23 percent in 2009 Personal identity sells for $.40 per person on the black market Healthcare data, such as dental records, sells for $14 per person 009573 | 3/12 © Windstream 2012