SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
UPGRADING YOUR FIREWALL?
IT’S TIME FOR AN INLINE SECURITY
FABRIC
Ajay Pandey, MS(Boston), LL.B, CCIE #14792 (R&S/Sec), CISSP, CISA
Enterprise Solutions Architect - APAC
2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
106 / hour 66%Growth in information-based security
incidents from 2014 to 20152
25%Chance that your organization will be
breached over next 24 months3
$550kAverage cost of unplanned outage for
enterprises, growing 15% annually2
Average number of malware hits1
1 ZK Research Study for Ixia, April 2016
ATTACKS CONTINUE TO RISE
2 Kaspersky Lab, Cost of Security Breaches, September 2015
3 Ponemon Institute, Data Breach Study, May 2015
3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Server
Switch
Switch
Switch
 Single points of failure
 Administrative tension
 Tools not used efficiently
 Difficult to scale
INLINE SECURITY IS EXPANDING
4© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
• Increased risk of downtime
• Upgrade disruption
• Inefficient use of budget and limit on ROI
• Difficult to scale
• Incomplete security monitoring
DISADVANTAGES OF CURRENT PRACTICES
5© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
INCREASED RISK OF DOWNTIME
6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
ELIMINATE DOWNTIME FROM TOOL
FAILURES
Monitored Tool Links via Heartbeat Packets
7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
UPGRADE & MAINTENANCE DISRUPTIONS
8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
ELIMINATE UPGRADE / MAINTENANCE DISRUPTION
Monitored Tool Links via Heartbeat Packets
9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
INEFFICIENT CAPACITY UTILIZATION
10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
MAXIMIZE CAPACITY USAGE
Bypass Switch
Bypass Switch
Network Packet
Broker (NPB)
• Aggregate security tool
capacity
• Selectively route traffic
to security tools
Monitored Tool Links via Heartbeat Packets
11© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
DIFFICULT TO SCALE CAPACITY
12© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
SIMPLE CAPACITY SCALABILITY
Bypass Switch
Bypass Switch
Network Packet
Broker (NPB)
• Aggregate security tool
capacity
• Selectively route traffic
to security tools
• Load balance traffic
across security tools
13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
SINGLE POINT OF FAILURE
Bypass Switch
Bypass Switch
Network Packet
Broker (NPB)
14© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Inline
Security
Tool Farm
Switch
Server
Switch
Server
Switch Switch
Bypass Switch
Bypass Switch
High-Availability (HA)
Network Packet Brokers
HIGH AVAILABILITY IXIA SECURITY FABRICTM
15© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Inline
Security
Tool Farm
Switch
Server
Switch
Server
Switch Switch
Bypass switch
Bypass switch
Out-of-band
sandboxing
CONNECT OUT-OF-BAND SECURITY TOOLS
High-Availability (HA)
Network Packet Brokers
16© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Reduce Network Downtime
• Failsafe inline security deployments
• HA configuration with no single points of failure
Increase Tool Efficiency
• Intelligent routing of traffic based on content
• Load balancing reduces congestion and extends tool life
Improve Inspection and Security Monitoring
• Increase monitored network segments
• Improve security resilience with HA configuration
SUMMARY
Benefits of Deploying Ixia Security Fabric
17© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
CYBER RANGE SCENARIO EXAMPLE
18© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
18
BREAKINGPOINT PERFORMANCE #S (BANDWIDTH PER
CHASSIS)
960Gbps
Apps Throughput
Applications
24Million
TCP CPS
Connection Rate
720
Capacity
Million
HTTP CC
12M
SSL Capacity
Concurrent
SSL Flows
2.4M
SSL CPS
SSL
Connection Rate
240
SSL Throughput
Gbps
SSL Throughput
Performance in two-arm mode,
With clients and servers simulated on same blade
19© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
20© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
THANK YOU

Mais conteúdo relacionado

Mais procurados

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 

Mais procurados (20)

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
Ivan dragas get ahead of cybercrime
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrime
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 

Destaque

Destaque (20)

Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Where Do We Go From Here / Qualisystems - IXIA in a joint presentation
Where Do We Go From Here / Qualisystems - IXIA in a joint presentationWhere Do We Go From Here / Qualisystems - IXIA in a joint presentation
Where Do We Go From Here / Qualisystems - IXIA in a joint presentation
 
Summit x480
Summit x480Summit x480
Summit x480
 
IXIA IxChariot
IXIA IxChariotIXIA IxChariot
IXIA IxChariot
 
Summit x870
Summit x870Summit x870
Summit x870
 
Summit x670 g2
Summit x670 g2Summit x670 g2
Summit x670 g2
 
Summit x620
Summit x620Summit x620
Summit x620
 
IXIA NVS Vision one
IXIA NVS Vision oneIXIA NVS Vision one
IXIA NVS Vision one
 
Connected Car Platform (CC-p)
Connected Car Platform (CC-p) Connected Car Platform (CC-p)
Connected Car Platform (CC-p)
 
Hawkeye proactive-monitoring-ru-new
Hawkeye proactive-monitoring-ru-newHawkeye proactive-monitoring-ru-new
Hawkeye proactive-monitoring-ru-new
 
Q3'16 investor-deck 20161111
Q3'16 investor-deck 20161111Q3'16 investor-deck 20161111
Q3'16 investor-deck 20161111
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
the age of cryptocurrency at Devoxx Morocco
the age of cryptocurrency at Devoxx  Moroccothe age of cryptocurrency at Devoxx  Morocco
the age of cryptocurrency at Devoxx Morocco
 

Semelhante a Upgrading Your Firewall? Its Time for an Inline Security Fabric

QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
Risk Analysis Consultants, s.r.o.
 

Semelhante a Upgrading Your Firewall? Its Time for an Inline Security Fabric (20)

Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise Security
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
 
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Are you putting your organization at risk?
Are you putting your organization at risk?Are you putting your organization at risk?
Are you putting your organization at risk?
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility Solution
 

Mais de Rahul Neel Mani

Mais de Rahul Neel Mani (20)

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo HospitalsSMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
 
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas TripathiPreparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
 
Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)
 
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh BatraIT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh Batra
 
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...
 
Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?
 
Becoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to ThriveBecoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to Thrive
 
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
 
Preventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical ElementsPreventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical Elements
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Upgrading Your Firewall? Its Time for an Inline Security Fabric

  • 1. 1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | UPGRADING YOUR FIREWALL? IT’S TIME FOR AN INLINE SECURITY FABRIC Ajay Pandey, MS(Boston), LL.B, CCIE #14792 (R&S/Sec), CISSP, CISA Enterprise Solutions Architect - APAC
  • 2. 2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 106 / hour 66%Growth in information-based security incidents from 2014 to 20152 25%Chance that your organization will be breached over next 24 months3 $550kAverage cost of unplanned outage for enterprises, growing 15% annually2 Average number of malware hits1 1 ZK Research Study for Ixia, April 2016 ATTACKS CONTINUE TO RISE 2 Kaspersky Lab, Cost of Security Breaches, September 2015 3 Ponemon Institute, Data Breach Study, May 2015
  • 3. 3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Server Switch Switch Switch  Single points of failure  Administrative tension  Tools not used efficiently  Difficult to scale INLINE SECURITY IS EXPANDING
  • 4. 4© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | • Increased risk of downtime • Upgrade disruption • Inefficient use of budget and limit on ROI • Difficult to scale • Incomplete security monitoring DISADVANTAGES OF CURRENT PRACTICES
  • 5. 5© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch INCREASED RISK OF DOWNTIME
  • 6. 6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches ELIMINATE DOWNTIME FROM TOOL FAILURES Monitored Tool Links via Heartbeat Packets
  • 7. 7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch UPGRADE & MAINTENANCE DISRUPTIONS
  • 8. 8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches ELIMINATE UPGRADE / MAINTENANCE DISRUPTION Monitored Tool Links via Heartbeat Packets
  • 9. 9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches INEFFICIENT CAPACITY UTILIZATION
  • 10. 10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch MAXIMIZE CAPACITY USAGE Bypass Switch Bypass Switch Network Packet Broker (NPB) • Aggregate security tool capacity • Selectively route traffic to security tools Monitored Tool Links via Heartbeat Packets
  • 11. 11© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches DIFFICULT TO SCALE CAPACITY
  • 12. 12© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch SIMPLE CAPACITY SCALABILITY Bypass Switch Bypass Switch Network Packet Broker (NPB) • Aggregate security tool capacity • Selectively route traffic to security tools • Load balance traffic across security tools
  • 13. 13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch SINGLE POINT OF FAILURE Bypass Switch Bypass Switch Network Packet Broker (NPB)
  • 14. 14© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Inline Security Tool Farm Switch Server Switch Server Switch Switch Bypass Switch Bypass Switch High-Availability (HA) Network Packet Brokers HIGH AVAILABILITY IXIA SECURITY FABRICTM
  • 15. 15© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Inline Security Tool Farm Switch Server Switch Server Switch Switch Bypass switch Bypass switch Out-of-band sandboxing CONNECT OUT-OF-BAND SECURITY TOOLS High-Availability (HA) Network Packet Brokers
  • 16. 16© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Reduce Network Downtime • Failsafe inline security deployments • HA configuration with no single points of failure Increase Tool Efficiency • Intelligent routing of traffic based on content • Load balancing reduces congestion and extends tool life Improve Inspection and Security Monitoring • Increase monitored network segments • Improve security resilience with HA configuration SUMMARY Benefits of Deploying Ixia Security Fabric
  • 17. 17© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | CYBER RANGE SCENARIO EXAMPLE
  • 18. 18© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 18 BREAKINGPOINT PERFORMANCE #S (BANDWIDTH PER CHASSIS) 960Gbps Apps Throughput Applications 24Million TCP CPS Connection Rate 720 Capacity Million HTTP CC 12M SSL Capacity Concurrent SSL Flows 2.4M SSL CPS SSL Connection Rate 240 SSL Throughput Gbps SSL Throughput Performance in two-arm mode, With clients and servers simulated on same blade
  • 19. 19© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
  • 20. 20© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | THANK YOU