Desktop Firewall

Views:
 
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

World’s first driver-centric desktop firewall with central control for corporate laptops:

World’s first driver-centric desktop firewall with central control for corporate laptops www.NetOp U S A .com

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

What is a Firewall? ...:

What is a Firewall? ... Perimeter Firewalls This is the traditional firewall used today by most companies that are connected to the Internet. Its primary objective is to protect computers behind the firewall from unwanted data packets originating from the Internet. Once a PC is through the firewall, there is no control. Often the firewall applies a technology called Network Address Translation (NAT) that makes the internal computers invisible to computers on the Internet. They will see all data packets as coming from the firewall itself. Most Perimeter Firewalls are dedicated computers running firewall software on top of a highly customized operating system.

What is a Firewall? ...:

What is a Firewall? ... Standard Personal Firewalls (computer centric) After a while companies started to realize that a Perimeter Firewall was not enough. A single computer located behind a Perimeter Firewall could communicate unrestricted ly with any internal computer and jeopardize the security of the entire network . A Personal Firewall is firewall software with a local configuration running on top of a standard operating system . I ts purpose is to protect the computer itself.

What is a Firewall? ...:

What is a Firewall? ... Distributed Personal Firewalls A Distributed Personal Firewall is a personal firewall with a centrally managed configuration running on top of a standard operating system . I ts purpose is to protect all computers on your corporate . These distributed personal firewalls are usually centrally managed by a Policy Server and console . A distributed personal firewall include s all standard personal firewall features.

What is a Firewall? ...:

What is a Firewall? ... Comparing the different types of firewalls Perimeter Firewall External attacks Internal attacks Easy administration Standalone Personal Firewall External attacks Internal attacks Easy administration Distributed Personal Firewall External attacks Internal attacks Easy administration ü û û ü ü ü ü ü ü

What is a Firewall? ...:

What is a Firewall? ... The main problem By analyzing the reason for security breaches in corporations over 70 % of all incidents are caused by computers within the Perimeter Firewall. Further investigations reveal that some of the biggest problems occur when laptop computers are connect ed to a number of unknown networks in airports, hotels, customer sites and home offices while they are outside the Perimeter Firewall. The trend of more and more wireless networks and an increasing number of laptop computers emphasizes th is security risk. Laptop Computer Perimeter Firewall Internal Computer

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

Packet Filtering:

Packet Filtering IP Filtering Each IP packet, which is sent to or through a firewall, is evaluated by a set of dynamic or static rules. Unwanted or malicious IP packets can be blocked if certain criteria such as the source and destination IP addresses, protocol type, source or destination port are met. Perimeter Firewall Internal Computer External Computer ü û

Packet Filtering …:

Packet Filtering … Example Below is a rule defining that only IP packets normally used for web browser traffic are allowed to reach any computer on the Internet. <129.142.88.27><192.168.1.1>><443><1431><TCP><34EF456CAB29><23450A9> Any Any 80 Any TCP <dest. addr.><source addr.><dest. port><source port><protocol><data><checksum> ü û ü ü ü û

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

Process Control:

Process Control Processes Whenever a program or a service is loaded into memory the operating system starts it as a process. A process consists of code written by a programmer for a specific operating system. These code lines can be part of a friendly program like a word processor, but they can also be part of a malicious program like a worm or Trojan horse. Viewing processes In the Windows task Manager you can see the different programs and services.

Process Control …:

Process Control … What is Process Control? This is a validation check against a process control program database to determine the following conditions for a process: May a process be loaded at all? May a running process communicate with the network? The database contains signatures that uniquely identifies each defined process which prevents renaming fraud and identifies process hijacking . ü ?

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

NetOp Desktop Firewall:

NetOp Desktop Firewall Centrally controlled, distributed personal firewall The NetOp Desktop Firewall is a true driver based firewall client designed specifically to meet the needs of corporate business and it consists of the following main functionality: Process Control Packet Filtering Local or centrally managed configuration

NetOp Desktop Firewall …:

NetOp Desktop Firewall … Key features NDIS Miniport Driver and TDI Driver based firewall. Profile system with automatic Network detection rules. Secure Component Checking and protection against Process Hijacking. Deny unknown processes from executing. Firewall rules are active the moment the operating system has a network connection. Stealth ports. Advanced event logging and real time packet view. Bi-directional blocking of ports and protocols. Bi-directional control of trusted networks. Bi-directional control of banned networks. Encrypted communication. Maintenance password. Gigabit & Wireless Compatibility. Low system overhead. MSI Installation.

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

NetOp Policy Server:

NetOp Policy Server Distributed NetOp Desktop Firewalls NetOp Desktop Firewall can optionally be centrally managed by the NetOp Policy Server. It includes the modules NetOp Policy Server Console, Master Server and Replica Server. Control NetOp Desktop Firewalls Centralized Management Master Server Replica Servers Desktop Firewalls Console

NetOp Policy Server …:

NetOp Policy Server … Key features Administration from a decentralized Policy Server Console. Master Server holding main Security Policies and log information. Multiple Replica Servers for fault tolerance and load distribution. Manage and monitor Master and Replica Servers in real-time. Manage multiple administrators for work load delegati on . All Desktop Firewall configuration organized in Security Policies for easy management. Use Microsoft Active Directory Security Groups to apply Security Policies to computers. The administrator can stop all Internet access instantly. Advanced statistics and logging for trouble shooting and load monitoring.

Product Presentation:

Product Presentation What is a firewall? Packet Filtering Process Control NetOp Desktop Firewall NetOp Policy Server Examples of usage

Example 1:

Example 1 Silent monitoring of process activity The NetOp Desktop Firewalls are running in a non-restrictive mode monitoring process information. The process information is sent to the Policy Server and stored in the Master Server database. From the Policy Server Console the administrator can now filter the process information and analyze the results. Based on the results the administrator can apply Security Policies for specific unwanted processes like games, file sharing services and peer-to-peer programs. 1 3 2 2 1 3

Example 2:

Example 2 Mobile computers using different Profiles depending on location While connected to the internal network the Policy Server has applied a very strict profile that only allows approved programs to run and communicate. When the laptop user leaves the company and connects directly to the Internet, a different profile allows the user to temporarily approve programs. After the laptop user returns to the internal network the strict profile is automatically applied again and prevents any programs that were temporary approved to run , protecting the internal network from malicious or unauthorized programs. 2 1 3 1 3 2

Example 3:

Example 3 Working in unsafe environment like a public access wireless network Working in an unshielded environment like public hotspots or airports any computer has access to perform direct attacks at your laptop computer. Using NetOp Desktop Firewall will completely stealth the presence of you r laptop by only allowing outbound packets for specific programs, ports and protocols. 2 1 1 2

Example 4:

Example 4 Emergency computer lock down An unknown malicious process runs rampant through the network spreading from computer to computer. Time is critical during the initial moments like this. From the Policy Server Console the administrator can within seconds perform an emergency lock down of NetOp Desktop Firewall computers. Once the process has been identified a Security Policy can be applied and the NetOp Desktop Firewalls computers can be re-opened. 2 1 3 3 2 1

World’s first driver-centric desktop firewall with central control for corporate laptops:

World’s first driver-centric desktop firewall with central control for corporate laptops www.NetOp U S A .com

authorStream Live Help