• Like
  • Save

APAC Partner Update: SolarWinds Security

Uploaded on


More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide
  • A firewall is considered a network’s “first line of defense” in protecting sensitive data from unauthorized access. It’s the entry point of the network—determining what is allowed in and out.Without the proper firewall rules in place, your network is left exposed and vulnerable. It’s like leaving your front door open for anyone to come in and take what they want.This is why firewall configuration management is so crucial. Without it, access to your network can become a free-for-all! And, it’s important to remember that SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT, which makes firewall management even more important!
  • NCM provides automated network configuration and change management to reduce the risk of human error and save you time and money. No more having to manually SSH or Telnet to each device. Do everything from one easy-to-use, centralized web interface. Detect and report on configuration policy violations and deliver real-time alerts


  • 1. 1SolarWinds® Security UpdatesPartner TrainingClare Kavanagh, Channel Accounts ManagerAravind Kurapati, APAC GeekJune 2013© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 2. 2» Who we are!» How to discovery security needs» Firewall Security Manager (FSM)» Log & Event Manager (LEM)» Network Configuration Manager (NCM)**We are trying to cover a lot in this presentation! Please usethe question box in the gotomeeting if anything needsclarification or a question comes up.2Agenda© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 3. 3SolarWinds – Who we areProvide IT management softwarethat is powerful, easy-to-use andaffordableCompany backgroundTimeline 1999 Founded in Tulsa, OK2005 Professional Investment2006 Hired Management Team2009 IPO (NYSE:SWI)Headquarters Austin, Texas; over 500employees worldwideCustomers Over 95,000 – from SMB toFortune 500© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 4. 4HELP!!!4My firewall rules are getting out of control! I need to be sure thereare no holes in my configs! I need to know my network is protected!Web server logs, OS logs, application logs, firewalllogs…it’s impossible to read through all of them!Network configuration changes, device backups, inventorymaintenance, compliance reporting…I can’t keep up!Mobile devices are everywhere! I can’t keep trackof which devices are safe and which aren’t!© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 5. 5FirewallManagementHow often do you analyze your firewall configurations?How do you know if your firewalls rules are optimized for both security & performance?How do you test a firewall addition or change to ensure it doesn’t have a negative impact?How do you perform security audits and compliance reporting?Log ManagementHow many log file sources do you review and how often do you review them?How do you know if a breach has occurred and can you respond immediately?How do you handle multiple-event correlation to detect anomalous behavior?How do you handle security and compliance reporting?ConfigurationManagementHow often do you backup the configuration files on your devices?How do you go about deploying configuration changes/updates to multiple devices?How quickly can you recover a device from a failed updated or config change?How are you alerted when a network change is made or a configuration policy violated?Questions to Consider5© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 6. 6Firewall Security Manager© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 7. 7The ProblemAs organizations grow and firewall rules become more and more complex, it’seasy for engineers to overlook existing rules and inadvertently open securityholes simply by not knowing the full impact of their changes.Lets be honest, some firewall rule sets have grown so large and unmanageable,its become virtually impossible to decipher whats going on with the naked eye.7“Through 2018, morethan 95% of firewallbreaches will becaused by firewallmisconfigurations,not firewall flaws.”Gartner research,November 28, 2012© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 8. 8The Need for Easy Firewall ManagementWhich way would you rather manage your firewall configurations?Point-&-Click ManagementComplex Command LineOR8© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 9. 9Firewall Management Best Practices Document all firewall rules and changes Configure firewall rules with minimal access rights Ensure all rules have business justification Implement a change-control policy Remove unused and redundant rules Perform firewall rule audits on an ongoing basis Log all pertinent firewall activity Back up firewall configuration files and logs regularly Automate, automate, automate!9SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 10. 105 Ways SolarWinds FSM Can Help1. Clean up and remove redundant, unused and conflicting rules2. Scan your inventory for high risk firewalls and assess your riskprofile in minutes3. Understand network policy through a unified view of connectivity,routing, and the security rules responsible for allowing or blockingnetwork access4. Know beforehand how a rule change will impact rules/objects,traffic flows, and security checks5. Troubleshoot service availability problems without touchingproduction devices10© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 11. 11Log & Event Manager© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 12. 12The ProblemLog files are generated across almost all of your IT assets—web serverlogs, operating system logs, application logs, firewall logs, and more.And, all of these log files need to be collected, stored, analyzed, andeffectively correlated for security, compliance, and troubleshootingpurposes.12Trying to sort through and decipher allthese logs manually is virtually impossible!© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 13. 13Log Management Best Practices Define your log management policies and procedures Log all relevant and required data (but don’t “over-log”) Centrally aggregate all logged data Review logs on a regularly scheduled basis Correlate events across all log sources Perform real-time monitoring and alerting Run regularly scheduled security and compliance reports Store logs securely and retain for the required amount of time Automate, automate, automate!© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 14. 145 Ways SolarWinds LEM Can Help1. Centralized collection of network device, machine, and cloud logs withreal-time, in-memory log correlation to instantly view security breaches2. Built-in active responses to immediately and automatically take actionto mitigate threats3. Advanced, easy-to-use, search interface with data visualization toolsthat go well beyond ineffective traditional search bars4. Over 300 out-of-the-box, “audit-proven” security and compliancetemplates including PCI, HIPAA, SOX, GLBA and many more5. USB defender technology protects sensitive data from with real-timemonitoring, detection notification and the ability to block usage14© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 15. 15Network Configuration Manager© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 16. 16The ProblemAs enterprise networks grow in both size and complexity, the difficulty inmanaging all the device configuration changes that are happeningthroughout the IT infrastructure grows exponentially.Manually logging in to each device separately to make changes or updatesmeans the likelihood of human error that can lead to policy violations,unauthorized network access, and the possibility of a security breach.Can you afford to take that chance?16© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 17. 17The Need for Easy Network Config ManagementWhich way would you rather manage your network devices?OR17Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 18. 18Configuration Management Best Practices Create standards-based IT security and access policies Implement a change management process to document and track allchanges to the network Establish role-based permissions to control who can make what change Backup critical network device configurations nightly and have a devicerecovery plan in place Perform continuous monitoring with real-time change detection alerts Enforce policies with regularly scheduled security and compliance audits Validate and maintain policies and procedures through ongoing dataanalysis and reviews Automate, automate, automate!© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 19. 195 Ways SolarWinds NCM Can Help1. Automated device configuration management and bulk change managementto save time, reduce errors, and reduce the risk of costly network downtime2. Automatic, scheduled backups of network configurations so your criticaldevices are always protected3. Configuration comparison and immediate rollback of failed changes toinstantly recover a device to a previous “known good” state4. Real-time change detection and alerts to protect against policy violations,unauthorized, unscheduled, and erroneous configuration changes5. Out-the-box compliance reports, along with automated network inventoryreports customizable to your networks needs19© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 20. 20How to Promote and Sell» Deals and Opportunities - Additional margin may be available for net new deals.Contact us with your opportunities as soon as you have them for special pricingPartnersAPAC@solarwinds.com» Leads – Generate your own leads using custom coded download links for your customers.Leads will be automatically tagged to you. Request custom links fromPartnersAPAC@solarwinds.com» Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partnersSales and Technical training Videos Sales cards PresentationsCurrent end-user price listDemo License (NFR) applicationBranding, logos, box shots, screenshotsWhat’s New section for up-to-date information14© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 21. 21Demo Sites» NCM http://configuration.demo.solarwinds.com» FSM http://demo.solarwinds.com/flashdemo/fsm» LEM http://demo.solarwinds.com/flashdemo/lem21
  • 22. 22© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.Summary and Q & A» Clare Kavanagh, Channel Accounts ManagerClare.Kavanagh@solarwinds.com» Aravind Kurapati, APAC Geek» Aravind.Kurapati@solarwinds.com» Join our community of 150,000+ IT pros at www.thwack.comThank you for attending!22
  • 23. 23Q&AQuestions?23© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 24. 24Thank YouThe SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registeredwith the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All otherSolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the UnitedStates or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be orare trademarks or registered trademarks of their respective companies.© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.24