SlideShare a Scribd company logo
1 of 3
Download to read offline
1
forcepoint.com
Customer Story
Forcepoint NGFW Helps the University of Münster
Keep Its Network Open and Safe
This German university relies on Forcepoint to help manage its firewalls efficiently, keep its
network open, and protect against ransomware attacks and other cybercriminal activity.
Article 5 of the German constitution guarantees freedom of science, research and
teaching as fundamental right. This ensures German universities are at the forefront
of research and education, but also creates a challenge for security teams tasked with
staving off the cybersecurity threats they’re facing. Defending against targeted attacks
from cybercriminals and safeguarding the University of Münster’s network is a daunting
challenge for its small IT team. Yet, while other universities in Germany had to shut down
essential systems and services due to ransomware attacks, the University of Münster
stayed up, running and secure by relying on Forcepoint NGFWwith IPS.
CUSTOMER PROFILE:
One of the largest universities
in Germanywith some 45,700
students and 7,100 employees,
including 5,300 academics.
INDUSTRY:
Education
HQ COUNTRY:
Germany
PRODUCT:
Forcepoint Next Generation
Firewall (NGFW)
Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe
2
forcepoint.com
Public organizations in Germany, and especially universities, are
frequently targeted by cybercriminals looking to either deny and
degrade services, steal personal data or intellectual property, or to
extort money by interrupting educational activities. Unfortunately,
specialized hacker networks and foreign organizations found
universities a tempting target. These institutions often have
modern, powerful and wide-ranging networks, enabling malware
to spread very quickly, but the culture of open networks means
that it is difficult to establish powerful security controls. Due to
their prominence in research and development, universities also
offer a rich trove of data, another attraction for bad actors. Over the
last fewyears, multiple German universities have been forced to
shut down large parts of their IT infrastructure for a period of time,
leaving users with no access to email or remote connectivity.
This has caused massive disruptions in some cases and
demonstrated how difficult it is to balance network freedom
with the necessary security controls. The University of Münster,
however, managed this verywell. The IT team became aware of
the risks early and has built up more than 15 years’ experience of
protecting the unprotectable.
The search for a new firewall and IPS leads
to a solution that can handle more than
10 gigabits per second
Founded as a Jesuit seminary in 1588, the University of Münster
plays a significant role in the city of Münster, the state of North
Rhine-Westphalia, and German intellectual life. The university
is housed in more than 300 buildings throughout the city and is
home to the University of Münster Faculty of Medicine.
As one of the most prominent universities in Germany, the network
security team always made security a priority. Since 2004, the
university had an intrusion prevention system (IPS) and firewall
in place, but in 2012 began looking for a new solution. They
considered several vendors and went through proofs of concept
with some of them. In the PoCs, Forcepoint (then known as
Stonesoft) proved to be the most suitable solution.
One of the critical requirements was the need for an IPS that could
handle the volume of traffic and speed the university required—
more than 10 gigabits per second. The university has since
upgraded their external internet connection to 30 gigabit per
second and need to have full IPS protection on all that data without
slowing traffic down. Forcepoint showed it could handle the load
and after a successful proof of concept, the team moved forward
with Forcepoint NGFWwith systems integrator partner Avency.
The Forcepoint NGFW Security Management
Center makes the grade
Today, the university has four NGFW firewall appliances in two
clusters creating 6 virtual contexts. They’ve created secure
network areas for the datacenter and workstations, voice over IP,
guest and remote access services, internet of things, and internal
management, and will soon add an area for administrative staff.
Creating these separate virtual contexts allows the team to set
custom security policies, rules and controls depending on the
area’s function and requirements. However, the IPS configuration
is nearly the same across the contexts and nearly all traffic goes
through the deep packet inspection engines..
Enabling the set up and easy configuration of the virtual contexts
is Forcepoint’s NGFW Security Management Center (SMC).
“The SMC is one of the major benefits to the Forcepoint firewall
solution—it was key to our decision to choose Forcepoint,” said
Guido Wessendorf, Head of Network Security. “It’s very intuitive
to configure and monitor the whole system.”
“It was far better than the management tools of the othervendors
we considered at that time,” said Markus Speer, Head of Central
Network Services.
Challenges
A culture of freedom for science and
teaching means the network needs
to stay open.
Required IPS for >10Gb internet
traffic without slowing down.
Privacy rules prevent security
controls on student, faculty and
staff personal devices.
High profile ransomware attacks
crippled other German universities.
Approach
Implement Forcepoint Next
Generation Firewall with Intrusion
Prevention System.
Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe
3
forcepoint.com/contact
One of the ways the SMC makes managing the firewalls easier
is via its API function. Forcepoint has built a robust community
among the German universities in which security professionals
connect and exchange tips and hints to best manage their
Forcepoint firewalls. One of those tips was the usage of
recommended IP blocklists—the user community exchanged
scripts on how to import and install them via the Forcepoint API
into the SMC. This led to University of Münster seeing 100 million
discards (a firewall terminate or denial to malicious hosts) per day
just due the IP block list, out of a total 150 million denials each day.
“With only a small team, we need systems that manage much of
our daily activities automatically,” Wessendorf said. “The import
of the block list, automatic receiving of Forcepoint updates,
and the intrusion prevention policies all help us manage our
firewalls efficiently.”
Even in an unusually difficult security environment,
Forcepoint helps the University of Münster stay
ransomware-free
Making the security situation even more challenging for the team
is that a large number of the PCs, laptops, phones and tablets
used by the students, faculty and staff are “user-managed” not
“university-managed.” This means that there can be no specific
controls on the personal systems. Often firewalls will utilize HTTPs
decryption to look into web traffic data packets and find malicious
code, but it’s not possible in this scenario because of privacy
restrictions protecting personal PC usage.
During a normal study day, around 20,000 users are
simultaneously connected with their own, unprotected laptops,
tablets and smartphones to the university’s WiFi network. Those
devices and all the other approximately 30,000 registered
university end systems could be infected with ransomware that
needs to download additional keys or software in order to activate,
but is blocked from doing so by the Forcepoint firewall solution.
“The IP block lists we imported along with the built in Forcepoint
block lists, the Forcepoint Threatseeker Intelligence Network
updates and the IPS functionality all work together to stop
the attempts of malicious software on our systems to access
command and control functions and establish ransomware locally,”
Wessendorf explains. “Therefore, we assume, we’ve had no
ransomware situations yet, due to that fact.”
A supportive university community delivers
benefits to Forcepoint customers
When peers in similar security roles ask for a review of Forcepoint
NGFW, “Normally I invite them to come to my desk and let them
look at the solution,” explains Wessendorf. “The SMC shows how
easy it is to use, configure and manage—the demonstration speaks
louder than words.”
As one of the first universities in Germany to select and implement
the Forcepoint NGFW, the longevity of the relationship also
demonstrates the value. The university’s network security team
appreciates the ability to connect with the Forcepoint firewall
product development team in Finland. “We have an open
opportunity to share feature requests and give input into what we
will require in the coming years,” Speer said. “Having that direct
contact and deep working relationship with Forcepoint is really
an advantage.”
In addition to the product itself, the support from Forcepoint and
the community they’ve built around German universities using
NGFW is unique. The members are all experts in using NGFW and
the SMC so it’s a very good resource, according to Wessendorf.
“I really have to say this kind of support and cooperation is unheard
of in other university circles. It really produces benefits for its
members,” said Speer.
Results
› 150 million firewall blocks of
connections per day.
› No successful ransomware attacks.
› Part of a supportive German
university community around
Forcepoint network security.
“I really have to say this kind
of support and cooperation
is unheard of in other
university circles.”
MARKUS SPEER, HEAD OF CENTRAL
NETWORK SERVICES
© 2020 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
[WWU Münster-Customer-Story-US-EN] 04Nov2020

More Related Content

Similar to Forcepoint NGFW Helps University of Münster Protect Network

Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSIJNSA Journal
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Threat intelligence platform explained
Threat intelligence platform explainedThreat intelligence platform explained
Threat intelligence platform explainedMindy Kam
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guideAndy Kwong
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39Felipe Prado
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfSecurityGen1
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationSecurityGen1
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview Security Gen
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 

Similar to Forcepoint NGFW Helps University of Münster Protect Network (20)

Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Threat intelligence platform explained
Threat intelligence platform explainedThreat intelligence platform explained
Threat intelligence platform explained
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
Forensics
ForensicsForensics
Forensics
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
The red book
The red book  The red book
The red book
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
CaselliM_CV
CaselliM_CVCaselliM_CV
CaselliM_CV
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 

More from Kim Cook

White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of DataKim Cook
 
eBook: Level Up Your Data Security with Tokenization
eBook: Level Up Your Data Security with TokenizationeBook: Level Up Your Data Security with Tokenization
eBook: Level Up Your Data Security with TokenizationKim Cook
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Customer Story: Indian Farm Equipment
Customer Story: Indian Farm EquipmentCustomer Story: Indian Farm Equipment
Customer Story: Indian Farm EquipmentKim Cook
 
ALTR Company Overview 2023
ALTR Company Overview 2023ALTR Company Overview 2023
ALTR Company Overview 2023Kim Cook
 
ALTR Redwood Logistics Case Study
ALTR Redwood Logistics Case StudyALTR Redwood Logistics Case Study
ALTR Redwood Logistics Case StudyKim Cook
 
E2open Corporate Overview
E2open Corporate OverviewE2open Corporate Overview
E2open Corporate OverviewKim Cook
 

More from Kim Cook (7)

White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
 
eBook: Level Up Your Data Security with Tokenization
eBook: Level Up Your Data Security with TokenizationeBook: Level Up Your Data Security with Tokenization
eBook: Level Up Your Data Security with Tokenization
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Customer Story: Indian Farm Equipment
Customer Story: Indian Farm EquipmentCustomer Story: Indian Farm Equipment
Customer Story: Indian Farm Equipment
 
ALTR Company Overview 2023
ALTR Company Overview 2023ALTR Company Overview 2023
ALTR Company Overview 2023
 
ALTR Redwood Logistics Case Study
ALTR Redwood Logistics Case StudyALTR Redwood Logistics Case Study
ALTR Redwood Logistics Case Study
 
E2open Corporate Overview
E2open Corporate OverviewE2open Corporate Overview
E2open Corporate Overview
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Forcepoint NGFW Helps University of Münster Protect Network

  • 1. 1 forcepoint.com Customer Story Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe This German university relies on Forcepoint to help manage its firewalls efficiently, keep its network open, and protect against ransomware attacks and other cybercriminal activity. Article 5 of the German constitution guarantees freedom of science, research and teaching as fundamental right. This ensures German universities are at the forefront of research and education, but also creates a challenge for security teams tasked with staving off the cybersecurity threats they’re facing. Defending against targeted attacks from cybercriminals and safeguarding the University of Münster’s network is a daunting challenge for its small IT team. Yet, while other universities in Germany had to shut down essential systems and services due to ransomware attacks, the University of Münster stayed up, running and secure by relying on Forcepoint NGFWwith IPS. CUSTOMER PROFILE: One of the largest universities in Germanywith some 45,700 students and 7,100 employees, including 5,300 academics. INDUSTRY: Education HQ COUNTRY: Germany PRODUCT: Forcepoint Next Generation Firewall (NGFW)
  • 2. Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe 2 forcepoint.com Public organizations in Germany, and especially universities, are frequently targeted by cybercriminals looking to either deny and degrade services, steal personal data or intellectual property, or to extort money by interrupting educational activities. Unfortunately, specialized hacker networks and foreign organizations found universities a tempting target. These institutions often have modern, powerful and wide-ranging networks, enabling malware to spread very quickly, but the culture of open networks means that it is difficult to establish powerful security controls. Due to their prominence in research and development, universities also offer a rich trove of data, another attraction for bad actors. Over the last fewyears, multiple German universities have been forced to shut down large parts of their IT infrastructure for a period of time, leaving users with no access to email or remote connectivity. This has caused massive disruptions in some cases and demonstrated how difficult it is to balance network freedom with the necessary security controls. The University of Münster, however, managed this verywell. The IT team became aware of the risks early and has built up more than 15 years’ experience of protecting the unprotectable. The search for a new firewall and IPS leads to a solution that can handle more than 10 gigabits per second Founded as a Jesuit seminary in 1588, the University of Münster plays a significant role in the city of Münster, the state of North Rhine-Westphalia, and German intellectual life. The university is housed in more than 300 buildings throughout the city and is home to the University of Münster Faculty of Medicine. As one of the most prominent universities in Germany, the network security team always made security a priority. Since 2004, the university had an intrusion prevention system (IPS) and firewall in place, but in 2012 began looking for a new solution. They considered several vendors and went through proofs of concept with some of them. In the PoCs, Forcepoint (then known as Stonesoft) proved to be the most suitable solution. One of the critical requirements was the need for an IPS that could handle the volume of traffic and speed the university required— more than 10 gigabits per second. The university has since upgraded their external internet connection to 30 gigabit per second and need to have full IPS protection on all that data without slowing traffic down. Forcepoint showed it could handle the load and after a successful proof of concept, the team moved forward with Forcepoint NGFWwith systems integrator partner Avency. The Forcepoint NGFW Security Management Center makes the grade Today, the university has four NGFW firewall appliances in two clusters creating 6 virtual contexts. They’ve created secure network areas for the datacenter and workstations, voice over IP, guest and remote access services, internet of things, and internal management, and will soon add an area for administrative staff. Creating these separate virtual contexts allows the team to set custom security policies, rules and controls depending on the area’s function and requirements. However, the IPS configuration is nearly the same across the contexts and nearly all traffic goes through the deep packet inspection engines.. Enabling the set up and easy configuration of the virtual contexts is Forcepoint’s NGFW Security Management Center (SMC). “The SMC is one of the major benefits to the Forcepoint firewall solution—it was key to our decision to choose Forcepoint,” said Guido Wessendorf, Head of Network Security. “It’s very intuitive to configure and monitor the whole system.” “It was far better than the management tools of the othervendors we considered at that time,” said Markus Speer, Head of Central Network Services. Challenges A culture of freedom for science and teaching means the network needs to stay open. Required IPS for >10Gb internet traffic without slowing down. Privacy rules prevent security controls on student, faculty and staff personal devices. High profile ransomware attacks crippled other German universities. Approach Implement Forcepoint Next Generation Firewall with Intrusion Prevention System.
  • 3. Forcepoint NGFW Helps the University of Münster Keep Its Network Open and Safe 3 forcepoint.com/contact One of the ways the SMC makes managing the firewalls easier is via its API function. Forcepoint has built a robust community among the German universities in which security professionals connect and exchange tips and hints to best manage their Forcepoint firewalls. One of those tips was the usage of recommended IP blocklists—the user community exchanged scripts on how to import and install them via the Forcepoint API into the SMC. This led to University of Münster seeing 100 million discards (a firewall terminate or denial to malicious hosts) per day just due the IP block list, out of a total 150 million denials each day. “With only a small team, we need systems that manage much of our daily activities automatically,” Wessendorf said. “The import of the block list, automatic receiving of Forcepoint updates, and the intrusion prevention policies all help us manage our firewalls efficiently.” Even in an unusually difficult security environment, Forcepoint helps the University of Münster stay ransomware-free Making the security situation even more challenging for the team is that a large number of the PCs, laptops, phones and tablets used by the students, faculty and staff are “user-managed” not “university-managed.” This means that there can be no specific controls on the personal systems. Often firewalls will utilize HTTPs decryption to look into web traffic data packets and find malicious code, but it’s not possible in this scenario because of privacy restrictions protecting personal PC usage. During a normal study day, around 20,000 users are simultaneously connected with their own, unprotected laptops, tablets and smartphones to the university’s WiFi network. Those devices and all the other approximately 30,000 registered university end systems could be infected with ransomware that needs to download additional keys or software in order to activate, but is blocked from doing so by the Forcepoint firewall solution. “The IP block lists we imported along with the built in Forcepoint block lists, the Forcepoint Threatseeker Intelligence Network updates and the IPS functionality all work together to stop the attempts of malicious software on our systems to access command and control functions and establish ransomware locally,” Wessendorf explains. “Therefore, we assume, we’ve had no ransomware situations yet, due to that fact.” A supportive university community delivers benefits to Forcepoint customers When peers in similar security roles ask for a review of Forcepoint NGFW, “Normally I invite them to come to my desk and let them look at the solution,” explains Wessendorf. “The SMC shows how easy it is to use, configure and manage—the demonstration speaks louder than words.” As one of the first universities in Germany to select and implement the Forcepoint NGFW, the longevity of the relationship also demonstrates the value. The university’s network security team appreciates the ability to connect with the Forcepoint firewall product development team in Finland. “We have an open opportunity to share feature requests and give input into what we will require in the coming years,” Speer said. “Having that direct contact and deep working relationship with Forcepoint is really an advantage.” In addition to the product itself, the support from Forcepoint and the community they’ve built around German universities using NGFW is unique. The members are all experts in using NGFW and the SMC so it’s a very good resource, according to Wessendorf. “I really have to say this kind of support and cooperation is unheard of in other university circles. It really produces benefits for its members,” said Speer. Results › 150 million firewall blocks of connections per day. › No successful ransomware attacks. › Part of a supportive German university community around Forcepoint network security. “I really have to say this kind of support and cooperation is unheard of in other university circles.” MARKUS SPEER, HEAD OF CENTRAL NETWORK SERVICES © 2020 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of their respective owners. [WWU Münster-Customer-Story-US-EN] 04Nov2020