SlideShare a Scribd company logo
1 of 28
Download to read offline
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP TippingPoint IPS
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Защита предприятия в современном
контексте
Архитектура используемых решений усложняется
Контрразведка стала обязательным элементом
сетевой безопасности
Серьезное давление на периметр, BYOD и т.д.
Понимание контекста приложений необходимо
для противодействия современным атакам
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Advanced Threat Appliance (ATA)
• Лучший анализ сетевого трафика на содержание вредоносного кода,
более 100 протоколов
• Расширенная защита и выявление заражения “patientzero
Семейство продуктов HP TippingPoint
Integrated
Policy
Integrated
Policy
Next-Generation Firewall
(NGFW)
• NGIPS интегрированый с МЭ
• Детектирование протоколв
приложений
• Высокая производительность,
в сочетании с низкой
стоимостью владения
In-line Threat Protection with
Next-Generation Intrusion
Prevention (NGIPS)
• Инновационные технологии
интеграции в инфраструктуру
• Надежная аппаратная
платформа,Uptime 99,99%
• Уникальная
производительность во время
действующей «Атаки»
• Защита инфраструктуры и
приложений
Security Management System
(SMS)
• Централизованное управление
NGIPS, NGFW and ATA
• Единое управление политиками и
управление устройствами ТР
Digital Vaccine Labs (DVLabs)
• Исследовательская лаборатория
• Инициатива zero-day
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
NGIPS - матрица устройств
Сегменты [пар портов]
Производительность[Mbps]
20
up to24
TippingPoint 6200NX, 2600NX,5200NX
3 Gbps, 5 Gbps, 10 Gbps
4
TippingPoint S110, S330
100 Mbps , 300 Mbps
2 10/11
TippingPoint 660N, 1400N
750 Mbps, 1,5
Gbps
20.000 TippingPoint 7100NX, 7500NX
15 Gbps, 20 Gbps
TippingPointS10
20 Mbps
up to24
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Сильные стороны HP TippingPoint
Надежность
NGIPS с
рекордной
доступностью в
99.99999%
Простота
Простота
использования,
управления и
эффективные
настройки по-
умолчанию
Эффективнос
ть
Лучшая в отрасли
исследовательска
я лаборатория
DVLabs
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Простота – это важно!
• Ввод в работу в течение минут
• Графический интерфейс с
особым упором на простоту
использования
• Общая система управления для
всей линейки решений NGIPS и
NGFW
• Высокая эффективность
настроек по-умолчанию
• HP Vertica Big Data для хранения
журналов
• ДокументированныйAPI,
интеграция с HPArcSight“60% of customers deploy with
recommended settings.” – Frost & Sullivan
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Filter-Store
• MODBUS
• DNP3
• ICCP
• InduSoft
WebStudio
• WellinTech
• DATAC
RealWin
• GE
• Schneider
Electric
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Надежность
• доступность NGIPS на уровне
99.99999%
• Прозрачное подключение
“bump in the wire”, VRRP,
OSPF, HSRP
• Два режима обеспечения
надежности
• Routing Active-Passive HA
• Transparent with bypass
• SSD диски, два блока
питания
• Низкая задержка при
обработке сетевого пакета
менее 40 микросекунд
• Обновление TOS без
перезапуска устройства
• ZPHA– замена шасси без
2x  10GbE  SFP+  ZPHA
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Эффективность
• Большой опыт в данной области (2005 voip, 2007 scada)
• Более 1,100 фильтров 800+ приложений
• Ограничение полосы, блокировка, карантин, уведомление
• Pandora
• Netflix
• Spotify
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Effective
DVLabs Research & QA~3,000+ independent researchers
• 8,200+ filters right out of the box
• ~3,000 contributing security
researchers
• Proven accuracy with minimal false
positives
• Repeatable results week over week
• Optimize network performance and
protect business critical applications
Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan and Microsoft Advisory
0
20
40
60
80
100
Identified High Severity Vulnerabilities
HPTippingPoint
US-CERT
Secunia
IBMISS
VUPEN
Security
CoreSecurity
Codemonicon
Labs
VerisigniDefense
High-TechBridge
0
50
100
150
200
250
300
350
Microsoft Advisory Acknowledgments
2006 2007 2008 2009 2010 2011 2012 2013 2014
HPTippingPoint
McAfee
IBM
SourceFire
CheckPoint
Fortinet
PaloAlto
Dell
Cisco
Stonesoft
! Vulnerability-based Filter !
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Исследовательская лаборатория DV Labs
DVLabs Services:
• Digital Vaccine
• ReputationDV
• CustomDV
• ThreatLinQ
• Lighthouse Program
Leading security research
and filter development with
30+ dedicated researchers
DVLabs Research & QA
Partners
SANS, CERT, NIST, etc.
Software & reputation vendors
2,000+ customers participating
~3,000+ independent researchers
Note: All figures are rounded. The base year is CY 2012. Source: Frost & Sullivan analysis
Analysis of Vulnerabilities by Severity
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Frost and Sullivan Market
Share Leadership Award за
вклад в работу по
обнаружению уязвимостей
4 года подряд!
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Digital Vaccine обеспечивает большую
эффективность
• DV фокусируется на первопричине уязвимости,
чтобы одним фильтром обеспечить защиту от
нескольких эксплойтов
• Всегда существует несколько вариантов эксплойтов
• Обнаружение каждой конкретной реализации эксплойта, все
равно что вычерпывать воду из дырявой лодки
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP TippingPoint DVLabs
Анализ уязвимостей
§ Покупка 0-day и анализ
уязвимостей с помощью Zero
Day Initiative (ZDI)
§ Поиск уязвимостей в широко
известном ПО
§ Направленный анализ новых
технологий атаки
Анализ вредоносов
§ Репутационная база узлов
сети Интернет
§ Репутационная база URL
§ Глубокий анализ для
выявления ключевых
признаков
Weekly updates for to stay ahead of the threats
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP TippingPoint применения для АСУ ТП
• Исследование уязвимостей в АСУ ТП
• Разработка фильтров Digital Vaccine для АСУ ТП
• Детектирование и разбор событий протоколов : MODBUS, DNP3, ICCP
• Совместная работа с производителями АСУ ТП (Siemens, Schneider, GE)
• SCADA Zero Days
• Постоянная работа по программе Zero-Day Initiative (ZDI) program в области АСУ ТП
• Реализация защиты от Zero-Day уязвимостей
• ReputationDV
• Анализ активности вредоносного кода и аномальных активностей во всем мире и
создание базы репутация
• Возможность блокировки коммуникаций с подозрительными источниками
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
0days published in 2015 so far
(sample):
• Moxa SoftCMS
• MICROSYS PROMOTIC
• Schneider Electric ClearSCADA
Currently covered
(pre-disclosure):
ZDI-CAN-2981 Cogent
ZDI-CAN-2965 Unitronics
ZDI-CAN-2964 Unitronics
ZDI-CAN-2954 Moxa
ZDI-CAN-2952 Moxa
ZDI-CAN-2951 Moxa
ZDI-CAN-2950 Moxa
ZDI-CAN-2956 Moxa
ZDI-CAN-2955 Moxa
ZDI-CAN-2953 Moxa
ZDI-CAN-2930 Unitronics
ZDI-CAN-2922 GE
ZDI-CAN-2919 Unitronics
ZDI-CAN-2918 Unitronics
ZDI-CAN-2911 Unitronics
ZDI-CAN-2910 Unitronics
ZDI-CAN-2906 GE
ZDI-CAN-2904 Unitronics
ZDI-CAN-2649 Indusoft
ZDI-CAN-2529 Moxa
ZDI-CAN-2526 Moxa
ZDI-CAN-2525 Moxa
ZDI-CAN-2496 Moxa
Преимущества защиты Zero-day АСУ ТП
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
0days published in 2014 so far
(sample):
• WellinTech KingSCADA
• GE Proficy
• Schneider Electric ClearSCADA
• Advantech WebAccess
• Ecava IntegraXor
• Cognet DataHub
Currently covered
(pre-disclosure):
ZDI-CAN-2310 Ecava
ZDI-CAN-2301 MICROSYS
ZDI-CAN-2086 Advantech
ZDI-CAN-2085 Advantech
ZDI-CAN-2079 Advantech
ZDI-CAN-2069 Advantech
ZDI-CAN-2068 Advantech
ZDI-CAN-2067 Advantech
ZDI-CAN-2066 Advantech
ZDI-CAN-2065 Advantech
ZDI-CAN-2064 Advantech
ZDI-CAN-2063 Advantech
ZDI-CAN-2062 Advantech
ZDI-CAN-2061 Advantech
ZDI-CAN-2044 Advantech
ZDI-CAN-2043 Advantech
ZDI-CAN-2032 Advantech
ZDI-CAN-2043 Advantech
ZDI-CAN-2172 ABB
Преимущества защиты Zero-day АСУ ТП
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Проекты HP TippingPoint SCADA
• HydroOne
• Hong Kong China Light Power Company
• Saint Lawrence Seaway Management
• Southern California Edison (Power, Energy)
• Alabama Power (Southern Company)
• CE Electric aka Northern Power Grid (UK)
• ABB Information Systems
• Sempra Energy
• Marathon Oil
• SCE
• Comision Nacional de Electricidad
• Enbridge Piplines
• IESO (Independent Electricity System
Operator)
• Transalta
• Vale Inco
• Terna
• Santa Clara Valley Water District
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Гидроэлектростанция HydroOne (Канада)
Company Profile
• Headquartered in Ontario, Canada
• $5.8B revenue
• Hydro One is a holding company with four subsidiaries, the largest being Hydro One Networks
• It operates 97% of the high voltage transmission grid throughout Ontario and serves 1.3 million
customers in rural areas across the province in its capacity as Ontario's largest distribution
utility
TippingPoint Deployment
• Perimeter and datacenter deployments, securing their cyber perimeter and core data centers
• 40 Hub locations with recently installed DV-powered 660Ns
• IPS profiles configured with in-line blocking
• SCADA signatures are utilized in a forward and permit mode
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Smart grid networking with IP convergence
HydroOne
• IP Network with VPN Hub and Spoke
Topology
• IPS protection at all end points
• Looking to expand with small form factor
and ruggedized versions of TP IPS for
thousands of locations
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Сеть китайских электростанций (Гонконг)
Company Profile
• Headquartered in Hong Kong
• $9B in revenue
• Provides electricity supply to Hong Kong City
• Participates in new energy development such as nuclear power, natural gas power, wind power,
solar power, etc. in the greater China region and Australia
TippingPoint Deployment
• Protects internet traffic, internal traffic between branch offices, partners, and Hong Kong head
office
• IPS profiles configured with in-line blocking
• SCADA signatures are configured for permit notify as they are concerned about false positives
and critical business up-time
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Unified	
  network	
  
security	
  policy
console
Campus
LAN
Edge
Core
Remote
offices	
  and
branches
Tele-­‐workers,
partners,	
  and
customers
Virtual	
  machines	
  (VMs)
Сеть электростанций (Гонконг)
Internet
Hong Kong Partners & Branch Office
China Partners & Branch Office
• 2 x S330 for internet protection
• 2 x 1400N for internal traffic between the
China branch office, China partners and
Hong Kong HQ with SCADA filters
enabled with permit notify
• 2 x1400N protecting the HK HQ, HK
partners and HK branch office
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Company Profile
• Provides power to 4 million customers in northern UK
• Moves electricity to and from homes and business over the Northern Powergrid network
• 2,534 employees
TippingPoint Deployment
• 3 x 660N, 2 are protecting corporate Internet connectivity and providing PCI 11.4 compliance, one is
deployed with zero power bypass in front of their industrial controls network
• Realized that TippingPoint also provided SCADA protection and deployed in front of their monitor
and control network
• Since much industrial control equipment is not regularly patched, TippingPoint Digital Vaccine
provides a Virtual Network Patch for this equipment
Сеть электростанций Великобритании
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Электросеть штата Алабама
Company Profile
• Headquartered in Birmingham, Alabama
• $5.7B revenue
• Alabama Power was founded in 1906 and is one of four U.S utilities operated by Southern
Company, one of the largest producers of electricity in the U.S.
• 1.4 million homes, businesses, and industries receive their electricity supply from Alabama
Power
TippingPoint Deployment
• Perimeter and SCADA network deployments
• DV-powered 660N and 2500N devices
• IPS profiles configured with in-line blocking
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Электросеть штата Алабама (Архитектура)
Internet
S660N
Scada Network
HMI StationsEng Workstations
Application Server Scada Server
Database
Server
Branch Offices
S660N
Communication Router
Remote Station 1
RTU/PLC
Remote Station 2
RTU/PLC
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Спасибо!

More Related Content

What's hot

A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...
A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...
A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...gogo6
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 Robb Boyd
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
OpenPOWER Foundation Overview
OpenPOWER Foundation OverviewOpenPOWER Foundation Overview
OpenPOWER Foundation OverviewNVIDIA Taiwan
 
Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Jeff Green
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Canada
 
Cisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Canada
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Ixia NVS Group
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
Cisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud AdoptionCisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud AdoptionCisco Canada
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Switch
SwitchSwitch
Switch1 2d
 

What's hot (20)

A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...
A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...
A10 Networks: IPv6 Solutions for Enterprise by Paul Nicholson at gogoNET LIVE...
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
OpenPOWER Foundation Overview
OpenPOWER Foundation OverviewOpenPOWER Foundation Overview
OpenPOWER Foundation Overview
 
Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Services pov jeff green 2016 v2
Services pov jeff green 2016 v2
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is now
 
Cisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex update
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Cisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud AdoptionCisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud Adoption
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Switch
SwitchSwitch
Switch
 
Horizon View 7
Horizon View 7Horizon View 7
Horizon View 7
 
Automation day red hat ansible
   Automation day red hat ansible    Automation day red hat ansible
Automation day red hat ansible
 

Similar to HP TippingPoint Решение по предотвращению вторжений критических инфраструктур, сетевая безопасность АСУ ТП

Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV EasyADVA
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Wilfried Grommen
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayHussein Khazaal
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...TechExpert
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
APAC Big Data Strategy RadhaKrishna Hiremane
APAC Big Data  Strategy RadhaKrishna  HiremaneAPAC Big Data  Strategy RadhaKrishna  Hiremane
APAC Big Data Strategy RadhaKrishna HiremaneIntelAPAC
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV EasyADVA
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)Marco Casassa Mont
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureMarketingArrowECS_CZ
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 

Similar to HP TippingPoint Решение по предотвращению вторжений критических инфраструктур, сетевая безопасность АСУ ТП (20)

Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav Knapovský
 
SnappyFlow Presentation.pdf
SnappyFlow Presentation.pdfSnappyFlow Presentation.pdf
SnappyFlow Presentation.pdf
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
APAC Big Data Strategy RadhaKrishna Hiremane
APAC Big Data  Strategy RadhaKrishna  HiremaneAPAC Big Data  Strategy RadhaKrishna  Hiremane
APAC Big Data Strategy RadhaKrishna Hiremane
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud future
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 

More from Компания УЦСБ

Практика классификации АСУ ТП по требованиям защиты информации
Практика классификации АСУ ТП по требованиям защиты информацииПрактика классификации АСУ ТП по требованиям защиты информации
Практика классификации АСУ ТП по требованиям защиты информацииКомпания УЦСБ
 
Типовые уязвимости компонентов АСУ ТП
Типовые уязвимости компонентов АСУ ТПТиповые уязвимости компонентов АСУ ТП
Типовые уязвимости компонентов АСУ ТПКомпания УЦСБ
 
Нюансы проведения аудита ИБ АСУ ТП
Нюансы проведения аудита ИБ АСУ ТПНюансы проведения аудита ИБ АСУ ТП
Нюансы проведения аудита ИБ АСУ ТПКомпания УЦСБ
 
3. Первый. Сертифицированный. DATAPK
3. Первый. Сертифицированный. DATAPK3. Первый. Сертифицированный. DATAPK
3. Первый. Сертифицированный. DATAPKКомпания УЦСБ
 
2. От аудита ИБ к защите АСУ ТП
2. От аудита ИБ к защите АСУ ТП2. От аудита ИБ к защите АСУ ТП
2. От аудита ИБ к защите АСУ ТПКомпания УЦСБ
 
1. УЦСБ и ИБ АСУ ТП. Всё только начинается!
1. УЦСБ и ИБ АСУ ТП. Всё только начинается!1. УЦСБ и ИБ АСУ ТП. Всё только начинается!
1. УЦСБ и ИБ АСУ ТП. Всё только начинается!Компания УЦСБ
 
Подходы к выполнению требований Приказа №31 ФСТЭК России
Подходы к выполнению требований Приказа №31 ФСТЭК РоссииПодходы к выполнению требований Приказа №31 ФСТЭК России
Подходы к выполнению требований Приказа №31 ФСТЭК РоссииКомпания УЦСБ
 
Проект Федерального закона о безопасности КИИ
Проект Федерального закона о безопасности КИИПроект Федерального закона о безопасности КИИ
Проект Федерального закона о безопасности КИИКомпания УЦСБ
 
5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...
5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...
5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...Компания УЦСБ
 
4. Обнаружение необнаруживаемого
4. Обнаружение необнаруживаемого4. Обнаружение необнаруживаемого
4. Обнаружение необнаруживаемогоКомпания УЦСБ
 
3. Типовые задачи и решения по ИБ
3. Типовые задачи и решения по ИБ3. Типовые задачи и решения по ИБ
3. Типовые задачи и решения по ИБКомпания УЦСБ
 
2. Приветственное слово - Газинформсервис
2. Приветственное слово - Газинформсервис2. Приветственное слово - Газинформсервис
2. Приветственное слово - ГазинформсервисКомпания УЦСБ
 
1. Приветственное слово - УЦСБ, РЦЗИ
1. Приветственное слово - УЦСБ, РЦЗИ1. Приветственное слово - УЦСБ, РЦЗИ
1. Приветственное слово - УЦСБ, РЦЗИКомпания УЦСБ
 
Кибербезопасность КИИ в свете новой доктрины ИБ России
Кибербезопасность КИИ в свете новой доктрины ИБ РоссииКибербезопасность КИИ в свете новой доктрины ИБ России
Кибербезопасность КИИ в свете новой доктрины ИБ РоссииКомпания УЦСБ
 
ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7
ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7
ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7Компания УЦСБ
 
Вебинар ИБ АСУ ТП NON-STOP. Серия №11
Вебинар ИБ АСУ ТП NON-STOP. Серия №11Вебинар ИБ АСУ ТП NON-STOP. Серия №11
Вебинар ИБ АСУ ТП NON-STOP. Серия №11Компания УЦСБ
 
Вебинар ИБ АСУ ТП NON-STOP_Серия №10
Вебинар ИБ АСУ ТП NON-STOP_Серия №10Вебинар ИБ АСУ ТП NON-STOP_Серия №10
Вебинар ИБ АСУ ТП NON-STOP_Серия №10Компания УЦСБ
 
Вебинар ИБ АСУ ТП NON-STOP_Серия №9
Вебинар ИБ АСУ ТП NON-STOP_Серия №9Вебинар ИБ АСУ ТП NON-STOP_Серия №9
Вебинар ИБ АСУ ТП NON-STOP_Серия №9Компания УЦСБ
 
Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...
Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...
Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...Компания УЦСБ
 

More from Компания УЦСБ (20)

Практика классификации АСУ ТП по требованиям защиты информации
Практика классификации АСУ ТП по требованиям защиты информацииПрактика классификации АСУ ТП по требованиям защиты информации
Практика классификации АСУ ТП по требованиям защиты информации
 
Типовые уязвимости компонентов АСУ ТП
Типовые уязвимости компонентов АСУ ТПТиповые уязвимости компонентов АСУ ТП
Типовые уязвимости компонентов АСУ ТП
 
Нюансы проведения аудита ИБ АСУ ТП
Нюансы проведения аудита ИБ АСУ ТПНюансы проведения аудита ИБ АСУ ТП
Нюансы проведения аудита ИБ АСУ ТП
 
4. ePlat4m Security GRC
4. ePlat4m Security GRC4. ePlat4m Security GRC
4. ePlat4m Security GRC
 
3. Первый. Сертифицированный. DATAPK
3. Первый. Сертифицированный. DATAPK3. Первый. Сертифицированный. DATAPK
3. Первый. Сертифицированный. DATAPK
 
2. От аудита ИБ к защите АСУ ТП
2. От аудита ИБ к защите АСУ ТП2. От аудита ИБ к защите АСУ ТП
2. От аудита ИБ к защите АСУ ТП
 
1. УЦСБ и ИБ АСУ ТП. Всё только начинается!
1. УЦСБ и ИБ АСУ ТП. Всё только начинается!1. УЦСБ и ИБ АСУ ТП. Всё только начинается!
1. УЦСБ и ИБ АСУ ТП. Всё только начинается!
 
Подходы к выполнению требований Приказа №31 ФСТЭК России
Подходы к выполнению требований Приказа №31 ФСТЭК РоссииПодходы к выполнению требований Приказа №31 ФСТЭК России
Подходы к выполнению требований Приказа №31 ФСТЭК России
 
Проект Федерального закона о безопасности КИИ
Проект Федерального закона о безопасности КИИПроект Федерального закона о безопасности КИИ
Проект Федерального закона о безопасности КИИ
 
5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...
5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...
5. Автоматизация процессов по обеспечению целостности объектов ИТ-инфраструкт...
 
4. Обнаружение необнаруживаемого
4. Обнаружение необнаруживаемого4. Обнаружение необнаруживаемого
4. Обнаружение необнаруживаемого
 
3. Типовые задачи и решения по ИБ
3. Типовые задачи и решения по ИБ3. Типовые задачи и решения по ИБ
3. Типовые задачи и решения по ИБ
 
2. Приветственное слово - Газинформсервис
2. Приветственное слово - Газинформсервис2. Приветственное слово - Газинформсервис
2. Приветственное слово - Газинформсервис
 
1. Приветственное слово - УЦСБ, РЦЗИ
1. Приветственное слово - УЦСБ, РЦЗИ1. Приветственное слово - УЦСБ, РЦЗИ
1. Приветственное слово - УЦСБ, РЦЗИ
 
Кибербезопасность КИИ в свете новой доктрины ИБ России
Кибербезопасность КИИ в свете новой доктрины ИБ РоссииКибербезопасность КИИ в свете новой доктрины ИБ России
Кибербезопасность КИИ в свете новой доктрины ИБ России
 
ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7
ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7
ИБ АСУ ТП NON-STOP. Второй сезон. Серия №7
 
Вебинар ИБ АСУ ТП NON-STOP. Серия №11
Вебинар ИБ АСУ ТП NON-STOP. Серия №11Вебинар ИБ АСУ ТП NON-STOP. Серия №11
Вебинар ИБ АСУ ТП NON-STOP. Серия №11
 
Вебинар ИБ АСУ ТП NON-STOP_Серия №10
Вебинар ИБ АСУ ТП NON-STOP_Серия №10Вебинар ИБ АСУ ТП NON-STOP_Серия №10
Вебинар ИБ АСУ ТП NON-STOP_Серия №10
 
Вебинар ИБ АСУ ТП NON-STOP_Серия №9
Вебинар ИБ АСУ ТП NON-STOP_Серия №9Вебинар ИБ АСУ ТП NON-STOP_Серия №9
Вебинар ИБ АСУ ТП NON-STOP_Серия №9
 
Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...
Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...
Последние новости о слиянии компаний. Обзор новинок с EMC World, Тимофей Григ...
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

HP TippingPoint Решение по предотвращению вторжений критических инфраструктур, сетевая безопасность АСУ ТП

  • 1. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP TippingPoint IPS
  • 2. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Защита предприятия в современном контексте Архитектура используемых решений усложняется Контрразведка стала обязательным элементом сетевой безопасности Серьезное давление на периметр, BYOD и т.д. Понимание контекста приложений необходимо для противодействия современным атакам
  • 3. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 4. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Advanced Threat Appliance (ATA) • Лучший анализ сетевого трафика на содержание вредоносного кода, более 100 протоколов • Расширенная защита и выявление заражения “patientzero Семейство продуктов HP TippingPoint Integrated Policy Integrated Policy Next-Generation Firewall (NGFW) • NGIPS интегрированый с МЭ • Детектирование протоколв приложений • Высокая производительность, в сочетании с низкой стоимостью владения In-line Threat Protection with Next-Generation Intrusion Prevention (NGIPS) • Инновационные технологии интеграции в инфраструктуру • Надежная аппаратная платформа,Uptime 99,99% • Уникальная производительность во время действующей «Атаки» • Защита инфраструктуры и приложений Security Management System (SMS) • Централизованное управление NGIPS, NGFW and ATA • Единое управление политиками и управление устройствами ТР Digital Vaccine Labs (DVLabs) • Исследовательская лаборатория • Инициатива zero-day
  • 5. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. NGIPS - матрица устройств Сегменты [пар портов] Производительность[Mbps] 20 up to24 TippingPoint 6200NX, 2600NX,5200NX 3 Gbps, 5 Gbps, 10 Gbps 4 TippingPoint S110, S330 100 Mbps , 300 Mbps 2 10/11 TippingPoint 660N, 1400N 750 Mbps, 1,5 Gbps 20.000 TippingPoint 7100NX, 7500NX 15 Gbps, 20 Gbps TippingPointS10 20 Mbps up to24
  • 6. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Сильные стороны HP TippingPoint Надежность NGIPS с рекордной доступностью в 99.99999% Простота Простота использования, управления и эффективные настройки по- умолчанию Эффективнос ть Лучшая в отрасли исследовательска я лаборатория DVLabs
  • 7. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Простота – это важно! • Ввод в работу в течение минут • Графический интерфейс с особым упором на простоту использования • Общая система управления для всей линейки решений NGIPS и NGFW • Высокая эффективность настроек по-умолчанию • HP Vertica Big Data для хранения журналов • ДокументированныйAPI, интеграция с HPArcSight“60% of customers deploy with recommended settings.” – Frost & Sullivan
  • 8. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Filter-Store • MODBUS • DNP3 • ICCP • InduSoft WebStudio • WellinTech • DATAC RealWin • GE • Schneider Electric
  • 9. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Надежность • доступность NGIPS на уровне 99.99999% • Прозрачное подключение “bump in the wire”, VRRP, OSPF, HSRP • Два режима обеспечения надежности • Routing Active-Passive HA • Transparent with bypass • SSD диски, два блока питания • Низкая задержка при обработке сетевого пакета менее 40 микросекунд • Обновление TOS без перезапуска устройства • ZPHA– замена шасси без 2x  10GbE  SFP+  ZPHA
  • 10. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Эффективность • Большой опыт в данной области (2005 voip, 2007 scada) • Более 1,100 фильтров 800+ приложений • Ограничение полосы, блокировка, карантин, уведомление • Pandora • Netflix • Spotify
  • 11. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Effective DVLabs Research & QA~3,000+ independent researchers • 8,200+ filters right out of the box • ~3,000 contributing security researchers • Proven accuracy with minimal false positives • Repeatable results week over week • Optimize network performance and protect business critical applications Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan and Microsoft Advisory 0 20 40 60 80 100 Identified High Severity Vulnerabilities HPTippingPoint US-CERT Secunia IBMISS VUPEN Security CoreSecurity Codemonicon Labs VerisigniDefense High-TechBridge 0 50 100 150 200 250 300 350 Microsoft Advisory Acknowledgments 2006 2007 2008 2009 2010 2011 2012 2013 2014 HPTippingPoint McAfee IBM SourceFire CheckPoint Fortinet PaloAlto Dell Cisco Stonesoft ! Vulnerability-based Filter !
  • 12. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Исследовательская лаборатория DV Labs DVLabs Services: • Digital Vaccine • ReputationDV • CustomDV • ThreatLinQ • Lighthouse Program Leading security research and filter development with 30+ dedicated researchers DVLabs Research & QA Partners SANS, CERT, NIST, etc. Software & reputation vendors 2,000+ customers participating ~3,000+ independent researchers Note: All figures are rounded. The base year is CY 2012. Source: Frost & Sullivan analysis Analysis of Vulnerabilities by Severity
  • 13. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Frost and Sullivan Market Share Leadership Award за вклад в работу по обнаружению уязвимостей 4 года подряд!
  • 14. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 15. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Digital Vaccine обеспечивает большую эффективность • DV фокусируется на первопричине уязвимости, чтобы одним фильтром обеспечить защиту от нескольких эксплойтов • Всегда существует несколько вариантов эксплойтов • Обнаружение каждой конкретной реализации эксплойта, все равно что вычерпывать воду из дырявой лодки
  • 16. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP TippingPoint DVLabs Анализ уязвимостей § Покупка 0-day и анализ уязвимостей с помощью Zero Day Initiative (ZDI) § Поиск уязвимостей в широко известном ПО § Направленный анализ новых технологий атаки Анализ вредоносов § Репутационная база узлов сети Интернет § Репутационная база URL § Глубокий анализ для выявления ключевых признаков Weekly updates for to stay ahead of the threats
  • 17. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP TippingPoint применения для АСУ ТП • Исследование уязвимостей в АСУ ТП • Разработка фильтров Digital Vaccine для АСУ ТП • Детектирование и разбор событий протоколов : MODBUS, DNP3, ICCP • Совместная работа с производителями АСУ ТП (Siemens, Schneider, GE) • SCADA Zero Days • Постоянная работа по программе Zero-Day Initiative (ZDI) program в области АСУ ТП • Реализация защиты от Zero-Day уязвимостей • ReputationDV • Анализ активности вредоносного кода и аномальных активностей во всем мире и создание базы репутация • Возможность блокировки коммуникаций с подозрительными источниками
  • 18. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 0days published in 2015 so far (sample): • Moxa SoftCMS • MICROSYS PROMOTIC • Schneider Electric ClearSCADA Currently covered (pre-disclosure): ZDI-CAN-2981 Cogent ZDI-CAN-2965 Unitronics ZDI-CAN-2964 Unitronics ZDI-CAN-2954 Moxa ZDI-CAN-2952 Moxa ZDI-CAN-2951 Moxa ZDI-CAN-2950 Moxa ZDI-CAN-2956 Moxa ZDI-CAN-2955 Moxa ZDI-CAN-2953 Moxa ZDI-CAN-2930 Unitronics ZDI-CAN-2922 GE ZDI-CAN-2919 Unitronics ZDI-CAN-2918 Unitronics ZDI-CAN-2911 Unitronics ZDI-CAN-2910 Unitronics ZDI-CAN-2906 GE ZDI-CAN-2904 Unitronics ZDI-CAN-2649 Indusoft ZDI-CAN-2529 Moxa ZDI-CAN-2526 Moxa ZDI-CAN-2525 Moxa ZDI-CAN-2496 Moxa Преимущества защиты Zero-day АСУ ТП
  • 19. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 0days published in 2014 so far (sample): • WellinTech KingSCADA • GE Proficy • Schneider Electric ClearSCADA • Advantech WebAccess • Ecava IntegraXor • Cognet DataHub Currently covered (pre-disclosure): ZDI-CAN-2310 Ecava ZDI-CAN-2301 MICROSYS ZDI-CAN-2086 Advantech ZDI-CAN-2085 Advantech ZDI-CAN-2079 Advantech ZDI-CAN-2069 Advantech ZDI-CAN-2068 Advantech ZDI-CAN-2067 Advantech ZDI-CAN-2066 Advantech ZDI-CAN-2065 Advantech ZDI-CAN-2064 Advantech ZDI-CAN-2063 Advantech ZDI-CAN-2062 Advantech ZDI-CAN-2061 Advantech ZDI-CAN-2044 Advantech ZDI-CAN-2043 Advantech ZDI-CAN-2032 Advantech ZDI-CAN-2043 Advantech ZDI-CAN-2172 ABB Преимущества защиты Zero-day АСУ ТП
  • 20. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Проекты HP TippingPoint SCADA • HydroOne • Hong Kong China Light Power Company • Saint Lawrence Seaway Management • Southern California Edison (Power, Energy) • Alabama Power (Southern Company) • CE Electric aka Northern Power Grid (UK) • ABB Information Systems • Sempra Energy • Marathon Oil • SCE • Comision Nacional de Electricidad • Enbridge Piplines • IESO (Independent Electricity System Operator) • Transalta • Vale Inco • Terna • Santa Clara Valley Water District
  • 21. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Гидроэлектростанция HydroOne (Канада) Company Profile • Headquartered in Ontario, Canada • $5.8B revenue • Hydro One is a holding company with four subsidiaries, the largest being Hydro One Networks • It operates 97% of the high voltage transmission grid throughout Ontario and serves 1.3 million customers in rural areas across the province in its capacity as Ontario's largest distribution utility TippingPoint Deployment • Perimeter and datacenter deployments, securing their cyber perimeter and core data centers • 40 Hub locations with recently installed DV-powered 660Ns • IPS profiles configured with in-line blocking • SCADA signatures are utilized in a forward and permit mode
  • 22. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Smart grid networking with IP convergence HydroOne • IP Network with VPN Hub and Spoke Topology • IPS protection at all end points • Looking to expand with small form factor and ruggedized versions of TP IPS for thousands of locations
  • 23. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Сеть китайских электростанций (Гонконг) Company Profile • Headquartered in Hong Kong • $9B in revenue • Provides electricity supply to Hong Kong City • Participates in new energy development such as nuclear power, natural gas power, wind power, solar power, etc. in the greater China region and Australia TippingPoint Deployment • Protects internet traffic, internal traffic between branch offices, partners, and Hong Kong head office • IPS profiles configured with in-line blocking • SCADA signatures are configured for permit notify as they are concerned about false positives and critical business up-time
  • 24. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Unified  network   security  policy console Campus LAN Edge Core Remote offices  and branches Tele-­‐workers, partners,  and customers Virtual  machines  (VMs) Сеть электростанций (Гонконг) Internet Hong Kong Partners & Branch Office China Partners & Branch Office • 2 x S330 for internet protection • 2 x 1400N for internal traffic between the China branch office, China partners and Hong Kong HQ with SCADA filters enabled with permit notify • 2 x1400N protecting the HK HQ, HK partners and HK branch office
  • 25. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Company Profile • Provides power to 4 million customers in northern UK • Moves electricity to and from homes and business over the Northern Powergrid network • 2,534 employees TippingPoint Deployment • 3 x 660N, 2 are protecting corporate Internet connectivity and providing PCI 11.4 compliance, one is deployed with zero power bypass in front of their industrial controls network • Realized that TippingPoint also provided SCADA protection and deployed in front of their monitor and control network • Since much industrial control equipment is not regularly patched, TippingPoint Digital Vaccine provides a Virtual Network Patch for this equipment Сеть электростанций Великобритании
  • 26. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Электросеть штата Алабама Company Profile • Headquartered in Birmingham, Alabama • $5.7B revenue • Alabama Power was founded in 1906 and is one of four U.S utilities operated by Southern Company, one of the largest producers of electricity in the U.S. • 1.4 million homes, businesses, and industries receive their electricity supply from Alabama Power TippingPoint Deployment • Perimeter and SCADA network deployments • DV-powered 660N and 2500N devices • IPS profiles configured with in-line blocking
  • 27. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Электросеть штата Алабама (Архитектура) Internet S660N Scada Network HMI StationsEng Workstations Application Server Scada Server Database Server Branch Offices S660N Communication Router Remote Station 1 RTU/PLC Remote Station 2 RTU/PLC
  • 28. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Спасибо!