SlideShare a Scribd company logo
1 of 59
Download to read offline
© 2013 Infoblox Inc. All Rights Reserved.
L. Francisco Abarca, Director Sales LATAM
Expanding Your Network Security
1
© 2013 Infoblox Inc. All Rights Reserved.
Infoblox Overview & Business Update
($MM)
$35.0
$56.0
$61.7
$102.2
$132.8
$169.2
$0
$20
$40
$60
$80
$100
$120
$140
$160
$180
FY2007 FY2008 FY2009 FY2010 FY2011 FY2012
Total Revenue
(Fiscal Year Ending July 31)
Founded in 1999
Headquartered in Santa Clara, CA
with global operations in 25 countries
Market leadership
•  Gartner “Strong Positive” rating
•  40%+ Market Share (DDI)
6,100+ customers, 45,000+
systems shipped
20 patents, 27 pending
IPO April 2012: NYSE BLOX
Leader in technology
for network control
2
© 2013 Infoblox Inc. All Rights Reserved.
Conventional Networks –
Static and Simple
192.168.255.255
132.18.255.45 126.78.255.35 72.168.21.135
72.168.21.135
72.168.21.135
Static
IPv4
Rudimentary
Tools for Control
Manually
Configured
3
© 2013 Infoblox Inc. All Rights Reserved.
Next Generation Networks –
Very Complex
132.18.255.45 126.78.255.35
72.168.21.135
72.168.21.135
2001:0fb8:85a3:0000:0000:8a2e:6332:4328
2001:0db8:85a3:0000:0000:8a2e:3375:9356
2001:0db8:85a3:0000:0000:8a2e:2385:3690
2001:0db8:85a3:0000:0000:8a2e:0647:8574
2001:0db8:85a3:0000:0000:8a2e:5330:7854
2001:0db8:85a3:0000:0000:8a2e:5370:6954
VM
VM
Expensive
Manual Inflexible
VM
VM
4
© 2013 Infoblox Inc. All Rights Reserved.
Triggers that are Redefining the Network
THREAT LANDSCAPE
MOBILE DEVICE
EXPLOSION
CLOUD /
VIRTUALIZATION
CONSOLIDATION
SOFTWARE DEFINED
NETWORKS
IPv6 TRANSITION
5
© 2013 Infoblox Inc. All Rights Reserved.
Traditional Approach
CONTROLPLANE
APPS&
END-POINTS
END POINTS VIRTUAL MACHINES PRIVATE CLOUD APPLICATIONS
NETWORK
INFRASTRUCTURE
FIREWALLS SWITCHES ROUTERS WEB PROXY LOAD BALANCERS
Complexity
Risk & Cost
Agility
Flexibility
QIPMICROSOFT DHCPMICROSOFT DNS VMWARE DNS UNIX BIND
SCRIPTS COMMAND LINE
6
© 2013 Infoblox Inc. All Rights Reserved.
What We Do:
Innovative Technology for Network Control
APPS&
END-POINTS
END POINTS VIRTUAL MACHINES PRIVATE CLOUD APPLICATIONS
NETWORK
INFRASTRUCTURE
FIREWALLS SWITCHES ROUTERS WEB PROXY LOAD BALANCERS
CONTROLPLANE
Infoblox GridTM
w/ Real-time
Network Database
Historical /Real-time
Reporting & Control
7
© 2013 Infoblox Inc. All Rights Reserved.
Expanding Your Network Security
8
© 2013 Infoblox Inc. All Rights Reserved.
Maintaining Security with Infoblox
Compliance & Policy Standardization
Enforce
Firewall ACL & Rule Automation
Control
Secure
DNS, DHCP and IP Address Management DNS Firewall
Protect
9
© 2013 Infoblox Inc. All Rights Reserved.
DNS, DHCP and IP Address Management
Secure
10
© 2013 Infoblox Inc. All Rights Reserved.
Security Risks with Conventional Approach
þ  Dedicated hardware with no unnecessary logical
or physical ports
þ  No OS-level user accounts – only admin accts
þ  Immediate updates to new security threats
þ  Secure HTTPS-based access to device
management
þ  No SSH or root-shell access
þ  Task-specific network appliance
–  Many open ports subject to attack
–  Users have OS-level account privileges on
server
–  Requires time-consuming manual updates
–  Requires multiple applications for device
management
Conventional Server Approach Infoblox Appliance Approach
Multiple
Open Ports
Limited
Port Access
Infoblox
Update
Service
Secure
Access
11
© 2013 Infoblox Inc. All Rights Reserved.
Security – Purpose Built Appliances
§  Task specific hardware
§  Restrictive/hardened Linux OS
§  Root access disabled
§  Simple VRRP-based HA setup
§  Active/active DR recovery
§  Common Criteria EAL-2 Cert.
§  128-bit AES Grid VPN comm.
§  FIPS 140-2 certification
§  DNS Firewall / RPZ protection
§  Fast/easy upgrades
12
© 2013 Infoblox Inc. All Rights Reserved.
Security – Purpose Built OS (NIOS)
§  Central view & management
§  Role-based admin controls
§  6 authentication methods
§  Two factor Auth. (CAC/PKI)
§  HTTPS Web access
§  Detailed audit logging
§  1-click DNSSEC
§  SSL-Based REST/Perl API
§  DNS blacklisting / re-directs
§  Anycast (BGP/OSPF)
§  GSS-TSIG & TSIG
§  Robust DDI Reporting
13
© 2013 Infoblox Inc. All Rights Reserved.
Infoblox Grid a Key Differentiator
Simple, Secure, Reliable
External DNS
Grid Member
Virtual
Environment
Grid Master Candidate
at Recovery Site
Internal
Grid Members
IPAM
Insight
Grid Master
Branch Offices
A collection of High
Availability member
appliances
Coordinated by the
Grid Master
Sharing a distributed database
Communicating via
an SSL VPN
§  Centralized visibility
and control
§  Real time IPAM & discovery
§  Automated failover and DR
14
© 2013 Infoblox Inc. All Rights Reserved.
Fast Responses to Security Incidents
§  3 Major Feature Releases
a year
§  Several patch/
maintenance releases
§  Security vulnerabilities
addressed within hours
§  Dedicated “Customer
Engineering team”
focused on resolving
customer issues
15
© 2013 Infoblox Inc. All Rights Reserved.
Enhancing External DNS Security
Cryptographically
signed DNS data
DNS Root
2nd Level Domain
nth Level Domain
DNSSEC helps
to mitigate hijacking
threats such as the
Kaminsky attack
Manual Tasks
§  Numerous manual procedures
for BIND, Microsoft DNS or
other systems
§  Cumbersome and repetitive
maintenance and key refresh
procedures
§  Specialized knowledge resides
(and leaves) with admin
Infoblox Solution
§  Automated
deployment process
§  Automated key refresh
§  Automated maintenance
§  Knowledge and best practices
embedded in system
TrustChain
16
© 2013 Infoblox Inc. All Rights Reserved.
DNSSEC in 1-Click
§  No scripts / Auto-Resigning / 1-click
§  Central configuration of all DNSSEC parameters
§  Automatic maintenance of signed zones
17
© 2013 Infoblox Inc. All Rights Reserved.
Automated IP Address Management
§  Tracks what’s connected on the network
§  Enhances IP allocation through automation
§  Increases accuracy with continuous updates
§  Helps with IPv4 to IPv6 migrations
18
© 2013 Infoblox Inc. All Rights Reserved.
Role Based Administration
Visibility for Multiple Audiences
IPAM admin Track how effectively provisioned networks being used
DNS admin See heavy users, what are the top sites being queried
DHCP admin Improve lease history, find most active DHCP clients
Security admin Improve traceability for compliance purposes
Network admin Understand subnet utilization for planning purposes
Helpdesk Better “at a glance” visibility into current state of DDI
Management Provide simple, presentable reporting formats on trends
19
© 2013 Infoblox Inc. All Rights Reserved.
CAC / PKI Login Enhancement
User Name pulled
automatically from
the Smart Card
certificate
MSFT AD
RADIUS
TACACS+
local
continue to be
user authentication
© 2013 Infoblox Inc. All Rights Reserved.
CAC / PKI Access Protection
21
GUI locks when Smart Card is removed
© 2013 Infoblox Inc. All Rights Reserved.
IB-4030 Recursive DNS w/ DDOS
Performance
§  A carrier grade DNS recursive appliance with over 1M DNS
queries per second
Software
§  Built-in threat protection
§  URL Blacklisting / NXDOMAIN Redirection
§  Cache pre-fetching and DNSSEC
World’s Most Scalable, Secure, and Manageable DNS Caching Server
22
© 2013 Infoblox Inc. All Rights Reserved.
Infoblox DNS Firewall
Protect
23
© 2013 Infoblox Inc. All Rights Reserved.
Overall Malware Threats Booming
§  Average over 7 million new Malware
threats per quarter in 2012*
§  Mobile threats grew about 10X in 2012*
§  855 successful breaches / 174 million
records compromised in 2012**
§  69% of successful breaches
utilized Malware**
§  54% took months to discover,
29% weeks**
§  92% discovered by external party**
0
2,000,000
4,000,000
6,000,000
8,000,000
10,000,000
Q1
2010
Q2
2010
Q3
2010
Q4
2010
Q1
2011
Q2
2011
Q3
2011
Q4
2011
Q1
2012
Q2
2012
Q3
2012
New Malware
0
5,000
10,000
15,000
20,000
25,000
2004 2005 2006 2007 2008 2009 2010 2011 2012
Total Mobile Malware Samples in the Database
Startling Statistics
* Source: McAfee Threats Report: Third Quarter 2012
** Source: Verizon Security Study 2012
24
© 2013 Infoblox Inc. All Rights Reserved.
Customer Challenge: New Class of Malware
DNS HAS BECOME A TARGET PATHWAY FOR A NEW CLASS OF MALWARE
DNS INFRASTRUCTURE IS THE ONLY WAY TO DEFEND AGAINST THIS TYPE OF MALWARE
COMMUNICATION
PROTOCOL
BECAME MAINSTREAM
PATHWAY FOR MALWARE
IRC (Chat) 1999
HTTP 2004
P2P 2007
DNS 2011
25
© 2013 Infoblox Inc. All Rights Reserved.
DNS Firewall – Complement Existing Security
§  Traditional or next generation firewall
(e.g. Checkpoint, Juniper, Palo Alto, Imperva, Cisco, etc.)
§  Anti-Virus
(e.g. Symantec, McAfee, Webroot, Kapersky, etc.)
§  Email / Web security
(e.g. Blue Coat, McAfee, Websense)
§  Advance Persistent Threat (APT)
(e.g. Damballa, FireEye)
§  Security Information and Event Management (SIEM)
(e.g. Trustwave, McAfee, Q1Labs)
26
© 2013 Infoblox Inc. All Rights Reserved.
Write to Syslog
and send to
Trinzic
Reporting
Introducing Infoblox DNS Firewall
Reputational Feed
from Infoblox
Landing Page /
Walled Garden
Infected
Client
Infoblox DNS Firewall /
Recursive DNS Server
Infoblox DNS Firewall /
Recursive DNS Server
Infoblox DNS Firewall /
Recursive DNS Server
Redirect
Dynamic Grid-Wide
Policy Distribution
Dynamic
Policy Update
Block / Disallow
session
Contact botnetLink to malicious
www.badsite.com
Apply Policy
27
© 2013 Infoblox Inc. All Rights Reserved.
Detailed Tracking and Reporting Options
§  Automatic reporting
§  Top Infected Clients
§  Malicious requested
domains and number of
requests
§  Lease history by MAC
address with detailed
drill down
Security Policy Violations Report
28
© 2013 Infoblox Inc. All Rights Reserved.
§  1/30/13 NY Times article – NY Times victim of hacker /
malware attacks over 4 months originating in China*
§  The Attack
–  Initial infection: Phishing / Spear Phishing
–  Botnet / attackers changed IP addresses; used
compromised US University machines as proxies
–  Utilized over 45 types of malware, only 1 caught by the
Anti-Virus defense
§  Why so difficult to detect
–  Malware/attacks designed to circumvent firewalls, web
filtering, antivirus, and other defenses
–  Appears it used DNS to locate the botnet controller
§  How DNS Firewall could have helped
–  Probably prevented infection via phishing
–  Disrupted botnet communications to China
–  Report Server: Early alert of attacks
Perfect Breach Example – New York Times Attack
29
© 2013 Infoblox Inc. All Rights Reserved. 30
APT / Botnet Malware Requires a New Approach
§  Existing security approaches
do not effectively address malware
that exploits DNS. Examples:
–  Malware repacks to avoid signature-based
detection
–  Botnet controllers typically change URLs
dynamically to circumvent Web Filters
–  Botnet controllers change IP addresses /
use other techniques to circumvent
Firewalls
* http://www.securityweek.com/why-dns-firewalls-should-become-next-hot-thing-enterprise-security
“… DNS firewalls likely would have prevented the
success of more than 80 percent of these attacks.”*
30
© 2013 Infoblox Inc. All Rights Reserved.
Infoblox Security Device Controller
Control
31
© 2013 Infoblox Inc. All Rights Reserved.
DHCP Fingerprint
32
© 2013 Infoblox Inc. All Rights Reserved.
Very Simple, Un-Intrusive, No Discovery Overhead
33
DHCPDISCOVER Option Sequence 1,15,3,6,44,46,47,31,33,121,249,43
Windows 7
DHCPOFFER
Option Sequence 1,3,6,15,119,78,79,95,252
iPad
DHCPOFFER
DHCPDISCOVER
X
© 2013 Infoblox Inc. All Rights Reserved.
Control - What you don’t know
Enhanced DHCP Lease Information
34
Sort
Filter
Smart Folder
© 2013 Infoblox Inc. All Rights Reserved.
Control - What you don’t know
Custom DHCP Fingerprint Management
35
© 2013 Infoblox Inc. All Rights Reserved.
Control – Through Network Planning
Device Trend
What devices are
being used
where?
Is a certain
device trending
up, or down?
36
© 2013 Infoblox Inc. All Rights Reserved.
Control – Through Network Planning
Top Device
What are the top
devices?
Click on the
device type to
view IP/MAC
information
37
© 2013 Infoblox Inc. All Rights Reserved.
SDC
38
© 2013 Infoblox Inc. All Rights Reserved.
Network Security Management: Today
39
© 2013 Infoblox Inc. All Rights Reserved.
Manual
The Pain of Legacy Processes
Legacy
Approach
Hours/
Days
Firewall
Change
Needed
1
Search
For
Devices
2
Figure Out
Impacted
Devices
3
Determine
Correct
Config
4
Compare
Change to
Standards/
Compliance
5
Request
Change/
Implement
Manually
6
Reconfirm
Correctness
and
Compliance
Hours/DaysNetwork Provisioning Time
§  Manual processes cannot keep up
§  SLA are lengthening to weeks or a even a month
§  Require dedicated, senior network architects
–  Routine, repetitive, error-prone
–  Multiple vendor expertise needed
40
© 2013 Infoblox Inc. All Rights Reserved.
CHANGE
REQUEST
MULTI-
VENDOR
FIREWALL
MULTI-
VENDOR
ROUTER/
FIREWALL
MULTI-
VENDOR
FIREWALL
MULTI-
VENDOR
SWITCH/
FIREWALL
Infoblox Security Device Controller
§  Increases speed and accuracy of new service deployment
§  Improves SLAs with automated provisioning
§  Reduce risk with embedded intelligence and modeling
§  Reduce errors & over-reliance on high level engineers
SERVICE/
APPLICATIONUSER
APPROVED
CHANGE
IT TICKETING
SYSTEM
41
© 2013 Infoblox Inc. All Rights Reserved.
Five Pillars of Controlling Security Devices
Embedded
Expertise
Automated
Discovery
Multi-vendor
Provisioning
Customized
Alerting
Powerful
Search
42
© 2013 Infoblox Inc. All Rights Reserved.
Automated Network Discovery
Simple and complete
network-wide discovery
Powerful topology to
visualize path
43
© 2013 Infoblox Inc. All Rights Reserved.
Embedded Expertise
Built-in intelligence
automatically provides
detailed ACL/rule views
Detects problems like
unused, overlapping
and duplicate rules
out-of-the box
44
© 2013 Infoblox Inc. All Rights Reserved.
Powerful Search
Search results identify
all matching devices
including vendor
specific syntax
Easily customize search
criteria for one or
multiple devices
45
© 2013 Infoblox Inc. All Rights Reserved.
Customizable Alerting
Immediately identify and
track defined alerts to
allow or deny access
Create Alerts for both
Blacklisting and
Whitelisting
46
© 2013 Infoblox Inc. All Rights Reserved.
Multi-vendor Provisioning
Maintain control with
user-based access
rights and change
process
Provision changes in
the same platform and
view the vendor-specific
syntax
47
© 2013 Infoblox Inc. All Rights Reserved.
Manual
The Power of Infoblox
Legacy
Approach
Infoblox
Approach
Hours/
Days
1 62 3 4 5
Automated
Days/
Weeks
Firewall
Change
Needed
1
Search
For
Devices
2
Figure Out
Impacted
Devices
3
Determine
Correct
Config
4
Compare
Change to
Standards/
Compliance
5
Request
Change/
Implement
Manually
6
Reconfirm
Correctness
and
Compliance
Firewall
Change
Needed
48
© 2013 Infoblox Inc. All Rights Reserved.
Compliance, Internal Policies & Best Practices
Enforce and Maintain
49
© 2013 Infoblox Inc. All Rights Reserved.
Standard
ConfigurationsAuditability
Process
Enforcement
Secure
Configurations
User Permission
Control
Visibility &
Documentation
Continuous
Monitoring
Change Tracking
Standardization and Compliance Drivers
Regulatory or
Industry Mandates
Corporate Security
Policies
Engineering Team
Best Practices
50
© 2013 Infoblox Inc. All Rights Reserved.
Common Standardization & Compliance Situation
§  Requirements are
researched and documented
§  Normally not thought
of until:
–  An audit is required
–  Something breaks
§  Believe the processes are
good best practices but:
–  Staff is too busy doing
everything else to
be proactive
51
© 2013 Infoblox Inc. All Rights Reserved.
Compliance Monitoring Best Practices
Define &
Customize
Rules/Policies
Segment
Policies to
Devices
Track and Audit
Configurations
and Changes
Continuously
Review for
Compliance
Proactive
Notification for
Violations
Automated
Reports
52
© 2013 Infoblox Inc. All Rights Reserved.
Infoblox Network Automation Overview
• Network discovery
• Built-in analysis
• Check against best practices
• Detect issues
• Monitor and manage change
• Automate change
• Maintain compliance
• Provision ACL & rules
Collected Via:
SNMP
CLI/configuration
Syslog
Fingerprinting
Real-time & Historical
Analysis
53
© 2013 Infoblox Inc. All Rights Reserved.
Standardization - Compliance Management
Embedded
compliance rules
Customizable best
practice templates
Manage multiple
policies
Proactive violation
detected
Multiple remediation
options
Current and
historical views
54
© 2013 Infoblox Inc. All Rights Reserved.
Configuration Analysis
Unique pre-packaged
expertise
Identifies common
misconfigurations
Customizable
alerting
Recommended
remediation options
Understand concept
of the network
Network Scorecard
views
55
© 2013 Infoblox Inc. All Rights Reserved.
Powerful Reporting
Single-click
compliance reports
Pre-packaged and
customizable
Powerful filtering
Executive and
detailed reports
On-demand or
scheduled
User-based view
rights
56
© 2013 Infoblox Inc. All Rights Reserved.
Value of Network Standardization
Verify your “desired state” to
the “as is state”
§  Improve network stability and
consistency
§  Reduce manual processes
§  Eliminate extensive, time-
consuming audit teams
§  Increase accuracy with
automation and embedded
expertise
§  Focus on building secure
infrastructure instead of waiting
for audits
57
© 2013 Infoblox Inc. All Rights Reserved.
Infoblox Value To Our Customer
58
Secure
•  Secure hardware form-factor & hardened OS
•  Designed to minimize vulnerabilities and
attack surfaces
•  Common Criteria certified
•  GridTM technology for fault tolerance,
easy updates and one-click DR
•  Optimized for enterprise demand & performance
•  Authoritative source for network dataAvailable
•  Powerful automation of manual processes
•  Reduce change errors & assure compliance
•  Save time, money and effort
Automated
Automated
SecureAvailable
Infoblox makes networks more available, secure and automated
© 2013 Infoblox Inc. All Rights Reserved.
Thank You
59

More Related Content

What's hot

PLNOG15-DNS is the root of all evil in the network. How to become a superhero...
PLNOG15-DNS is the root of all evil in the network. How to become a superhero...PLNOG15-DNS is the root of all evil in the network. How to become a superhero...
PLNOG15-DNS is the root of all evil in the network. How to become a superhero...PROIDEA
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewMarketingArrowECS_CZ
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 
What is ddos attack
What is ddos attackWhat is ddos attack
What is ddos attackDosarrest007
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointLancope, Inc.
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...Jisc
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchLancope, Inc.
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation SolutionRadware
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_OfferingsDSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_OfferingsAndris Soroka
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time Haltdos
 

What's hot (20)

PLNOG15-DNS is the root of all evil in the network. How to become a superhero...
PLNOG15-DNS is the root of all evil in the network. How to become a superhero...PLNOG15-DNS is the root of all evil in the network. How to become a superhero...
PLNOG15-DNS is the root of all evil in the network. How to become a superhero...
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 
Denial of Service
Denial of ServiceDenial of Service
Denial of Service
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
What is ddos attack
What is ddos attackWhat is ddos attack
What is ddos attack
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_OfferingsDSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
 

Viewers also liked

Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infobloxislamet
 
LicensingScopeAndBoundaries
LicensingScopeAndBoundariesLicensingScopeAndBoundaries
LicensingScopeAndBoundariesWilliam Francis
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminarpatmisasi
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack 2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack Raleigh ISSA
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
How to Sell Security to Your CIO
How to Sell Security to Your CIOHow to Sell Security to Your CIO
How to Sell Security to Your CIORapid7
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6Andreas Taudte
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxSolarWinds
 
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponUberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponInfer
 

Viewers also liked (19)

Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
 
Cyber crime v3
Cyber crime v3Cyber crime v3
Cyber crime v3
 
Infoblox reporting
Infoblox reportingInfoblox reporting
Infoblox reporting
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Workgroup Issues
Workgroup IssuesWorkgroup Issues
Workgroup Issues
 
LicensingScopeAndBoundaries
LicensingScopeAndBoundariesLicensingScopeAndBoundaries
LicensingScopeAndBoundaries
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminar
 
Long Infoblox
Long InfobloxLong Infoblox
Long Infoblox
 
Ipadd mngt
Ipadd mngtIpadd mngt
Ipadd mngt
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack 2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
How to Sell Security to Your CIO
How to Sell Security to Your CIOHow to Sell Security to Your CIO
How to Sell Security to Your CIO
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
 
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponUberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
 

Similar to Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...PROIDEA
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present DangersPeter Wood
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSDevOps.com
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasNextel S.A.
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 

Similar to Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM (20)

DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 

More from Mundo Contact

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Mundo Contact
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Mundo Contact
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Mundo Contact
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Mundo Contact
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Mundo Contact
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Mundo Contact
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Mundo Contact
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Mundo Contact
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Mundo Contact
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Mundo Contact
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Mundo Contact
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Mundo Contact
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Mundo Contact
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Mundo Contact
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Mundo Contact
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Mundo Contact
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Mundo Contact
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Mundo Contact
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Mundo Contact
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Mundo Contact
 

More from Mundo Contact (20)

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM

  • 1. © 2013 Infoblox Inc. All Rights Reserved. L. Francisco Abarca, Director Sales LATAM Expanding Your Network Security 1
  • 2. © 2013 Infoblox Inc. All Rights Reserved. Infoblox Overview & Business Update ($MM) $35.0 $56.0 $61.7 $102.2 $132.8 $169.2 $0 $20 $40 $60 $80 $100 $120 $140 $160 $180 FY2007 FY2008 FY2009 FY2010 FY2011 FY2012 Total Revenue (Fiscal Year Ending July 31) Founded in 1999 Headquartered in Santa Clara, CA with global operations in 25 countries Market leadership •  Gartner “Strong Positive” rating •  40%+ Market Share (DDI) 6,100+ customers, 45,000+ systems shipped 20 patents, 27 pending IPO April 2012: NYSE BLOX Leader in technology for network control 2
  • 3. © 2013 Infoblox Inc. All Rights Reserved. Conventional Networks – Static and Simple 192.168.255.255 132.18.255.45 126.78.255.35 72.168.21.135 72.168.21.135 72.168.21.135 Static IPv4 Rudimentary Tools for Control Manually Configured 3
  • 4. © 2013 Infoblox Inc. All Rights Reserved. Next Generation Networks – Very Complex 132.18.255.45 126.78.255.35 72.168.21.135 72.168.21.135 2001:0fb8:85a3:0000:0000:8a2e:6332:4328 2001:0db8:85a3:0000:0000:8a2e:3375:9356 2001:0db8:85a3:0000:0000:8a2e:2385:3690 2001:0db8:85a3:0000:0000:8a2e:0647:8574 2001:0db8:85a3:0000:0000:8a2e:5330:7854 2001:0db8:85a3:0000:0000:8a2e:5370:6954 VM VM Expensive Manual Inflexible VM VM 4
  • 5. © 2013 Infoblox Inc. All Rights Reserved. Triggers that are Redefining the Network THREAT LANDSCAPE MOBILE DEVICE EXPLOSION CLOUD / VIRTUALIZATION CONSOLIDATION SOFTWARE DEFINED NETWORKS IPv6 TRANSITION 5
  • 6. © 2013 Infoblox Inc. All Rights Reserved. Traditional Approach CONTROLPLANE APPS& END-POINTS END POINTS VIRTUAL MACHINES PRIVATE CLOUD APPLICATIONS NETWORK INFRASTRUCTURE FIREWALLS SWITCHES ROUTERS WEB PROXY LOAD BALANCERS Complexity Risk & Cost Agility Flexibility QIPMICROSOFT DHCPMICROSOFT DNS VMWARE DNS UNIX BIND SCRIPTS COMMAND LINE 6
  • 7. © 2013 Infoblox Inc. All Rights Reserved. What We Do: Innovative Technology for Network Control APPS& END-POINTS END POINTS VIRTUAL MACHINES PRIVATE CLOUD APPLICATIONS NETWORK INFRASTRUCTURE FIREWALLS SWITCHES ROUTERS WEB PROXY LOAD BALANCERS CONTROLPLANE Infoblox GridTM w/ Real-time Network Database Historical /Real-time Reporting & Control 7
  • 8. © 2013 Infoblox Inc. All Rights Reserved. Expanding Your Network Security 8
  • 9. © 2013 Infoblox Inc. All Rights Reserved. Maintaining Security with Infoblox Compliance & Policy Standardization Enforce Firewall ACL & Rule Automation Control Secure DNS, DHCP and IP Address Management DNS Firewall Protect 9
  • 10. © 2013 Infoblox Inc. All Rights Reserved. DNS, DHCP and IP Address Management Secure 10
  • 11. © 2013 Infoblox Inc. All Rights Reserved. Security Risks with Conventional Approach þ  Dedicated hardware with no unnecessary logical or physical ports þ  No OS-level user accounts – only admin accts þ  Immediate updates to new security threats þ  Secure HTTPS-based access to device management þ  No SSH or root-shell access þ  Task-specific network appliance –  Many open ports subject to attack –  Users have OS-level account privileges on server –  Requires time-consuming manual updates –  Requires multiple applications for device management Conventional Server Approach Infoblox Appliance Approach Multiple Open Ports Limited Port Access Infoblox Update Service Secure Access 11
  • 12. © 2013 Infoblox Inc. All Rights Reserved. Security – Purpose Built Appliances §  Task specific hardware §  Restrictive/hardened Linux OS §  Root access disabled §  Simple VRRP-based HA setup §  Active/active DR recovery §  Common Criteria EAL-2 Cert. §  128-bit AES Grid VPN comm. §  FIPS 140-2 certification §  DNS Firewall / RPZ protection §  Fast/easy upgrades 12
  • 13. © 2013 Infoblox Inc. All Rights Reserved. Security – Purpose Built OS (NIOS) §  Central view & management §  Role-based admin controls §  6 authentication methods §  Two factor Auth. (CAC/PKI) §  HTTPS Web access §  Detailed audit logging §  1-click DNSSEC §  SSL-Based REST/Perl API §  DNS blacklisting / re-directs §  Anycast (BGP/OSPF) §  GSS-TSIG & TSIG §  Robust DDI Reporting 13
  • 14. © 2013 Infoblox Inc. All Rights Reserved. Infoblox Grid a Key Differentiator Simple, Secure, Reliable External DNS Grid Member Virtual Environment Grid Master Candidate at Recovery Site Internal Grid Members IPAM Insight Grid Master Branch Offices A collection of High Availability member appliances Coordinated by the Grid Master Sharing a distributed database Communicating via an SSL VPN §  Centralized visibility and control §  Real time IPAM & discovery §  Automated failover and DR 14
  • 15. © 2013 Infoblox Inc. All Rights Reserved. Fast Responses to Security Incidents §  3 Major Feature Releases a year §  Several patch/ maintenance releases §  Security vulnerabilities addressed within hours §  Dedicated “Customer Engineering team” focused on resolving customer issues 15
  • 16. © 2013 Infoblox Inc. All Rights Reserved. Enhancing External DNS Security Cryptographically signed DNS data DNS Root 2nd Level Domain nth Level Domain DNSSEC helps to mitigate hijacking threats such as the Kaminsky attack Manual Tasks §  Numerous manual procedures for BIND, Microsoft DNS or other systems §  Cumbersome and repetitive maintenance and key refresh procedures §  Specialized knowledge resides (and leaves) with admin Infoblox Solution §  Automated deployment process §  Automated key refresh §  Automated maintenance §  Knowledge and best practices embedded in system TrustChain 16
  • 17. © 2013 Infoblox Inc. All Rights Reserved. DNSSEC in 1-Click §  No scripts / Auto-Resigning / 1-click §  Central configuration of all DNSSEC parameters §  Automatic maintenance of signed zones 17
  • 18. © 2013 Infoblox Inc. All Rights Reserved. Automated IP Address Management §  Tracks what’s connected on the network §  Enhances IP allocation through automation §  Increases accuracy with continuous updates §  Helps with IPv4 to IPv6 migrations 18
  • 19. © 2013 Infoblox Inc. All Rights Reserved. Role Based Administration Visibility for Multiple Audiences IPAM admin Track how effectively provisioned networks being used DNS admin See heavy users, what are the top sites being queried DHCP admin Improve lease history, find most active DHCP clients Security admin Improve traceability for compliance purposes Network admin Understand subnet utilization for planning purposes Helpdesk Better “at a glance” visibility into current state of DDI Management Provide simple, presentable reporting formats on trends 19
  • 20. © 2013 Infoblox Inc. All Rights Reserved. CAC / PKI Login Enhancement User Name pulled automatically from the Smart Card certificate MSFT AD RADIUS TACACS+ local continue to be user authentication
  • 21. © 2013 Infoblox Inc. All Rights Reserved. CAC / PKI Access Protection 21 GUI locks when Smart Card is removed
  • 22. © 2013 Infoblox Inc. All Rights Reserved. IB-4030 Recursive DNS w/ DDOS Performance §  A carrier grade DNS recursive appliance with over 1M DNS queries per second Software §  Built-in threat protection §  URL Blacklisting / NXDOMAIN Redirection §  Cache pre-fetching and DNSSEC World’s Most Scalable, Secure, and Manageable DNS Caching Server 22
  • 23. © 2013 Infoblox Inc. All Rights Reserved. Infoblox DNS Firewall Protect 23
  • 24. © 2013 Infoblox Inc. All Rights Reserved. Overall Malware Threats Booming §  Average over 7 million new Malware threats per quarter in 2012* §  Mobile threats grew about 10X in 2012* §  855 successful breaches / 174 million records compromised in 2012** §  69% of successful breaches utilized Malware** §  54% took months to discover, 29% weeks** §  92% discovered by external party** 0 2,000,000 4,000,000 6,000,000 8,000,000 10,000,000 Q1 2010 Q2 2010 Q3 2010 Q4 2010 Q1 2011 Q2 2011 Q3 2011 Q4 2011 Q1 2012 Q2 2012 Q3 2012 New Malware 0 5,000 10,000 15,000 20,000 25,000 2004 2005 2006 2007 2008 2009 2010 2011 2012 Total Mobile Malware Samples in the Database Startling Statistics * Source: McAfee Threats Report: Third Quarter 2012 ** Source: Verizon Security Study 2012 24
  • 25. © 2013 Infoblox Inc. All Rights Reserved. Customer Challenge: New Class of Malware DNS HAS BECOME A TARGET PATHWAY FOR A NEW CLASS OF MALWARE DNS INFRASTRUCTURE IS THE ONLY WAY TO DEFEND AGAINST THIS TYPE OF MALWARE COMMUNICATION PROTOCOL BECAME MAINSTREAM PATHWAY FOR MALWARE IRC (Chat) 1999 HTTP 2004 P2P 2007 DNS 2011 25
  • 26. © 2013 Infoblox Inc. All Rights Reserved. DNS Firewall – Complement Existing Security §  Traditional or next generation firewall (e.g. Checkpoint, Juniper, Palo Alto, Imperva, Cisco, etc.) §  Anti-Virus (e.g. Symantec, McAfee, Webroot, Kapersky, etc.) §  Email / Web security (e.g. Blue Coat, McAfee, Websense) §  Advance Persistent Threat (APT) (e.g. Damballa, FireEye) §  Security Information and Event Management (SIEM) (e.g. Trustwave, McAfee, Q1Labs) 26
  • 27. © 2013 Infoblox Inc. All Rights Reserved. Write to Syslog and send to Trinzic Reporting Introducing Infoblox DNS Firewall Reputational Feed from Infoblox Landing Page / Walled Garden Infected Client Infoblox DNS Firewall / Recursive DNS Server Infoblox DNS Firewall / Recursive DNS Server Infoblox DNS Firewall / Recursive DNS Server Redirect Dynamic Grid-Wide Policy Distribution Dynamic Policy Update Block / Disallow session Contact botnetLink to malicious www.badsite.com Apply Policy 27
  • 28. © 2013 Infoblox Inc. All Rights Reserved. Detailed Tracking and Reporting Options §  Automatic reporting §  Top Infected Clients §  Malicious requested domains and number of requests §  Lease history by MAC address with detailed drill down Security Policy Violations Report 28
  • 29. © 2013 Infoblox Inc. All Rights Reserved. §  1/30/13 NY Times article – NY Times victim of hacker / malware attacks over 4 months originating in China* §  The Attack –  Initial infection: Phishing / Spear Phishing –  Botnet / attackers changed IP addresses; used compromised US University machines as proxies –  Utilized over 45 types of malware, only 1 caught by the Anti-Virus defense §  Why so difficult to detect –  Malware/attacks designed to circumvent firewalls, web filtering, antivirus, and other defenses –  Appears it used DNS to locate the botnet controller §  How DNS Firewall could have helped –  Probably prevented infection via phishing –  Disrupted botnet communications to China –  Report Server: Early alert of attacks Perfect Breach Example – New York Times Attack 29
  • 30. © 2013 Infoblox Inc. All Rights Reserved. 30 APT / Botnet Malware Requires a New Approach §  Existing security approaches do not effectively address malware that exploits DNS. Examples: –  Malware repacks to avoid signature-based detection –  Botnet controllers typically change URLs dynamically to circumvent Web Filters –  Botnet controllers change IP addresses / use other techniques to circumvent Firewalls * http://www.securityweek.com/why-dns-firewalls-should-become-next-hot-thing-enterprise-security “… DNS firewalls likely would have prevented the success of more than 80 percent of these attacks.”* 30
  • 31. © 2013 Infoblox Inc. All Rights Reserved. Infoblox Security Device Controller Control 31
  • 32. © 2013 Infoblox Inc. All Rights Reserved. DHCP Fingerprint 32
  • 33. © 2013 Infoblox Inc. All Rights Reserved. Very Simple, Un-Intrusive, No Discovery Overhead 33 DHCPDISCOVER Option Sequence 1,15,3,6,44,46,47,31,33,121,249,43 Windows 7 DHCPOFFER Option Sequence 1,3,6,15,119,78,79,95,252 iPad DHCPOFFER DHCPDISCOVER X
  • 34. © 2013 Infoblox Inc. All Rights Reserved. Control - What you don’t know Enhanced DHCP Lease Information 34 Sort Filter Smart Folder
  • 35. © 2013 Infoblox Inc. All Rights Reserved. Control - What you don’t know Custom DHCP Fingerprint Management 35
  • 36. © 2013 Infoblox Inc. All Rights Reserved. Control – Through Network Planning Device Trend What devices are being used where? Is a certain device trending up, or down? 36
  • 37. © 2013 Infoblox Inc. All Rights Reserved. Control – Through Network Planning Top Device What are the top devices? Click on the device type to view IP/MAC information 37
  • 38. © 2013 Infoblox Inc. All Rights Reserved. SDC 38
  • 39. © 2013 Infoblox Inc. All Rights Reserved. Network Security Management: Today 39
  • 40. © 2013 Infoblox Inc. All Rights Reserved. Manual The Pain of Legacy Processes Legacy Approach Hours/ Days Firewall Change Needed 1 Search For Devices 2 Figure Out Impacted Devices 3 Determine Correct Config 4 Compare Change to Standards/ Compliance 5 Request Change/ Implement Manually 6 Reconfirm Correctness and Compliance Hours/DaysNetwork Provisioning Time §  Manual processes cannot keep up §  SLA are lengthening to weeks or a even a month §  Require dedicated, senior network architects –  Routine, repetitive, error-prone –  Multiple vendor expertise needed 40
  • 41. © 2013 Infoblox Inc. All Rights Reserved. CHANGE REQUEST MULTI- VENDOR FIREWALL MULTI- VENDOR ROUTER/ FIREWALL MULTI- VENDOR FIREWALL MULTI- VENDOR SWITCH/ FIREWALL Infoblox Security Device Controller §  Increases speed and accuracy of new service deployment §  Improves SLAs with automated provisioning §  Reduce risk with embedded intelligence and modeling §  Reduce errors & over-reliance on high level engineers SERVICE/ APPLICATIONUSER APPROVED CHANGE IT TICKETING SYSTEM 41
  • 42. © 2013 Infoblox Inc. All Rights Reserved. Five Pillars of Controlling Security Devices Embedded Expertise Automated Discovery Multi-vendor Provisioning Customized Alerting Powerful Search 42
  • 43. © 2013 Infoblox Inc. All Rights Reserved. Automated Network Discovery Simple and complete network-wide discovery Powerful topology to visualize path 43
  • 44. © 2013 Infoblox Inc. All Rights Reserved. Embedded Expertise Built-in intelligence automatically provides detailed ACL/rule views Detects problems like unused, overlapping and duplicate rules out-of-the box 44
  • 45. © 2013 Infoblox Inc. All Rights Reserved. Powerful Search Search results identify all matching devices including vendor specific syntax Easily customize search criteria for one or multiple devices 45
  • 46. © 2013 Infoblox Inc. All Rights Reserved. Customizable Alerting Immediately identify and track defined alerts to allow or deny access Create Alerts for both Blacklisting and Whitelisting 46
  • 47. © 2013 Infoblox Inc. All Rights Reserved. Multi-vendor Provisioning Maintain control with user-based access rights and change process Provision changes in the same platform and view the vendor-specific syntax 47
  • 48. © 2013 Infoblox Inc. All Rights Reserved. Manual The Power of Infoblox Legacy Approach Infoblox Approach Hours/ Days 1 62 3 4 5 Automated Days/ Weeks Firewall Change Needed 1 Search For Devices 2 Figure Out Impacted Devices 3 Determine Correct Config 4 Compare Change to Standards/ Compliance 5 Request Change/ Implement Manually 6 Reconfirm Correctness and Compliance Firewall Change Needed 48
  • 49. © 2013 Infoblox Inc. All Rights Reserved. Compliance, Internal Policies & Best Practices Enforce and Maintain 49
  • 50. © 2013 Infoblox Inc. All Rights Reserved. Standard ConfigurationsAuditability Process Enforcement Secure Configurations User Permission Control Visibility & Documentation Continuous Monitoring Change Tracking Standardization and Compliance Drivers Regulatory or Industry Mandates Corporate Security Policies Engineering Team Best Practices 50
  • 51. © 2013 Infoblox Inc. All Rights Reserved. Common Standardization & Compliance Situation §  Requirements are researched and documented §  Normally not thought of until: –  An audit is required –  Something breaks §  Believe the processes are good best practices but: –  Staff is too busy doing everything else to be proactive 51
  • 52. © 2013 Infoblox Inc. All Rights Reserved. Compliance Monitoring Best Practices Define & Customize Rules/Policies Segment Policies to Devices Track and Audit Configurations and Changes Continuously Review for Compliance Proactive Notification for Violations Automated Reports 52
  • 53. © 2013 Infoblox Inc. All Rights Reserved. Infoblox Network Automation Overview • Network discovery • Built-in analysis • Check against best practices • Detect issues • Monitor and manage change • Automate change • Maintain compliance • Provision ACL & rules Collected Via: SNMP CLI/configuration Syslog Fingerprinting Real-time & Historical Analysis 53
  • 54. © 2013 Infoblox Inc. All Rights Reserved. Standardization - Compliance Management Embedded compliance rules Customizable best practice templates Manage multiple policies Proactive violation detected Multiple remediation options Current and historical views 54
  • 55. © 2013 Infoblox Inc. All Rights Reserved. Configuration Analysis Unique pre-packaged expertise Identifies common misconfigurations Customizable alerting Recommended remediation options Understand concept of the network Network Scorecard views 55
  • 56. © 2013 Infoblox Inc. All Rights Reserved. Powerful Reporting Single-click compliance reports Pre-packaged and customizable Powerful filtering Executive and detailed reports On-demand or scheduled User-based view rights 56
  • 57. © 2013 Infoblox Inc. All Rights Reserved. Value of Network Standardization Verify your “desired state” to the “as is state” §  Improve network stability and consistency §  Reduce manual processes §  Eliminate extensive, time- consuming audit teams §  Increase accuracy with automation and embedded expertise §  Focus on building secure infrastructure instead of waiting for audits 57
  • 58. © 2013 Infoblox Inc. All Rights Reserved. Infoblox Value To Our Customer 58 Secure •  Secure hardware form-factor & hardened OS •  Designed to minimize vulnerabilities and attack surfaces •  Common Criteria certified •  GridTM technology for fault tolerance, easy updates and one-click DR •  Optimized for enterprise demand & performance •  Authoritative source for network dataAvailable •  Powerful automation of manual processes •  Reduce change errors & assure compliance •  Save time, money and effort Automated Automated SecureAvailable Infoblox makes networks more available, secure and automated
  • 59. © 2013 Infoblox Inc. All Rights Reserved. Thank You 59