SlideShare a Scribd company logo
WHITE PAPER




                                               Is Your Network Safe Behind Just A Firewall?


      Malware Threatens                        Malicious software or “malware” is the                               In essence, malware acts like a parasite
       Network Security                        biggest network security threat facing                               on a network. It is designed to infiltrate
                                               organizations today. Cybercriminals                                  a computer system without permission.
                                               target enterprises that hold a great deal                            Even the most well-intentioned employee
                                               of money or conduct a high volume of                                 may accidentally download malware –
                                               transactions on a daily basis. A network                             such as Zeus (Zbot) – from a Web site
                                               intrusion can cost an organization as                                or open it via an e-mail attachment. The
                                               much as $5 million. And, the damage                                  worm then slips past network security
                                               to a company’s reputation can be                                     measures and hides against the firewall.
                                               irreparable. Statistics show that if a                               Here, it collects data and absorbs
                                               major security breach occurs against                                 private information passing through,
                                               a U.S. enterprise, that organization                                 such as credit card numbers, account
                                               has a 90 percent chance of going out                                 numbers, or social security numbers.
                                               of business within two years. This is                                The worm then sends that information
                                               particularly alarming considering that                               back to the host, who then sells it to
                                               malware is currently the fastest-                                    criminals for identity fraud, e-scams, and
                                               growing trend in the misuse of                                       other personally invasive crimes.
                                               network resources.



      The Threat is Real                       This threat of malware is very real.                                 Just as federal regulators have made
                                               Private information is at risk without                               efforts to protect privacy through
                                               the proper network security measures.                                statutes such as HIPAA, Gramm-
                                               Unfortunately, a majority of anti-virus                              Leach-Bliley, and PCI DSS, compliance
                                               programs and network firewalls cannot                                 standards are moving toward required
                                               protect against intrusion risks beyond                               advanced network security measures.
                                               viruses and Trojan worms. Organizations
                                               have to be smarter than the criminals
                                               they’re up against.




                                                                                                                                                       © Windstream 2012




         DATE: 3.27.12 | REVISION: 1 | 009573_Is_Your_Network_Safe | CREATIVE: MF | JOB#: 9573 - Is Your Network Safe | COLOR: 4C | TRIM: 8.5” x 11”
WHITE PAPER




     A Firewall is Not Enough   Today’s malware is so advanced that a         network. If there is danger lurking
                                firewall alone will still leave a network      outside the front door (port connection)
                                vulnerable. A firewall provides a basic        and the data finds a way into the home
                                line of defense by allowing or blocking       (the network), it will cause an intense
                                connectivity to the network through           amount of damage. And, although it’s
                                port connections. Think of a firewall          not practical to check your guests’ bags,
                                like a house: it allows you to close and      it is necessary to scan all items entering
                                lock the doors and windows you don’t          your network to determine if they are
                                want outsiders to have access to, while       friend or foe because the network’s
                                keeping them open for welcome visitors.       health and safety rely on it.

                                The problem with this defense is that the
                                firewall does not investigate the data that
                                is allowed to enter the doors on the




          IDPS is the Answer    Intrusion Detection and Protection            In a 2009 survey, Forrester Research
                  to Malware    Systems (IDPS) are the newest line of         showed that IDPS is the second most
                                defense in network security and combine       in-demand security solution. Many of the
                                two levels of network protection into one:    solutions on the market today are either
                                intrusion detection and prevention. These     IPS or IDS. Windstream’s IDPS requires
                                systems identify and prevent malware          no additional equipment purchases, and
                                intrusion by examining information via        has the ability to provide powerful and
                                sensors within the network infrastructure.    efficient security while also being cost-
                                                                              effective for the customer. Windstream
                                An Intrusion Detection System (IDS)           offers an IDPS solution that outperforms
                                monitors activities on the network by         other products in the industry because
                                searching for malware and producing           of its ability to minimize risk and cost for
                                reports for the system administrator.         an organization.
                                Intrusion Prevention Sensors (IPS) actively
                                block the malware on the network,             IDPS is a substantial part of an
                                dropping the malicious data while still       enterprise security solution used to
                                allowing normal data to continue on the       protect the network. In order to set
                                network. With IDPS, the solution runs         up proper network security, layers
                                along the MPLS cloud. If the malware          of products, software, and solutions
                                is right on the network’s doorsteps, the      need to be in place that protect against
                                technology is efficient enough to detect       various threats. Firewalls, anti-virus
                                and prevent it from entering before the       programs, access controls, and an IDPS
                                data leaves the cloud.                        solution are all necessary to achieve
                                                                              effective network security.



                                                                                                        © Windstream 2012
WHITE PAPER




              How IDPS Works   An IDPS keeps risks away from                IDPS customer and Windstream’s
                               important data. It acts like a bouncer       security operations center are alerted.
                               standing outside of a bar checking IDs:      Windstream engineers contact the
                               it detects malware and prevents it from      customer about the malicious activity,
                               hanging out along the firewall. The IDPS      and also help remediate the problem.
                               is constantly scanning the network
                               for known threats. These threats are         Management of an IDPS is just as
                               identified in several ways, including         important as purchasing the solution
                               through customer-provided data or Web        itself. With current IDS or IPS solutions,
                               security solutions such as McAfee. It is     IT professionals need to sift through a
                               also continuously searching the network      wall of network data that likely contains a
                               for any possible anomalies.                  great deal of false positives – information
                                                                            that is classified as malicious, but is, in
                               Windstream’s IDPS sensors provide            fact, harmless. Windstream manages
                               “zero hour” protection for the customer      this process for the customer, and has
                               so an organization is protected as           a 99.9999 percent guarantee against
                               soon as threats are launched. When           false positives, ensuring that the IT
                               an anomaly is discovered, both the           professional’s time is spent in the most
                                                                            productive way possible.




                                                                                               INTERNET




                                                                                      FIREWALL &
                                                                                     IDPS PRIMARY

                                              SITE 3                      MPLS
                                                                              FIREWALL &
                                                                             IDPS PRIMARY


                                              SITE 1


                                                                                               INTERNET
                                                              EVENT
                                                           CORRELATION
                                                             SERVERS

                                                                            SITE 2




                               This diagram shows the network infrastructure and how the IDPS works in conjunction
                               with the firewall, and the MPLS cloud, in order to secure the network.




                                                                                                          © Windstream 2012
WHITE PAPER




                     The ROI of IDPS            The manpower and capital resources              In addition, purchasing an IDPS
                                                required to protect against the threat          solution is like buying insurance for an
                                                of malware is significant; however,              organization’s reputation. As malware
                                                Windstream’s IDPS provides network              evolves, network security must keep
                                                protection and a good return on                 pace. If not, companies will continue to
                                                investment for organizations. Since             be at risk for damage to their networks
                                                Windstream’s security engineers                 and reputations. One network security
                                                provide support for the IDPS, the need          breach can bring operations to a
                                                is eliminated for customers to hire             screeching stop. An IDPS works along
                                                additional IT staff, complete extra             with other network security measures
                                                levels of certification, or incur capital        in order to prevent this from happening
                                                costs associated with maintaining               and has proven to be the most effective
                                                multiple security devices and information       response in evading malware threats.
                                                security providers.



                           Conclusion           The best way to provide adequate                data theft. For more information on
                                                security for an organization is to stay         Windstream’s IDPS solution, or to have
                                                informed on threats, analyze                    Windstream evaluate the strength of
                                                vulnerabilities, and work with a partner        your network firewall, visit
                                                that can help you build your security           www.windstream.com.
                                                solution. IDPS is a crucial layer and
                                                Windstream offers the most advanced
                                                solution to protect your network against




    Quick Facts:
    In the first quarter of 2010, nearly 27 percent of malware attacks occurred in the United States – second only to Brazil. While 98
    percent of malware attacks are conducted by nondiscriminating automated systems, 2 percent are sophisticated hackers
    targeting a specific company network.

    Nonetheless, cybercrime acts continue to grow, and remain profitable for the hacker:
                Internet crime in the U.S. increased 23 percent in 2009
                Personal identity sells for $.40 per person on the black market
                Healthcare data, such as dental records, sells for $14 per person




009573 | 3/12                                                                                                             © Windstream 2012

More Related Content

What's hot

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
CMR WORLD TECH
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
FindWhitePapers
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
FindWhitePapers
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
Ricardo Resnik
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
Imperva
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
Booz Allen Hamilton
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
Lumension
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
patmisasi
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
ecarrow
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
Advanced Technology Consulting (ATC)
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Netpluz Asia Pte Ltd
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Netpluz Asia Pte Ltd
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Trend Micro
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
IBM
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 

What's hot (20)

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Information security
Information securityInformation security
Information security
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 

Similar to White Paper: Is Your Network Safe Behind Just a Firewall?

Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Erik Ginalick
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
Quick Heal Technologies Ltd.
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
Seqrite
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
GFI Software
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
Ravi Kumar Pawanism
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
Booz Allen Hamilton
 
Data security
 Data security  Data security
Data security
Laura Breese
 
COMPUTER SEMINAR network security threats .pptx
COMPUTER SEMINAR  network security threats .pptxCOMPUTER SEMINAR  network security threats .pptx
COMPUTER SEMINAR network security threats .pptx
manishae08
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber security
HeritageCyberworld
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
NetWitness
NetWitnessNetWitness

Similar to White Paper: Is Your Network Safe Behind Just a Firewall? (20)

Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Data security
 Data security  Data security
Data security
 
COMPUTER SEMINAR network security threats .pptx
COMPUTER SEMINAR  network security threats .pptxCOMPUTER SEMINAR  network security threats .pptx
COMPUTER SEMINAR network security threats .pptx
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber security
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
NetWitness
NetWitnessNetWitness
NetWitness
 

More from Windstream Enterprise

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
Windstream Enterprise
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Enterprise
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
Windstream Enterprise
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Enterprise
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
Windstream Enterprise
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
Windstream Enterprise
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Enterprise
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWindstream Enterprise
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...Windstream Enterprise
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
Windstream Enterprise
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHR
Windstream Enterprise
 
White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI Perspective
Windstream Enterprise
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. Michael
Windstream Enterprise
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol Broadcasting
Windstream Enterprise
 

More from Windstream Enterprise (16)

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Maximizing it budget
Maximizing it budgetMaximizing it budget
Maximizing it budget
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
 
Product Information: Cloud Services
Product Information: Cloud ServicesProduct Information: Cloud Services
Product Information: Cloud Services
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHR
 
White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI Perspective
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. Michael
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol Broadcasting
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

White Paper: Is Your Network Safe Behind Just a Firewall?

  • 1. WHITE PAPER Is Your Network Safe Behind Just A Firewall? Malware Threatens Malicious software or “malware” is the In essence, malware acts like a parasite Network Security biggest network security threat facing on a network. It is designed to infiltrate organizations today. Cybercriminals a computer system without permission. target enterprises that hold a great deal Even the most well-intentioned employee of money or conduct a high volume of may accidentally download malware – transactions on a daily basis. A network such as Zeus (Zbot) – from a Web site intrusion can cost an organization as or open it via an e-mail attachment. The much as $5 million. And, the damage worm then slips past network security to a company’s reputation can be measures and hides against the firewall. irreparable. Statistics show that if a Here, it collects data and absorbs major security breach occurs against private information passing through, a U.S. enterprise, that organization such as credit card numbers, account has a 90 percent chance of going out numbers, or social security numbers. of business within two years. This is The worm then sends that information particularly alarming considering that back to the host, who then sells it to malware is currently the fastest- criminals for identity fraud, e-scams, and growing trend in the misuse of other personally invasive crimes. network resources. The Threat is Real This threat of malware is very real. Just as federal regulators have made Private information is at risk without efforts to protect privacy through the proper network security measures. statutes such as HIPAA, Gramm- Unfortunately, a majority of anti-virus Leach-Bliley, and PCI DSS, compliance programs and network firewalls cannot standards are moving toward required protect against intrusion risks beyond advanced network security measures. viruses and Trojan worms. Organizations have to be smarter than the criminals they’re up against. © Windstream 2012 DATE: 3.27.12 | REVISION: 1 | 009573_Is_Your_Network_Safe | CREATIVE: MF | JOB#: 9573 - Is Your Network Safe | COLOR: 4C | TRIM: 8.5” x 11”
  • 2. WHITE PAPER A Firewall is Not Enough Today’s malware is so advanced that a network. If there is danger lurking firewall alone will still leave a network outside the front door (port connection) vulnerable. A firewall provides a basic and the data finds a way into the home line of defense by allowing or blocking (the network), it will cause an intense connectivity to the network through amount of damage. And, although it’s port connections. Think of a firewall not practical to check your guests’ bags, like a house: it allows you to close and it is necessary to scan all items entering lock the doors and windows you don’t your network to determine if they are want outsiders to have access to, while friend or foe because the network’s keeping them open for welcome visitors. health and safety rely on it. The problem with this defense is that the firewall does not investigate the data that is allowed to enter the doors on the IDPS is the Answer Intrusion Detection and Protection In a 2009 survey, Forrester Research to Malware Systems (IDPS) are the newest line of showed that IDPS is the second most defense in network security and combine in-demand security solution. Many of the two levels of network protection into one: solutions on the market today are either intrusion detection and prevention. These IPS or IDS. Windstream’s IDPS requires systems identify and prevent malware no additional equipment purchases, and intrusion by examining information via has the ability to provide powerful and sensors within the network infrastructure. efficient security while also being cost- effective for the customer. Windstream An Intrusion Detection System (IDS) offers an IDPS solution that outperforms monitors activities on the network by other products in the industry because searching for malware and producing of its ability to minimize risk and cost for reports for the system administrator. an organization. Intrusion Prevention Sensors (IPS) actively block the malware on the network, IDPS is a substantial part of an dropping the malicious data while still enterprise security solution used to allowing normal data to continue on the protect the network. In order to set network. With IDPS, the solution runs up proper network security, layers along the MPLS cloud. If the malware of products, software, and solutions is right on the network’s doorsteps, the need to be in place that protect against technology is efficient enough to detect various threats. Firewalls, anti-virus and prevent it from entering before the programs, access controls, and an IDPS data leaves the cloud. solution are all necessary to achieve effective network security. © Windstream 2012
  • 3. WHITE PAPER How IDPS Works An IDPS keeps risks away from IDPS customer and Windstream’s important data. It acts like a bouncer security operations center are alerted. standing outside of a bar checking IDs: Windstream engineers contact the it detects malware and prevents it from customer about the malicious activity, hanging out along the firewall. The IDPS and also help remediate the problem. is constantly scanning the network for known threats. These threats are Management of an IDPS is just as identified in several ways, including important as purchasing the solution through customer-provided data or Web itself. With current IDS or IPS solutions, security solutions such as McAfee. It is IT professionals need to sift through a also continuously searching the network wall of network data that likely contains a for any possible anomalies. great deal of false positives – information that is classified as malicious, but is, in Windstream’s IDPS sensors provide fact, harmless. Windstream manages “zero hour” protection for the customer this process for the customer, and has so an organization is protected as a 99.9999 percent guarantee against soon as threats are launched. When false positives, ensuring that the IT an anomaly is discovered, both the professional’s time is spent in the most productive way possible. INTERNET FIREWALL & IDPS PRIMARY SITE 3 MPLS FIREWALL & IDPS PRIMARY SITE 1 INTERNET EVENT CORRELATION SERVERS SITE 2 This diagram shows the network infrastructure and how the IDPS works in conjunction with the firewall, and the MPLS cloud, in order to secure the network. © Windstream 2012
  • 4. WHITE PAPER The ROI of IDPS The manpower and capital resources In addition, purchasing an IDPS required to protect against the threat solution is like buying insurance for an of malware is significant; however, organization’s reputation. As malware Windstream’s IDPS provides network evolves, network security must keep protection and a good return on pace. If not, companies will continue to investment for organizations. Since be at risk for damage to their networks Windstream’s security engineers and reputations. One network security provide support for the IDPS, the need breach can bring operations to a is eliminated for customers to hire screeching stop. An IDPS works along additional IT staff, complete extra with other network security measures levels of certification, or incur capital in order to prevent this from happening costs associated with maintaining and has proven to be the most effective multiple security devices and information response in evading malware threats. security providers. Conclusion The best way to provide adequate data theft. For more information on security for an organization is to stay Windstream’s IDPS solution, or to have informed on threats, analyze Windstream evaluate the strength of vulnerabilities, and work with a partner your network firewall, visit that can help you build your security www.windstream.com. solution. IDPS is a crucial layer and Windstream offers the most advanced solution to protect your network against Quick Facts: In the first quarter of 2010, nearly 27 percent of malware attacks occurred in the United States – second only to Brazil. While 98 percent of malware attacks are conducted by nondiscriminating automated systems, 2 percent are sophisticated hackers targeting a specific company network. Nonetheless, cybercrime acts continue to grow, and remain profitable for the hacker: Internet crime in the U.S. increased 23 percent in 2009 Personal identity sells for $.40 per person on the black market Healthcare data, such as dental records, sells for $14 per person 009573 | 3/12 © Windstream 2012