SlideShare a Scribd company logo
1 of 17
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
SDN Killer App Beyond Micro-Segmentation
Security Automation, Visibility and Monitoring
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Agenda
1. Trends and Security Challenges
2. Nuage VSP Security
3. Palo Alto NGFW Integration
4. Demo
5. Q&A
9/23/2020
2
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Market Trends Driving New Security Requirements
9/23/2020
3
Private /
Public /
Hybrid
• Security Automation
• Multi-tenancy
• Support Mobility
• Mitigate lateral spread
• Visibility to East/West Traffic
• Fast Response
Threat LandscapeMove to Cloud
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
SDN can help address these challenges!
Challenges with Existing Data Center Security Model
• Lack of visibility to
east/west traffic
• Detection is hard, slow
• Complex to manage
ACL lifecycle
• Service insertion is
manual
• Lack of sufficient
segmentation
• Limited by static
network topology
Protection Detection Operations
9/23/2020
4
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Micro-Segmentation reduces risks with “Zero-Trust” Model
 Benefits
 Enforce security between end-points
anywhere
 Restricts lateral movement of
malware
 Use Cases
 High value asset protection
 PCI compliance
 Restrict shared services access
 Securing east/west application traffic
Gartner, Network Security Architectures for Virtualized Data Centers, Joerg Fritsch, 10 August 2015
Untrusted Zone Outside (South)
DMZ
Trusted Zone
Restricted Zone
SQL
VoIPLaurel
App 1
WWW
Mobile
Index
Mail
DB
Stuttgart
Amsterdam
Hardy
DB
Record
Domain
Big Data
Search
Perimeter
Perimeter
Perimeter
Figure 2. Microsegmentation is Changing the Network Security Architecture
9/23/2020
5
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
 Secure multi-tenancy
 Isolation based on virtual
networks
 Logical segmentation using
policy groups
 Distributed L4 stateful
firewall
 Supports bare-metal, VMs,
containers
Nuage VSP enables Flexible Segmentation for ANY End-point
Tenant 1
Virtual
Network 1
(PCI Domain)
Virtual
Network 2
(Non PCI Domain)
E-commerce
front-end
Policy Group
E-commerce
back-end
Policy Group
Web Tier/
Policy Group
App Tier/
Policy Group
Data Tier/
Policy Group
9/23/2020
6
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Automate security service insertion
based on forwarding policy
Automate security provisioning at the
time of workload instantiation, removal
Automate enterprise wide security
enforcement to ensure compliance
Security Automation with Nuage VSP
Global Policy
Template
Hypervisor
ACL Config
Network
Security
Application
Team
Application
Specific Policy
Hypervisor
ACL Config
9/23/2020
7
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Visibility and Security Monitoring in Virtual Networks
• Contextual Flow Visibility
• Application Flow Detection
• Security Alerts
• Monitoring Reports
• ACL Flow Logging
• Policy based Mirroring
Web
App DB
9/23/2020
8
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Nuage Networks Integration with Palo Alto Networks Next
Generation Firewall
9/23/2020
9
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Nuage VSP and Palo Alto Networks VM-Series
…joint integration brings advanced security for SDN enabled data centers
VM-1000-HV Panorama
Nuage VSP
• Dynamic and transparent insertion of VM-
Series as security service during workload
deployment
• Automated security policy updates
• Micro segmentation of applications and
data
• Prevention of known and unknown threats
• Protection from lateral movement of
cyberattacks
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Nuage Networks VSP integration with Palo Alto Networks for
Advanced Security and Security Automation
 Security Automation
 Policy based insertion of physical
or virtual security services
 Policy based security automation
for any workload
 Advanced Security Controls
 Application based micro-
segmentation
 Advanced threat protection
Virtualized
Services
Directory
Virtualized
Services
Controller
HYPERVISOR
Virtualized
Router/Switch
Physical Gateway
HYPERVISOR
Virtual Gateway
API calls
Event & Policy
Synchronization
9/23/2020
11
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Use Case: Secure your high value assets
12
…with network and application-level micro segmentation and advanced threat protection
Intra-Tier Segmentation with
Nuage L3/L4 Distributed
Firewall
Inter-Tier Segmentation with Palo
Alto Networks VM-Series
NOVANEUTRON
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Demo Overview
 Micro-segmentation using Nuage
policy groups and Layer 4
distributed firewall
 Security automation to dynamically
move VM to suspect tier based on
alerts
 Security policy automated
dynamically to include suspect VM
using Palo Alto Networks Integration
 Advanced security protection with
Palo Alto Networks VM-Series NGFW
9/23/2020
13
WEB-Tier
APP-Tier
SUSPECT-Tier
External
network
DB-Tier
VM1
VM2
VM3
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Overcoming DeJaVu
..an example of a targeted attack for achieving lateral movement within data centers
Apache
Web Server
IBM WebSphere
Application Server
MySQL
Database Server
Remote code
injection over
SOAP/HTTP(S)
Root
privileges
Exfiltration of data
CVE 2015-7450
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Physical / Baremetal Containers / PaaS
PODPODPODVM VMVMVM VMVM
Openstack /CloudstackMulti-Hypervisor
Nuage VSP with Palo Alto Networks Delivers Advanced Security, Automation and Visibility
for ANY workload
Summary
Micro-Segmentation
Advanced Protection
Security
Automation
Visibility & Security
Monitoring
9/23/2020
15
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION
Resources
 Nuage Networks Micro-Segmentation and Security Automation White Paper
 http://bit.ly/microsegmentation
 Nuage Networks Micro-Segmentation, Automation and Visibility Demo with Palo Alto
Networks NGFW
 http://bit.ly/nuage-pan-security-demo
 Nuage Networks VSP integration with Palo Networks NGFW Solution Brief
 http://bit.ly/nuage-pan-solution
9/23/2020
16
© 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE.
CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW
PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION 9/23/2020
17
THANK YOU

More Related Content

What's hot

Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수NAIM Networks, Inc.
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Building a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5GBuilding a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5GPaul Bradley
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallShilaThak
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015abhi75
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex TrainingBryan Len
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?S&T Consulting Hungary
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategyxKinAnx
 

What's hot (20)

Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Building a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5GBuilding a chain of trust from the device to the cloud in 5G
Building a chain of trust from the device to the cloud in 5G
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Ds e class-nsa_e8500_us
Ds e class-nsa_e8500_usDs e class-nsa_e8500_us
Ds e class-nsa_e8500_us
 

Similar to Nuage-Palo Alto Security Automation

Nuage Networks Technology Program Partners Overview 2016
Nuage Networks Technology Program Partners Overview 2016Nuage Networks Technology Program Partners Overview 2016
Nuage Networks Technology Program Partners Overview 2016Hussein Khazaal
 
Service Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and salesService Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and salesHussein Khazaal
 
Presentation - Nuage Networks Partner Program Update 9/2016
Presentation - Nuage Networks Partner Program Update 9/2016Presentation - Nuage Networks Partner Program Update 9/2016
Presentation - Nuage Networks Partner Program Update 9/2016Hussein Khazaal
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Public Presentation - OpenStack Summit - Nuage X & DevIOps
Public Presentation - OpenStack Summit - Nuage X & DevIOpsPublic Presentation - OpenStack Summit - Nuage X & DevIOps
Public Presentation - OpenStack Summit - Nuage X & DevIOpsHussein Khazaal
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsADVA
 
finCODE US 2018 - En route to CI/CD nirvana
finCODE US 2018 - En route to CI/CD nirvanafinCODE US 2018 - En route to CI/CD nirvana
finCODE US 2018 - En route to CI/CD nirvanaRémi Vichery
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G NetworksPaul Bradley
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochureIEI Integration Corp.
 

Similar to Nuage-Palo Alto Security Automation (20)

Nuage Networks Technology Program Partners Overview 2016
Nuage Networks Technology Program Partners Overview 2016Nuage Networks Technology Program Partners Overview 2016
Nuage Networks Technology Program Partners Overview 2016
 
Service Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and salesService Launch - Nuage X as a SaaS platform for demos, integrations and sales
Service Launch - Nuage X as a SaaS platform for demos, integrations and sales
 
Presentation - Nuage Networks Partner Program Update 9/2016
Presentation - Nuage Networks Partner Program Update 9/2016Presentation - Nuage Networks Partner Program Update 9/2016
Presentation - Nuage Networks Partner Program Update 9/2016
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Public Presentation - OpenStack Summit - Nuage X & DevIOps
Public Presentation - OpenStack Summit - Nuage X & DevIOpsPublic Presentation - OpenStack Summit - Nuage X & DevIOps
Public Presentation - OpenStack Summit - Nuage X & DevIOps
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE Solutions
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
finCODE US 2018 - En route to CI/CD nirvana
finCODE US 2018 - En route to CI/CD nirvanafinCODE US 2018 - En route to CI/CD nirvana
finCODE US 2018 - En route to CI/CD nirvana
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Public Internet WAN
Public Internet WANPublic Internet WAN
Public Internet WAN
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G Networks
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Nuage-Palo Alto Security Automation

  • 1. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION SDN Killer App Beyond Micro-Segmentation Security Automation, Visibility and Monitoring
  • 2. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Agenda 1. Trends and Security Challenges 2. Nuage VSP Security 3. Palo Alto NGFW Integration 4. Demo 5. Q&A 9/23/2020 2
  • 3. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Market Trends Driving New Security Requirements 9/23/2020 3 Private / Public / Hybrid • Security Automation • Multi-tenancy • Support Mobility • Mitigate lateral spread • Visibility to East/West Traffic • Fast Response Threat LandscapeMove to Cloud
  • 4. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION SDN can help address these challenges! Challenges with Existing Data Center Security Model • Lack of visibility to east/west traffic • Detection is hard, slow • Complex to manage ACL lifecycle • Service insertion is manual • Lack of sufficient segmentation • Limited by static network topology Protection Detection Operations 9/23/2020 4
  • 5. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Micro-Segmentation reduces risks with “Zero-Trust” Model  Benefits  Enforce security between end-points anywhere  Restricts lateral movement of malware  Use Cases  High value asset protection  PCI compliance  Restrict shared services access  Securing east/west application traffic Gartner, Network Security Architectures for Virtualized Data Centers, Joerg Fritsch, 10 August 2015 Untrusted Zone Outside (South) DMZ Trusted Zone Restricted Zone SQL VoIPLaurel App 1 WWW Mobile Index Mail DB Stuttgart Amsterdam Hardy DB Record Domain Big Data Search Perimeter Perimeter Perimeter Figure 2. Microsegmentation is Changing the Network Security Architecture 9/23/2020 5
  • 6. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION  Secure multi-tenancy  Isolation based on virtual networks  Logical segmentation using policy groups  Distributed L4 stateful firewall  Supports bare-metal, VMs, containers Nuage VSP enables Flexible Segmentation for ANY End-point Tenant 1 Virtual Network 1 (PCI Domain) Virtual Network 2 (Non PCI Domain) E-commerce front-end Policy Group E-commerce back-end Policy Group Web Tier/ Policy Group App Tier/ Policy Group Data Tier/ Policy Group 9/23/2020 6
  • 7. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Automate security service insertion based on forwarding policy Automate security provisioning at the time of workload instantiation, removal Automate enterprise wide security enforcement to ensure compliance Security Automation with Nuage VSP Global Policy Template Hypervisor ACL Config Network Security Application Team Application Specific Policy Hypervisor ACL Config 9/23/2020 7
  • 8. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Visibility and Security Monitoring in Virtual Networks • Contextual Flow Visibility • Application Flow Detection • Security Alerts • Monitoring Reports • ACL Flow Logging • Policy based Mirroring Web App DB 9/23/2020 8
  • 9. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Nuage Networks Integration with Palo Alto Networks Next Generation Firewall 9/23/2020 9
  • 10. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Nuage VSP and Palo Alto Networks VM-Series …joint integration brings advanced security for SDN enabled data centers VM-1000-HV Panorama Nuage VSP • Dynamic and transparent insertion of VM- Series as security service during workload deployment • Automated security policy updates • Micro segmentation of applications and data • Prevention of known and unknown threats • Protection from lateral movement of cyberattacks
  • 11. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Nuage Networks VSP integration with Palo Alto Networks for Advanced Security and Security Automation  Security Automation  Policy based insertion of physical or virtual security services  Policy based security automation for any workload  Advanced Security Controls  Application based micro- segmentation  Advanced threat protection Virtualized Services Directory Virtualized Services Controller HYPERVISOR Virtualized Router/Switch Physical Gateway HYPERVISOR Virtual Gateway API calls Event & Policy Synchronization 9/23/2020 11
  • 12. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Use Case: Secure your high value assets 12 …with network and application-level micro segmentation and advanced threat protection Intra-Tier Segmentation with Nuage L3/L4 Distributed Firewall Inter-Tier Segmentation with Palo Alto Networks VM-Series NOVANEUTRON
  • 13. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Demo Overview  Micro-segmentation using Nuage policy groups and Layer 4 distributed firewall  Security automation to dynamically move VM to suspect tier based on alerts  Security policy automated dynamically to include suspect VM using Palo Alto Networks Integration  Advanced security protection with Palo Alto Networks VM-Series NGFW 9/23/2020 13 WEB-Tier APP-Tier SUSPECT-Tier External network DB-Tier VM1 VM2 VM3
  • 14. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Overcoming DeJaVu ..an example of a targeted attack for achieving lateral movement within data centers Apache Web Server IBM WebSphere Application Server MySQL Database Server Remote code injection over SOAP/HTTP(S) Root privileges Exfiltration of data CVE 2015-7450
  • 15. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Physical / Baremetal Containers / PaaS PODPODPODVM VMVMVM VMVM Openstack /CloudstackMulti-Hypervisor Nuage VSP with Palo Alto Networks Delivers Advanced Security, Automation and Visibility for ANY workload Summary Micro-Segmentation Advanced Protection Security Automation Visibility & Security Monitoring 9/23/2020 15
  • 16. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION Resources  Nuage Networks Micro-Segmentation and Security Automation White Paper  http://bit.ly/microsegmentation  Nuage Networks Micro-Segmentation, Automation and Visibility Demo with Palo Alto Networks NGFW  http://bit.ly/nuage-pan-security-demo  Nuage Networks VSP integration with Palo Networks NGFW Solution Brief  http://bit.ly/nuage-pan-solution 9/23/2020 16
  • 17. © 2016 NOKIA. ALL RIGHTS RESERVED. NUAGE NETWORKS IS A NOKIA VENTURE. CONFIDENTIAL - SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW PROPRIETARY – USE PURSUANT TO COMPANY INSTRUCTION 9/23/2020 17 THANK YOU

Editor's Notes

  1. There are 2 key drivers we see that is driving new security requirements for how enterprises secure applications and data. First, with the move to virtualization and cloud, networking and security needs to evolve to not be a bottleneck. security boundaries based on perimeter and traditional trust model breaks down as the infrastructure is shared between multiple tenants and we can no longer assume anything is trusted inside the data center network. 2nd the threat landscape is evolving and attacks are not only getting past existing security controls but are also harder to detect as they laterally move through various systems inside the data center
  2. Existing security model cannot effectively address these new security requirements. First, current protection model in Enterprise datacenters is largely perimeter-centric. Only the traffic gets through the firewall into a zone there is very little segmentation to prevent malware from spreading from one server to another within the same zone. In addition, the firewalls are placed in specific points in the network and security zoning is based on static network topology. If workloads are moved around within the data center or to another data center or cloud the security policies don’t move with the workloads and requires manual intervention to re-configure. Second, with the increasing attack sophistication and evolving threat landscape we cannot assume that all attacks can be prevented by protective controls. Currently there is no visibility to east/west application traffic inside the data center as it is impossible to . Visibility and security analytics are key to help detect attacks. Last but not least, the current security provisioning model for applications is largely manual and device-centric. It can take weeks in an enterprise to provision firewall policies for a new application deployment and obtain the approvals from various stakeholders. In addition, the ACLs themselves are a challenge to manage.. ACLs are based on IP addresses and subnets and arent mapped to applications. As a result, ACLs are not touched even though the application is de-commissioned. This doesn’t scale for cloud environment and presents a bottleneck. Nuage SDN (VSP) together with security eco-system partners (such as PANW and others) can help address these challenges.
  3. One of the key capabilities enabled by SDN to address the new security requirements is micro-segmentation. Micro-segmentation is the ability to insert a security service between between any two end-points (VMs or containers or BM) in the same broadcast domain. Instead of assuming any traffic that goes based a DMZ or internal firewall is trusted, one can enforce security between various application components / tiers (such as web/app/db) inside the data center or even security within a particular tier of an application. In a micro-segmented environment, security is enforced in every end-point and hence we no longer need to assume trust based on static boundaries.. All east/west traffic can be inspected and appropriate security controls applied with distributed security controls closer to the workload. A key benefit of micro-segmented environment when appropriate policies are in place is to contain the spread of malware from one server to another. If policy is enforced at each end-point/server where workload resides (as with Nuage SDN and few others) with distributed firewall, policies can follow workloads and you get security anywhere in the network and enable mobility. Clearly moving an entire enterprise data center from current model to a micro-segmented environment is not a simple under-taking. What we are seeing from enterprise customers are they are picking specific use cases for micro-segmentation. Severa financials are picking high value assets/applications as a key use case. We also see compliance as a key use case where customers want to use micro-segmentation to reduce the scope of PCI compliance. Another key use case is restricting access to shared services such as backup infrastructure that various services can connect to address the lateral spread using shared infra as a channel.
  4. The intent of this slide is to go a little bit into “HOW” Nuage VSP solution delivers secure multi-tenancy and micro-segmentation. There are three key abstractions that enables Nuage SDN to support these capabilities. First is the concept of tenant to provide separation of organization from organization/adminsitrative perspective. 2nd is the the concept of virtual networks / domain. The 3rd key concept is policy based grouping to offer logical segmentation. Nuage VSP SDN solution is a software based network virtualization and distributed security platform that offers the ability to create multi-tenant, isolated virtual networks / domains on top of any IP based physical network. Unlike some of the competitive alternatives, Nuage SDN solution can work with any IP based underlay network and can support multi-hypervisors (ESXi, KVM), containers, PaaS (openshift)/Orchestration (kubernetes) Nuage VSP SDN solution supports logical segmentation of application end-points based on logical context (such as app-tier, app lifecycle, compliance requirements) using the concept of policy groups/zones rather than requiring segmentation policies to be defined and enforced based on IP subnets/VLANs. This abstraction provide the capability to enforce security even as workloads move in the datacenter and cloud environment.
  5. Security automation is a key requirement for cloud and modern data center environment. With Nuage VSP platform. There are 3 key areas of security automation as it pertains to automating security for distributed applications. First, one the key areas to address is compliance. Enterprise security teams define a set of security policies that their IT environment including network, compute and storage needs to adhere to. With Nuage VSP, these enterprise wide network security policies can be centrally defined in a logical template and automatically enforced in every virtual network that is instantiated based on the template. Another use of this template is to automate security policy to say a new worm or a virus at every workload by simply adding a global policy in the template to block a specific set of ports/protocols without having to configure every firewall in the data center. Second area of automation is actually provision security policies for a application deployment – both new as well as expansion of capacity for an existing application. With the current provisioning model, it can take weeks to implement a ACL with all the approvals in the organization. With Nuage SDN, security policies (ACLs) are automatically pushed to every end-point where the workload is brought up and enforced using L4 distributed firewall. In addition, we can also insert advanced security services such as NGFW (PANW and others) based on forwarding policies. The insertion and configuration of advanced security services such as NGFW is today manual. With Nuage integration with NGFW that you will see in the PANW integration demonstration not only is the insertion of security services be automated via policies but the policies for a new workload instance that is spun is automatically configured by our integration with NGFW.
  6. Several organizations lack the visibility to east/west application traffic inside the data center. This makes is harder to figure out what is going on inside the data center network as well as detect some advanced threats. Nuage VSP offers rich set of capabilities such as ACL allow/deny logs with additional context such as Policy group. In addition, traffic can be selectively mirrored based on policy to security analytics tools to further analyze traffic for detection. VSP also provides stats and threshold crossing alerts to automate abnormal events such as increase in policy violations (# ACL denys) etc. Beyond security operations, the ACL allow/deny logs can be used to address the problem of defining policies can micro-segmentation. By using ACL logs one visualize application flows and drive policies based on actual application traffic ,to build a whitelist policy model.
  7. Nuage VSP can automate insertion of both physical and virtual Palo alto networks NGFW and provide the ability to protect any workload (bare-metal, virtual – multi-hypervisor KVM/ESXi, containers)
  8. Challenge Granular segmentation of virtual workloads Security policy enforcement tied to workload mobility Application segmentation and protection against advanced threats Joint Integration L3/L4 distributed firewall for reduces attack surface area with L4 segmentation VM-Series provides application level micro-segmentation and protection against advanced threats Benefits: Automation and correlation for reduced TCO Meet compliance mandates
  9. Key differentiation of Nuage Networks integrated solution with Palo Alto is the ability to provide micro-segmentation with advanced security, automation and visibility for heterogeneous environments: multi-hypervisor, multi-cloud mgmt systems (Openstack/Cloud), multiple workload type (VM. Container, bare-metal) etc.