SlideShare a Scribd company logo
Secure Web Gateway (SWG) 
보안 웹 프록시
• outbound & inbound 의 효과적인 트래픽 제어 
• Inbound: 모든 사용자는 APM을 통하여 들어오는 트래픽 
에 대한 제어 (Access, VPN, Identity Federation, SSO, etc 
.) 
• Outbound: 위험한 웹 사이트 또는 악성 코드 감염으로 
부터 차단 
• 소셜 웹 미디어 사용시 작업에 따른 분류 보안 (Facebook 
, Twitter) 
• 웹사이트에 대한 검색 및 악성 코드 분류 및 효과적인 차 
단 
F5 SWG : Secure Web Gateway
F5 SWG 
주요 기능 위협 성능 
URL/App Filtering 
Policy based control and monitoring on who can ac 
cess what websites at what times with what risks inv 
olved 
Web Page Based Malware 
Detecting malware or malicious components inside 
web pages 
User Identification 
User names, IP addresses, devices used and more c 
ontextual information 
HTTP/SSL Forward Proxy 
Intercepts all outbound HTTP(S) traffic, inspect the 
URLs or web applications and enforce policy control 
s 
Security Management, Reporting & Logging 
VPE based policy, Top Security Event Reporting with 
drill-down capability to show details 
Malicious URLs Inside Search Results 
Detect and block URL links that embedded inside a 
search engine results, when client browsers failed to 
be configured with “safeSearch” mode. 
Visiting malicious websites and web based 
malware infections 
Regulatory compliance on reporting and e 
nforcing Internet usage based on policies 
Mitigation of sensitive data leakage by un 
authorized employees or through infected 
web applications 
Loss of business productivity because of 
unauthorized usage of Internet 
Metric Range 
Transaction Per Se 
TBD 
conds (TPS) 
L7 Throughput TBD 
# of Users 500-20,000 (BIG-IP) 
Up to 80,000 (VPR) 
Websense 
Threat 
Intelligence 
Enterprise Apps 
Remote 
Access 
3rd party Saa 
S 
Internet 
Secure Web Gateway
F5 SWG : 쉬운 정책 수립, 접근 및 통계 가시성
WEB Gateway/Filtering 솔루션 비교 
F5 
Bluecoat 
WF 
Bluecoat 
SWG 
Checkpo 
int SWG 
Palo Alt 
o 
PaWloFAlt 
o 
SWG 
Cisco W 
F 
Cisco S 
WG 
URL 
Cat. Engin 
e 
URL Filtering - Security x x x x x x 
URL Filtering – Productivity/Accept 
able Use 
x x x x x x x X 
Advanced Classificat 
ion Engine 
Real-time Security Classification x 
Anti-Malware Engine x x x x x x x 
Reputation Analysis x x x x 
Real-time Content Classification x (1) (1) (2) (2) (3) (3) 
(1) LimitedS Loincki aAln Malyesids iOan (lyFine-grained control) x x x 
(2) Limited to small number of applications 
(3) Simplistic weighted dictionary of keywords

More Related Content

What's hot

OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
shiriskumar
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
EMC
 
OWASP Top 10 Overview
OWASP Top 10 OverviewOWASP Top 10 Overview
OWASP Top 10 Overview
PiTechnologies
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
Antonio Fontes
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
vhimsikal
 
Content filters presentation
Content filters presentationContent filters presentation
Content filters presentation
kdore
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
Microsoft
 
Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
Chandrapal Badshah
 
Url filtration
Url filtrationUrl filtration
Url filtration
ronpoul
 
Web Filters
Web FiltersWeb Filters
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
Microsoft
 
Broken access control
Broken access controlBroken access control
Broken access control
Priyanshu Gandhi
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
Lan & Wan Solutions
 
Threat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine LearningThreat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine Learning
Priyanka Aash
 
Security Operations
Security OperationsSecurity Operations
Security Operations
ankitmehta21
 
Identity & access management jonas syrstad
Identity & access management jonas syrstadIdentity & access management jonas syrstad
Identity & access management jonas syrstad
Meandmine2
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
Sysfore Technologies
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
RomSoft SRL
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
martinvoelk
 
Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted software
Phú Phùng
 

What's hot (20)

OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
OWASP Top 10 Overview
OWASP Top 10 OverviewOWASP Top 10 Overview
OWASP Top 10 Overview
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
Content filters presentation
Content filters presentationContent filters presentation
Content filters presentation
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
Url filtration
Url filtrationUrl filtration
Url filtration
 
Web Filters
Web FiltersWeb Filters
Web Filters
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
 
Broken access control
Broken access controlBroken access control
Broken access control
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
Threat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine LearningThreat Detection using Analytics & Machine Learning
Threat Detection using Analytics & Machine Learning
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Identity & access management jonas syrstad
Identity & access management jonas syrstadIdentity & access management jonas syrstad
Identity & access management jonas syrstad
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
 
Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted software
 

Viewers also liked

Declaración sobre la secta Moon
Declaración sobre la secta MoonDeclaración sobre la secta Moon
Declaración sobre la secta Moon
Episcopalpy
 
Caacupe 2015
Caacupe 2015Caacupe 2015
Caacupe 2015
Episcopalpy
 
Dragana Djordjević, preporuka
Dragana Djordjević, preporukaDragana Djordjević, preporuka
Dragana Djordjević, preporukaDragana Djordjevic
 
RESUME2014
RESUME2014RESUME2014
RESUME2014
Matthew Hall
 
Teología de la liberación. 20 de octubre de 1988
Teología de la liberación. 20 de octubre de 1988Teología de la liberación. 20 de octubre de 1988
Teología de la liberación. 20 de octubre de 1988
Episcopalpy
 
Recommendation Ross Hatch
Recommendation Ross HatchRecommendation Ross Hatch
Recommendation Ross Hatch
Ross Thomson
 
2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)
2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)
2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)
Kyoko Ohtagaki
 
[170102]구름IDE 기본사용법 (C언어)
[170102]구름IDE 기본사용법 (C언어)[170102]구름IDE 기본사용법 (C언어)
[170102]구름IDE 기본사용법 (C언어)
Sung-tae Ryu
 
Comunicado sobre la píldora anticonceptiva de emergencia
Comunicado sobre la píldora anticonceptiva de emergenciaComunicado sobre la píldora anticonceptiva de emergencia
Comunicado sobre la píldora anticonceptiva de emergencia
Episcopalpy
 
Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.
Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.
Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.
Episcopalpy
 
Moment.js overview
Moment.js overviewMoment.js overview
Moment.js overview
Oleksii Prohonnyi
 
Guión homilético. Novenario de Caacupé
Guión homilético. Novenario de CaacupéGuión homilético. Novenario de Caacupé
Guión homilético. Novenario de Caacupé
Episcopalpy
 
Pastoral de la Comunicacion desde el CELAM
Pastoral de la Comunicacion desde el CELAMPastoral de la Comunicacion desde el CELAM
Pastoral de la Comunicacion desde el CELAM
Episcopalpy
 
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗDragana Djordjevic
 
Cv & cover letter
Cv & cover letterCv & cover letter
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗAnastasia Togkouri
 
Capstone 발표 pt
Capstone 발표 ptCapstone 발표 pt
Capstone 발표 pt
itian-f5
 
Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)
Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)
Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)
Amazon Web Services Korea
 
The simple present
The simple presentThe simple present
The simple present
Ingles Corporativo
 
21st Century Sirens Series
21st Century Sirens Series21st Century Sirens Series
21st Century Sirens Series
Tracy Edmunds
 

Viewers also liked (20)

Declaración sobre la secta Moon
Declaración sobre la secta MoonDeclaración sobre la secta Moon
Declaración sobre la secta Moon
 
Caacupe 2015
Caacupe 2015Caacupe 2015
Caacupe 2015
 
Dragana Djordjević, preporuka
Dragana Djordjević, preporukaDragana Djordjević, preporuka
Dragana Djordjević, preporuka
 
RESUME2014
RESUME2014RESUME2014
RESUME2014
 
Teología de la liberación. 20 de octubre de 1988
Teología de la liberación. 20 de octubre de 1988Teología de la liberación. 20 de octubre de 1988
Teología de la liberación. 20 de octubre de 1988
 
Recommendation Ross Hatch
Recommendation Ross HatchRecommendation Ross Hatch
Recommendation Ross Hatch
 
2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)
2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)
2014.07.05 Drupal PaaS でASWを活用する(Kyoko Ohtagaki)
 
[170102]구름IDE 기본사용법 (C언어)
[170102]구름IDE 기본사용법 (C언어)[170102]구름IDE 기본사용법 (C언어)
[170102]구름IDE 기본사용법 (C언어)
 
Comunicado sobre la píldora anticonceptiva de emergencia
Comunicado sobre la píldora anticonceptiva de emergenciaComunicado sobre la píldora anticonceptiva de emergencia
Comunicado sobre la píldora anticonceptiva de emergencia
 
Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.
Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.
Declaración sobre el Código de la Niñez. 9 de noviembre de 2000.
 
Moment.js overview
Moment.js overviewMoment.js overview
Moment.js overview
 
Guión homilético. Novenario de Caacupé
Guión homilético. Novenario de CaacupéGuión homilético. Novenario de Caacupé
Guión homilético. Novenario de Caacupé
 
Pastoral de la Comunicacion desde el CELAM
Pastoral de la Comunicacion desde el CELAMPastoral de la Comunicacion desde el CELAM
Pastoral de la Comunicacion desde el CELAM
 
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
 
Cv & cover letter
Cv & cover letterCv & cover letter
Cv & cover letter
 
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
ΣΥΣΤΑΤΙΚΗ ΕΠΙΣΤΟΛΗ
 
Capstone 발표 pt
Capstone 발표 ptCapstone 발표 pt
Capstone 발표 pt
 
Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)
Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)
Open Network Korea 2016 - AWS 클라우드를 통해 본 가상 네트워크 기술 진화 (윤석찬)
 
The simple present
The simple presentThe simple present
The simple present
 
21st Century Sirens Series
21st Century Sirens Series21st Century Sirens Series
21st Century Sirens Series
 

Similar to Swg

50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
Bố Su
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
Richard Sullivan
 
Novinky F5
Novinky F5Novinky F5
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
Digital Auxilio Technologies
 
Security Testing
Security TestingSecurity Testing
Security Testing
BOSS Webtech
 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Nextel S.A.
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
Mike Saunders
 
Forti web
Forti webForti web
Forti web
Forti webForti web
Secure code practices
Secure code practicesSecure code practices
Secure code practices
Hina Rawal
 
FortiGate-80C
FortiGate-80CFortiGate-80C
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
Cloudflare
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs
💻 Javier Garza
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
Array Networks
 

Similar to Swg (20)

50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Unit 5.pptx
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
Forti web
Forti webForti web
Forti web
 
Forti web
Forti webForti web
Forti web
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
 

More from itian-f5

F5 spdy 솔루션 선관
F5 spdy 솔루션 선관F5 spdy 솔루션 선관
F5 spdy 솔루션 선관
itian-f5
 
F5 프로그래밍 기능
F5 프로그래밍 기능F5 프로그래밍 기능
F5 프로그래밍 기능
itian-f5
 
Virtual Edition
Virtual EditionVirtual Edition
Virtual Edition
itian-f5
 
경쟁사비교:성능
경쟁사비교:성능경쟁사비교:성능
경쟁사비교:성능
itian-f5
 
경쟁사비교:기능
경쟁사비교:기능경쟁사비교:기능
경쟁사비교:기능
itian-f5
 
Aam1,2
Aam1,2Aam1,2
Aam1,2
itian-f5
 
F5 adc
F5 adcF5 adc
F5 adc
itian-f5
 
Gtm
GtmGtm
LTM
LTMLTM
Products
ProductsProducts
Products
itian-f5
 
솔루션소개
솔루션소개솔루션소개
솔루션소개
itian-f5
 
DNS Express
DNS ExpressDNS Express
DNS Express
itian-f5
 

More from itian-f5 (12)

F5 spdy 솔루션 선관
F5 spdy 솔루션 선관F5 spdy 솔루션 선관
F5 spdy 솔루션 선관
 
F5 프로그래밍 기능
F5 프로그래밍 기능F5 프로그래밍 기능
F5 프로그래밍 기능
 
Virtual Edition
Virtual EditionVirtual Edition
Virtual Edition
 
경쟁사비교:성능
경쟁사비교:성능경쟁사비교:성능
경쟁사비교:성능
 
경쟁사비교:기능
경쟁사비교:기능경쟁사비교:기능
경쟁사비교:기능
 
Aam1,2
Aam1,2Aam1,2
Aam1,2
 
F5 adc
F5 adcF5 adc
F5 adc
 
Gtm
GtmGtm
Gtm
 
LTM
LTMLTM
LTM
 
Products
ProductsProducts
Products
 
솔루션소개
솔루션소개솔루션소개
솔루션소개
 
DNS Express
DNS ExpressDNS Express
DNS Express
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Swg

  • 1. Secure Web Gateway (SWG) 보안 웹 프록시
  • 2. • outbound & inbound 의 효과적인 트래픽 제어 • Inbound: 모든 사용자는 APM을 통하여 들어오는 트래픽 에 대한 제어 (Access, VPN, Identity Federation, SSO, etc .) • Outbound: 위험한 웹 사이트 또는 악성 코드 감염으로 부터 차단 • 소셜 웹 미디어 사용시 작업에 따른 분류 보안 (Facebook , Twitter) • 웹사이트에 대한 검색 및 악성 코드 분류 및 효과적인 차 단 F5 SWG : Secure Web Gateway
  • 3. F5 SWG 주요 기능 위협 성능 URL/App Filtering Policy based control and monitoring on who can ac cess what websites at what times with what risks inv olved Web Page Based Malware Detecting malware or malicious components inside web pages User Identification User names, IP addresses, devices used and more c ontextual information HTTP/SSL Forward Proxy Intercepts all outbound HTTP(S) traffic, inspect the URLs or web applications and enforce policy control s Security Management, Reporting & Logging VPE based policy, Top Security Event Reporting with drill-down capability to show details Malicious URLs Inside Search Results Detect and block URL links that embedded inside a search engine results, when client browsers failed to be configured with “safeSearch” mode. Visiting malicious websites and web based malware infections Regulatory compliance on reporting and e nforcing Internet usage based on policies Mitigation of sensitive data leakage by un authorized employees or through infected web applications Loss of business productivity because of unauthorized usage of Internet Metric Range Transaction Per Se TBD conds (TPS) L7 Throughput TBD # of Users 500-20,000 (BIG-IP) Up to 80,000 (VPR) Websense Threat Intelligence Enterprise Apps Remote Access 3rd party Saa S Internet Secure Web Gateway
  • 4. F5 SWG : 쉬운 정책 수립, 접근 및 통계 가시성
  • 5. WEB Gateway/Filtering 솔루션 비교 F5 Bluecoat WF Bluecoat SWG Checkpo int SWG Palo Alt o PaWloFAlt o SWG Cisco W F Cisco S WG URL Cat. Engin e URL Filtering - Security x x x x x x URL Filtering – Productivity/Accept able Use x x x x x x x X Advanced Classificat ion Engine Real-time Security Classification x Anti-Malware Engine x x x x x x x Reputation Analysis x x x x Real-time Content Classification x (1) (1) (2) (2) (3) (3) (1) LimitedS Loincki aAln Malyesids iOan (lyFine-grained control) x x x (2) Limited to small number of applications (3) Simplistic weighted dictionary of keywords

Editor's Notes

  1. 2 column. Problem/solution data vis