SlideShare a Scribd company logo
Next Generation Network Security and
why you need it for your business!
Patrick Luce, CISSP, CISM
Director of Consultative Services, VectorUSA
August 18, 2016
What is Next Generation Security?
Why is it important for your organization?
How is Next Generation Security evolving?
How does Fortinet approach protecting customers from emerging threats?
Agenda
Next Generation Security - History
To have a next generation, there needs to be a previous generation.
OUTSIDE (INTERNET)
INSIDE
Inside Computer
10.0.X.X (Internal)
150.151.X.X (Internet)
www.yahoo.com
206.190.36.105
Port 80
Network Address
Translation (NAT)
Stateful Packet Inspection Outside Computer
Virtual Private Networking (VPN)
“First Generation” Firewalls – Three Features
www.yahoo.com
206.190.36.105
Port 80
Outside Computer
OUTSIDE (INTERNET)
Inside Computer
INSIDE
10.0.X.X (Internal)
150.151.X.X (Internet)
Hackers expose all kinds of security flaws…
Application port designations become unreliable.
No control over where inside computers choose to connect to the outside world.
No control over the payload that outside computers deliver.
Weak security practices when configuring inside workstations and servers.
INSIDE
OUTSIDE (INTERNET)
Inside Computer
www.yahoo.com
206.190.36.105
Port 80
Here comes the calvary…
New technologies require upkeep of signatures.
- This costs money…forever…
Traffic delays from processing packet streams multiple times.
- When life was web, file transfer and mail, no problem.
- With live video and audio, big problem.
Questions about real need, compliance, etc.
Now we have new problems…
Enter, Unified Threat Management (UTM)
FortiGate UTM
Application Control
Antivirus
AntiSpam
Web Filtering
Next Generation Firewall
WAN Acceleration
Traffic Optimization
VPN
IPS
DLP
WiFi Controller
↑↑↑↑↑↑↑↑↑↑↑
According to Gartner…(sigh)…
“Non-disruptive in-line bump-in-the-wire configuration”
“Standard first-generation firewall capabilities, e.g., network-address translation
(NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc.”
“Integrated signature-based IPS engine”
Enter, Next Generation Firewall NGFW??
“Application awareness, full stack visibility and granular control”
“Capability to incorporate information from outside the firewall, e.g., directory-based
policy, blacklists, white lists, etc.”
“Upgrade path to include future information feeds and security threats”
“SSL decryption to enable identifying undesirable encrypted applications”
Now we had new problems continued …
What’s the difference?
Brilliant marketing.
(image via https://blog.anitian.com.)
Security Control NGFW/UTM
Feature
PCI-DSS
Requirement
HIPAA Requirement California Civil
Code
Install and maintain a stateful
inspection firewall
Firewall 1.1 (All),
1.3.6,1.4
Implement Perimeter Intrusion
Prevention
IPS 11.4A § 164.312(c)(1)
Implement Antivirus/Antimalware Antivirus 5.1-5.4 § 164.308(a)(5)(ii)(B)
Explicitly authorize outbound traffic to
Internet
Web Filtering 1.3.5 § 164.312(c)(1)
Enforce encryption of sensitive data DLP 4.1 § 164.312(e)(2)(ii)
§ 164.312(a)(2)(iv)
1798:29
FIPS 140-2
Secure end user messaging
technologies
Application
Control
4.1.1 1798:29
Retain and review audit logs Logging/
Reporting
10 (all) § 164.308(a)(1)(ii)(D)
Current Compliance Requirement and NGFW/UTM
Common Sense NGFW Applications
Sandbox Inspection
- Code emulation, OS sandboxing
Reputation Analysis
- IP and Domain
Mobile Security
Embedded Vulnerability Assessment
Coming to a NGFW near you (or already here)
Talk to Patrick Luce about your Network Security
Pluce@vectorusa.com
310-436-1000

More Related Content

What's hot

Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
laonap166
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
Data#3 Limited
 
What is NAC
What is NACWhat is NAC
What is NAC
Israel Marcus
 
What is NetFlow?
What is NetFlow?What is NetFlow?
What is NetFlow?
NetHound
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
neoma329
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
NAIM Networks, Inc.
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
Mark Curphey
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
Anthony Daniel
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
cyberlocke
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
Anthony Daniel
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
محمد
محمدمحمد
محمد
mohammed-1212
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
military
 
E firewalls
E firewallsE firewalls
E firewalls
Abhiroop Ghatak
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerability
PositiveTechnologies
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
mpatke
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
Nisha Menon K
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
Lan & Wan Solutions
 

What's hot (20)

Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
What is NAC
What is NACWhat is NAC
What is NAC
 
What is NetFlow?
What is NetFlow?What is NetFlow?
What is NetFlow?
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
محمد
محمدمحمد
محمد
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
E firewalls
E firewallsE firewalls
E firewalls
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerability
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 

Viewers also liked

question 1
question 1question 1
question 1
IngridCastile
 
7º Ano Tayna Estefany
7º Ano Tayna Estefany7º Ano Tayna Estefany
7º Ano Tayna Estefany
E. M. Célia Rabelo
 
Fun play-systems
Fun play-systemsFun play-systems
Fun play-systems
Fun Play Systems
 
satheesh.k
satheesh.ksatheesh.k
How Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel BusinessHow Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel Business
Yusuf Andrew Akyol
 
8 Dec.Global News Update
8 Dec.Global News Update8 Dec.Global News Update
8 Dec.Global News Update
newsjunkie
 
Luis Vives
Luis VivesLuis Vives
Luis Vives
Antonio Sanjuan
 
Learn on Article of "THE"
Learn on Article of "THE"Learn on Article of "THE"
Learn on Article of "THE"
MOHD AFIQ
 
Redes inalambricas y sus tipos
Redes inalambricas y sus tiposRedes inalambricas y sus tipos
Redes inalambricas y sus tipos
Mixitoabata
 
Taxation session woxsen school of business
Taxation session woxsen school of businessTaxation session woxsen school of business
Taxation session woxsen school of business
Sree Harsha
 
The best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard aboutThe best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard about
Michael de Raadt
 
Etiyopya ulke raporu_2013
Etiyopya ulke raporu_2013Etiyopya ulke raporu_2013
Etiyopya ulke raporu_2013
UlkeRaporlari2013
 
Finlandiya ulke raporu_2013
Finlandiya ulke raporu_2013Finlandiya ulke raporu_2013
Finlandiya ulke raporu_2013
UlkeRaporlari2013
 
Starting with social media
Starting with social mediaStarting with social media
Starting with social media
Edumarketeer
 
Turkce – macaristan ulke raporu
Turkce – macaristan ulke raporuTurkce – macaristan ulke raporu
Turkce – macaristan ulke raporu
Peter Gerstner
 
Los materiales | Mario Villacorta García
Los materiales | Mario Villacorta GarcíaLos materiales | Mario Villacorta García
Los materiales | Mario Villacorta García
Mario Villacorta Garcia
 
ELP Training Program
ELP Training ProgramELP Training Program
ELP Training Program
SMIconsultant
 
SOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes AltitudeSOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes Altitude
MOHD AFIQ
 
Borang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti AltitudeBorang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti Altitude
MOHD AFIQ
 
Vertebrates
VertebratesVertebrates
Vertebrates
jonalyn shenton
 

Viewers also liked (20)

question 1
question 1question 1
question 1
 
7º Ano Tayna Estefany
7º Ano Tayna Estefany7º Ano Tayna Estefany
7º Ano Tayna Estefany
 
Fun play-systems
Fun play-systemsFun play-systems
Fun play-systems
 
satheesh.k
satheesh.ksatheesh.k
satheesh.k
 
How Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel BusinessHow Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel Business
 
8 Dec.Global News Update
8 Dec.Global News Update8 Dec.Global News Update
8 Dec.Global News Update
 
Luis Vives
Luis VivesLuis Vives
Luis Vives
 
Learn on Article of "THE"
Learn on Article of "THE"Learn on Article of "THE"
Learn on Article of "THE"
 
Redes inalambricas y sus tipos
Redes inalambricas y sus tiposRedes inalambricas y sus tipos
Redes inalambricas y sus tipos
 
Taxation session woxsen school of business
Taxation session woxsen school of businessTaxation session woxsen school of business
Taxation session woxsen school of business
 
The best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard aboutThe best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard about
 
Etiyopya ulke raporu_2013
Etiyopya ulke raporu_2013Etiyopya ulke raporu_2013
Etiyopya ulke raporu_2013
 
Finlandiya ulke raporu_2013
Finlandiya ulke raporu_2013Finlandiya ulke raporu_2013
Finlandiya ulke raporu_2013
 
Starting with social media
Starting with social mediaStarting with social media
Starting with social media
 
Turkce – macaristan ulke raporu
Turkce – macaristan ulke raporuTurkce – macaristan ulke raporu
Turkce – macaristan ulke raporu
 
Los materiales | Mario Villacorta García
Los materiales | Mario Villacorta GarcíaLos materiales | Mario Villacorta García
Los materiales | Mario Villacorta García
 
ELP Training Program
ELP Training ProgramELP Training Program
ELP Training Program
 
SOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes AltitudeSOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes Altitude
 
Borang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti AltitudeBorang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti Altitude
 
Vertebrates
VertebratesVertebrates
Vertebrates
 

Similar to VectorUSA and Fortinet: Next Generation Network Security

ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
sharetech
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
Cyberoam Brasil Consultcorp
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
Infosec Europe
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Jason Shen
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
Cyberoam Brasil Consultcorp
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
Cyberoam Brasil Consultcorp
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
Mirza Bilal Baig
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
matthew.maisel
 
CONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200INGCONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200ING
Cyberoam Brasil Consultcorp
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
Amazon Web Services
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
juliankanarek
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
RakeshKumar442494
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
BAKOTECH
 
Day4
Day4Day4
Day4
Jai4uk
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
saloni mittal
 
Paloalto network analysis.
Paloalto network analysis.Paloalto network analysis.
Paloalto network analysis.
MohitKumar1389
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 

Similar to VectorUSA and Fortinet: Next Generation Network Security (20)

ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
CONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200INGCONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200ING
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
Day4
Day4Day4
Day4
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Paloalto network analysis.
Paloalto network analysis.Paloalto network analysis.
Paloalto network analysis.
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

VectorUSA and Fortinet: Next Generation Network Security

  • 1. Next Generation Network Security and why you need it for your business! Patrick Luce, CISSP, CISM Director of Consultative Services, VectorUSA August 18, 2016
  • 2. What is Next Generation Security? Why is it important for your organization? How is Next Generation Security evolving? How does Fortinet approach protecting customers from emerging threats? Agenda
  • 3. Next Generation Security - History To have a next generation, there needs to be a previous generation.
  • 4. OUTSIDE (INTERNET) INSIDE Inside Computer 10.0.X.X (Internal) 150.151.X.X (Internet) www.yahoo.com 206.190.36.105 Port 80 Network Address Translation (NAT) Stateful Packet Inspection Outside Computer Virtual Private Networking (VPN) “First Generation” Firewalls – Three Features www.yahoo.com 206.190.36.105 Port 80 Outside Computer OUTSIDE (INTERNET) Inside Computer INSIDE 10.0.X.X (Internal) 150.151.X.X (Internet)
  • 5. Hackers expose all kinds of security flaws… Application port designations become unreliable. No control over where inside computers choose to connect to the outside world. No control over the payload that outside computers deliver. Weak security practices when configuring inside workstations and servers.
  • 7. New technologies require upkeep of signatures. - This costs money…forever… Traffic delays from processing packet streams multiple times. - When life was web, file transfer and mail, no problem. - With live video and audio, big problem. Questions about real need, compliance, etc. Now we have new problems…
  • 8. Enter, Unified Threat Management (UTM) FortiGate UTM Application Control Antivirus AntiSpam Web Filtering Next Generation Firewall WAN Acceleration Traffic Optimization VPN IPS DLP WiFi Controller ↑↑↑↑↑↑↑↑↑↑↑
  • 9. According to Gartner…(sigh)… “Non-disruptive in-line bump-in-the-wire configuration” “Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc.” “Integrated signature-based IPS engine” Enter, Next Generation Firewall NGFW??
  • 10. “Application awareness, full stack visibility and granular control” “Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc.” “Upgrade path to include future information feeds and security threats” “SSL decryption to enable identifying undesirable encrypted applications” Now we had new problems continued …
  • 11. What’s the difference? Brilliant marketing. (image via https://blog.anitian.com.)
  • 12. Security Control NGFW/UTM Feature PCI-DSS Requirement HIPAA Requirement California Civil Code Install and maintain a stateful inspection firewall Firewall 1.1 (All), 1.3.6,1.4 Implement Perimeter Intrusion Prevention IPS 11.4A § 164.312(c)(1) Implement Antivirus/Antimalware Antivirus 5.1-5.4 § 164.308(a)(5)(ii)(B) Explicitly authorize outbound traffic to Internet Web Filtering 1.3.5 § 164.312(c)(1) Enforce encryption of sensitive data DLP 4.1 § 164.312(e)(2)(ii) § 164.312(a)(2)(iv) 1798:29 FIPS 140-2 Secure end user messaging technologies Application Control 4.1.1 1798:29 Retain and review audit logs Logging/ Reporting 10 (all) § 164.308(a)(1)(ii)(D) Current Compliance Requirement and NGFW/UTM
  • 13. Common Sense NGFW Applications
  • 14. Sandbox Inspection - Code emulation, OS sandboxing Reputation Analysis - IP and Domain Mobile Security Embedded Vulnerability Assessment Coming to a NGFW near you (or already here)
  • 15. Talk to Patrick Luce about your Network Security Pluce@vectorusa.com 310-436-1000