How Do You Create A Successful Information Security Program Hire A Great Iso!!
Mc Afee And Georgia State University Taking Aim At Network Intruders With Intrushield’S Intrusion Prevention System
1. McAfee and Georgia State University---Taking Aim at Network Intruders With Intrushield’s Intrusion Prevention System Tammy Clark , Chief Information Security Officer, William Monahan , Lead Information Security Administrator Bill Boyle , Product Line Executive, Network Security
2.
3.
4.
5.
6. One Size Does Not Fit All (Child Domains) Copyright GSU, eFortresses, March 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.
7.
8. Leveraging Stateful Firewall Copyright GSU, eFortresses, March 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. The “Nuclear Option” for Colleges & Departments Protection for System IP(s) that Process “confidential” information (HIPAA, FERPA, Visa PCI…)
9. Unidirectionaly Blocking P2P Copyright GSU, eFortresses, March 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. February 2006 – wireless networks on verge of collapse due to ubiquitous P2P traffic & inordinate amount of copywrite infringement notifications – referenced Server Registration Policy & blocked outbound traffic Totally blocked for areas that process “confidential” information
10.
11. Dealing with: “The Firewall Broke It” Copyright GSU, eFortresses, March 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. 80% of the “The Firewall Broke It” issues are quickly disproved via VPN session or generating an IntruShield report. Other options include punching a “really big hole” or placing IntruShield in fiber bypass mode.
12. McAfee IntruShield Architecture Real Events Are Found In Real-Time Set and Forget Short Learning Curve Easy To Use Network Class Accurate Decrease Risk Decrease Exposure Decrease OpEx IntruShield 30,000 to 30
13. Network Class Hardware Copyright GSU, eFortresses, March 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.
14. Copyright GSU, eFortresses, March 2007. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Network Class Hardware SMB & Branch Office Enterprise Perimeter Enterprise Service Providers Enterprise Core Service Providers 100Mbps 1Gbps 600Mbps 200Mbps 5 Gbps 2 Gbps 10Gbps I-1200 I-1400 I-2700 I-4000 I-4010 I-3000 Performance, Scalability and Connectivity M-6050 M-8000
15. McAfee IntruShield Architecture Real Events Are Found In Real-Time Set and Forget Short Learning Curve Easy To Use Network Class Accurate Decrease Risk Decrease Exposure Decrease OpEx IntruShield 30,000 to 30
22. McAfee IntruShield Architecture Real Events Are Found In Real-Time Set and Forget Short Learning Curve Easy To Use Network Class Accurate Decrease Risk Decrease Exposure Decrease OpEx IntruShield 30,000 to 30