SlideShare a Scribd company logo
1 of 15
Next Generation Network Security and
why you need it for your business!
Patrick Luce, CISSP, CISM
Director of Consultative Services, VectorUSA
August 18, 2016
What is Next Generation Security?
Why is it important for your organization?
How is Next Generation Security evolving?
How does Fortinet approach protecting customers from emerging threats?
Agenda
Next Generation Security - History
To have a next generation, there needs to be a previous generation.
OUTSIDE (INTERNET)
INSIDE
Inside Computer
10.0.X.X (Internal)
150.151.X.X (Internet)
www.yahoo.com
206.190.36.105
Port 80
Network Address
Translation (NAT)
Stateful Packet Inspection Outside Computer
Virtual Private Networking (VPN)
“First Generation” Firewalls – Three Features
www.yahoo.com
206.190.36.105
Port 80
Outside Computer
OUTSIDE (INTERNET)
Inside Computer
INSIDE
10.0.X.X (Internal)
150.151.X.X (Internet)
Hackers expose all kinds of security flaws…
Application port designations become unreliable.
No control over where inside computers choose to connect to the outside world.
No control over the payload that outside computers deliver.
Weak security practices when configuring inside workstations and servers.
INSIDE
OUTSIDE (INTERNET)
Inside Computer
www.yahoo.com
206.190.36.105
Port 80
Here comes the calvary…
New technologies require upkeep of signatures.
- This costs money…forever…
Traffic delays from processing packet streams multiple times.
- When life was web, file transfer and mail, no problem.
- With live video and audio, big problem.
Questions about real need, compliance, etc.
Now we have new problems…
Enter, Unified Threat Management (UTM)
FortiGate UTM
Application Control
Antivirus
AntiSpam
Web Filtering
Next Generation Firewall
WAN Acceleration
Traffic Optimization
VPN
IPS
DLP
WiFi Controller
↑↑↑↑↑↑↑↑↑↑↑
According to Gartner…(sigh)…
“Non-disruptive in-line bump-in-the-wire configuration”
“Standard first-generation firewall capabilities, e.g., network-address translation
(NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc.”
“Integrated signature-based IPS engine”
Enter, Next Generation Firewall NGFW??
“Application awareness, full stack visibility and granular control”
“Capability to incorporate information from outside the firewall, e.g., directory-based
policy, blacklists, white lists, etc.”
“Upgrade path to include future information feeds and security threats”
“SSL decryption to enable identifying undesirable encrypted applications”
Now we had new problems continued …
What’s the difference?
Brilliant marketing.
(image via https://blog.anitian.com.)
Security Control NGFW/UTM
Feature
PCI-DSS
Requirement
HIPAA Requirement California Civil
Code
Install and maintain a stateful
inspection firewall
Firewall 1.1 (All),
1.3.6,1.4
Implement Perimeter Intrusion
Prevention
IPS 11.4A § 164.312(c)(1)
Implement Antivirus/Antimalware Antivirus 5.1-5.4 § 164.308(a)(5)(ii)(B)
Explicitly authorize outbound traffic to
Internet
Web Filtering 1.3.5 § 164.312(c)(1)
Enforce encryption of sensitive data DLP 4.1 § 164.312(e)(2)(ii)
§ 164.312(a)(2)(iv)
1798:29
FIPS 140-2
Secure end user messaging
technologies
Application
Control
4.1.1 1798:29
Retain and review audit logs Logging/
Reporting
10 (all) § 164.308(a)(1)(ii)(D)
Current Compliance Requirement and NGFW/UTM
Common Sense NGFW Applications
Sandbox Inspection
- Code emulation, OS sandboxing
Reputation Analysis
- IP and Domain
Mobile Security
Embedded Vulnerability Assessment
Coming to a NGFW near you (or already here)
Talk to Patrick Luce about your Network Security
Pluce@vectorusa.com
310-436-1000

More Related Content

What's hot

Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solutionlaonap166
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
What is NetFlow?
What is NetFlow?What is NetFlow?
What is NetFlow?NetHound
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수NAIM Networks, Inc.
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutionsAnthony Daniel
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)cyberlocke
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilityPositiveTechnologies
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhedempatke
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 

What's hot (20)

Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
What is NAC
What is NACWhat is NAC
What is NAC
 
What is NetFlow?
What is NetFlow?What is NetFlow?
What is NetFlow?
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
محمد
محمدمحمد
محمد
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
E firewalls
E firewallsE firewalls
E firewalls
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerability
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 

Viewers also liked

How Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel BusinessHow Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel BusinessYusuf Andrew Akyol
 
8 Dec.Global News Update
8 Dec.Global News Update8 Dec.Global News Update
8 Dec.Global News Updatenewsjunkie
 
Learn on Article of "THE"
Learn on Article of "THE"Learn on Article of "THE"
Learn on Article of "THE"MOHD AFIQ
 
Redes inalambricas y sus tipos
Redes inalambricas y sus tiposRedes inalambricas y sus tipos
Redes inalambricas y sus tiposMixitoabata
 
Taxation session woxsen school of business
Taxation session woxsen school of businessTaxation session woxsen school of business
Taxation session woxsen school of businessSree Harsha
 
The best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard aboutThe best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard aboutMichael de Raadt
 
Starting with social media
Starting with social mediaStarting with social media
Starting with social mediaEdumarketeer
 
Turkce – macaristan ulke raporu
Turkce – macaristan ulke raporuTurkce – macaristan ulke raporu
Turkce – macaristan ulke raporuPeter Gerstner
 
Los materiales | Mario Villacorta García
Los materiales | Mario Villacorta GarcíaLos materiales | Mario Villacorta García
Los materiales | Mario Villacorta GarcíaMario Villacorta Garcia
 
ELP Training Program
ELP Training ProgramELP Training Program
ELP Training ProgramSMIconsultant
 
SOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes AltitudeSOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes AltitudeMOHD AFIQ
 
Borang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti AltitudeBorang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti AltitudeMOHD AFIQ
 

Viewers also liked (20)

question 1
question 1question 1
question 1
 
7º Ano Tayna Estefany
7º Ano Tayna Estefany7º Ano Tayna Estefany
7º Ano Tayna Estefany
 
Fun play-systems
Fun play-systemsFun play-systems
Fun play-systems
 
satheesh.k
satheesh.ksatheesh.k
satheesh.k
 
How Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel BusinessHow Retail Needs to Rethink Their Towel Business
How Retail Needs to Rethink Their Towel Business
 
8 Dec.Global News Update
8 Dec.Global News Update8 Dec.Global News Update
8 Dec.Global News Update
 
Luis Vives
Luis VivesLuis Vives
Luis Vives
 
Learn on Article of "THE"
Learn on Article of "THE"Learn on Article of "THE"
Learn on Article of "THE"
 
Redes inalambricas y sus tipos
Redes inalambricas y sus tiposRedes inalambricas y sus tipos
Redes inalambricas y sus tipos
 
Taxation session woxsen school of business
Taxation session woxsen school of businessTaxation session woxsen school of business
Taxation session woxsen school of business
 
The best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard aboutThe best Moodle extensions you might not have heard about
The best Moodle extensions you might not have heard about
 
Etiyopya ulke raporu_2013
Etiyopya ulke raporu_2013Etiyopya ulke raporu_2013
Etiyopya ulke raporu_2013
 
Finlandiya ulke raporu_2013
Finlandiya ulke raporu_2013Finlandiya ulke raporu_2013
Finlandiya ulke raporu_2013
 
Starting with social media
Starting with social mediaStarting with social media
Starting with social media
 
Turkce – macaristan ulke raporu
Turkce – macaristan ulke raporuTurkce – macaristan ulke raporu
Turkce – macaristan ulke raporu
 
Los materiales | Mario Villacorta García
Los materiales | Mario Villacorta GarcíaLos materiales | Mario Villacorta García
Los materiales | Mario Villacorta García
 
ELP Training Program
ELP Training ProgramELP Training Program
ELP Training Program
 
SOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes AltitudeSOP Penerimaan Peranti Yes Altitude
SOP Penerimaan Peranti Yes Altitude
 
Borang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti AltitudeBorang Pengesahan (Penerimaan) Peranti Altitude
Borang Pengesahan (Penerimaan) Peranti Altitude
 
Vertebrates
VertebratesVertebrates
Vertebrates
 

Similar to VectorUSA and Fortinet: Next Generation Network Security

ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfosec Europe
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270BAKOTECH
 
Paloalto network analysis.
Paloalto network analysis.Paloalto network analysis.
Paloalto network analysis.MohitKumar1389
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 

Similar to VectorUSA and Fortinet: Next Generation Network Security (20)

ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
CONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200INGCONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200ING
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
Day4
Day4Day4
Day4
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Paloalto network analysis.
Paloalto network analysis.Paloalto network analysis.
Paloalto network analysis.
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

VectorUSA and Fortinet: Next Generation Network Security

  • 1. Next Generation Network Security and why you need it for your business! Patrick Luce, CISSP, CISM Director of Consultative Services, VectorUSA August 18, 2016
  • 2. What is Next Generation Security? Why is it important for your organization? How is Next Generation Security evolving? How does Fortinet approach protecting customers from emerging threats? Agenda
  • 3. Next Generation Security - History To have a next generation, there needs to be a previous generation.
  • 4. OUTSIDE (INTERNET) INSIDE Inside Computer 10.0.X.X (Internal) 150.151.X.X (Internet) www.yahoo.com 206.190.36.105 Port 80 Network Address Translation (NAT) Stateful Packet Inspection Outside Computer Virtual Private Networking (VPN) “First Generation” Firewalls – Three Features www.yahoo.com 206.190.36.105 Port 80 Outside Computer OUTSIDE (INTERNET) Inside Computer INSIDE 10.0.X.X (Internal) 150.151.X.X (Internet)
  • 5. Hackers expose all kinds of security flaws… Application port designations become unreliable. No control over where inside computers choose to connect to the outside world. No control over the payload that outside computers deliver. Weak security practices when configuring inside workstations and servers.
  • 7. New technologies require upkeep of signatures. - This costs money…forever… Traffic delays from processing packet streams multiple times. - When life was web, file transfer and mail, no problem. - With live video and audio, big problem. Questions about real need, compliance, etc. Now we have new problems…
  • 8. Enter, Unified Threat Management (UTM) FortiGate UTM Application Control Antivirus AntiSpam Web Filtering Next Generation Firewall WAN Acceleration Traffic Optimization VPN IPS DLP WiFi Controller ↑↑↑↑↑↑↑↑↑↑↑
  • 9. According to Gartner…(sigh)… “Non-disruptive in-line bump-in-the-wire configuration” “Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc.” “Integrated signature-based IPS engine” Enter, Next Generation Firewall NGFW??
  • 10. “Application awareness, full stack visibility and granular control” “Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc.” “Upgrade path to include future information feeds and security threats” “SSL decryption to enable identifying undesirable encrypted applications” Now we had new problems continued …
  • 11. What’s the difference? Brilliant marketing. (image via https://blog.anitian.com.)
  • 12. Security Control NGFW/UTM Feature PCI-DSS Requirement HIPAA Requirement California Civil Code Install and maintain a stateful inspection firewall Firewall 1.1 (All), 1.3.6,1.4 Implement Perimeter Intrusion Prevention IPS 11.4A § 164.312(c)(1) Implement Antivirus/Antimalware Antivirus 5.1-5.4 § 164.308(a)(5)(ii)(B) Explicitly authorize outbound traffic to Internet Web Filtering 1.3.5 § 164.312(c)(1) Enforce encryption of sensitive data DLP 4.1 § 164.312(e)(2)(ii) § 164.312(a)(2)(iv) 1798:29 FIPS 140-2 Secure end user messaging technologies Application Control 4.1.1 1798:29 Retain and review audit logs Logging/ Reporting 10 (all) § 164.308(a)(1)(ii)(D) Current Compliance Requirement and NGFW/UTM
  • 13. Common Sense NGFW Applications
  • 14. Sandbox Inspection - Code emulation, OS sandboxing Reputation Analysis - IP and Domain Mobile Security Embedded Vulnerability Assessment Coming to a NGFW near you (or already here)
  • 15. Talk to Patrick Luce about your Network Security Pluce@vectorusa.com 310-436-1000