Tải bản đầy đủ (.ppt) (35 trang)

Tài liệu Giải pháp mạng Motorola AirDefense Customer Presentation March 2009v3 docx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (3.53 MB, 35 trang )

1
Fortifying Wireless Networks
2
Server
Users
Traditional Wired Network
Well-Defined
Network Edge,
Straightforward
to Manage and
Secure
INTERNET
SECURE INTERNAL NETWORK
3
Users
INTERNET
Trouble Connecting
to WLANs
Hacker in
Parking Lot
Users Connecting to
Neighboring Networks
Rogue AP
Network Edge
Blurred, New
Attack Vectors
‘Behind’ the
Firewall
Wireless Changes Everything
Server
4


Wireless Breaches Cost Millions
2000 2002 2004 2006 2008
Attacks are No Longer Innocent Attempts to Gain Notoriety –
Organized Crime Uses Wireless Hacking to Steal Money
Tens of Millions of Credit & Debit Card
Numbers Have Been Stolen
Average Cost of a Data Breach is $300
per Compromised Record (per Gartner)
Average Breach Cost is $6.6m
(Network World)
Average Customer Turnover
After a Breach is 3.6%
5
The Reliability Issue
TECHNOLOGY
PROBLEMS
Connectivity can be Impacted by Many
Outside Factors
Much Wider Variety of Client Settings
than Wired Networks
Problems are Transient – Like the
Devices
RF is a New Technology for
Some Network Engineers
BUSINESS / ORGANIZATIONAL
PROBLEMS
Wireless is the #1 Culprit – Blamed
for Everything
Too Many Support Calls are Escalated to
Wireless Networking Team

Tools Unavailable at Remote Sites Where
Issues are Present
Site Visits are Very Expensive
Connectivity Problems
Roaming Issues
Coverage & Capacity
Noise & Interference
6
PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
SECURITY
Rogue Elimination
Intrusion Detection
Automated Defenses
Forensic Analysis
Legacy Protection
Mobile Protection
COMPLIANCE
24x7 Policy Monitoring
Flexible Definition
Custom Reports
PCI, HIPAA, GLBA, US
DoD, SOX Reports
Granular Forensic Records
TROUBLESHOOTING

Solve Issues Remotely
Level 1 Helpdesk
Proactive Monitoring
Spectrum Analysis
Interference Detection
LiveRF Coverage
Remote Packet Capture
Historical Analysis
Motorola AirDefense Solution
7
Motorola AirDefense Products
HEADQUARTERS
WIPS
Appliance
Sensor
FIELD OFFICES
FIELD OFFICES
Motorola AirDefense Enterprise
Innovative Add-on Modules
WEP
Cloaking
A Migration Step to
Protect Legacy
Encryption
Protocols. Meet
PCI Requirements
While Upgrading to
WPA
Spectrum
Analysis

Detect & Classify
Common Types of
RF Interference
Sources Including
Microwaves,
Bluetooth etc.
LiveRF
Real-time
Assessment of
Wireless Network
Performance.
Centrally Analyze
& Troubleshoot
Connectivity
Issues
Advanced
Forensics
Rewind & Review
Detailed Wireless
Activity Records
for Forensic
Investigations &
Troubleshooting
Advanced
Trouble-
shooting
Provides Faster
Resolution of
Wireless-related
Issues as Well as

Proactive
Resolutions
Mobile
Workforce
Protection
End-point Security
to Protect Mobile
Users Regardless
of Location
Rogue Detection & Elimination
Intrusion Detection
Automated Termination
Policy Compliance
Wireless Troubleshooting
Forensic Analysis
Location Tracking
Enterprise-class Scalability
8
Solution Architecture
Centralized, Hardened Appliance
Protection for WLAN
Infrastructure and Devices
Secure Layer 3 Connections
Between Sensors and Appliance
Minimal WAN Bandwidth
Needed by Sensors, < 3Kb/s
Two Types of Sensors:
Dedicated Sensors are Separate Devices,
Use One for Every 3-5 APs
Integrated Sensors are Built Into Motorola

Access Points
All Sensors Provide 24x7
Protection for Gap-free Security
NETWORK
Distributed Collaborative Architecture is Highly Scalable
Distributed Collaborative Architecture is Highly Scalable
Integrated
AP/Sensor
FIELD OFFICE
Central Appliance
Dedicated
Sensor
CORPORATE OFFICE
9
Motorola AirDefense Solution
COMPLIANCE
24x7 Policy Monitoring
Flexible Definition
Custom Reports
PCI, HIPAA, GLBA, US
DoD, SOX Reports
Granular Forensic Records
TROUBLESHOOTING
Solve Issues Remotely
Level 1 Helpdesk
Proactive Monitoring
Spectrum Analysis
Interference Detection
LiveRF Coverage
Remote Packet Capture

Historical Analysis
PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
SECURITY
Rogue Elimination
Intrusion Detection
Automated Defenses
Forensic Analysis
Legacy Protection
Mobile Protection
COMPLIANCE
24x7 Policy Monitoring
Flexible Definition
Custom Reports
PCI, HIPAA, GLBA, US
DoD, SOX Reports
Granular Forensic Records
TROUBLESHOOTING

Solve Issues Remotely
Level 1 Helpdesk
Proactive Monitoring
Spectrum Analysis
Interference Detection
LiveRF Coverage
Remote Packet Capture
Historical Analysis
10
Eliminate Rogues on the Network
Differentiate Between Neighbors
and Rogue Devices Automatically
Identify Every Type of Rogue
Device Connected to the Network
Historical Record of
Associations & Traffic
Automatic Elimination
Automatically Finds and Removes All Rogue Devices
Automatically Finds and Removes All Rogue Devices
REMOTE OFFICE
NEIGHBOR
DETECT - ANALYZE - ELIMINATE
Dedicated
Sensor
Open
Rogue AP
Encrypted
Rogue AP
Rogue AP
Behind

Firewall
Soft AP
Rogue Devices Can be Anywhere on the Network
and can be Encrypted
11
Comprehensive Intrusion Detection
Sensors
PROTOCOL
ABUSE
ANOMALOUS
BEHAVIOR
SIGNATURE
ANALYSIS
POLICY
MANAGER
Correlation Engines
Context-Aware
Detection Engines
200+ Threats Detected
Reconnaissance & Probing
Denial of Service Attacks
Identity Thefts, Malicious Associations
Dictionary Attacks; Security
Policy Violations
Minimal False Positives
Correlation Across Multiple Detection
Engines Reduces False Positives
Most Accurate Attack Detection
Powerful Detection with Minimal False Positives
Powerful Detection with Minimal False Positives

DETECTION
AIRDEFENSE SERVER APPLIANCE
DISCOVERY ANALYSIS
12
Automated Wireless Protection
Wireless Termination
Targeted Disruption of Wireless Connections
No Impact to Allowed Network Traffic
Compliant with Applicable Laws & FCC Regulations
Wired Port Suppression
Search Wired Network to Locate the Switch-port
a Rogue Threat is Attached to
Safeguards Ensure Only Threat is Disconnected
Wireless ACL
Prevent Wireless Stations from Connecting
to the WLAN
Sensor
WIPS Appliance
Switch
Laptop
Neighboring AP
APs
Wireles
s
Station
AP
Terminated:
Accidental
Association
Port Suppressed:

Rogue AP
ACL Enforced:
Rogue Station
Comprehensive Threat Mitigation that is Powerful & Safe to Use
Comprehensive Threat Mitigation that is Powerful & Safe to Use
13
Forensic Analysis
Extensive Forensic Data
Months of Historical Data Accessible
from System
325+ Statistics per Device per Minute
Device Connectivity & Activity Logs
Valuable Business Information
Accurate Records for Forensic Analysis &
Policy Compliance Reporting
Determine Exact Time & Impact of
Attempted Attacks
Record of Wireless Performance and
Connectivity Issues
FORENSIC
SUMMARY
ASSOCIATION
ANALYSIS
Unrivaled Visibility into Network Activity & Threats
14
Advanced Forensics Module
Detailed Forensic Analysis
Graphical View of Minute-by-minute Stats
Device, Threats, Associations, Traffic,
Signal and Location Tends

Adjustable Time Windows
Historical Location Tracking
Network Trend Analysis
Forensic Analysis and Audit Support
Allows Historical Analysis of Intermittent
Wireless Problems
Quickly View Performance / Security
Trends Over Time
TRAFFIC
ANALYSIS
EVENT
SEQUENCE
15
SECURITY
Rogue Elimination
Intrusion Detection
Automated Defenses
Forensic Analysis
Legacy Protection
Mobile Protection
TROUBLESHOOTING
Solve Issues Remotely
Level 1 Helpdesk
Proactive Monitoring
Spectrum Analysis
Interference Detection
LiveRF Coverage
Remote Packet Capture
Historical Analysis
Motorola AirDefense Solution

PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
SECURITY
Rogue Elimination
Intrusion Detection
Automated Defenses
Forensic Analysis
Legacy Protection
Mobile Protection
COMPLIANCE
24x7 Policy Monitoring
Flexible Definition
Custom Reports
PCI, HIPAA, GLBA, US
DoD, SOX Reports
Granular Forensic Records
TROUBLESHOOTING
Solve Issues Remotely
Level 1 Helpdesk
Proactive Monitoring
Spectrum Analysis
Interference Detection
LiveRF Coverage
Remote Packet Capture
Historical Analysis

PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
16
Regulatory Compliance
RETAIL
FEDERAL
HEALTHCARE
CORPORATE
Payment Card Industry (PCI) Data
Security Standard (DSS)
Automated Wireless Scanning and
Rogue Wireless Elimination
Wireless Intrusion Prevention
Encryption Policy Enforcement
Department of Defense 8100.2
Directive
Must have 24x7 Dedicated WIDS
Applicable Regardless of

WLAN Deployment
Common Criteria
Certification Needed
Location Tracking Mandatory
Health Insurance Portability and
Accountability Act (HIPAA )
Encryption Validation
Security Configuration
Management
HIPAA Compliance Reports
Sarbanes Oxley (SOX) Compliance
Gramm-Leach-Bliley Act (GLBA)
Protect Confidentiality and
Integrity of Corporate Data
Transmitted Wirelessly
Reporting and Audit Support
Regulatory Compliance ≠ WLAN Security
17
Policy Compliance & Reporting
Fully Customizable Reporting and Dedicated Monitoring of
Policy Compliance and Network Performance
COMPLY
Monitor
Enforce
Define
DEFINE WIRELESS
POLICY
CUSTOMIZABLE
REPORTING
18

SECURITY
Rogue Elimination
Intrusion Detection
Automated Defenses
Forensic Analysis
Legacy Protection
Mobile Protection
COMPLIANCE
24x7 Policy Monitoring
Flexible Definition
Custom Reports
PCI, HIPAA, GLBA, US
DoD, SOX Reports
Granular Forensic Records
Motorola AirDefense Solution
SECURITY
Rogue Elimination
Intrusion Detection
Automated Defenses
Forensic Analysis
Legacy Protection
Mobile Protection
COMPLIANCE
24x7 Policy Monitoring
Flexible Definition
Custom Reports
PCI, HIPAA, GLBA, US
DoD, SOX Reports
Granular Forensic Records
TROUBLESHOOTING

Solve Issues Remotely
Level 1 Helpdesk
Proactive Monitoring
Spectrum Analysis
Interference Detection
LiveRF Coverage
Remote Packet Capture
Historical Analysis
PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
PROTECTION
FOR ANY
WLAN
Trouble-
shooting
Compliance
Security
19
PAST PRESENT FUTURE
HISTORICAL
TROUBLESHOOTING
TOOLS
Detailed Forensics
Scope Forensics
Alarm Forensics

PROACTIVE
TROUBLE
PREVENTION
AP Testing
Policy Compliance
Performance Policy
REAL-TIME
TROUBLESHOOTING
TOOLS
LiveView
Connectivity Troubleshooting
AP Testing
Spectrum Analysis
LiveRF
End-user Feedback Performance Alarms & Reports
Centralized WLAN Troubleshooting
Remote Troubleshooting
20
Remote Visibility with LiveView
Real-time View of WLAN
Turn Any Sensor into a ‘Sniffer’
Full Layer 2 Frame Capture
Visualize Wireless Traffic Flow
28 Different Graphical Views
Low Network Support Costs
Real-time View of Remote WLAN
Advanced Centralized Troubleshooting
Reduced on-site Support Cost
Increased WLAN Uptime
Remote WLAN Troubleshooting with Real-time Analysis

FRAME
CAPTURE
REAL-TIME
TRAFFIC
CONNECTION
ANALYSIS
21
Advanced Troubleshooting Module
Connection Troubleshooting
Designed for Level 1 Helpdesk
Quickly Determine if it is a Wireless or
Wired Network Issue
Simple Debugging of Wireless Issues
Escalation Only if Necessary
Centralized Troubleshooting
AP Connectivity Test
Proactively Test One or More APs
Find Problems Before Disruption
Analyze Wireless and Wired Network
from Clients Perspective
Schedule Automatic Tests
Test Access to Wired Applications
Secure
Server
WAN
DHCP
Server
Application
Server
DATA CENTER REMOTE LOCATION

22
Spectrum Analysis Module
Physical Layer
Troubleshooting
Detect non-802.11 Interference –
Microwaves, Bluetooth, Frequency
Hopping Devices etc.
2.4 and 5 GHz Band Support
Remote Real-time Spectrograms
Automated
Interference Detection
Use Existing Sensors – No
Special Hardware Needed
Remote Detection of Interference
Automatic Interference Alarms
Improve Wireless Performance
FULL SCAN
CLASSIFY
INTERFERENCE
SOURCES
23
Coverage Mapping – LiveRF Module
Understand Wireless Coverage
& Impact on Applications
Real-time RF coverage analysis
Building Aware Prediction of Coverage
and Capacity
Application Specific Simulations
– Voice, Video, Data
Centralized and Remote Analysis

VIEW SIGNAL
COVERAGE FOR
APPLICATIONS
COVERAGE
CHANGE WITH
INTERFERER
Wireless Camera
Used as Interference
Source
Comparison of VoIP
Coverage
24
AirDefense – The Proven Solution
AirDefense Rated ‘POSITIVE’
Largest Overlay WIPS Vendor
Highest Level of Visibility
Most Detailed Wireless Activity Data
BEST WIRELESS
SECURITY SOLUTION
GLOBAL
MARKET LEADER
RECOGNIZED
TECHNOLOGY LEADER
PATENTED
AND CERTIFIED
AirDefense Owns WIPS IP - 28 Patents
NIAP Common Criteria Certified
Validated and Deployed by Very Security
Sensitive Organizations – US Army, DoD,
FAA, NSA, FBI, DoE, DHS, etc.

Most Scalable Wireless Monitoring Platform
MarketScope for Wireless LAN
Intrusion Prevention Systems
25
Return on Investment
AirDefense Enterprise has a Positive ROI within a Year
Cost of a Data Breach is $200-$300 per Record
According to Gartner, Prevention Cost is About 5% the Cost of the Data Breach
WEP Cloaking
TM
Provides Secure, Compliant and Time Deferred Upgrade Path
SECURITY
Cost of on-site Wireless Scanning can be $270-$900 per Visit
Manually Classifying Wireless Devices as Rogues or Neighbors is Error-prone
AirDefense Generates Automatic Wireless Compliance Reports with Forensics
COMPLIANCE
TROUBLESHOOTING
Cost of on-site Wireless Troubleshooting can be Over $1000 per Visit
Remote Troubleshooting Improves Wireless Availability and Reduces Downtime
AirDefense Enterprise Resolves Over 70% of Wireless Trouble Tickets Remotely

×