160 likes | 857 Views
ThreatLinQ. Proactively Optimize IPS Network Security. Typical IPS Deployments and Configurations. IPS throughout the network to protect critical assets WAN perimeter DMZ / Web applications Internal data centers Core network Access Aggregation / Distribution Layer
E N D
ThreatLinQ Proactively Optimize IPS Network Security
Typical IPS Deployments and Configurations • IPS throughout the network to protect critical assets • WAN perimeter • DMZ / Web applications • Internal data centers • Core network • Access Aggregation / Distribution Layer • TippingPoint Recommended Settings • And Localized Settings • Perimeter • Data center • Core
Key Questions • What threats are outside the network – “in the wild”, and how are they changing? • Is the network protected against these changing threats? • Are we making optimal use of the TippingPoint IPS?
TippingPoint’s ThreatLinQ • What is it? • Security portal that provides global threat and IPS filter intelligence data • Who is it for? • TippingPoint IPS customers through our customer portal • Why is it important? • Helps customers optimize their IPS protection
Real-Time Threat IntelligenceWhat’s happening outside your network – “in the wild”? • Real-time monitoring of malicious threats and attacks • View current global attack activity • View attack activity by country • Watch recent new and growing threats • Drill-down to view detailed threat source and destination data on each attack type TippingPoint Lighthouse Network
Global Threat LandscapeView details on all global threats Attack / Filter Name • Attack severity • # of unique attacks
Local Threat LandscapeDrill-down on local threat landscape details Top Attacks Originating in China • # of unique attacks
Movers and ShakersWatch new and growing threats Attack Type / Name • # of unique attacks • # of unique source IP addresses • # of unique destination IP addresses
IPS Filter IntelligenceAre you protected against the changing threat landscape? • Real-time IPS profile feeds from participating customers • Identify IPS filters for each of the top attacks • View IPS filter usage stats from other companies • See how other companies have deployed the filter – block, rate-limit, etc. • View additional IPS filter information Customer SMS/IPS Sites
Find the Right IPS FilterMap IPS filters to each of the top threats IPS Filter ID # Attack Type / Name
View IPS Filter Usage StatsSee how other companies use the IPS filters… Vulnerability Filters IPS Filter ID # “Recommended” (Yes/No) Customer Filter Usage • Block • Rate Limit • Permit
View Additional IPS Filter Information Additional Filter Info • Description • External References CVE & BugTraq IDs
ThreatLinQ - Optimize IPS ProtectionAre you making optimal use of your TippingPoint IPS? • Compare IPS Filter Profile to the Threat Landscape • Determine policy changes and deploy to TippingPoint IPS • Identify IPS Filters that cover your security gaps TippingPoint IPS • Review IPS Filter Intelligence Information