870 likes | 1.34k Views
InstantScan Content Manager L7 Networks service@L7-Networks.com L7 Networks Inc. Agenda Company Profile L7 Missions L7 Investors Layer-7 Content Manager Part-I Market Demand Part-II Solutions Part-III Successful Cases Appendix-I Layer-7 App. Appendix-II Product Spec.
E N D
InstantScan Content Manager L7 Networks service@L7-Networks.com L7 Networks Inc.
Agenda Company Profile • L7 Missions • L7 Investors Layer-7 Content Manager • Part-I Market Demand • Part-II Solutions • Part-III Successful Cases • Appendix-I Layer-7 App. • Appendix-II Product Spec. • Appendix-III Patents
Missions: Internal Network Security InstantScan Content Mgr. Catching Internal Thieves: Employee internet content / behavior management InstantLock Co-Defender Defending Internal Attacks: Isolate virus-infected PCs Internal Threats InstantBlock Application Firewall Preventing External Attacks/Thieves: Unified threat management InstantQos Bandwidth Mgr. Shaping Internal Traffic: Manage P2P / streaming / VoIP / … by layer-7 in-depth classification External Threats
InstantScan Content Manager L7 Networks Inc.
Part-IMarket Demands Catching the Internal Thieves
What are your employees doing at work? employee productivity killer Internet Explorer for web sites Outlook for emails Looking for info for work? Check out stock price first! network performance killer Communicating for work? Speak to lovers first! MSN for chats BT, ED2K, Xunlei Download a movie back home for fun!!
Survey & Studies • Heavy Usage • Gartner: >30% enterprise, <1% control (2005) • Radicati Group: >80% enterprise (2008) • Security Theats • WORM_KELVIR.A • WORM_FATSO.A • …
2. Information Leakage or Virus Price Book
3. Bandwidth stealers for downloads • P2P downloads • Illegal music • Illegal movies • …… • …… • Bandwidth inadequate for • HTTP • Email • ERP • ……
Plug & Play Firewall 2005/03/25: NBL Editor’s Choice Beat Facetime, Akonix 2005/12/01: National Innovation Awards L7 Content Manager (stealth mode) switch
5-Step Content Management Step.4 Content Mgmt. Step.1 Discovery Step.2 Normalization Step.3 Behavior Mgmt. Step.5 Report Analysis Anti-Virus MSN file transfer File Recording IM Game IM Chat Chat Recording IM Streaming Keyword block P2P Bandwidth Mgmt. 35 Mbps 20 Mbps 10 Mbps Real-time Learning Layer-7 to Layer-4 Normalization Interactive Behavior Mgmt. Deep Content Inspection Offline Report / Analysis
1. Employees with low productivity Instantly respond to employees in Chat windows even IS doesn’t have an IP address
2. Information Leakage or Virus Price Book Instant Warning
3. Bandwidth stealers for downloads • P2P downloads • Illegal music • Illegal movies • …… • …… After installing InstantScan • Mission critical app. • HTTP • Email • ERP • ……
Solutions manage / filter / record / audit employee’s IM & Web behaviors and contents to increase their productivity built-in backend reports for 3-level analysis: (1) index for productivity, performance, security; (2) dashboards for summary; (3) detailed reports for inspection Employee Productivity highspeed UTM hardware platform with intelligent 3-tier arch. for performance, availability, and reports Layer-7 Visibility understand the real applications running by your employees Network Performance Internal Security limit P2P / P2SP traffic and guarantee mission critical traffic such as ERP, VoIP, Web traffic prevent internal network users from virus/worm or information leakage by P2P / tunnel software, spyware, WebMail, WebIM, etc.
Painless Installation? WebSense / BlueCoat / FaceTime / IM Logic / Akonix require to setup every client to connect to the IM Proxy Spam Wall Tunneled IM cannot be managed Virus Wall IM@HTTP cannot be managed IM Proxy data path Inline-IDP Firewall/VPN Check website for comparison Content Mgmt. IM Proxy What if IM is tunneled in WebMSN/Mail/HTTP/…? Web Proxy What if IM behaves like Web Proxy?
Step 0. No Modification of Networks IM in port-80, proxy, socks4/5 can still be managed Even in wireless/dhcp env, still can be managed by AD Management Server DHCP Server Firewall/Router Proxy IS switch AD Server switch
3-Tier Architecture Friendly user interfaces Powerful reporting and alerts Plug & play installation without modifying network arch.
5-Step Content Management Step.4 Content Mgmt. Step.1 Discovery Step.2 Normalization Step.3 Behavior Mgmt. Step.5 Report Analysis Anti-Virus MSN file transfer File Recording IM Game IM Chat Chat Recording IM Streaming Keyword block P2P Bandwidth Mgmt. 35 Mbps 20 Mbps 10 Mbps Real-time Learning Layer-7 to Layer-4 Normalization Interactive Behavior Mgmt. Deep Content Inspection Offline Report / Analysis
Step 1. Discovery (App. View) Watch applications’ sessions and highlight tunneled IM sessions
Step 2. Setup L7 Policy Scheduled updates to Application Patterns to manage application usage by defined time schedules
Step 3.1 Setup IM Policy for Individuals IM management for individuals by (1) specific IM accounts, (2) learning, (3) registration, (4) AD name, (5) AD group
Step 3.2 Setup IM Behavior Mgmt. Define permission levels to facilitate individual IM policy deployment
Step 3.3 Setup IM Peers Limit the peer for chat by individuals or groups
Step 3.4 Self-Defined Policy Violation Warning Messages Multi-language support for all languages
Step 3.4 Setup Bandwidth Pipes Divide outbound bandwidth pipes by mouse drags Divide inbound bandwidth pipes by mouse drags
Step 4.1 Setup IM Chat Content Management Right click to define your own chatting keywords / groups
Step 4.2 Setup IM File Transfer Content Management Right click to define your own filename keywords/groups
Step 4.3 Setup IM File Transfer Anti-Virus Anyone who is infected with virus will be notified the name of the virus
Step 5.1 Multi-level Auditing Levels 3-levels: admin/mis/audit to separate operating and auditing parties
Accounting & Auditing Anyone who is auditing others should have themselves well-audited so as to assist customers to be compliant to various regulations.
Manufacturing Confidential information should be kept as private as possible. InstantScan is able to detect varieties of tunneled software which may cause a lot of security holes for information leakage.
Semiconductor Confidential design sheet is the core technology of IC design and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.
IC Design Confidential design sheet is the core technology of IC design and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.
Banking & Stocks With a heavy usage of IM across the stock transactions, they do need a tool to log and record what the customers have issued to the brokers, and what the brokers have spoken to the internal dealers.
Photodiode Confidential design sheet is the core technology of Photodiode and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.
Electronics Confidential price book is the core value of us to sale the chips and must be kept as private as possible. Anyone who use IM to transfer confidential files can be caught with strong evidence.
Media Confidential news are invaluable if they are kept in secret. However, journalists communicate largely with IM so they can share the resources. What is worse, internal staffs may also use IM to tell other staffs in other companies. However, IM is extremely convenient for communications among internal staffs. We need L7 to control them.
Spin-off from the D-Link corporation, Alpha continued to sue VIA Technology for the stolen confidential designs. In the mean time, Alpha Networks put 4 InstantScan boxes at the outbound links to control the use of IM so as to gather the information of IM usage. As the largest multi-level company in the world, Amway continued to make itself conform to the toughest regulations in order to keep its electrical communications as secure as possible, just like what it had done to web and emails.
Confidential patents are invaluable if they are kept in secret. Biochemistry has become the most emergent Industry that can boost revenue in the century. Just like what health-care industry has emphasized, the data of the patient or people under experiments is extremely proprietary and never be leaked to anyone else. L7’s InstantScan helps to control the usage of IM.
Benefits for Deploying InstantScan • Discovery • See who is actually using the network for what, especially in multi-culture environments which mix a huge number of applications. • L7 Firewall: IM / P2P / Tunnel / Streaming / VoIP / File-Transfer / … • Effective control the applications in your networks, either blocking or shaping • Content Manager: IM & Web • Selectively log/record employees' activities and contents for regulations and compliance. • Actively control the activities/contents instead of just logging/recording to prevent confidential information leakage while improving productivity. • Report & Analysis • log and archive for potential legal discovery needs or other purposes • Indication of employees' policy violations or productivity.