As enterprise networks grow and become the most crucial driver of business,
they are also becoming increasingly vulnerable to attacks from diverse sources.
Most corporations–especially those for whom network downtime means not just
loss of business but also of reputation–are well aware of the vulnerability of
their networks.
Unfortunately, except for a few large corporations, most of them still have a
piecemeal and reactive approach towards security. However, it is now being
accepted that threats to networks must be taken care of in a holistic and
proactive manner. And since the source of attacks can be as diverse as the
number of vulnerable points on the network, networks needed to be guarded by an
integrated security solution.
Integrated Security solutions
While on one hand, many security solutions vendors have been promoting the
concept of an integrated security solution, on the other hand, many enterprises
too have shown an inclination towards deploying a comprehensive solution instead
of going for point solutions or appliances that address only one or a few
portions of the security. This broad-based approach to security has happened
largely in the past one year. As Avinash Purwar, business development manager,
Cisco Systems (India & SAARC) points out that in the last financial year,
Cisco India’s focus was on selling individual boxes which could fit into the
customers network and deliver specific functionalities. Therefore, PIX Firewall
boxes, 42XX IDS boxes and 3000 series VPN concentrator boxes were positioned
with the customer. "However, the sales team found that many times, the
customers did not really require dedicated (and thereby, more expensive)
solutions–but integrated solutions which could deliver multiple
functionalities and could be scaled up as and when the requirements went
up," he says.
|
Even though various security solutions vendors have different definitions for
an integrated security solution, such solutions must offer a combination of
hardware and software platforms including a security management solution that
offers multiple functionalities and takes care of the entire gamut of security
on a network. Rakesh Singh, general manager, Asia operations, NetScaler, defines
an integrated security solution as "one that encompasses not only a point
security problem (like worms/intrusions), but also handles a variety of network
and/or application-layer security challenges." Pointing out that the
concept of integrated security is emerging as an effective approach to address
the new challenges facing e-businesses, Joy Ghosh, country manager—India,
Symantec, says, "This method combines multiple security technologies with
policy compliance, customer management, service and support, and advanced
research for complete protection."
|
On the other hand, Nortel Networks definition of integrated network security
is based on a key tenet known as ‘Security in the DNA’. Nortel Networks
strategy for enterprise security called ‘Unified Security Architecture’
assumes that all components of an IT infrastructure are targets... that even
internal users could be network threats... attacks are inevitable... network
performance cannot be compromised by processing-intensive security
measures...and IT budgets are constrained. "It is not a one-size-fits-all
prescription, but rather a framework of functionality that offers multiple
implementation choices suitable for closed, extended, and open enterprises in
different industries–and for diverse application requirements within all
enterprise types," emphasizes Sanjay Jotshi, director-marketing &
channels, Nortel Networks India.
Vishak Raman, country manager—India, WatchGuard Technologies, makes an
altogether different observation. He says that today there is no clear-cut
definition for an integrated solution. "At one end of the spectrum, there
is a growth in specialized appliances like HHTP Proxy and Blue Coat, SSL-based
(Neoteris) and on the other end there are integrated appliances which claim to
have application proxies, IDS, IDP, URL filtering, routing,
anti-virus, firewall, VPN, QOS, SLB (Server Load balancing) etc," he points
out, adding that a customer might not need or might not use the entire piece of
features. His take is that it is eventually enterprises that would define what
would be an integrated solution for his existing set-up.
The Key Elements
Key security technologies that can be integrated include firewalls (they
control all network traffic by screening the information entering and leaving a
network or portion of a network to help ensure that no unauthorized access to
computers and/or the network occurs), intrusion detection (detects unauthorized
access and provides alerts and reports that can be analyzed for patterns and
planning), content filtering (identifies and eliminates unwanted traffic)
virtual private networks (secure connections beyond the perimeter, enabling
organizations to safely communicate with other networks across the Internet),
vulnerability management (enables assessments of a network’s security position
by uncovering security gaps and suggesting improvements) and virus protection
(protects against viruses, worms, and Trojan horses).
|
Singh of NetScaler says that an integrated security solution can have a wide
range of elements but common application-layer security challenges (which
NetScaler focuses on) include denial of service (DoS) attacks, intrusion attacks
(worms and viruses) and overall encryption to protect transmitted data (SSL
encryption).
Benefits
Companies usually perceive security as an expensive proposition (that’s
not always without a reason), which also involves lots of management
complexities. As such any security solution must offer benefits in terms of
total cost of ownership, functional depth and efficiency and ease of management.
From an enterprise standpoint, though security is a big concern, keeping
operational costs low is also a big concern. Many products implemented in the
operating environment means increase in management and manpower overheads and
would in turn increase complexity.
An integrated security solution takes care of many of these concerns of an
enterprise. By adopting a comprehensive strategy that holistically addresses
security at each tier of the network (client, server and gateway), organizations
are able to reduce costs, improve manageability, enhance performance, tighten
security, and reduce risk of exposure.
|
"We feel these three metrics would define the success of an integrated
solution in the market place–cost, performance and depth of the specialization
of that feature available in that integrated appliance," observes Raman of
Watch Guard.
Integrated security solution can offer much more seamless operation.
"Multiple devices (from different vendors) often don’t work well
together, as encryption or other issues can challenge data flows and visibility
of traffic streams – doing the majority of one type or other of security
operations in the same device maximizes the chances of success," emphasizes
Singh of NetScaler.
Integrated security solution reduces the need to purchase, install, update,
and manage multiple security products from multiple vendors or address
interoperability issues between various vendors’ products at each network
tier. Such a solution enables reallocation of IT personnel to other strategic
projects while maximizing the productivity of the often overburdened
IT-department, improving overall security manageability. "Since an
integrated security solution can be implemented at all network tiers, it offers
greater protection of proprietary assets. Integrated security allows for
uninterrupted business operations, promotes employee productivity, maximizes
revenues, and minimizes the possibility of litigation," says Ghosh of
Symantec India.
Integrated security solutions may be the future of network security. However,
that should not mean enterprise networks are tied to security devices or
appliances from one vendor. Enterprise must always deploy best of breed
solutions and products. And this is what is beginning to happen. No doubt, large
security vendors like Cisco and NetScreen have found it useful in putting
together an ecosystem of partners or frantically acquiring specialist single
product companies that would help them build more effective and powerful
security solutions.
| Vendor Offerings | |
| Vendors | Integrated Solutions Approach |
Cisco Systems | Cisco’s Network Integrated Security Solution comprises the following. |
| 1. Software-based (IOS) Security | |
| 2. Blade/Add-on cards-based Security | |
| 3. Appliance-based Security | |
| Basic security instructions are programmed into the Cisco IOS, which may be uploaded on to an SME / SOHO router, and deliver the functionality in a small user group. As users increase or the number of branches increase, the company may choose to scale-up its security infrastructure by inserting firewall and/or IDS cards into the router. This, Cisco claims, would enhance the speed and feed of the security features on the router. As enterprise needs expand further, they may choose to upgrade to a security appliance. | |
| NetScreen Technologies www.netscreen.com | Solutions integrate layers of security technologies in purpose-built devices optimized to secure |
| critical assets. Key technologies include firewall, IPSec VPN, SSL VPN, secure meeting, denial of service protection, antivirus protection and intrusion prevention. | |
| NetScaler www.netscaler.com | NetScaler’s secure application networking systems leverage the company’s patented Request |
| Switching technology, which enables the integration of application-level (Layer 7) security, optimization and traffic management capabilities into a unified platform. By leveraging these combined capabilities, NetScaler claims enterprises, e-commerce vendors and service providers can ensure application security and performance while reducing their total cost of ownership. | |
| Nortel Networks www.nortel.com | Nortel Networks’ definition of integrated network security is based on what it calls ‘Security in |
| the DNA’. Nortel Networks strategy for enterprise security called ‘Unified Security Architecture’ provides a conceptual, physical and procedural framework of recommendations and solutions for enterprise network security. The vendor says that its Unified Security Architecture addresses the multi-level complexity of network threats. It provides answers on multiple levels–for instance, from a firewall guardian to block intruders at the front gate to encryption to shroud every packet in privacy...from virtual private networks that span the global Internet to virtual LANs that segregate network management traffic from desktop users. | |
| Symantec www.symantec.com | Symantec says that its integrated security solution goes beyond the client and gateway and |
| provides another layer of integrated security in the management and monitoring infrastructure. Symantec’s Enterprise management solution brings together events and incident response capabilities from not just Symantec’s own products but also from other security vendors. The vendor says that it uses Push-Pull technology to extract the relevant amounts of information from these other vendors to its own environment and then provides the client with the capability to respond and mitigate these security issues. | |
Source: | |
/vnd/media/agency_attachments/bGjnvN2ncYDdhj74yP9p.png)
/vnd/media/post_attachments/317eb0238d85ee462c19f6fe77a2cb35a592e593d0f415850e6e2d2923eb3ec4.jpg)
/vnd/media/post_attachments/5e0f66a513aa00de75dd57c5182d2b33f37b8f911510abf388eeacfac9368e5a.jpg)
/vnd/media/post_attachments/fcfbcb7061b824b2eb34719f38bd2ce75ff956c3fac7f7afc01b86237c4e5e60.jpg)
/vnd/media/post_attachments/1e0d0cecf3043b2dfd48d52d8b4465fd9f2d2295189f073a84624e77c4ac3263.jpg)