SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
LHSSS-3




    Next Generation Firewalls
    Harsh Jangra
    Director – Technical Operations (Security)
    www.LearnHackingSecurity.com
Can you keep up?
• Intelligence                  • Consolidation of gateway functions
  » Reduce emphasis on human      » Simplification
    intervention
                                • Enterprise-class features available for all
• End-to-end protection           segments
  » Policy compliance for all
                                  » Not limited to large appliances
    devices, including mobile
                                • Growth of WLANs
• Virtualization
                                  » Mobile enterprise
  » Virtual appliances
  » Multi-tenant environments
Firewalls Evolution

                      • Firewalls developed over 25 years ago
                        » Initial protection by blocking traffic by
                          port, protocol, or IP address
                          • From packet filtering to circuit level to proxy to deep
                            packet inspection…
                      • Threat landscape evolved from primitive to
                        more sophisticated
                        » Able to pose as legitimate traffic & bypass policies
                        » Business processes evolved as well
                          • Firewall policies disabled over time to allow critical
                            applications to pass through
Integrated Threat Protection in Action
Problem:



                                                                          Error message:
                                                                          “Drops” copy of itself on
 “Innocent” Video Link:                                                   system and attempts to
 Redirects to malicious Website                                           propagate

                                      “Out of date” Flash player error:
                                      “Download” malware file



Solution:
 Integrated Web Filtering
 Blocks access to malicious Website

 Network Antivirus
 Blocks download of virus

 Intrusion Protection
 Blocks the spread of the worm
Integrated Threat Protection in Action
  • Application Control: Unwanted Services and P2P Limiting
   Botnet command channel, compromised Facebook applications, independent of port or protocol

  • Intrusion Prevention: Vulnerabilities and Exploits
   Browser and website attack code crafted by hackers and criminal gangs.

  • Web Filtering: Multiple categories and Malicious sites
   Botnet command, phishing, search poisoning, inappropriate content

  • Vulnerability Management: Real time exploit updates
    Multiple scanning points Firewall Gate, Analyzer, Web, DB, and Scan

  • Antispam: Unsolicited messages
    Phishing, Malware, Social Engineering and Junk

  • Antivirus: All malicious code
    Documents, macros, scripts, executable
    Delivered via Web, Email, USB, Instant messaging, social networks, etc.
LHS Connections and Updates



                    #harsh_ jangra
                    #HackingTechnoS

                                      Get Latest       Facebook
                                      Hacking &
                                                       Security Updates
                                      Security Updates Connect with us
                                      Subscribed on
                                                       Facebook.com/HackingTechn
                    Hands-On Labs     LHS/ePaper       ologies
Resources




      http://www.eCoreTechnoS.com         www.LearnHackingSecurity.com




   http://www.HackingTechnologies.com   http://www.GetHackingSecurity.com

More Related Content

PDF
Next Generation Firewall and IPS
PPTX
Sangfor ngfw 修订版
PPTX
Why Its time to Upgrade a Next-Generation Firewall
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
PPTX
Advanced Threat Protection
PPTX
September 2012 Security Vulnerability Session
PPT
Top Tactics For Endpoint Security
Next Generation Firewall and IPS
Sangfor ngfw 修订版
Why Its time to Upgrade a Next-Generation Firewall
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection
September 2012 Security Vulnerability Session
Top Tactics For Endpoint Security

What's hot (20)

PDF
Cisco NGFW AMP
PPTX
FireEye Engineering
PDF
Cisco amp for endpoints
PDF
Cisco amp for networks
DOCX
Nice network intrusion detection and countermeasure
PPT
FireEye
PDF
Cisco umbrella overview
PPTX
160415 lan and-wan-ctap
PDF
How to Choose a SandBox - Gartner
PPTX
PPSX
SonicWALL Advanced Features
PDF
Cisco amp for meraki
PDF
Bezpečnost není jen antivirus
PPT
UTM Unified Threat Management
PPTX
Evento 15 aprile
PDF
Web Application Security
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PPTX
Thinking Differently About Security Protection and Prevention
PPTX
Cerdant Security State of the Union
Cisco NGFW AMP
FireEye Engineering
Cisco amp for endpoints
Cisco amp for networks
Nice network intrusion detection and countermeasure
FireEye
Cisco umbrella overview
160415 lan and-wan-ctap
How to Choose a SandBox - Gartner
SonicWALL Advanced Features
Cisco amp for meraki
Bezpečnost není jen antivirus
UTM Unified Threat Management
Evento 15 aprile
Web Application Security
Make Every Spin Count: Putting the Security Odds in Your Favor
Thinking Differently About Security Protection and Prevention
Cerdant Security State of the Union
Ad

Similar to Next Generation Firewalls (20)

PPTX
An introduction to Unified Threat Management (UTM), for Dummies
PPTX
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
PDF
Plugging Network Security Holes Using NetFlow
PPTX
Spiceworld 2011 - AppRiver breakout session
PDF
20120329 Cybercrime threats on e-world
PPTX
Cyber crime trends in 2013
PPTX
Cyber Security
PDF
Offensive malware usage and defense
PPTX
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
PPT
Security Lifecycle Management Process
PDF
Securing the Human (人を守るセキュリティ)
PDF
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
PDF
Advanced security - Seccom Global
PDF
Cyber security-briefing-presentation
PPTX
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
PPT
3 Hkcert Trend
PPT
PDF
Invited Talk - Cyber Security and Open Source
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
ODP
Web application-security-and-why-you-should-review-yours
An introduction to Unified Threat Management (UTM), for Dummies
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Plugging Network Security Holes Using NetFlow
Spiceworld 2011 - AppRiver breakout session
20120329 Cybercrime threats on e-world
Cyber crime trends in 2013
Cyber Security
Offensive malware usage and defense
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Security Lifecycle Management Process
Securing the Human (人を守るセキュリティ)
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
Advanced security - Seccom Global
Cyber security-briefing-presentation
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
3 Hkcert Trend
Invited Talk - Cyber Security and Open Source
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Web application-security-and-why-you-should-review-yours
Ad

More from The eCore Group (8)

PDF
Top 5 Cyber Threats of 2014
PDF
15 Tips to Protect Yourself from Cyber Attacks
PPTX
Top 10 Cyber Attacks on Healthcare Industry
PDF
India is Cyber Vulnerable
PPTX
CMS Joomla
PPTX
Secure Coding 2013
PPTX
Windows server 2012 security Webinar
PPTX
Windows 8 security eCore
Top 5 Cyber Threats of 2014
15 Tips to Protect Yourself from Cyber Attacks
Top 10 Cyber Attacks on Healthcare Industry
India is Cyber Vulnerable
CMS Joomla
Secure Coding 2013
Windows server 2012 security Webinar
Windows 8 security eCore

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Next Generation Firewalls

  • 1. LHSSS-3 Next Generation Firewalls Harsh Jangra Director – Technical Operations (Security) www.LearnHackingSecurity.com
  • 2. Can you keep up? • Intelligence • Consolidation of gateway functions » Reduce emphasis on human » Simplification intervention • Enterprise-class features available for all • End-to-end protection segments » Policy compliance for all » Not limited to large appliances devices, including mobile • Growth of WLANs • Virtualization » Mobile enterprise » Virtual appliances » Multi-tenant environments
  • 3. Firewalls Evolution • Firewalls developed over 25 years ago » Initial protection by blocking traffic by port, protocol, or IP address • From packet filtering to circuit level to proxy to deep packet inspection… • Threat landscape evolved from primitive to more sophisticated » Able to pose as legitimate traffic & bypass policies » Business processes evolved as well • Firewall policies disabled over time to allow critical applications to pass through
  • 4. Integrated Threat Protection in Action Problem: Error message: “Drops” copy of itself on “Innocent” Video Link: system and attempts to Redirects to malicious Website propagate “Out of date” Flash player error: “Download” malware file Solution: Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm
  • 5. Integrated Threat Protection in Action • Application Control: Unwanted Services and P2P Limiting Botnet command channel, compromised Facebook applications, independent of port or protocol • Intrusion Prevention: Vulnerabilities and Exploits Browser and website attack code crafted by hackers and criminal gangs. • Web Filtering: Multiple categories and Malicious sites Botnet command, phishing, search poisoning, inappropriate content • Vulnerability Management: Real time exploit updates Multiple scanning points Firewall Gate, Analyzer, Web, DB, and Scan • Antispam: Unsolicited messages Phishing, Malware, Social Engineering and Junk • Antivirus: All malicious code Documents, macros, scripts, executable Delivered via Web, Email, USB, Instant messaging, social networks, etc.
  • 6. LHS Connections and Updates #harsh_ jangra #HackingTechnoS Get Latest Facebook Hacking & Security Updates Security Updates Connect with us Subscribed on Facebook.com/HackingTechn Hands-On Labs LHS/ePaper ologies
  • 7. Resources http://www.eCoreTechnoS.com www.LearnHackingSecurity.com http://www.HackingTechnologies.com http://www.GetHackingSecurity.com

Editor's Notes

  • #5: Here is an example of our approach in action. This is the Koobface attack, which is still active in the wild.Starts as a link to a non-existent video on a malicious site sent via IM, email, or webmail. The first layer of protection is web filtering to block access to the site. If the user clicks on the link, he would receive a phony alert telling him his player is not working, and to download a non-existent new version on a malicious site. By clicking on the “OK” button on the phony Error message, the user is actually instructing his system to install the virus. Antivirus protection would detect the file that the user is trying to install, and block itOnce installed, the worm would try to propagate. The IPS technology would detect the propagation effort, and block it before it could succeed.