1 / 20

Deep Content Security Solutions

Deep Content Security Solutions. Oliver T. Ott VP Sales oliver.ott@microdasys.com. Company info. Microdasys Inc. Founded in 2001 HQ in Las Vegas, NV EMEA office in Munich, Germany Regional sales offices in France, Belgium, UK Worldwide distribution network

mbraswell
Download Presentation

Deep Content Security Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Deep Content Security Solutions Oliver T. Ott VP Sales oliver.ott@microdasys.com

  2. Company info Microdasys Inc. Founded in 2001 HQ in Las Vegas, NV EMEA office in Munich, Germany Regional sales offices in France, Belgium, UK Worldwide distribution network 100% channel oriented, no direct sales Microdasys Inc.

  3. Microdasys Customers Microdasys Inc.

  4. Strategic Partnerships • Clearswift • Sun Microsystems Strategic Development Partner • Fujitsu Siemens Global Alliance • Cyberguard/WebWasher • Aladdin Knowledge Systems • Secudos Microdasys Inc.

  5. Deep Content Security by Microdasys Inc.

  6. Deep Content Security Deep Content Security provides the ability to apply the same security policies not only to one specific Layer, but all the way from the application to the session layer. Effective application defense is only possible if SSL and XML connections are monitored and inspected. …devices must terminate Secure Sockets Layer (SSL) sessions… …features such as SSL termination and authentication, and deep packet inspection is required to apply rules to the content stream of a connection (and to)…protecting against XML-based attacks one must take the next step: apply rules to all network traffic protocols, not just HTTP. GARTNER – ATC Security Forum Microdasys Inc.

  7. Your Content Security Gap Today, network defense is severely limited because of SSL encrypted and XML based connections which cannot be monitored and inspected by content security devices. The amount of traffic not being inspected, ranges from 30 to over 50%. Microdasys Inc.

  8. Your Content Security Gap II Security administrators face the challenge that SSL and XML connections are controlled by the user, not the administrator. XML capabilities (SOAP extensions) of client workstations are automatically installed with MS Office, Webbrowsers and other applications. “Webservices (XML) will be the next wave of attack by those trying to subvert enterprise security policies. Controlling Web services interfaces is imperative. Security Gateways provide the best way to control Web services connections, inside and beyond the firewall.” GARTNER Microdasys Inc.

  9. Deep Content Security Solutions • Policy Based inspection of all inbound and outbound Webservices (XML) • Interfaces with ICAP enabled content security scanners for AntiVirus protection and content scanning • Auto WSDL feature identifies XML requests and creates a WSDL file if none is present • Webservices are vertically categorized for quick and easy creation of global access and action policies • Easily integrates with SCIP for the inspection of SSL encrypted XML requests • Supports unlimited, multiple accounts with role based multi-admin administration • Decryption and encryption of all inbound and outbound SSL webtraffic • Security policy enforcement, even if the traffic is encrypted • All certificates are inspected and allowed or denied at the gateway level, based on security policies, not the discretion of the client user • Automatic revocation checking with CRL and OCSP support • Extensive exception handling and incident management capabilities • Supports unlimited, multiple accounts with role based multi-admin administration SCIP Encrypted Content Security XmlRay COntent Security for Webservices Microdasys Inc.

  10. Bridging The Gap To overcome the content security gap, SCIP and XmlRAY provide 100% traffic inspection and ZERO-GAP Policy Enforcement. All rules that apply to HTTP traffic, also apply to HTTPS (SSL) and XML traffic ! Microdasys Inc.

  11. Summary Todays network perimeter defense systems are severly limited by encrypted and XML based internet traffic. SCIP and XmlRAY enable 100% traffic inspection and apply security policies to all protocols, without vulnerability gaps. WWW.Microdasys.COM

  12. Licencing • SCIP • XmlRay • SX-Suite Available for Sun Solaris, Windows and Linux. Seat based licensing. Also available as appliance WWW.Microdasys.COM

  13. Why Microdasys Products? • Unique product combination • High margin attainable • Easy to explain, easy to install and easy to test • Existing customers are a potential target group • The best way to aquire new customers WWW.Microdasys.COM

  14. Partner Program • Three Level • NFR-License • Recommended discount level • Sales and technical training with certification • Sales- and marketing plan Start: October 05 WWW.Microdasys.COM

  15. Partnerprogramm We need you – sign up today! WWW.Microdasys.COM

  16. Thank you ! Questions, please… WWW.Microdasys.COM

  17. Encrypted Content Security SCIP Encrypted Content Security SCIP

  18. 1 2 Wenn eine SSL Verbindung hergestellt wird, überprüft SCIP das Zertifikat anhand der Widerrufslisten sowie aller anderen Gültigkeitskriterien für Zertifikate 1 SCIP ermöglicht den Content Scannern die Prüfung der (unverschlüsselten) Inhalte 2 3 Der User kann keine ungültigen Zertifikate mehr akzeptieren. SSL-Tunneling wird erkannt, der Traffic unterliegt den Standard Security Policies 3 SCIP Funktionsweise HTTPS Server SCIP Internet Content Scanner / Filter DMZ Firewall Client verschlüsselt LAN unverschlüsselt > SCIP

  19. Content Security for Webservice XmlRay COntent Security for Webservices XmlRay

  20. The Response will be evaluated and controlled by the WS Boundary Gateway The Server sends the XML-Response The Request will be parsed by the WS Boundary Gateway Client performs an XML-Request 2 1 3 4 How does it work? HTTP(S) Server Complete control Check if the user is allowedto perform this webservice XmlRay Internet Check if the Webservice is in theWhitelist/Blacklist Check all the attachements and DMZ • Perform logging • Perform Content-Check • Notify Admin/User Firewall Client LAN > XmlRay

More Related