1 / 14

ThreatLinQ

ThreatLinQ. Proactively Optimize IPS Network Security. Typical IPS Deployments and Configurations. IPS throughout the network to protect critical assets WAN perimeter DMZ / Web applications Internal data centers Core network Access Aggregation / Distribution Layer

omer
Download Presentation

ThreatLinQ

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ThreatLinQ Proactively Optimize IPS Network Security

  2. Typical IPS Deployments and Configurations • IPS throughout the network to protect critical assets • WAN perimeter • DMZ / Web applications • Internal data centers • Core network • Access Aggregation / Distribution Layer • TippingPoint Recommended Settings • And Localized Settings • Perimeter • Data center • Core

  3. Key Questions • What threats are outside the network – “in the wild”, and how are they changing? • Is the network protected against these changing threats? • Are we making optimal use of the TippingPoint IPS?

  4. TippingPoint’s ThreatLinQ • What is it? • Security portal that provides global threat and IPS filter intelligence data • Who is it for? • TippingPoint IPS customers through our customer portal • Why is it important? • Helps customers optimize their IPS protection

  5. Real-Time Threat IntelligenceWhat’s happening outside your network – “in the wild”? • Real-time monitoring of malicious threats and attacks • View current global attack activity • View attack activity by country • Watch recent new and growing threats • Drill-down to view detailed threat source and destination data on each attack type TippingPoint Lighthouse Network

  6. Global Threat LandscapeView details on all global threats Attack / Filter Name • Attack severity • # of unique attacks

  7. Local Threat LandscapeDrill-down on local threat landscape details Top Attacks Originating in China • # of unique attacks

  8. Movers and ShakersWatch new and growing threats Attack Type / Name • # of unique attacks • # of unique source IP addresses • # of unique destination IP addresses

  9. IPS Filter IntelligenceAre you protected against the changing threat landscape? • Real-time IPS profile feeds from participating customers • Identify IPS filters for each of the top attacks • View IPS filter usage stats from other companies • See how other companies have deployed the filter – block, rate-limit, etc. • View additional IPS filter information Customer SMS/IPS Sites

  10. Find the Right IPS FilterMap IPS filters to each of the top threats IPS Filter ID # Attack Type / Name

  11. View IPS Filter Usage StatsSee how other companies use the IPS filters… Vulnerability Filters IPS Filter ID # “Recommended” (Yes/No) Customer Filter Usage • Block • Rate Limit • Permit

  12. View Additional IPS Filter Information Additional Filter Info • Description • External References CVE & BugTraq IDs

  13. ThreatLinQ - Optimize IPS ProtectionAre you making optimal use of your TippingPoint IPS? • Compare IPS Filter Profile to the Threat Landscape • Determine policy changes and deploy to TippingPoint IPS • Identify IPS Filters that cover your security gaps TippingPoint IPS • Review IPS Filter Intelligence Information

  14. Thank you

More Related