Scaling Network Security

Scaling Network Security Table of Contents RIP, the Moat 4 The New Network Security Requirements 8 The Scaled Network Security Architecture 11 Summary 15 About the Analyst 16 About Securosis 17 Securosis — Scaling Network Security "3 RIP, the Moat Young people today laugh at folks with a couple decades of experience when they rue about the good old days, when networks snaked along the floors of offices (shout out for Thicknet!), and trusted users were on the corporate network, while untrusted users were not. Suffice it to say the past 25 years have seen some rapid changes to technology infrastructure. First of all, in a lot of cases, there aren’t even any wires. That’s kind of a shocking concept to a former network admin who fixed a majority of problems by swapping out patch cords. On the plus side, with the advent of wireless and widespread network access, you can troubleshoot your network from the other side of the world. We’ve also seen continuing insatiable demand for Network security solutions still need to inspect and enforce policies, regardless of how fast the network gets. Looking for attack patterns on today’s networks requires an entirely different amount of computing power than it did in the old days. network bandwidth. Networks grow to address that demand every year, which stresses our ability to protect them. But network security solutions still need to inspect and enforce policies, regardless of how fast the network gets. Looking for attack patterns on today’s networks requires an entirely different amount of computing power than it did in the old days. So an essential requirement is to ensure that your network security controls can keep pace with network bandwidth, which may be Mission: Impossible. Something has to give at some point to keep the network secure. In this “Scaling Network Security” paper, we will look at where secure networking started and why it needs to change. We’ll present requirements for today’s networks which will take you into the future. Finally we will wrap up with some architectural constructs we believe can help scale up your network security controls. The Moat Let’s take a quick tour through the past 20 years of network security. We appreciate the digression — we old network security folks get a bit nostalgic thinking about how far we’ve come. Back in the day, a modern network security industry started with a firewall to provide access control. Then a seemingly never-ending set of additional capabilities were introduced in the decades since. Next was network Intrusion Detection Systems (IDS), which looked for attacks on the network. Rather than die IDS morphed into IPS (Intrusion Prevention Systems) by adding the ability to block attacks based on policy. We also saw a wave of application-oriented capabilities in the form of Securosis — Scaling Network Security "4
Please complete the form to gain access to this content