Click here to download….

advertisement
Network Security Measures For Next-Generation Enterprises
Rapid advances in communications technology have met with equally rapid
growth in security threats, cybercrime, and the introduction of new security
regulations designed to mitigate these threats. To keep up with these changes
and thrive, enterprises must change how they view security. Competing
effectively in today's business environment means creating a trusted dynamic
enterprise that supports secure voice and data communication channels and
employee mobility.
Security must be dynamic, constantly evolving to meet new threats and allow
for real-time adjustment of security policies to reduce risk. This requires a
shift to a user-centric approach to security that, delivered from within the
network, protects networks, people, processes and knowledge. Security must
also drive business performance. To achieve this, enterprises must have a
corporate-wide strategy - a security blueprint - that allows the enterprise to be
open for business and provide a trusted environment.
Leveraging Bell Labs’ innovation and its carrier class roots, our experience
securing carrier networks, and our understanding of multiple deployment
models, the Alcatel-Lucent security blueprint helps enterprises deploy usercentric security from within their own network.
 A global, corporate-wide security infrastructure






Consistent and corporate-wide application of security (voice, data,
mobility)
Security delivered separately from endpoints and applications
An independent chain of control for security
Security that is transparent to the user
Always-on and highly available security
Ensure secure, private and quality communications from any device,
at any time, by combining the trusted capabilities of the enterprise
network with the creative communications services of the Web (Web
2.0, Cloud and beyond)
To enable the transformation to a trusted, dynamic enterprise with its usercentric security blueprint, Alcatel-Lucent offers a complete suite of products
and solutions that can be easily integrated with existing switching and
security infrastructures. The complete portfolio of Alcatel-Lucent security
solutions allows enterprises to leverage Bell Labs innovations and its carrier
roots to benefit from its carrier class security expertise. It creates open and
secure interfaces to communications, data and services to enable enterprises
to take advantage of new collaborative business models (Web 2.0, Cloud).
Perimeter Security
Security starts with protecting the
voice and data fabric and ensuring a
proper, secure perimeter is in place.
This perimeter must include
traditional elements, such as IP
firewall, virtual private network
(VPN) and threat management.
Choosing a perimeter security solution
means different choices for different
types of enterprises and depends upon
security strategy. Considerations in
controlling security operations costs
include scalability and manageability
of the perimeter solution, especially
for enterprises with multiple locations
to protect.
Our managed perimeter security has
the capability to secure next
generation converged networks
including VoIP, IMS, IPtv, fixed
mobile convergence and Femto.
For enterprises with multiple managed
branch offices, secure integrated
solutions are a must. The AlcatelLucent OmniAccess 5700 Unified
Services Gateway provides a complete
branch office solution in a single
appliance.
Why choose the OmniAccess 5000?



An integrated platform with
network (Routing, Switching,
QoS)
Full security (Firewall, VPN,
IDS)
Handles analog and packet
voice
What makes the OmniAccess 5000
unique?


Centralized management,
performance and scalability
Competitive price/performance
Network Access Control
Alcatel-Lucent Safe Network Access
Control (NAC) provides a fully
integrated NAC solution for multivendor networks with a variety of
managed and non-managed endpoints.
Safe NAC provides guest access, host
integrity check, and role-based access
control to help corporations ensure
compliance. Safe NAC is also backed
by a global multi-vendor capable
professional services organization.
Safe NAC has been shown to reduce
costs by automating operational
processes and minimizing the need for
IT operator intervention during the
authentication process. There is also
simplified troubleshooting and
reduced help desk costs which enables
a reduction in operational overhead
and proactively ensures the health of
the network.
The solution offers a number of key
benefits including full visibility and
control of network activity, protection
of network assets and mission critical
data, ability to enforce user policies in
a centralized manner and most
importantly, ability to offer guest
access.
Safe NAC is comprised of multiple
components including the AlcatelLucent OmniSwitch platforms (AOS
6.3.4 and newer), the Alcatel-Lucent
OmniVista Access Guardian and
Quarantine Manager, the AlcatelLucent VitalQIP and Alcatel-Lucent
OmniAccess wireless platforms. The
Alcatel-Lucent products are integrated
with InfoExpress CyberGatekeeper
Policy Server, CyberGatekeeper
Policy Management and Reporting,
CyberGatekeeper remote and
CyberGatekeeper agents.
Benefits :
Cost optimization




Completely integrated
hardware and software solution
Simplified maintenance and
troubleshooting
Easy to deploy, interoperate
and integrate into existing
network infrastructure
Customized solution available
via Alcatel-Lucent
professional services


Support for multiple endpoint
platforms
Reduced Help Desk calls for
guest access and time to
trouble shoot mis-configured
endpoints.
Secure access for endpoints to
network resources


Continuous surveillance for
identification and mitigation of
rogue and improperly
configured endpoints
Remediation of non-compliant
endpoints to guest server or
guest access
Identity-based networking

Role based access control
allowing access only to
network resources as defined
in user based policies located
on the Alcatel-Lucent
OmniSwitch
Protection of mission critical data and
resources


Centralized policy
management provides
simplified management of
endpoints and users
Seamless use of multiple
authentication methods
(802.1x, MAC, Captive Portal)
for automation of endpoint
integrity checking.
Increased compliance

Consistent compliance policy
can be defined and adhered to

Detailed compliance reporting
to provide visibility of
activities on the network
Features :








Access control for guests,
LAN and wireless
Endpoint malware protection
Verify OS and end-point
configuration
Controls automatic
remediation
Role-based post admission
control
Audit reports for compliance
Non-disruptive, multi-vendor
network deployment
Support for multiple
authentication methods, multiendpoint environments
Embedded Security
Alcatel-Lucent treats security as an
integral part of switch and network
design. Security functions are
embedded directly into our switching
fabric, operating systems,
management applications, and all
interface directly with identity
management. This improves security
by delivering it at the first point of
network contact and reduces security
operating costs by allowing
administrators to configure, manage
and maintain the infrastructure more
efficiently.
Security at the switch core
Integrated into the switch operating
system (AOS), Alcatel-Lucent’s
Access Guardian combines LAN
switch and wireless LAN controller
authentication and access control
features with standards based
directory services. This method
provides authentication, device
compliance and access control
functions directly into the hardware,
distributing security functions closer
to the user.
Why choose Access Guardian?



Authentication, device
compliance and access control
functions are designed directly
into the hardware.
Simplified configuration and
management
Host integrity checking and
user profiles automatically
manage end point security
Quarantine – the next layer of
embedded security
Imagine one of your devices is under
Denial of Service attack, do you know
which device and how fast can you
react to this treat? Alcatel-Lucent
Quarantine Manager combines
network management and network
security into one application to defend
against attacks just like this at the
network and application level,
isolating misbehaving users and
providing a means for user
remediation.
It extends Alcatel-Lucent NMS
benefits such as centralization and
automation, and offers OneTouch
automation for handling a security
event once it is detected, reducing the
complexity of pre-configured alert
notifications and containment rules.
Why choose Alcatel-Lucent
Quarantine Manager?




OneTouch automation
simplifies rules and decision
deployment and change
management
Containment and remediation
ensures consistently secure
infrastructure
Part of a comprehensive
integrated security strategy
Network administrator has
complete control over
quarantine operations
Application Security
Business operations today demand
open access from a variety of devices.
However, unless proper safeguards are
in place, web-enabled access can
compromise the confidentiality of
business-critical information. The
Enterprise landscape is changing. New
applications such as VoIP, new
business models leveraging Web 2.0
and the Cloud, and changing
compliance regulations all create the
need for security solutions that protect
users and infrastructure.
Security for VoIP
As VoIP adoption grows, more hackers and criminals attempt to capitalize on
the technologies security weaknesses. Denial of service (DOS) attacks,
registrant hijacking, message tempering, and SPAM are just a few examples.
Enterprises must not overlook VoIP security or risk exposing their business
to attack.
Enterprise telephony infrastructures are rapidly changing from traditional,
fixed function, proprietary Private Branch Exchange (PBX) infrastructures, to
voice over Internet Protocol (VoIP) PBX systems. These systems enable
convergence of voice and data networks, minimize infrastructure costs and
provide deployment ease and flexibility.
However, the transition to VoIP technology presents new security challenges
that must be addressed to ensure secure and robust, non-disruptive, toll-grade
quality of service (QoS) for voice services, and ensure that business-critical
data networks continue to operate effectively. Therefore, the benefits VoIP
provides can be erased quickly by motivated cyber criminals bent on
compromising an enterprise network.
Alcatel-Lucent provides an end-to-end solution that includes advanced,
multi-layered, network-level security at every point of vulnerability. IP
communications are secured with dynamic pin-holing, deep packet inspection
technology, and advanced bandwidth management capabilities. The
functionality is delivered by Alcatel-Lucent's VPN Firewall Brick®. The
voice and signaling for VoIP are encrypted by the Thales IP Touch Security
Solution to ensure confidentiality and to ensure that all IP phone software
upgrades are not corrupted.
PCI compliance
The real cost of data breach is more than you think. According to the U.S.
National Archives & Records Administration, 50% of businesses that lose
their critical data for 10 days or more file for bankruptcy immediately!
For retailers, PCI compliance is mandatory and has direct and indirect
business benefits. First, no retailer who is PCI-compliant has ever been a
victim of credit card theft. More than the direct cost savings of avoiding a
breach, there is a tacit benefit to the retailer’s brand. Secondly, there are bank
imposed monetary penalties that apply if a retailer is found out-ofcompliance.
Being PCI compliant involves a continuous process of assessment to
determine the current risk level faced by an organization. Alcatel-Lucent PCI
compliance solutions can be applied in stages depending upon most pressing
gaps that an organization might need to correct. Ultimately, a complete
deployment provides a cost effective end-to-end protection and is nondisruptive to current operations.
A critical and most basic component for PCI compliance is the perimeter
surrounding the enterprise, especially if there are many branch locations or
the enterprise is also engaged in ecommerce via their Web site. For fortifying
the enterprise perimeter, Alcatel-Lucent has two products the can be used to
fill any existing gaps, its VPN Firewall Brick®, and FortiNet's FortiWeb.
With a secure perimeter in place, an enterprise must then move to contain the
network connected devices that are considered to be in scope for PCI
compliance. These devices must be regularly audited and can drive up the
cost of maintaining PCI compliance. In addition, providing proper audit trails
is a must. Alcatel-Lucent with its SafeGuard product is able to allow the
network of an enterprise to virtually isolate the devices that are involved in
credit card transactions without requiring a costly network reconfiguration.
For those enterprises that must have controls in place on each transaction and
each user, Alcatel-Lucent's OmniAccess™ 8550 Web Service Gateway can
provide the required contextual transaction content inspection and policy
enforcement with audit.
Security Management
Effective security management involves not only making the right choices
about vulnerability detection, patch management and compliance
management, but also a performance and event management solution that
meets the demands of a global enterprise. Security solutions must collect a
rich dataset from the voice and data fabric and provide a robust event
response and escalation engine.
The Alcatel-Lucent VitalSuite® is Alcatel-Lucent’s industry leading, award
winning, multi-vendor, multi-technology network, application and business
transaction performance management product family that offers a number of
features and capabilities that address the needs of enterprise, government and
service provider customers worldwide. With its unprecedented "Quality of
Visibility" (QoV), VitalSuite lets the customer see everything from the
physical infrastructure to individual desktops to understand the end-user
experience and monitor compliance with service level agreements (SLAs).
The Alcatel-Lucent VitalSuite™ Performance Management Software
solution provides network administrators with end-to-end, web-based
visibility into geographically dispersed, multi-vendor, and multi-technology
converged infrastructures.
The VitalSuite® portfolio integrates multiple innovative components and
capabilities to keep networks, applications and business processes working
together effectively. From a single location, network managers can monitor,
measure and enhance delivery of carrier-class business services across multiservice, multi-vendor networks.
What makes our solution unique?



Performance & event management
Real-time event analysis
Application performance management, reporting, and proactive
tracking of performance problems

End-to-end management for geographically dispersed, multi-vendor,
multi-service networks with at-a-glance access to personalized
performance data
Identity Management
Identity management is at the heart of user-centric security and starts with an
enterprise-wide password management platform and directory server farm.
Many organizations consider it essential to adopt some form of strong
authentication based on certificates, coupled with two-factor identification of
end users and devices.
Providing a rich set of interface and control points to the voice and data
fabric of the enterprise is key to the deployment an Authentication,
Authorization and Accounting (AAA) infrastructure. The Alcatel-Lucent
8950 AAA solution provides the most extensive set of AAA support features
available for both wireline and wireless networks.
What makes our solution unique?





PolicyFlow™ language and interpretation engine allows the system to
enforce to any policy scenario
Extensive protocol support for wireless LANs and other networks (i.e.
802.1x, DIAMETER, and EAP protocols)
Complete solution that fully enables 3G mobility wireless WANs
Centralized management
Comprehensive dashboards
The Motive AAA is the Authentication, Authorization and Accounting
(AAA) server of choice for major service providers, ISPs and Enterprises due
to its proven performance and its flexible, extensible PolicyFlow™
architecture built on Java™-based programming language. In addition,
Motive AAA provides an expanded graphic interface for overall server
configuration, management and monitoring.
Motive AAA server delivers expanded functionality to address your
deployment of wireless LANs and other networks deploying 802.1x,
DIAMETER, and EAP protocols to support fixed-mobile roaming and
blended multimedia services.
Benefits :


Complete support for Wi-Fi Wireless LANs
Most extensive set of AAA support features available – for wireline
and wireless networks









Fully enables 3G mobility wireless WANs
Easy integration to existing systems
Carrier Class AAA Platform, 5 nines reliability and geo-redundant
Features for every AAA requirement
RADIUS, DIAMETER, TACACS, EAP-SIM, EAP-AKA, EAPFAST, SS7 Gateway, Mobile IP, IPv4/v6, IP assignment and pool
management
High performance-better performance on less hardware
Extreme flexibility-unparalleled user definable integration capabilities
Logging and reporting down the processing thread and packet level
No per server fees
Features :
Provides centralized network access management and control to:.




Verify Identity (Authentication)
Verify Access Permissions (Authorization)
Define Session Configuration Parameters
Record Session Data (Accounting)
Centralized AAA session management and control across a wide range of
access medial including:












Wide Area Broadband (WiMax)
Wide Area Mobile (CDMA, GPRS, UMTS, 1xRTT, 1xEV-DOrA,
eHRPD, LTE 4G and LTE)
Wired and Wireless Local Area Networks (IP, Wi-Fi, WiMax/WiBro)
Dial-Up
DSL (Termination on DSLAM & BRAS)
Dual-Mode Services (UMA/IMS)
Define Session Configuration Parameters
Firewalls and VPNs (LSMS/LVF, etc.)
Features for Wireline and Wide-Area Wireless (W-WAN) networks;
Local-Area Wireless (Wi-Fi) networks and 802.1x/EAP
authentication; UMA and IMS Dual-Mode Handset Services
Provides an expanded graphical interface for overall server
configuration, management and monitoring
The only AAA application to offer a built-in programming language
for writing custom AAA Policy applications. This powerful
PolicyFlow™ language allows the system to conform to any possible
policy scenario, eliminating the need to compromise your
requirements or adjust your designs to meet other AAA software’s
fixed view of the world.
EAP can also be used to support dynamic key creation for securing
the network traffic flowing through the air. This capability provides














an additional layer of protection for users and administrators
concerned about data security.
An easy to use step-by-step GUI wizard that allows administrators to
build specific policies in a fast easy and efficient way.
Server monitoring and statistics tools
Flexible session limit enforcement definition
Real-time session tracking with external query support
SNMP MIB and Trap support
Easy SQL data base integration
Read/write from LDAP directories
Strong authentication (based on token cards)
Flexible retry/alternate data source logic
Complete support for Proxy RADIUS and DIAMETER
Support for IP Multimedia Subsystem (IMS)
Fully configurable accounting
CDR mediation and configurable login
Extensive logging capabilities with multiple log channels (Syslog,
SNMP, SQL, file, etc.)
Security Services
Our teams identify vulnerabilities and
implement secure architecture relying
on 25 years of proven expertise in
high-security environments. We
review and strengthen your
technologies and security policies to
meet compliance requirements and
establish a standards-based framework
for operations. Our experts can
improve your crisis management
strategies and review your
infrastructure, services and security
measures. Our security solutions
portfolio includes:


Security assessment services:
identify the threats and
vulnerabilities within your
organization, network,
applications, services and
policies.
Security strategy, policy and
compliance services: ensure
you are up to date with the





latest regulatory, partner and
business requirements related
to security and privacy.
Alcatel-Lucent can also
establish or update corporate
security strategies, programs
and policies.
Security architecture design
and integration services:
develop, implement and test
security solutions.
Business applications security
services: fully exploit the
OmniAccess 8550 Web
Services Gateway to manage
user access to sensitive
corporate data, applications
and communications across
multiple IT systems, in real
time. We assist with the
design, integration and
optimization of your web
services filtering policies to
ensure you obtain optimal
value from this innovative
security solution.
Security services for mobile
users: install the AlcatelLucent OmniAccess 3500
Nonstop Laptop Guardian
platform. We can provide
consulting, integration and
training to ensure this awardwinning product matches your
unique mobile security
requirements.
Business continuity and
disaster recovery
services:establish processes
and infrastructures that are
responsive, available and
scalable to ensure the secure
continuity of operations in any
situation.
Threat management services:
take reassurance from a full
range of capabilities to
prevent, detect and respond to
security incidents. Leveraging
the security research of
Alcatel-Lucent experts, we
monitor vulnerabilities and
provide alerts and advisories
for CERT-IST.
Download