Sygate Products Endpoint protection and compliance Ricardo Hernández Calleja Sales Engineer – Security Solutions 14 Diciembre 2006 2005 Symantec Corporation, All Rights Reserved Magic Quadrant for Personal Firewalls, 1Q06 Gartner RAS Core Research Note G00139942, John Girard, 27 June 2006, R1901 06302007 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. The Magic Quadrant is copyrighted June 2006 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to 2 –vendors 2005 Symantec Rights Reserved select only those placed in Corporation, the "Leaders"Allquadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Customer List Some Global Customers TimeWarner 3 – 2005 Symantec Corporation, All Rights Reserved Some Southern Europe & Benelux Customers Framing the Security Problem Worms targeting multi-layered vulnerabilities and are growing in complexity 4 – 2005 Symantec Corporation, All Rights Reserved Vulnerability—Exploit Gap Decreasing Ramen/Adore—06/00 5 variants, 359,000 machines infected Vulnerability Announced Code Red—06/01 Digispid—03/02 Spida—04/02 SQL Slammer—07/02 Slapper—07/02 WebDAV vuln—03/03 Blaster/Welchia—07/03 75 variants, 500,000+ machines infected Witty—03/04 Sasser—04/04 17 variants, 1,000,000+ machines infected Zotob—8/05 0 50 100 150 Days Until First Attack 5 – 2005 Symantec Corporation, All Rights Reserved 200 250 Vulnerabilities in the Enterprise Vulnerabilities Exploited—Gartner Misconfiguration Old Patch Recent Patch New Vulnerability Agent+PFW+Host Integrity IPS 0-Day 6 – 2005 Symantec Corporation, All Rights Reserved Symantec Endpoint Compliance Solution Symantec Sygate Enterprise Protection Symantec On-Demand Protection Symantec Embedded Security Symantec Network Access Control 7 – 2005 Symantec Corporation, All Rights Reserved Symantec Sygate Enterprise Protection Problem Propagation of malicious code Leakage of sensitive information Lost user productivity Increased support costs Solution Ridding the network of non-compliant endpoints with Symantec network access control Ensuring compliance on contact™ across all entry points Protecting endpoints with host intrusion prevention 8 – 2005 Symantec Corporation, All Rights Reserved Two Symantec Sygate Enterprise Protection Agents Symantec Protection Agent Enforcement Host Integrity Symantec Enforcement Agent Enforcement Host Integrity HI and Remediation DHCP/LAN/Gateway/API HI and Remediation IF...Then...Else OS Protection (File, Registry, Process Control) NAC/NAP DHCP/LAN/Gateway/API NAC/NAP OS Protection System Lockdown (Application Control) Buffer Overflow Protection Peripheral Device Control Adaptive Policies Auto-Location Switching IDS Signature-based IDS FW Desktop Firewall Adaptive Policies 9 – 2005 Symantec Corporation, All Rights Reserved Auto-Location Switching Symantec Protection Agent Adaptive policies – Change firewall and/or HIPS policies: By network (IP, subnet, DNS server, DNS resolution, SPM connection, network adapter) By host integrity result (quarantine policy) Application-centric firewall – Granular traffic control – Adapter-specific rules (e.g., Ethernet, wireless, VPN) – Application learning Intrusion Prevention Signatures 10 – 2005 Symantec Corporation, All Rights Reserved Symantec Protection Agent Host intrusion prevention system – OS protection behavioral IPS Configure application access controls for files, registry keys, ability to launch/terminate a process, and load a DLL Downloadable templates – System lockdown Application control whitelist – Universal buffer overflow protection OS services or all applications 11 – 2005 Symantec Corporation, All Rights Reserved Symantec Protection Agent Peripheral Device Control – Block Devices by type (Windows® Class ID) – Supports all common ports USB, Infrared, Bluetooth, Serial, Parallel, FireWire, SCSI, PCMCIA – Can block read/write/execute from removable drives – Example: Block all USB devices except USB mouse and keyboard 12 – 2005 Symantec Corporation, All Rights Reserved Enterprise-Class Management Scalable Multi-Server Architecture – Policy and Log Replication – Policy Distribution (Push/Pull) – Configurable Priority/Load Balancing Policy Management – – – – Group hierarchy w/ inheritance Manage by computer or user Reusable policy objects AD user and group synchronization Centralized Logging and Reporting – Event forwarding (Syslog, SIMs) – Daily or Weekly E-mailed Reports 13 – 2005 Symantec Corporation, All Rights Reserved Symantec Network Access Control Problem Propagation of malicious Leakage of sensitive information Lost user productivity Increased support costs Solution Discovering endpoints & their compliance with security policies Enforcing network access throughout the entire network Remediating non-compliant endpoints Monitoring the network continuously 14 – 2005 Symantec Corporation, All Rights Reserved Symantec Open Network Access Control Host Integrity – – – – Verify process/application (FW, A/V, etc.) Verify service pack/hotfix Verify files/registry keys (patches, etc.) Sophisticated decision tree logic (IF … THEN … ELSE) – Templates Enforcement – Check agent status and Host Integrity result before allowing network access Automatic Remediation – Run local command – Download and execute file – Custom Checks Set registry value, log event, run program or script, popup dialog box 15 – 2005 Symantec Corporation, All Rights Reserved Policy Symantec Open Network Access Control Endpoint Enforcement – Switch to Quarantine Policy when HI fails Sygate Gateway Enforcer – In-line network bridge at gateway VPN, RAS, etc. – Authenticate agent, verify policy, check HI status – Block/quarantine when validation fails Captive proxy redirection Enforcement API – Provide agent status to third-party applications – Integrated VPN Enforcement Nortel, Netscreen/Neoteris, Checkpoint, Aventail, Cisco, iPass 16 – 2005 Symantec Corporation, All Rights Reserved Symantec Open Network Access Control LAN Enforcement (802.1X) – Switch challenges network devices when attached – Non-compliant devices blocked by switch or moved to remediation VLAN – Sygate LAN Enforcer acts as RADIUS proxy Verify agent running, policy current, Host Integrity status – SSA and/or third-party supplicant Policy Compliance or Authentication + Compliance 17 – 2005 Symantec Corporation, All Rights Reserved Symantec Open Network Access Control DHCP Enforcement – Evaluates a computer’s compliance with security policy before allowing the system to obtain a valid DHCP lease (and IP address). DHCP Gateway Microsoft DHCP Plug In Lucent VitalQIP Server Plug In Cisco NAC Enforcement – Integration with Cisco Trust Agent 18 – 2005 Symantec Corporation, All Rights Reserved Network Access Control concepts 2005 Symantec Corporation, All Rights Reserved Corporate Network Is Continually Exposed Internet Kiosks & Shared Computers Guests WANs & Extranets SSL VPN Consultants IPsec VPN Employees Working at Home 20 – 2005 Symantec Corporation, All Rights Reserved Wireless Networks Web Applications “Because of worms and other threats, you can no longer leave your networks open to unscreened devices and users.” Protect Your Network with a NAC Process, Gartner ID# G00124992 It Begins At The Endpoint … Compromised and non-compliant endpoints endanger the network and your data Every user accesses the network and the Internet from an endpoint But not all endpoints are protected and compliant For employees, the endpoint may be – – – Company-issued laptop that hasn’t had a patch or AV update in two weeks Personal computer – desktop or laptop Kiosk computer in an airport, hotel, or office center For guests, the endpoint could be anything, with no ability to know its security health Endpoints are at risk even when not connected to the corporate network 21 – 2005 Symantec Corporation, All Rights Reserved Authorizing Endpoints, Not Just Users Network Access Control = Control who can access your network by creating a closed system Ensure that required patches, configuration, and protection signatures are in place before the endpoint connects to the network Automatic endpoint remediation – Enforce policy before access is granted Authorized User + Authorized Endpoint Antivirus installed and current? Firewall installed and running? Required patches and service packs? Required configuration? 22 – 2005 Symantec Corporation, All Rights Reserved Protected Network Enterprise NAC Requirements Pervasive Endpoint Coverage Universal Enforcement • Laptops • Deployable in all enterprise environments: • Servers • LAN • Managed devices • Desktops • 802.1x • Unmanaged devices • DHCP • Guests • WLAN • VPN • Contractors • SSL • Home computers & kiosks • IPSec Integration Support • Standards • 802.1x • TCG TNC • Frameworks • Cisco NAC • Microsoft NAP Automated Remediation Enterprise Management • Tie into existing tools and workflow • Centralized • No end-user intervention required • Scalable • Flexible Learning Mode • Preserve productivity during patch cycles • Redundant • Multi-tier • Configurable deferral options • Web portal • Printers & other devices “Automated remediation will minimize productivity loss and help desk labor costs for deployments that encompass a large number of managed endpoints.” Understanding Benefits of Installed Endpoint Agents for NAC, Gartner ID# G00140811 23 – 2005 Symantec Corporation, All Rights Reserved Network Access Control: Multiple Dimensions Onsite Nodes connected directly in the LAN switching infrastructure – Workstations – Laptops Remote Nodes connected indirectly to the corporate LAN via VPN Managed Nodes that are owned and administered by the corporate IT group Have expected AV, firewall, and other client protection components – Workstations – Company-issued laptops Unmanaged 24 – 2005 Symantec Corporation, All Rights Reserved Nodes outside the authority or control of the corporate IT group – Guest and contractor laptops – Employee home computers – Kiosk workstations Symantec NAC: Covering the Endpoint Security Problem Gateway Enforcer M A N A G E D U N M A N A G E D SEP SelfEnforcement VPN API Integration R E M O T E O N S I T E LAN Enforcer (802.1x) – Transparent and full 802.1x modes DHCP Enforcer Cisco NAC SEP Self-Enforcement Symantec On-Demand Protection Guest Enforcement 25 – 2005 Symantec Corporation, All Rights Reserved Symantec On-Demand Protection Symantec Network Access Control: Defining Policy and Compliance Symantec NAC can perform a wide range of host integrity (HI) checks for endpoint security policy compliance – – – – Most Anti-Virus Microsoft Patches Microsoft Service Packs Most Personal Firewalls Unique template feature – Delivered from Symantec Security Response – Updated online – Provides integration with 3rd party tools such as patch management systems Remediation 26 – 2005 Symantec Corporation, All Rights Reserved Symantec Network Access Control Custom Host Integrity Checking Most robust capability of any NAC solution Powerful If…Then…Else syntax Many checks available, including: – Registry entries—exist, specific value, more – Files—exist, date, size, checksum, more – AV Signature file age, date, size – Patches installed – Process running, OS version – More Actions also programmable: – Set a registry entry – Run a Script or Program – Download and execute an installer, and more 27 – 2005 Symantec Corporation, All Rights Reserved Symantec Network Access Control Technologies Overview 2005 Symantec Corporation, All Rights Reserved Symantec NAC Self-Enforcement The ability of the agent to quarantine its system if it falls out of compliance – Quarantine policies defined on Policy Manager – Policies set for host integrity (HI), OSP, and firewall The agent can quarantine itself by switching to a quarantine firewall policy – Firewall restricts access to specific IP addresses or segments Allows rapid deployment of basic endpoint security – No network-level systems or configuration needed Includes market-leading personal firewall (Gartner 2006 PFW Magic Quadrant) Requires Symantec Enterprise Protection agent 29 – 2005 Symantec Corporation, All Rights Reserved Symantec NAC Self-Enforcement: How It Works Symantec Policy Manager Symantec Sygate Enterprise Protection Agent with NAC Protected Network Onsite or Remote Laptop Quarantine Remediation Resources Host Integrity Rule Client connects to network and validates policy SEP Agent performs selfcompliance checks 30 – 2005 Symantec Corporation, All Rights Reserved Compliance pass: Apply “Office” firewall policy Compliance fail: Apply “Quarantine” firewall policy Status Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Updated Patch Updated Patch Updated Symantec NAC Gateway Enforcer In-line appliance segments networks into secure and insecure zones – Transparent deployment – Integrates easily with existing network infrastructure If a client is non-compliant (HI fail or no Agent present), Enforcer can – Block the client or simply log their compliance status – Restrict access to certain network resources (e.g., patch and update server) Typically used to enforce endpoint security for nodes connecting through – IPSec VPN – WAN - Wireless LAN - Dial-up RAS Guest access for local unmanaged users (conference rooms, guest offices, etc.) 31 – 2005 Symantec Corporation, All Rights Reserved Symantec NAC Gateway Enforcement: How It Works Gateway Enforcement Options Symantec Sygate Policy Manager Block Client HTTP Redirect for Client Symantec NAC Enforcement Agent Display Pop-up on Client Restrict Network Access Protected Network Remote User IPSec VPN Gateway Enforcer Remediation Resources Host Integrity Rule Client attempts to connect to network Gateway Enforcer requests policy & compliance data 32 – 2005 Symantec Corporation, All Rights Reserved Enforcer validates policy & checks compliance status Agent present & compliance pass: Allow access Status Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Patch Updated Updated Patch Updated Symantec NAC LAN Enforcer 802.1x Standards-Based – Supports wired and wireless – Supports all standards-based 802.1x implementations – Provides most secure remediation – Nearly all vendors supported Two Deployment Options – NAC status (transparent mode) – NAC+User credentials (full 802.1x mode) Transparent mode reduces complexity – Only 802.1x-capable switch infrastructure is required – Username/password is not part of admission decision: only the compliance status of the endpoint is considered – Benefits: No third-party No backend RADIUS server No user authentication at switch layer 33 – 2005 Symantec Corporation, All Rights Reserved Fewer logins to manage Symantec NAC LAN Enforcement: How It Works Symantec LAN Enforcer Symantec Sygate Policy Manager EAP RADIUS Server Symantec NAC Enforcement Agent Status User Name Password Token Protected Network Quarantine VLAN LAN Desktop Remediation Resources Full 802.1x Mode Host Integrity Rule Client connects & sends login, compliance, and policy data via EAP Switch forwards data to LAN Enforcer LAN Enforcer checks user login on RADIUS server 34 – 2005 Symantec Corporation, All Rights Reserved LAN Enforcer checks policy & validates compliance status HI pass: Open port on switch HI fail: Assign to quarantine VLAN Status Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Patch Updated Updated Patch Updated Symantec NAC LAN Enforcement: How It Works Symantec LAN Enforcer Symantec Sygate Policy Manager Symantec NAC Enforcement Agent Protected Network Quarantine VLAN Local User Remediation Resources Transparent Mode Host Integrity Rule Client connects & sends login, compliance, and policy data via EAP Switch forwards data to LAN Enforcer LAN Enforcer checks policy & validates compliance status 35 – 2005 Symantec Corporation, All Rights Reserved HI pass: Open port on switch HI fail: Assign to quarantine VLAN Status Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Patch Updated Updated Patch Updated Symantec NAC DHCP Enforcer DHCP-Based solution is universal – Supports wired and wireless – Supports any network infrastructure without upgrade Two deployment options – Network-based DHCP Enforcer: Deploy as a policy-enforcing bridge to protect an internal network – DHCP Enforcer Plug-In that runs directly on a Microsoft DHCP server Non-compliant clients are left in quarantine address space – Clients only able to interact with Quarantine network resources (remediation server, etc.) and Symantec Policy Manager until they are compliant Failover configurations supported for high-availability deployments 36 – 2005 Symantec Corporation, All Rights Reserved Symantec NAC DHCP Enforcement: DHCP Enforcer Plug-In – How It Works DHCP Server Symantec Sygate Policy Manager Symantec NAC Enforcement Agent Symantec NAC DHCP Plug-In running on MSFT DHCP server Remediation Resources Quarantine IPs Protected Network LAN Desktop or Onsite Wireless Client Host Integrity Rule Client sends DHCP request Enforcer assigns a ‘quarantined’ IP address; requests compliance & policy data 37 – 2005 Symantec Corporation, All Rights Reserved Enforcer validates policy & checks compliance status Enforcer initiates DHCP release & renew on client Client receives access to production network Status Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Updated Patch Updated Symantec Network Access Control Enforcement Methods – Proven Experience NAC Method Sygate Support API Enforcement June, 2001 Gateway Enforcement December, 2001 Self Enforcement August, 2003 On-Demand Enforcement September 2003 802.1x (W)LAN Enforcement February, 2004 DHCP Enforcement Mid 2005 Cisco NAC, v1 Mid 2005 TCG’s Trusted Network Connect Late 2005 DHCP Enforcer Plug-In July 2006 Microsoft NAP Vista / Longhorn TNC When specifications released 38 – 2005 Symantec Corporation, All Rights Reserved SNAC Enforcer Appliance Symantec Network Access Control Enforcer 6100 Series Appliance The Enforcer appliance is a new Enforcer option being added to the existing SNAC solution The appliance is NOT a standalone NAC solution. Operates in conjunction with the Symantec Sygate Policy Manager and Symantec Enforcement Agents Enforcer can be utilized as: – LAN Enforcer – Gatway Enforcer – DHCP Enforcer Benefits – Rapid implementation – Simplified management Base Unit 2.8GHz/1MB cache - P4 800MHz front side bus Memory 1GB DDR2, 533MHz, 2x512 single-ranked DIMMs, Hard drive 160GB, SATA, 1-inch, 7.2K RPM hard drive Network adapters Two network adapters Size & Weight Form Factor: 1U Rack Height: 1.68" (4.27 cm) Width: 17.60" (44.70 cm) Depth: 21.50" (54.61 cm) Weight: ~ 26.0 lbs. (11.80kg) 39 – 2005 Symantec Corporation, All Rights Reserved Symantec Network Access Control How it works… Gateway/API Enforcement 802.1x Enforcement Symantec Policy Manager Symantec LAN Enforcer Symantec DHCP Enforcer Symantec Host Host Integrity Integrity Rule Rule On-Demand Policy Manager Anti-Virus On Compliant Non-Compliant Compliant Guest Access Remediation Wireless Guest Desktop Server Switch Anti-Virus Updated Router Personal Firewall On Symantec Gateway Enforcer Radius Service Pack Updated SSL VPN Patch Updated Remediation DHCP Kiosk IPSEC VPN Applications Mobile User Telecommuter Host Status Host Integrity Integrity Rule Rule Status EAP Status Anti-Virus Anti-Virus On On User NameUpdated Anti-Virus Anti-Virus Updated Personal Personal Firewall Firewall On On Password Service Service Pack Pack Updated Updated Token Patch Patch Updated Updated 40 – 2005 Symantec Corporation, All Rights Reserved Partner Thieves Hackers Status The real world – Using multiple solutions Lan Enforcement WAN ? Gateway Enforcement DHCP Enforcement Plug In Gateway Enforcement 41 – 2005 Symantec Corporation, All Rights Reserved Roadmap Symantec: Full Integration AntiCrimeware Integrated Suite Anti-Spyware Symantec Sygate Enterprise Protection 5.1 Antivirus Management AntiVirus AntiSpyware 2 Management Consoles Symantec AntiVirus 42 – 2005 Symantec Corporation, All Rights Reserved SAV Adaptive Policies IDS FW Enterprise Management Symantec Client Security Host Integrity OS Protection Enterprise Management Enforcement Enforcement Host Integrity OS Protection Adaptive Policies Adaptive Policies IDS IDS FW FW Symantec On-Demand Protection Problem Eavesdropping and theft of data from unmanaged devices Unprotected or compromised devices connecting to the enterprise via web infrastructure Delivering endpoint security to unmanaged devices (contractors, kiosks, home machines) Solution Protects confidential data by creating a secure environment that provides encryption and file deletion upon session termination Protection from viruses, worms by enforcing AV, personal firewall via host integrity Lower TCO by delivering endpoint protection on-demand via existing web infrastructure 43 – 2005 Symantec Corporation, All Rights Reserved The Market in Which Symantec On-Demand Plays—Gartner Has Defined the Market… Six Critical Requirement for On-Demand Security: Client integrity checkers – SODA host integrity Browser cache file cleanup – SODA cache cleaner Behavioral malicious code scanners – SODA malicious code prevention Personal firewall mini-engines: – SODA connection control Protected virtual user sessions – SODA virtual desktop Dynamic user access policies – SODA adaptive policies Source: “Access From Anywhere Drives Innovation for On-Demand Security, Gartner, ID Number: G00126242”, March 21, 2005. 44 – 2005 Symantec Corporation, All Rights Reserved SODP Architecture Symantec On-Demand Agent User can securely logs into SSL Virtual Desktop Cache Symantec On-Demand IfUpon compliant, On-Demand Symantec On-Demand inactivity ororAgent closing, Adapts Policies to download, view, modify, VPM/Web app and gets Cleaner then launches the Agent launches the Virtual Desktop Administrator Creates Verifies Host Integrity VD is closed and data User Connects to Login Administrator Uploads Environment and upload corporate access to process the network login Downloads (Java) or Cache Cleaner Symantec On-Demand Agent erased Page On-Demand Agent information How it works… Symantec Policy Manager Symantec LAN Enforcer Symantec DHCP Enforcer Symantec On-Demand Policy Manager Wireless Guest Desktop Server Switch Router Symantec Gateway Enforcer Radius SSL VPN Adaptive Policies Device Network Host Integrity Rule Type Location Policy Status CorporateAnti-Virus OnAirport owned, WLAN Anti-Virus Updated running agent Personal Firewall On Employee Home Service Pack Updated Home Network Trusted Patch Updated Guest Internal Laptop LAN VD, HI Kiosk VD, HI Public Internet Remediation DHCP Kiosk IPSEC VPN Web Applications Mobile User Telecommuter Partner 45 – 2005 Symantec Corporation, All Rights Reserved Thieves Hackers VD, HI, Persistent Muchas Gracias 2005 Symantec Corporation, All Rights Reserved