What Did You Do At School Today Junior? Ethan West – Palo Alto Networks Systems Engineer 279 schools 1,000s of students 1,200+ applications 1 challenge What do you really know about your network? Frequency that external proxies were found on K-12 Networks? Frequency is defined as a single instance found on a network (n=279). | Frequency that external proxies were found on K-12 networks? A total of 28 different proxies were in use, with an average of 4 external proxies found on 80% of the 279 K12 networks. | Frequency that non-VPN related encrypted tunnels were found? Frequency is defined as a single instance found on a network (n=279). Frequency that non-VPN related encrypted tunnels were found? An average of 2 encrypted tunnel applications were found in 42% of the K12 networks. SSH is excluded Students will find a way… • Encrypted tunnels (Tor, UltraSurf, Hamachi) used to “hide” • External proxies commonly used to bypass URL filtering • Remote access commonly used to evade controls; known as a cyber criminal target Frequency is defined as a single instance found on a network (n=279). Percentage of total bandwidth consumed by file transfer of all types Percentage of total bandwidth consumed by file transfer of all types? P2P, browser-based and client-server filesharing applications consumed 9% of total bandwidth – roughly the same amount as viewed in the enterprise environments. P2P Dwarfs All Other Filesharing Applications The solution of choice for moving big files… Average number of browser-based file sharing applications found on each network? Average number of browser-based filesharing applications found on each network? There were 64 browser-based filesharing variants found with an average of 11 discovered on 95% of the K-12 networks. Browser-Based File Sharing: Two Use Cases Browser-based filesharing use cases: entertainment or productivity. Both uses have a common set of business and security risks that organizations must address. The number of applications using Port 80 (tcp/80) only? The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 278 or 26% of the 1,050 applications found on the participating K-12 networks. Percentage of total bandwidth consumed by applications not using tcp/80? Percentage of total bandwidth consumed by applications not using tcp/80? 30% of the total bandwidth is being consumed by (31% of the 1,050) applications that DO NOT USE port 80 at all. Ever. Port 80 only security is shortsighted The common perception is that port 80 (tcp/80) is where all the traffic and all the problems are. An emphasis is an absolute requirement; but too much tcp/80 focus is shortsighted. Junior’s application usage is sophisticated… These are not our parents applications – usage patterns are on-par with those seen in the enterprise Applications that can hide or mask activity are common P2P, despite control efforts, is used heavily; browser-based filesharing is a hidden risk Port 80 is used heavily, but too much focus is shortsighted and high risk Page 21 | © 2012 Palo Alto Networks. Proprietary and Confidential. Applications Have Changed, Firewalls Haven’t Network security policy is enforced at the firewall • Sees all traffic • Defines boundary • Enables access Traditional firewalls don’t work any more 22 | ©2012, Palo Alto Networks. Confidential and Proprietary. Technology Sprawl and Creep Aren’t the Answer • “More stuff” doesn’t solve the problem • Firewall “helpers” have limited view of traffic • Complex and costly to buy and maintain • Doesn’t address application “accessibility” features UTM Internet IPS DLP IM AV URL Proxy Enterprise Network 23 | ©2012, Palo Alto Networks. Confidential and Proprietary. More not always better… © 2010 Palo Alto Networks. Proprietary and Confidential. The Answer? A capable Next Gen Security Platform 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment 25 | ©2012, Palo Alto Networks. Confidential and Proprietary. The Benefits of Classifying Traffic in the Firewall X Firewall Allow Facebook App-ID Policy Decision Key Difference Benefit Single firewall policy • Less work, more secure. Administrative effort is reduced; potential reconciliation holes eliminated. Positive control model • Allow by policy, all else is denied. It’s a firewall. Single log database • Less work, more visibility. Policy decisions based on complete information. Systematic management of unknowns • Less work, more secure. Quickly identify high risk traffic and systematically manage it. 26 | ©2013 Palo Alto Networks. Confidential and Proprietary. Multi-Step Scanning Ramifications Firewall App-Control Add-on Allow port 80 Applications Policy Decision #1 Open ports to allow the application Policy Decision #2 300+ applications allowed* Allow Facebook Facebook allowed…what about the other 299 apps? Key Difference Ramifications Two separate policies • • More Work. Two policies = double the admin effort (data entry, mgmt, etc) Possible security holes. No policy reconciliation tools to find potential holes Two separate policy decisions • Weakens the FW deny all else premise. Applications allowed by portbased FW decision. Two separate log databases • Less visibility with more effort. informed policy decisions require more effort , slows reaction time No concept of unknown traffic • Increased risk. Unknown is found on every network = low volume, high risk More work, less flexible. Significant effort to investigate; limited ability to *Based on Palo Alto Networks Application Usage and Risk Report manage if it is found. • 27 | ©2013 Palo Alto Networks. Confidential and Proprietary. Your Control With a Next-Generation Firewall » The ever-expanding universe of applications, services and threats Only allow the apps you need Safely enable the applications relevant to your business » Traffic limited to » Complete threat library with no approved business use cases based on App and User » Attack surface reduced by orders of magnitude blind spots Bi-directional inspection Scans inside of SSL Scans inside compressed files Scans inside proxies and tunnels Covering the entire Enterprise Data center/ cloud Network location Enterprise perimeter Distributed enterprise/BYOD Nextgeneration appliances Physical: PA-200, PA-500,, PA-3000 Series, PA-5000 Series WildFire: WF-500 Virtual: VM-Series Threat Prevention URL Filtering GlobalProtect™ WildFire™ Subscription services Use cases Next-Generation Firewall Cybersecurity: IDS / IPS / APT Web gateway Management system Panorama and M-100 appliance Operating system PAN-OS™ 29 | ©2013, Palo Alto Networks. Confidential and Proprietary. VPN Addresses Three Key Business Problems Safely Enable Applications Identify more than 1,900 applications, regardless of port, protocol, encryption, or evasive tactic Fine-grained control over applications/application functions (allow, deny, limit, scan, shape) Addresses the key deficiencies of legacy firewall infrastructure Systematic management of unknown applications Prevent Threats Stop a variety of known threats – exploits (by vulnerability), viruses, spyware Detect and stop unknown threats with WildFire Stop leaks of confidential data (e.g., credit card #, social security #, file/type) Enforce acceptable use policies on users for general web site browsing Simplify Security Infrastructure Put the firewall at the center of the network security infrastructure Reduce complexity in architecture and operations 30 | ©2012, Palo Alto Networks. Confidential and Proprietary. Magic Quadrant for Enterprise Network Firewalls “Palo Alto Networks continues to both drive competitors to react in the firewall market and to move the overall firewall market forward. It is assessed as a Leader, mostly because of its NGFW design, direction of the market along the NGFW path, consistent displacement of competitors, rapidly increasing revenue and market share, and market disruption that forces competitors in all quadrants to react.” Gartner, February 2013 31 | ©2013, Palo Alto Networks. Confidential and Proprietary. Customer Example: Huron Valley Schools Problem Students circumventing IT security controls with tools such as UltraSurf and TOR No visibility into user behavior, application use Existing firewall not keeping up “Not only did the PA-3000 Series give us total control over all applications, we saw an increase in our Internet performance plus much easier administration.” Industry: K-12 Education Statistics: School District in Oakland County supporting 9800 students across 15 schools. © 2008 Palo Alto Networks. Proprietary and Confidential. Page 32 | Rate of change in applications Difficult to maintain content filter Reaching throughput maximum End of life Solution / Results PA-3000 Series deployed as primary enterprise firewall Policy control by application and user No longer struggle to keep up with new/changed applications Improved performance 33 | ©2012, Palo Alto Networks. Confidential and Proprietary.