FE408xxxAx - Optinet_8_essential_elements

FE408xxxAx - Optinet_8_essential_elements
Bandwidth Shaping • Content Filtering • Threat Elimination
The 8 essential elements of Internet security
BLACK BOX
®
The 8 essential elements of Internet Security
Table of Contents
Introduction.................................................................................................................................................................................................................. 3
What Evolved Internet Security Does for You................................................................................................................................................................. 4
The Old Way vs. the New Way . .................................................................................................................................................................................... 4
The 8 Essentials of Internet Security in Detail ............................................................................................................................................................5–6
We‘re here to help! If you have any questions about your application, our products,
or this white paper, contact FREE Black Box Tech Support at 724-746-5500 or
go to blackbox.com and click on “Talk to Black Box.”
You’ll be live with one of our technical experts in less than 20 seconds.
724-746-5500 | blackbox.com/go/optinet
Page 2
The 8 essential elements of Internet Security
Changing times, changing tools
The evolution of Internet content toward social media and Web 2.0-based sites presents new challenges for organizations.
Critical applications have become Web-based, and non-browser generated Web traffic—think iTunes® and peer-to-peer
networking—has exploded.
You have a business Internet connection for two things: Web-based applications (Web site admin tools, CRM tools, collaboration
sites) and Web browsing (to do critical research). Of course, some of your employees use their time and Internet connections for
non-critical ends, such as checking personal e-mail or streaming music or video. The trick is to maximize your company’s broadband
capacity and contain related costs while also protecting your assets from malware and viruses.
Demand for content is increasing, content access methods are multiplying, and content itself is evolving. It’s time for your
organization to evolve with it.
The 8 essential elements of Internet security
1. Inline, deep packet inspection device
2. Layer 7 application control
3. Dynamic content shaping
4. Event and user correlation
5. Dynamic, real-time anonymous proxy detection
6. Dynamic, real-time URL filtering
7. Full HTTPS traffic inspection
8. Web-based malware blocking
Get detailed, accurate information
about your organization’s Web traffic.
The Optinet provides deep packet
inspections and detailed reporting
to give you the knowledge you need
and the peace of mind you want.
724-746-5500 | blackbox.com/go/optinet
Page 3
The 8 essential elements of Internet Security
What evolved Internet security does for you
Reveals
You don’t have to guess who’s hogging your broadband capacity any longer. Instead, see exactly what users are doing on-line,
how much bandwidth they are using, and how those activities impact mission-critical applications. Whether you analyze the
data in real time or historically, you will likely discover that your top Web users aren’t your top bandwidth users. When you can
envision exactly how your Internet resources are being used, you can more accurately troubleshoot issues and solve problems.
You can also make more appropriate security decisions to protect yourself and your business.
Optimizes
Get the most out of what you’re paying for. You can easily configure company policy to give priority to your critical applications,
Web sites that you need to run fast, and users who need the quickest access. Instantly eliminate spyware infections and users
bypassing your Web filter. Optinet enables you to set policy and optimize the way your Internet connection is used.
Automates
Another way to eliminate guesswork is to know exactly how much bandwidth a browser or a Web-based application needs.
To ensure critical content has the bandwidth resources it requires, you have to manage your capacity. Rather than
manually manipulate levels based on estimates, manage it by priority for Web sites and applications. Users will still have access
to non-critical traffic but only when it doesn’t impact resources for critical traffic. Most importantly, bandwidth management
and policy enforcement are fully automated, so your IT team doesn’t have to be “Big Brother” to the rest of your employees.
The Old Way
Is your Internet security outdated?
Anonymous proxies easily bypass your Web filters, creating liability issues.
Web
Browsing
Traffic
Internet
Application
Traffic
User productivity plunges.
Critical
Critical
Non-Critical
Non-Critical
Users hog bandwidth.
Critical Internet resources run slowly.
Spyware and malware damage productivity and overwhelm Help Desk resources.
Troubleshooting is difficult, meaning network issues linger.
Content can only be turned “on” or “off,” instead of being controlled by priority.
Internet usage in a typical organization
The New Way
How does Optinet update security for you?
Visibility: Automated reporting reveals exactly what users are doing, in real-time or historically.
Protection: Enables you to enforce stronger content policies with unparalleled anonymous proxy and filter bypass controls.
Bandwidth prioritization: Through deep packet inspection and signature control, bandwidth capacity is allocated according
to mission-critical requirements.
Security: Simply eliminates spyware, malware, and viruses from your network with its Web-threat security features.
724-746-5500 | blackbox.com/go/optinet
Page 4
The 8 essential elements of Internet Security
Optinet from Black Box provides the 8 essential elements of Internet security. It scans, identifies, and controls Internet traffic,
and provides advanced content filtering, reporting, application prioritization, bandwidth management, and threat protection.
Internet
Ethernet
Firewall
1. Inline, deep packet inspection device
To see and effectively manage Internet traffic, you
need an inline device. Out-of-date approaches such
as a standalone firewall and Web proxies are easy to
bypass and don’t provide the Web-enabled application controls organizations need. For complete
management, other necessary components are deeppacket inspection, identification, and prioritization.
Corporate Users
Optinet Deep-Packet, Layer 7
Inspection Device (FE408020AA)
Ethernet
Core
Switch/
Router
Mobile Users
Education/Students
Optinet is a secure Internet gateway
appliance that sits between your corporate
firewall and network switches.
LAPD Servers
2. Layer 7 application control
Non-Mission Critical
a
et Dat
Optin Control
Stream
Mission Critical
Threats and Abuse
Mission Critical
Secure,
Intelligent
Data Flow
Non-Mission Critical
Advanced Internet security gives you three ways to control
Web-enabled application traffic. First, it prioritizes critical
traffic; second, it limits non-critical traffic; and third, it eliminates
detrimental traffic. Optinet provides the control you need
by including signatures for all major applications.
3. Content shaping
Instead of controlling content by turning Web sites “on”
or “off,” administrators are able to set priorities on traffic
dynamically. When bandwidth is available, users can access
non-critical sites. Conversely, when bandwidth is needed
by a more critical site or application, the non-critical traffic
gets scaled back dynamically.
4. Event and user correlation
Combine visibility into what users are doing on-line, what applications
they’re using, what threats they’re exposed to, and how much bandwidth
they’re consuming. You’ll also be able to discover how the actions of a
single user can impact the Internet connection as a whole. This level of
event and user correlation enables IT administrators to properly diagnose
problems and issues.
Ensure critical
applications have
the resources
they need.
724-746-5500 | blackbox.com/go/optinet
Page 5
The 8 essential elements of Internet Security
5. Anonymous proxy detection
Anonymous proxies, also called open proxies, enable users to get around Internet security devices. To prevent this and bolster
security, organizations need a tool to dynamically detect and control anonymous proxies in real time.
6. Real-time URL filtering
Keeping users safe from inappropriate content has become more challenging because millions of Web sites are created daily. Using a
database of URLs to categorize Web sites is nearly futile as this database becomes out-of-date very quickly. Instead, Optinet includes
a database plus dynamic, real-time filtering capabilities, to categorize Web sites quickly and effectively.
7. Full HTTPS traffic inspection
Web filters at your company can be rendered useless by HTTPS connections, as the security sites prevent filters from seeing what’s
contained in the encrypted session. To be effective, your Internet security must be able to decrypt and re-encrypt HTTPS sessions
to ensure policy is applied to all content.
8. Web-based malware blocking
Your firewall may not be enough to sufficiently block malware and viruses from downloading, especially if they come from trusted
sites or are contained in HTTPS interactions.
Upload
Before Optinet
Internet/
WAN
Organization/
LAN
Network
Download
Non-critical traffic and threats comprise more than half the available bandwidth.
Mission Critical
After Optinet
Non-Mission Critical
Upload
Threats and Abuse
Organization/
LAN
Internet/
WAN
Network
Download
Threats and abuse are eliminated and critical traffic is prioritized.
Let Optinet, a deep-packet, Layer 7 inspection device, optimize Internet use for your organization. For more information
and to improve your company’s productivity, visit blackbox.com/go/optinet or call 724-746-5500.
About Black Box
Black Box is the world’s largest technical services company dedicated to designing, building, and maintaining today’s complicated
data networking services and voice infrastructure systems. Black Box services 175,000 clients in 141 countries with 191 offices
throughout the world. Black Box is ISO 9001:2000 certified. Black Box provides more than 118,000 networking and infrastructure
products, such as fiber, CAT5e, and CAT6 cable; KVM switches; digital signage; and cabinets and racks, plus network services.
To learn more, visit the Black Box Web site at http://www.blackbox.com.
© Copyright 2009 Black Box Corporation. All rights reserved. Black Box and the Double Diamond logo are registered trademarks, and Optinet is a trademark, of BB Technologies,
Inc. Any third-party trademarks appearing in this white paper are acknowledged to be the property of their respective owners.
®
724-746-5500 | blackbox.com/go/optinet
Page 6
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement