Firewall/Network Configuration and Change Control
Information infrastructures, there may be firewalls, attack prevention systems and network products from many different manufacturers. The compliance of the configurations on these components with certain legislation and corporate standards must be checked. At this point, some of the following features can be used;
With the help of Firewall Control, you can perform many more controls such as rule analysis and normalization, hidden risk factors, vulnerability analysis, and many more controls on all firewalls in your infrastructure within the scope of certain legislation, corporate standards and special criteria that you can determine, and you can get customized reports for them.
With the help of Network Configuration Control, it provides network visibility on a scale from medium-sized infrastructures to large-scale infrastructures. You can create a network topology model including end-to-end physical, virtual and cloud infrastructure, and check compliance with legislation and corporate standards using all network components on the created model. You can also test targeted configuration test scenarios and communication problems on the created network model.
With the help of Change Control, you can put all changes made on the firewall components in the infrastructure into a workflow and monitor the process by security units. In this way, each rule change can be converted into a request and checked whether it is applied in accordance with the workflow.
Security Event Management and Correlation System
The Event Record Collection, Analysis and Correlation System (SIEM) is at the center of the daily operations and detection capabilities of a network facing current threats. The need for a network analyst operating 24/7 to quickly display the dashboards, trends and events they need, to perform more effective threat management, and to detect and track malicious internal and external actors places SIEM at the center of new generation CSOCs. In addition, compliance requirements with legislation and corporate standards also necessitate a SIEM system.
Security Incident Management and Automation
The detection of security incidents reveals the next step, Incident Response processes. It becomes very difficult to sort out the large amounts of incidents detected with human power and to ensure that the incident response process focuses on important incidents. In every Cyber Security Operation Center that has reached a certain level, this human resource gap arises and a structure is created that can automate the Incident Response process as much as possible and allow human power to focus on the most critical incidents. These platforms implement automatic actions within the framework of defined flows integrated with the security and system components in the institution or organization structure and can make decisions according to the results.
Security and Network Products Central Backup
Backup and restore scenarios are necessary for the infrastructure to be reactivated as soon as possible after an attack and/or a disaster. As a result of this approach, we can say that backup systems are also a part of security. The ability of backup systems to provide simple and fast restore will shorten the time it takes for systems to resume operation in the event of a disaster. The basic expectations are that the backup system has rich manufacturer support, the backups are stored securely and the integrity of the backups is ensured.
Two-Factor Authentication System
User identity and its verification are one of the most basic security steps. This situation continues in the same way for the Cyber Security world, but there are many more options for identity theft. Verifying the user with different factors can provide an effective security layer to solve these problems. Identity security can be provided with these solutions that the person knows, has or can be used biometrically.
Modern Malicious Code Analysis and Blocking System
The vast majority of today’s threats are known as zero-day attacks, where malicious, persistent and transformed files reach the network. Since these types of threats cannot be detected with traditional methods, the real threat can only be revealed with systems that can monitor their behavior and observe the movements of the file in a sandbox.
Checkpoint SandBlast APT solution is one of the leading and most successful solutions in the sector at this point.
ATP systems can integrate with some existing security components (firewall, proxy, smtp gw) and ensure that files passing through HTTP, HTTPS, SMTP and SMB/CIFS protocols are sent to the APT system. With this method, it is possible to prevent the creation of another point of failure on the network, and the first file that reaches the network can be analyzed and prevented from reaching inside, and real zero-day protection can be provided.
Packet Routing System
The increase in the number of security systems and the complexity it brings to the network structure greatly increases operational costs. Packet Routing systems provide a centralized and high-performance environment for data to be collected inline (L2) to the network structure or from the network using the mirror (span, tap) method, and provide an effective method for placing these systems at desired points in the network structure. Thanks to this system, connection complexity is reduced, the load on the switch structure is reduced, and capabilities such as optimization of traffic directed to security systems emerge.
Intrusion Detection and Prevention System
Traditional detection methods can miss advanced attacks. A single mechanism that can detect malware is not enough to prevent all attacks. In addition to the signature-based system, unsigned detection engines are also effective in blocking unexpected malware. In addition, there are threat intelligence, application control, APT (zero-day attack prevention) system, SIEM and many other features/integrations. The intrusion detection and prevention system (IPS) system can be configured topologically on virtualization platforms or at the network level (inline or sniff).
Cyber Threat Intelligence
In order to prevent an attack, it must be detectable and countermeasures must be taken. Cyber Threat Intelligence emerges at this point, providing institutions and organizations with up-to-date intelligence data detected through various environments and tools, and ensuring that these attacks can be prevented in their early stages.
Border Security Analysis System
One of the most important handicaps of security systems positioned for protection purposes is that they are dependent on the people who manage these systems and cannot provide the security they promise in case of configuration errors. Regularly testing the performance of these systems and revealing the weak points of the defense is considered an important security topic.
End User Security
Looking at the past years, millions of users and systems have been damaged by millions of new malware variations, ransomware and zero-day threats. Organizations have been seriously affected by this situation and many manufacturers are developing solutions to prevent these threats with different methods. Instead of traditional end-user solutions, solutions with some of the following features provide more effective protection;
Advanced malicious code analysis
Heuristic analysis
Integration with APT (zero-day attack prevention) system
Network attack prevention and firewall module
Application control
Device control
IOC detection and blocking
Integration with data leakage prevention (DLP) system
SSL VPN and SSO Applications
Today, there has been a significant increase in the number of mobile workers connecting to their workplaces remotely. Especially for security reasons, some application and file resources are made available over SSL/TLS virtual private networks (SSL/VPN). In cases where SSL/VPN systems are widely used, they need to be high-performance, expandable and easy to use. In addition, with the integration of the single-point login (SSO) method, mobile users can access multiple applications without being exposed to complex login methods.
SSL/TLS Visibility System
Today, in internet access and almost every application, traffic decryption methods have begun to be used very frequently. Research shows that more than half of internet traffic is encrypted. The same situation occurs in corporate networks, but this traffic also needs to be examined in line with needs and security requirements. SSL/TLS Visibility Systems offer the ability to open high volume encrypted traffic with Man-in-The-Middle or Out-Of-Band methods for these needs and to send it to security devices that will perform the examination and then encrypt it again after receiving it.

Bir yanıt yazın
Yorum yapabilmek için oturum açmalısınız.