CyberWarfare / ExoWarfare

Software-Defined Networking (SDN): Intent-Based Network Segmentation

[Source: Vendor (!)]

By John Maddison (Sr. Vice President, Products and Solutions at Fortinet) on February 07, 2019

Network Segmentation Needs to be Able to Consistently Secure and Isolate Data
Regardless of Where it Needs to Go

While networks continue to expand and evolve, the primary goals of the security team have not changed. Infrastructure needs to meet business objectives while also meeting regulatory and compliance standards and protecting critical data and resources. Unfortunately for many organizations today, these goals are not being met because more time is being spent managing the security infrastructure than on enabling the business.

Part of the challenge is that many networks are undergoing rapid change without a cohesive security strategy in place. This has led to ad-hoc security strategies, overburdened security teams, security sprawl, and gaps in both visibility and control. Without an overarching plan in place, security teams are forced to rapidly identify and deploy security solutions to protect the expanding network and its new assets.

As a result, organizations on average now have solutions in place from over 80 security vendors that they need to configure, manage, and update. This sort of accidental security architecture poses critical challenges for security teams, not the least of which is simply collecting and correlating security data between isolated and highly dispersed solutions in order to detect and respond to threats.

Adding to the complexity of this problem are three facts. First, new devices—both physical and virtual—and their related traffic are being added to networks at an unprecedented rate. Second, applications and workflows are being added, updated, and replaced at an astonishing speed. And third, those applications and workflows need to be able to move freely between different networked environments, including remote devices, branch offices, and multi-cloud ecosystems.

Take back control

Addressing these challenges has overwhelmed the capacity of many security teams. This is why we see, in spite of spending $124 billion on security solutions this year, the cost of cybercrime will outpace spending on cybersecurity by over 16X, reaching $2.1 trillion by the end of 2019.

The most important thing that security teams can do this year to protect themselves is to take back control of their security environment. Starting this process requires doing three things:

1. Get involved in business operations planning on day one. Security operations play a critical role in digital transformation, and early inclusion can save time and money in terms of protecting new assets, ensuring compliance, and building security that functions as an integral part of a larger security strategy.

2. Replace isolated security devices with tools that can be integrated to see, share, and correlate threat intelligence. Those tools also need to be able to consistently and seamlessly track and secure workflows, applications, and data that move across and between different network environments.

3. Develop a single pane of glass management strategy using open APIs and standards, centralized SIEM, and where possible, a common OS to establish and maintain centralized policy distribution, orchestration, and enforcement across security solutions.

Security needs to follow the data

Once you have the basics in place, you can then begin to optimize your security through automation. This includes two critical functions:

• Conditional access— Organizations that provide employees and customers with high performance applications, process credit card transactions, manage personally identifiable information (PII), or manage sensitive data require a more innovative approach to perform strong access control across infrastructure security. In addition, any device being added to the network needs to be automatically assessed for compliance to security policies, and then admitted based on specific policies based on the context of that device. This includes what kind of device it is, what resources it needs to access and support, and if it has a user, what privileges that user has. That device then needs to be tagged with a policy so that the entire security ecosystem can track and enforce that policy.

• Dynamic segmentation—Organizations also need to be able to dynamically group and isolate certain data and applications from the rest of their assets to stay compliant with various regulatory standards, such as PCI, HIPPA and GDPR. The same requirement also holds true for applications, workflows, and transactions. Segmentation is the answer.

Internal security segmentation might limit resources to a physical location, such as a specific building, floor, or lab; assign those resources to a specific group or function, such as sales, engineering, or guest access; or it could be based on the type of device, such as a digital camera, IoT device, or inventory tag. Besides devices, segmentation needs to include applications, workflows, and other transactions. This includes being able to isolate that data from unauthorized access, or include automatically securing data coming from or headed to specific users, servers, or data center resources.

Finally, this segmentation needs to be able to consistently secure and isolate data regardless of where it needs to go. A sensitive workflow needs to be protected along its entire data path, even if that includes moving across and between a hybrid network environment of physical domains and private and public cloud networks and services.

Moving to intent-based segmentation

For segmentation to operate effectively in today’s increasingly digital business environment, however, it also needs to be able to automatically convert business objectives into security requirements, and then map those requirements to specific policies. This requires adding machine learning to segmentation tools so that a security administrator can predefine policies, and advanced segmentation software can implement those policies based on its ability to interpret the business objectives of a workflow, application, or deployed device.

To do this, intent-based segmentation needs to be able to perform four functions:

  • First, it needs to be able to translate high-level business language into segmentation policy.
  • It then needs to automatically implement and enforce policies across the network.
  • Third, it needs to constantly monitor the state of the data or devices being segmented.
  • And finally, it needs to use machine learning to choose the best way to implement a segment, constantly monitor it, and be able to automatically take corrective action if anything should change.

Leverage the power of advanced security to enable your digital business goals

Securing today’s highly dynamic and flexible networks not only requires implementing changes at machine speeds. New advances in intent-based tools such as segmentation allow organizations to create business objectives that can be automatically converted into security policies that can not only seamlessly span the network, but also automatically adapt to changes.

However, none of this is possible until you make some fundamental changes to your security strategy and infrastructure. Until your security framework can see and adapt to network changes, share and correlate threat intelligence, and respond to threats as a unified system, you will not be able to take full advantage of the opportunities being created in the new digital economy.

from: https://www.securityweek.com/need-intent-based-network-segmentation

***

Fortinet Introduces New Next-Generation Intent-based Segmentation Firewalls

By Ionut Arghire on February 07, 2019

Fortinet this week announced new FortiGate Next-Generation Firewalls (NGFWs), which help customers improve security through implementing Intent-based Segmentation

The newly announced firewalls, namely FortiGate 3600E, FortiGate 3400E, FortiGate 600E and FortiGate 400E Series, provide a robust security architecture that doesn’t rely on a single enforcement point, the network security firm says.

With Intent-based Segmentation, which results in granular access control, continuous trust assessment, end-to-end visibility, and automated threat protection, the new security appliances allow organizations achieve adaptive security by segmenting IT assets, thus having multiple enforcement points.

The new FortiGate NGFWs, Fortinet says, are part of its Security Fabric, delivering integrated and consistent security policy across both on-premise and cloud assets. Customized Security Processor Units (SPUs) ensure that full visibility and advanced threat protection are available without performance loss.

According to Fortinet, the new solutions can deliver the industry’s highest SSL inspection performance for their class.

The FortiGate 3600E Series delivers performance of 30Gbps of threat protection throughput and 34Gbps of throughput with SSL inspection. The FortiGate 3400E Series provides 23Gbps of threat protection and 30Gbps SSL inspection performance, while the FortiGate 600E Series achieves up to 7Gbps of threat protection and 8Gbps SSL inspection performance, and the FortiGate 400E Series can support up to 5Gbps of threat protection and 4.8Gbps of SSL inspection performance.

The new NGFWs can integrate with external security ecosystems and share threat intelligence quickly for automated remediation. Advanced high-performance security integration with solutions such as VMWare NSX and Cisco ACI are also provided.

Segmentation is becoming as fundamental as patching vulnerable systems. Intent-based Segmentation aligns business goals with infrastructure changes and ultimately, dynamically separates infrastructure to protect users, data and systems,” John Maddison, EVP of products and solutions at Fortinet, says.

 

from: https://www.securityweek.com/fortinet-introduces-new-next-generation-firewalls

 

 

 

By continuing to use this site, you agree to the use of cookies. Please consult the Privacy Policy page for details on data use. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close