http://www.engineeringnews.co.za
  SEARCH
Login
R/€ = 14.19Change: -0.01
R/$ = 10.56Change: -0.03
Au 1305.25 $/ozChange: 6.37
Pt 1488.50 $/ozChange: 15.00
 
 
Note: Search is limited to the most recent 250 articles. Set date range to access earlier articles.
Where? With... When?








Start
 
End
 
 
And must exclude these words...
Close Main Search
Close Main Login
My Profile News Alerts Newsletters Logout Close Main Profile
 
Agriculture   Automotive   Chemicals   Competition Policy   Construction   Defence   Economy   Electricity   Energy   Environment   ICT   Metals   Mining   Science and Technology   Services   Trade   Transport & Logistics   Water  
What's On Press Office Suppliers Directory Research Jobs Announcements Contact Us
 
 
 
RSS Feed
Article   Comments   Other News   Research   Magazine  
 
 
Jan 27, 2012

Real-time, deep-packet inspection of network traffic improves security

Back
SECURITY|Africa|Facebook|LinkedIn|Security|SonicWall|Unified Threat Management Solutions|YouTube|Africa|Europe|South Africa|United States|Security|Cloud Applications|Firewall Supplier|Internal Network|Intrusion Prevention Services|Secure Hypertext Transfer Protocol|Security|Session Initiation Protocol|Streaming Media|Dominique Honnay|Security|Middle East|Firewall|Information Technology|Secure Hypertext Transfer Protocol|Session Initiation Protocol|Streaming Media|VOIP
SECURITY|Africa|Security||Africa|||Security|Security||Security||
security|africa-company|facebook|linkedin|security-company|sonicwall|unified-threat-management-solutions|youtube|africa|europe|south-africa|united-states|security-facility|cloud-applications|firewall-supplier|internal-network|intrusion-prevention-services|secure-hypertext-transfer-protocol|security-industry-term|session-initiation-protocol-industry-term|streaming-media-industry-term|dominique-honnay|security-person|middle-east|firewall|information-technology|secure-hypertext-transfer-protocol-technology|session-initiation-protocol|streaming-media|voip
© Reuse this



The real-time, deep-layer inspection of inbound, outbound and internal network traffic enables companies to improve the security of their information and also to secure information accessed remotely by different devices, says firewall supplier SonicWall director of emerging markets and Europe, Middle East and Africa distributors Dominique Honnay.

The information technology administrator or security officer of a company needs to be able to identify the applications coming into the company’s network, he says.

“We look at the special characteristics of data streams and, based on these, we can determine that the traffic is LinkedIn, Facebook, Facebook Farmville gaming, or Skype, beside others. Our library has a database of 3 800 applications that we can identify and it is growing continuously,” he explains.

All incoming traffic should be scanned and filtered, as is the case with classic Unified Threat Management Solutions (intrusion prevention services, gateway antivirus and antispyware). However, there is a growing need to scan the traffic from specific applications in detail, owing to emerging security threats. This means scanning streaming media, such as Skype, YouTube and Voice-over-Internet Protocols (VoIPs). Also, when companies are using cloud applications, it is critical to ensure a secure network envi- ronment, he says.

“This must happen in real time, as the information is streamed. We have developed our own patented technology, called Reassembly-Free Deep Packet Inspection (RFDPI), to scan network traffic. This engine gives us the ability to scan up to 56 different protocols, including secure hypertext trans- fer protocol and other secure traffic,” he notes.

“One of the things we do is to look for anomalies in the packets. For example, session initiation protocol and VoIP have distinguishing characteristics. We also use our own intelligence database to identify potential threats coming into the network through, for example, VoIP, and we define the patterns that the engine can recognise in the VoIP traffic coming into companies,” explains Honnay.

Companies traditionally focus on securing and filtering information coming from outside into the networks. However, in larger, more open environments, such as in large corporate companies and universi- ties, it is also important to subsegment the internal network in different virtual or physical areas and conduct scans and filtering for internal traffic on the network, he notes.

Meanwhile, given that some employees must be able to access different sites, such as Facebook or LinkedIn, to establish and maintain client relationships, simply blocking access to sites is not the most effective method of dealing with the emerging security threats in the workplace.

Rules for bandwidth prioritisation can be set up to manage the performance of a company’s network because there will always be a greater demand for bandwidth than is available, he adds.

“From a secure remote access point of view, we also must be able to identify which users are accessing our networks, using which applications and what devices. Is the device known to the company, is it a private device, does it have the correct firewall settings and is its antivirus program up to date?”

Employees and managers need to be able to connect to work networks using any device at hand and the critical measure is how companies control this development, states Honnay.

The mechanisms to manage device connectivity mostly have to do with the internal environment, which means that the user must register and authenticate the device on the active directory database, including his or her position in, or relationship with, the company, for example, a consultant.

“Secondly, we have to check the device he or she is using and whether it is a managed or unmanaged device. Can the information technology (IT) manager configure or see the security settings?”

SonicWall’s Secure Remote Access Platforms can check to see if devices are secure and can prevent flooding, which is mass traffic sent to bring down a server or network.

“We can define, for instance, when a person wants to connect with a device that does not meet the company’s security policy; they can only access browser-based applications, and will only be granted full access to the internal network if the user has taken action to secure his device,” he says.

The challenge, if a company wants to effectively secure traffic on its network, is to be able to scan at wire speeds.

“If you cannot scan at 1 Gbit/s, 5 Gbit/s, 40 Gbit/s or higher, you are securing the environment at the cost of performance. There must be a balance between connec- tivity, security and performance.

“We have RFDPI appliances capable of handling 10 Gbit/s and can combine four boxes to enable 40 Gbit/s scanning. We plan to increase this capacity in 2012.”

Meanwhile, SonicWall has identified a potential growth market in South Africa in line with developments in the US and Europe, where smaller companies that are unable to afford skilled or permanent IT security personnel are outsourcing the perimeter security of their networks to specialist companies.

“This is a change in the market that will probably come to South Africa as well,” concludes Honnay.

Edited by: Martin Zhuwakinyu
© Reuse this Comment Guidelines
 
 
 
 
 
 
 
 
Other Business Process Outsourcing News
YASAS JAYAKODY Project management drives organisations forward
In times of change, in order for the vision and strategy of a company to be realised, there needs to be proper project management, says Johnson Controls Africa Region project operations manager Yasas Jayakody. “Project management helps to drive organisations...
As e-commerce and digital payments gain traction worldwide, Mastercard, in conjunction with Standard Bank, on Tuesday launched a digital wallet mobile phone application, MasterPass, as a new way to transact safely and securely when shopping online. MasterPass would...
More
 
 
Latest News
Numsa general secretary Irvin Jim
Updated 5 hours ago South African engineering union Numsa has agreed to end a four-week strike after accepting a wage increase offer from employers, union leader Irvin Jim said on Monday. Numsa, South Africa's largest union, has accepted a 10% annual pay rise fixed for three years for...
Updated 5 hours ago Trade union Solidarity on Monday accepted the Steel and Engineering Industries Federation of South Africa’s (Seifsa’s) revised wage offer. The three-year wage agreement, settled within the Metal and Engineering Industries Bargaining Council (MEIBC), comprised...
Rob Davies
Updated 6 hours ago South Africa will use the upcoming US-Africa Leaders' Summit, which will also encompass the 2014 edition of the Africa Growth and Opportunity Act (Agoa) Forum, to appeal for a 15-year extension of the nonreciprocal trade arrangement, as well as South Africa’s...
More
 
 
Recent Research Reports
Real Economy Year Book 2014 (PDF Report)
This edition drills down into the performance and outlook for a variety of sectors, including automotive, construction, electricity, transport, steel, water, coal, gold, iron-ore and platinum.
Real Economy Insight: Automotive 2014 (PDF Report)
This four-page brief covers key developments in the automotive industry over the past 12 months, including an overview of South Africa’s automotive market, trade figures, production and the policies influencing the sector.
Real Economy Insight: Construction 2014 (PDF Report)
This five-page brief covers key developments in the construction industry over the past 12 months. It provides an overview of the sector and includes details of employment in the sector, infrastructure and municipal spending, as well as insight into companies’...
Real Economy Insight: Electricity 2014 (PDF Report)
This five-page brief covers key developments in the electricity industry over the past 12 months, including details of State-owned power utility Eskom’s generation activities, funding and tariffs, independent power producers and prospects for the sector.
Real Economy Insight: Road and Rail 2014 (PDF Report)
This six-page brief covers key developments in the road and rail industries over the past 12 months, including details of South Africa’s road and rail network and prospects for both sectors.
Real Economy Insight: Steel 2014 (PDF Report)
This four-page brief covers key developments in the steel industry over the past 12 months. It provides an overview of the global and South African steel and stainless steel markets, South Africa’s major steel producers and events that have shaped these markets.
 
 
 
 
 
This Week's Magazine
Multinational semiconductor chipmaker corporation Intel announced its national campaign to further acquire partners to drive its She Will Connect programme, an initiative that aims to expand digital literacy skills to young women in developing countries, further into...
South Africa's MeerKAT radio telescope array programme should get back on schedule within a few months. This assurance has been given by SKA South Africa (SKA SA) associate director: science and technology Prof Justin Jonas. Early last month, Science and Technology...
The Passenger Rail Agency of South Africa’s (PRASA’s) Metrorail service will remain a subsidised service following its current multibillion-rand rolling stock, station, depot and signalling upgrade programme. PRASA group CEO Lucky Montana has allayed fears that...
GARYN RAPSON Contaminated Land Provisions in the National Environmental Management: Waste Act No 59 of 2008 will open the door for court battles to determine who will be held liable for the remediation
The uncertainties around the remediation of affected areas as addressed in the Contaminated Land Provisions in the National Environmental Management: Waste Act No 59 of 2008 will possibly spark litigation and disputes between landowners and businesses, contractors...
South Africa is currently the largest component of the African Development Bank’s (AfDB’s) active portfolio in Southern Africa, comprising 62.5% of the bank’s $7.9-billion exposure to the 12-country region – the second largest beneficiary is Mauritius, which...
 
 
 
 
 
 
 
 
 
Alert Close
Embed Code Close
content
Research Reports Close
Research Reports are a product of the
Research Channel Africa. Reports can be bought individually or you can gain full access to all reports as part of a Research Channel Africa subscription.
Find Out More Buy Report
 
 
Close
Engineering News
Completely Re-Engineered
Experience it now. Click here
*website to launch in a few weeks