Jan 27, 2012
Real-time, deep-packet inspection of network traffic improves securityBack
SECURITY|Africa|Environment|Facebook|LinkedIn|Security|SonicWall|Unified Threat Management Solutions|YouTube|Africa|Europe|South Africa|United States|Security|Cloud Applications|Firewall Supplier|Internal Network|Intrusion Prevention Services|Secure Hypertext Transfer Protocol|Security|Services|Session Initiation Protocol|Solutions|Streaming Media|Dominique Honnay|Security|Middle East|Firewall|Information Technology|Secure Hypertext Transfer Protocol|Session Initiation Protocol|Streaming Media|VOIP
© Reuse this
The information technology administrator or security officer of a company needs to be able to identify the applications coming into the company’s network, he says.
“We look at the special characteristics of data streams and, based on these, we can determine that the traffic is LinkedIn, Facebook, Facebook Farmville gaming, or Skype, beside others. Our library has a database of 3 800 applications that we can identify and it is growing continuously,” he explains.
All incoming traffic should be scanned and filtered, as is the case with classic Unified Threat Management Solutions (intrusion prevention services, gateway antivirus and antispyware). However, there is a growing need to scan the traffic from specific applications in detail, owing to emerging security threats. This means scanning streaming media, such as Skype, YouTube and Voice-over-Internet Protocols (VoIPs). Also, when companies are using cloud applications, it is critical to ensure a secure network envi- ronment, he says.
“This must happen in real time, as the information is streamed. We have developed our own patented technology, called Reassembly-Free Deep Packet Inspection (RFDPI), to scan network traffic. This engine gives us the ability to scan up to 56 different protocols, including secure hypertext trans- fer protocol and other secure traffic,” he notes.
“One of the things we do is to look for anomalies in the packets. For example, session initiation protocol and VoIP have distinguishing characteristics. We also use our own intelligence database to identify potential threats coming into the network through, for example, VoIP, and we define the patterns that the engine can recognise in the VoIP traffic coming into companies,” explains Honnay.
Companies traditionally focus on securing and filtering information coming from outside into the networks. However, in larger, more open environments, such as in large corporate companies and universi- ties, it is also important to subsegment the internal network in different virtual or physical areas and conduct scans and filtering for internal traffic on the network, he notes.
Meanwhile, given that some employees must be able to access different sites, such as Facebook or LinkedIn, to establish and maintain client relationships, simply blocking access to sites is not the most effective method of dealing with the emerging security threats in the workplace.
Rules for bandwidth prioritisation can be set up to manage the performance of a company’s network because there will always be a greater demand for bandwidth than is available, he adds.
“From a secure remote access point of view, we also must be able to identify which users are accessing our networks, using which applications and what devices. Is the device known to the company, is it a private device, does it have the correct firewall settings and is its antivirus program up to date?”
Employees and managers need to be able to connect to work networks using any device at hand and the critical measure is how companies control this development, states Honnay.
The mechanisms to manage device connectivity mostly have to do with the internal environment, which means that the user must register and authenticate the device on the active directory database, including his or her position in, or relationship with, the company, for example, a consultant.
“Secondly, we have to check the device he or she is using and whether it is a managed or unmanaged device. Can the information technology (IT) manager configure or see the security settings?”
SonicWall’s Secure Remote Access Platforms can check to see if devices are secure and can prevent flooding, which is mass traffic sent to bring down a server or network.
“We can define, for instance, when a person wants to connect with a device that does not meet the company’s security policy; they can only access browser-based applications, and will only be granted full access to the internal network if the user has taken action to secure his device,” he says.
The challenge, if a company wants to effectively secure traffic on its network, is to be able to scan at wire speeds.
“If you cannot scan at 1 Gbit/s, 5 Gbit/s, 40 Gbit/s or higher, you are securing the environment at the cost of performance. There must be a balance between connec- tivity, security and performance.
“We have RFDPI appliances capable of handling 10 Gbit/s and can combine four boxes to enable 40 Gbit/s scanning. We plan to increase this capacity in 2012.”
Meanwhile, SonicWall has identified a potential growth market in South Africa in line with developments in the US and Europe, where smaller companies that are unable to afford skilled or permanent IT security personnel are outsourcing the perimeter security of their networks to specialist companies.
“This is a change in the market that will probably come to South Africa as well,” concludes Honnay.
Edited by: Martin Zhuwakinyu© Reuse this Comment Guidelines (150 word limit)
Other Information Technology News
In response to the growing need to prevent the losses that companies suffer as a result of identification fraud, identity management specialist Ideco is encouraging its clients to use biometrics technology to help them gather accurate information on their customers,...
Every company needs to comply with the Protection of Personal Information (POPI) Act by ensuring that customers’ personal information is protected against loss and destruction. “Compliance prevents customer information from falling into the hands of people who could...
Master engineer and engineering consultant Bert Chapman has created an educational disc of engineering training materials based on real engineering problems, including their solutions, for engineers entering industry. The disc covers more than 35 electrical,...
Updated 1 hour 32 minutes ago The retail price of 95-grade petrol in South Africa will drop by 45 cents or 3.3 percent a liter from next Wednesday, while wholesale diesel will decrease by 4.9 percent, the government said on Friday. Petrol will cost 13.16 rand ($1.20) a liter while the wholesale...
Updated 1 hour 47 minutes ago Special purpose vehicle GreenCape will, by the end of 2014, make an application to the Department of Trade and Industry (DTI), the Western Cape provincial government and the City of Cape Town to declare Atlantis, on the Western seaboard, a special economic zone...
Updated 2 hours 17 minutes ago The German government has committed a further R70-million towards the second phase of the Non-Motorised Transport (NMT) programme. The NMT programme forms part of the Department of Environmental Affairs’ 2010 FIFA World Cup National Greening Legacy Programme.
Recent Research Reports
Defence 2014: A review of South Africa's defence industry (PDF Report)
Creamer Media’s Defence 2014 report examines South Africa’s defence industry, with particular focus on the key participants in the sector, the innovations that have come out of the sector, local and export demand, South Africa’s controversial multibillion-rand...
Road and Rail 2014: A review of South Africa's road and rail infrastructure (PDF report)
Creamer Media’s Road and Rail 2014 report examines South Africa’s road and rail transport system, with particular focus on the size and state of the country’s road and rail network, the funding and maintenance of these respective networks, and the push to move road...
Real Economy Year Book 2014 (PDF Report)
This edition drills down into the performance and outlook for a variety of sectors, including automotive, construction, electricity, transport, steel, water, coal, gold, iron-ore and platinum.
Real Economy Insight: Automotive 2014 (PDF Report)
This four-page brief covers key developments in the automotive industry over the past 12 months, including an overview of South Africa’s automotive market, trade figures, production and the policies influencing the sector.
Real Economy Insight: Construction 2014 (PDF Report)
This five-page brief covers key developments in the construction industry over the past 12 months. It provides an overview of the sector and includes details of employment in the sector, infrastructure and municipal spending, as well as insight into companies’...
Real Economy Insight: Electricity 2014 (PDF Report)
This five-page brief covers key developments in the electricity industry over the past 12 months, including details of State-owned power utility Eskom’s generation activities, funding and tariffs, independent power producers and prospects for the sector.
This Week's Magazine
In the next 20 years, it was expected that, in Africa, more people would live in cities and towns than in rural areas, United Nations Habitat executive director Dr Aisa Kirabo Kacyira said at the Human Settlements Indaba that took place earlier this month in...
Tough-talking Human Settlements Minister Lindiwe Sisulu has committed government to building 1.5-million low-cost houses over the next five years, telling the Human Settlements Indaba in Johannesburg on Wednesday that the State would achieve this target through the...
Over the past 20 years there has been persistent concern about deindustrialisation in South Africa, as well as the fact that locally produced manufactured products have been increasingly displaced by imports.
Financial agreement for Ghanian independent power producer (IPP) Cenpower Generation Company’s $900-million, 350 MW combined-cycle gas-turbine power plant was finalised earlier this month, paving the way for the project’s construction to begin before 2015 in Tema,...
The revenue implications for South Africa of ‘base erosion and profit shifting’ by corporate taxpayers are firmly in the crosshairs of the Davis Tax Committee (DTC) and Judge Dennis Davis hinted last week that recommendations were being considered to “detect and...