SONICWALL CAPTURE SECURITY CENTER

Transcription

SONICWALL CAPTURESECURITY CENTERCloud-delivered single pane of glass unified management,analytics for network, endpoint and cloud securitySonicWall Capture Security Center is anopen, scalable cloud-based securitymanagement software delivered as acost-effective as-a-service offering fororganizations and service providers ofvarious sizes and use cases. It offers theultimate in visibility, agility and capacityto centrally govern the entire SonicWallsecurity ecosystem with greater clarity,precision and speed – all from a singlepane of glass. This cloud- and serviceoriented architecture unifies andconnects SonicWall security services andmanagement tools to help gain betteroperational efficiencies and elasticity,while supporting a broader cyberdefense strategy.Guided by business processes and servicelevel requirements, Capture SecurityCenter helps Security Operation Centers(SOCs) form the foundation for a unifiedsecurity governance, compliance and riskmanagement strategy. By establishing aholistic, connected approach to securityorchestration, Capture Security Centerfederates operational aspects of network,endpoint and cloud security via a simple,common management framework. Itsimplifies and, in many cases, automatesvarious tasks to promote better securitycoordination and decision-making, whilereducing the complexity, time andexpense of performing securityoperations and administration tasks.These tasks include firewall and endpointprovisioning, configuration, monitoring,reporting, patching, auditing, and trafficand data analytics that is invaluable tothe detection and response to securityproblems before they occur.Benefits: Unified security governance,compliance and risk managementsecurity program An integration-friendly managementconsole for all your SonicWall Solutions Automated workflows assure securitycompliance & error-free policymanagement Simple and fast zero-touch remotedeployment and provisioning ofSonicWall firewalls Single-pane visibility and situationalawareness of the network securityenvironment Deep investigative and forensicanalysis of enriched security data Reduced incident response time withreal-time, actionable threat intelligence

Capture Security Center provides SingleSign-On access to license, provision andmanage all your network, endpoint andcloud security services. These servicesinclude Firewall Management, Analytics,Capture Client and Cloud ApplicationSecurity. Our vision of unifying the fullbreadth of SonicWall security portfoliounder one integration-friendlymanagement tool includes web, wireless,email, mobile and IoT security services.1The combination of these cloud servicesdelivers layered mission-critical cyberdefense, threat intelligence, analysis andcollaboration, and common management,reporting and analytics that worksynchronously together. With softwareupdates and support included in an activesubscription service, access to any latestinnovations and enhancements isimmediate. This helps manage securityrisks, help fulfill regulatory obligations,and defend against the newestvulnerabilities and threats in anautomated fashion. With limitlessscalability and flexibility, Capture SecurityCenter readily adapts to capacity andbusiness changes on demand.Capture ClientSentinelOne, Capture Client appliesadvanced threat protection techniques,such as machine learning and systemrollback. This protects against bothfile-based and fileless malware, whiledelivering a 360-degree attack view withactionable intelligence relevant forinvestigations. Combined with SonicWallfirewalls, Capture Client also addsvisibility into encrypted traffic, throughthe management of trusted SSLcertificates used for Deep PacketInspection of SSL/TLS traffic.Assessible within the Capture SecurityCenter is the SonicWall Capture Client, aunified client platform that deliversmultiple endpoint protection capabilities.With a next-generation malwareprotection engine powered byCloud-Based ManagementAnywhereWindows& Mac OSNext-Generation Malware Prevention TechnologySonicWall Capture Client PlatformUnifiedClientEndpointReportingAntivirus Enforcement& ManagementDPI-SSL CertificateManagementCapture nt1 Web, wireless, email, mobile and IoT security services will be fully integrated into this platform in future product announcements.2

Cloud App SecurityThe SonicWall Capture Security CenterAnalytics subscription bundle empowerscustomers with shadow IT visibility andcontrol over the usage of cloudapplications. SonicWall Cloud AppSecurity provides CASB-like functionality.It enables administrators to discoverusage of risky applications, track useractivity, and set allow/block policies forsanctioned and unsanctioned ITapplications on managed firewalls toprotect sensitive data.3Shadow IT discovery, Real-time visibility,and Application classification & controlare the key capabilities of the Cloud AppSecurity service. The service ensures safeadoption of SaaS applications withoutimpacting employee productivity and at alow total cost of ownership.1.Shadow IT discovery: Leverageexisting firewall log files to automatecloud discovery to identifyapplications being used and their riskposture.2.Real-time application visibility:Monitor usage in real-time with anintuitive dashboard view thatprovides details of applications beingused, traffic volume, user activity andlocation of use.3.Application classification andcontrol: Classify unmanaged cloudapplications into Sanctioned Apps (ITapproved) or Un-Sanctioned Apps(Not IT approved), and set allow/block policies based on theapplication risk score.

Workflow AutomationEmploying native workflow automation,Capture Security Center helps SOCsconform to firewall policy changemanagement and auditing requirementsof various regulatory laws such as PCI,HIPPA and GDPR. It enables policychanges by applying a series of rigorousprocedures for configuring, comparing,validating, reviewing and approving1. CONFIGUREAND COMPARECapture SecurityCenter configurespolicy changeorders and colorcodes differencesfor clearcomparisonsfirewall policies prior to deployment.The approval groups are flexible tocomply with varying authorizationand audit procedures from differenttypes of organizations. Workflowautomation programmatically deployssanctioned security policies to improveoperational efficiency, mitigate risks andeliminate errors.2. VALIDATECapture SecurityCenter performsan integrityvalidation of thepolicy’s logic3. REVIEW &APPROVECapture SecurityCenter emailsreviewers andlogs an approval/disapproval audittrail of the policyWorkflow Automation: Four steps to error-free policy management4Capture Security Centerprovides a holisticapproach to securitygovernance, complianceand risk management.4. DEPLOY5. AUDITCapture SecurityCenter deploysthe policy changesimmediately or ona scheduleThe change logsenable accuratepolicy auditingand precisecompliance data

Zero-Touch DeploymentIntegrated into Capture Security Center isthe Zero-Touch Deployment service,which simplifies and speeds theprovisioning process for SonicWallSTEP 1firewalls at remote and branch officelocations. The process requires minimaluser intervention, and is fully automatedto operationalize firewalls at scale in foureasy deployment steps. This significantlyreduces the time, cost and complexityassociated with installation andconfiguration, while security andconnectivity occurs instantly andautomatically.REGISTER THE FIREWALLRegisters the new firewall in MySonicWall using its assigned serial number and authentication code.STEP 2CONNECT THE FIREWALLConnects the firewall to the network using the ethernet cable that came with the unit.STEP 3POWER UP THE FIREWALLPower up the firewall after connecting the power cable and plugging it into a standard wall outlet. Units areautomatically assigned a WAN IP using DHCP server. Once connectivity is established, the unit is automaticallydiscovered, authenticated, and added to Capture Security Center with all licenses and configurations synchronizedwith MySonicWall and License Manager.STEP 4MANAGE THE FIREWALLThe unit is now operational and managed via the Capture Security Center cloud-based central management consolesuch as firmware upgrades, security patching, and group level configuration changes.Zero-Touch Deployment: Operationalize firewall in four easy steps5

ReportingCapture Security Center offers over 140predefined reports, as well as theflexibility to create custom reports usingany combination of auditable data toacquire various use-case outcomes.6These outcomes include big-picture anddetailed awareness of network events,user activities, threats, operational andperformance issues, security efficacy,risks and security gaps, compliancereadiness, and even post-mortemanalysis. Every report is designed withthe collective input from many years ofSonicWall customer and partnercollaborations. This provides the deepgranularity, scope and knowledge ofsyslog and IPFIX/NetFlow data SOCsneed to track, measure and run aneffective network and security operation.

AnalyticsSonicWall Analytics is an intelligencedriven big data analysis engine thatautomates the aggregation,normalization, correlation, andcontextualization of security data flowingthrough all managed firewalls. It givesorganizations real-time insight intoeverything that is happening across theirnetworks. The results, presented in astructured, meaningful, actionable andeasily consumable way, empower securityteam, analysts, auditors, boards, C-Suitesand stakeholders to discover, interpret,prioritize, make decisions and takeappropriate defensive and correctiveactions.Analytics presents real-time visualization,monitoring and alerting of enrichedsecurity data through a single pane ofglass. It comes with powerful tools thatgive customers complete authority, agilityand flexibility to perform extensivedrill-down investigative analysis ofnetwork traffic, user activities, securityevents, threat profile, applicationutilization, and a myriad of othercontextual firewall data. This deepvisibility, knowledge and understandingof the security environment givescustomers valuable insight and thecapacity to not only uncover securityrisks, but also orchestrate remediation,while monitoring and tracking the resultswith greater clarity and speed. Analyticsenables customers to operationalizesecurity analysis and integrate it intobusiness processes to transform data intoinformation, information into knowledge,and knowledge into decisions that enableachieving full security automation.7 Gain eagle-eye viewinto everythingg Calibrate securitypolicies and controls Empowerstakeholderswith single-panevisibility and insightsAGGREGATEDATA Exercise risk-baseddecision-making andremediationCONTEXTUALIZEDATADETECT ANDREMEDIATE Enrich firewallsecurity dataActionable Insightand Knowledge Operationalizeanalytics viareal-time, SUSERANALYTICS Show enriched datain a meaningful,actionable andconsumable manner,and speed Create knowledgerepresentations ofanalytic data Monitor results withgreater clarity, certaintyand speed Perform deepdrill-down investigativeand forensic analysis

8

Scalable cloud architectureCapture Security Center distributedarchitecture facilitates limitless systemavailability and scalability. Supportingsmall to large enterprises, telecoms,carriers and service providers with amassive multi-tenant ecosystem, CaptureSecurity Center can scale on-demand tosupport thousands of SonicWall securitydevices under its management, regardlessof location. At the customer-facing level isits highly interactive universal dashboardsCapture Security Center providesa complete and scalable securitymanagement, analytic and reportingplatform for distributed organizations andservice providers (i.e. carriers, telecoms,and MSPs).loaded with real-time monitoring,reporting, and analytics data to helpguide smart security policy decisions, anddrive collaboration, communication andknowledge across the shared securityframework. With an enterprise-wide viewof the security environment and realtime security intelligence reaching theright people in the organization, accuratesecurity policies and controls actions canbe made towards a stronger adaptivesecurity posture.Enterprise ClientsSecure Wireless ZoneManaged Security ServiceProvider (MSSP)Secure Mobile AccessInternal FirewallGuest ZoneIoT ZoneSonicPoint ACeLAN ZoneSMB ClientsCaptureSecurityCenterConsoleCapture SecurityCenter ConsoleEmail SecurityRetail ClientsPOSGateway FirewallSwitchInternal FirewallDMZ ZoneGuestWAN AccelerationInternal FirewallServer ZoneInternal FirewallCapture Threat ResearchCapture LabsCapture SandboxApplication ControlContent Filtering Botnet FilteringAnti-MalwareIntrusion PreventionSSL InspectionCloud-delivered unified management, reporting and analytics for network, endpoint and cloud security.9IoTInternational ClientsFirewall Security Services Layers POSCaptureSecurityCenterMSSP’s managed firewallsMSSP’s co-managed firewalls

FeaturesSecurity management and monitoring featuresFeatureDescriptionCentralized security and networkmanagementHelps administrators deploy, manage and monitor a distributed network security environment.Federate policy configurationEasily sets policies for thousands of SonicWall firewalls, wireless access points, email security,secure remote access devices and switches from a central location.Change Order Management andWork FlowAssures the correctness and compliance of policy changes by enforcing a process for configuring,comparing, validating, reviewing and approving policies prior to deployment. The approval groupsare user-configurable for adherence to company security policy. All policy changes are logged inan auditable form that ensures the firewall complies with regulatory requirements. All granulardetails of any changes made are historically preserved to help with compliance, audit trailing, andtroubleshooting.Zero-Touch DeploymentSimplifies and speeds the deployment and provisioning of SonicWall firewalls remotely using thecloud. Automatically pushes policies; performs firmware upgrades; and synchronizes licenses.Sophisticated VPN deploymentand configurationDell X-Series switches can now be managed easily within TZ, NSa and SuperMassive seriesfirewalls to offer single-pane-of-glass management of the entire network security infrastructure.Offline managementSimplifies and speeds the deployment and provisioning of SonicWall firewalls remotely using thecloud. Automatically pushes policies; performs firmware upgrades; and synchronizes licenses.Streamlined license managementSimplifies the enablement of VPN connectivity, and consolidates thousands of security policies.Universal dashboardFeatures customizable widgets, geographic maps and user-centric reporting.Active-device monitoring andalertingProvides real-time alerts with integrated monitoring capabilities, and facilitates troubleshootingefforts, thus allowing administrators to take preventative action and deliver immediateremediation.SNMP supportProvides powerful, real-time traps for all Transmission Control Protocol/Internet Protocol (TCP/IP) and SNMP-enabled devices and applications, greatly enhancing troubleshooting efforts topinpoint and respond to critical network events.Application Visualization andIntelligenceShows historic and real-time reports of what applications are being used, and by which users.Reports are completely customizable using intuitive filtering and drill-down capabilities.Rich integration optionsProvides application programming interface (API) for web services, command line interface (CLI)support for the majority of functions, and SNMP trap support for both service providers andenterprises.Dell Networking X-Series switchmanagementDell X-Series switches can now be managed easily within TZ, NSa and SuperMassive seriesfirewalls to offer single-pane-of-glass management of the entire network security infrastructure.ReportingFeatureDescriptionBotnet ReportIncludes four report types: Attempts, Targets, Initiators, and Timeline containing attack vectorcontext such as Botnet ID, IP Addresses, Countries, Hosts, Ports, Interfaces, Initiator/Target,Source/Destination, and User.Geo IP ReportContains information on blocked traffic that is based on the traffic’s country of origin ordestination.Includes four report types: Attempts, Targets, Initiators, and Timeline containing attack vectorcontext such as Botnet ID, IP Addresses, Countries, Hosts, Ports, Interfaces, Initiator/Target,Source/Destination, and UserMAC Address ReportShows the Media Access Control (MAC) address on the report page. Includes device-specificinformation (Initiator MAC and Responder MAC) in five report types: Data Usage Initiators Data Usage Responders Data Usage Details User Activity Details Web Activity InitiatorsCapture ATP ReportShows detail threat behavior information to respond to a threat or infection.HIPPA, PCI and SOX reportsIncludes pre-defined PCI, HIPAA and SOX report templates to satisfy security compliance audits.10

Reporting con'tFeatureDescriptionRogue Wireless Access PointReportingShows all wireless devices in use as well as rogue behavior from ad-hoc or peer-to-peernetworking between hosts and accidental associations for users connecting to neighboring roguenetworks.Intelligent reporting and activityvisualizationProvides comprehensive management and graphical reports for SonicWall firewalls, email securityand secure mobile access devices. Enables greater insight into usage trends and security eventswhile delivering a cohesive branding for service providers.Centralized loggingOffers a central location for consolidating security events and logs for thousands of appliances,providing a single point to conduct network forensics.Real-time and historic nextgeneration syslog reportingThrough a revolutionary enhancement in architecture, streamlines the time-consumingsummarization process, allowing for near real-time reporting on incoming syslog messages. Alsoprovides the ability to drill down into data and customize reports extensively.Universal scheduled reportsSchedules reports that are automatically created and mailed out across multiple appliances ofvarious types to authorized recipients.AnalyticsFeatureDescriptionData aggregationIntelligence-driven analytic engine automates the aggregation, normalization, correlation, andcontextualization of security data flowing through all firewalls.Data contextualizationActionable analytics, presented in a structured, meaningful and easily consumable way, empowersecurity team, analyst and stakeholders to discover, interpret, prioritize, make decisions and takeappropriate defensive actions.Streaming analyticsStreams of network security data are continuously processed, correlated and analyzed in real-timeand the results are illustrated in a dynamic, interactive visual dashboard.User analyticsDeep analysis of users’ activity trends to gain full visibility into their utilization, access, andconnections across the entire network.Real-time dynamic visualizationThrough a single-pane-of glass, security team can perform deep drill-down investigative andforensic analysis of security data with greater precision, clarity and speed.Rapid detection and remediationInvestigative capabilities to chase down unsafe activities and to quickly manage and remediaterisks.Flow analytics and reportsProvides a flow reporting agent for application traffic analytics and usage data through IPFIX orNetFlow protocols for real-time and historical monitoring. Offers administrators an effective andefficient interface to visually monitor their network in real-time, providing the ability to identifyapplications and websites with high bandwidth demands, view application usage per user andanticipate attacks and threats encountered by the network. A Real-Time Viewer with drag and drop customization A Real-Time Report screen with one-cli

compliance and risk management security program An integration-friendly management console for all your SonicWall Solutions Automated workflows assure security compliance & error-free policy management Simple and fast zero-touch remote deployment and provisioning of SonicWall