Extend Security With Juniper Connected Security And ForeScout

Transcription

Solution BriefEXTEND SECURITY WITH JUNIPERCONNECTED SECURITY ANDFORESCOUTLeverage the entire network for lateral threat remediationChallengeThe proliferation of BYOD,IoT, and unmanaged systemsexposes corporate networks tocyber attacks from unsecured,noncompliant devices. Lackof visibility into and controlover these devices—wired orwireless—can lead to downtime,lower productivity, and spiralingoperational costs.SolutionThe joint Juniper-ForeScoutsolution offers complete visibilityinto, and control over, wired andwireless devices the momentthey connect to the network. Thisprevents lateral threat propagationand ensures that these devicescomply with corporate securityand risk mitigation policies.Benefits Defends against unknownmalware and advanced attacks Expands threat protection withvendor-agnostic mechanisms Ensures consistent policyenforcement on third-partydevices such as switches andwireless access points Prevents lateral threatmovement by moving infectedhosts to quarantined or blockedstates Minimizes threat exposure byextending security deeper intothe networkThe increasingly sophisticated cyber attack landscape demandsthat businesses deploy a comprehensive security platformthat not only unites and coordinates various threat analyticsplatforms, but provides a simpler policy mechanism as well. Thisrequires leveraging the entire network as a threat detection andenforcement tool.The Juniper Connected Security framework does just that, empowering all networkdevices—not just perimeter firewalls—to work together as a threat detection andsecurity enforcement domain. Juniper Networks Junos Space Security DirectorPolicy Enforcer management software orchestrates policies created by the JuniperAdvanced Threat Prevention cloud-based malware detection solution, distributingthem to Juniper Networks EX Series Ethernet Switches, QFX Series Switches,and third-party switches, as well as the physical and virtual Juniper Networks SRXSeries Services Gateways. The Juniper solutions work in concert with ForeScoutCounterACT , giving IT organizations the unique ability to see new devices theinstant they connect to, or leave, the network, allowing them to continuouslymonitor, control, and remediate these devices.Working together, Juniper and ForeScout create a secure, end-to-end, multilayernetwork by defining risk mitigation policies and implementing them at the access,aggregation, core, and network perimeter, greatly enhancing the system’s overallsecurity profile.The ChallengeVisibilityMost successful cyber attacks exploit well-known vulnerabilities and security gaps onnetwork endpoints. Unfortunately, organizations aren’t aware of all endpoints in theirnetwork because many are unmanaged transient BYOD, guest, or IoT devices that goundetected during periodic scans, making them invisible to most security tools.ControlPerimeter security alone is not sufficient to secure networks; it merely protects thesystem from outside intruders. With the proliferation of internally launched attacks,it’s now imperative to know about each and every device on your network, including1

Extend Security with Juniper Connected Security and ForeScoutJuniper ATP CloudInfected Endpoint InformationCentral ManagementPolicy EnforcerPolicy ControllerSRX Series NGFWSecurity DirectorAccessConnector APIThird Party SW ConnectorJuniper Networks EX Series SwitchesWireless Access ControllersThird Party SwitchesFigure 1: Juniper Connected Security and ForeScout CounterACT solution overviewits owner, purpose, and security posture.These insights allow you to apply the appropriate level ofnetwork access control based on established security policies—for example, BYOD, guest, contractor, and IoT devices must beassigned to appropriate network segments. You must also beable to restrict access to noncompliant devices and quarantinethem within secure VLANs. Given the dramatic growth ofmobility and IoT devices, this level of control will ideally beachieved without manual implementation methods.Response AutomationThe velocity and evasiveness of today’s targeted attacks,coupled with increasing network complexity, mobility, andpermissive BYOD policies, are creating a perfect storm for ITsecurity teams. Without an automated system for monitoringand mitigating endpoint security gaps, valuable time is lost. Youmust also be able respond to attacks and breaches quickly andautomatically; any delay creates an opportunity for cyber threatsto propagate within your network.The Juniper Networks and ForeScout SolutionJuniper Connected Security delivers highly effective protectionagainst today’s sophisticated and ever-evolving threatlandscape. With Juniper Connected Security’s open architecturetightly integrated with ForeScout, enterprises can secureevery point of connection across multivendor environments,including public and private clouds. With the automated threatremediation, real-time intelligence, and machine learning thatthe joint Juniper-ForeScout solution provides, your network willknow when and how to protect your people, your data, and yourinfrastructure—no matter where they are.With its agentless approach, ForeScout CounterACT occupiesa unique space among network security solutions. Available asboth a physical and virtual solution, ForeScout CounterACT usesactive and passive techniques to discover and classify endpointsas they connect to the network, including BYOD/guestdevices, nontraditional devices (IoT, handhelds, and sensors),and unknown and rogue endpoints (unauthorized endpoints,switches/routers, and wireless access points)—all withoutrequiring management agents or previous device awareness.Using agentless visibility, CounterACT checks for deviceposture/compliance according to established security policiesand then, depending on the device classification and/or posture,coordinates an automated host- or network-based response.Working in concert with ForeScout CounterACT, EX Series andQFX Series switches offer layered security policy enforcementand control at the access, aggregation, core, and perimeter.This multilayer approach mitigates risk and noncompliance atmultiple levels while increasing the network’s security profile.Using standard protocols such as SNMP, CLI, and RADIUS,CounterACT classifies and assesses device compliance posture,then applies automated policy actions through the switches.The joint solution empowers enterprises to defend themselvesagainst the lateral movement of threats by blocking orquarantining infected hosts, even when users move and IPaddresses change. This workflow is the same for endpoints thatconnect to the network via wireless access points.2

Extend Security with Juniper Connected Security and ForeScoutKey Features and BenefitsThe joint Juniper-ForeScout solution delivers the following features for enterprise customers seeking a comprehensive securitysolution.Multilayer securityThe joint Juniper-ForeScout solution provides layered security, policy enforcement, and control at the access, aggregation,core, and perimeter, greatly increasing the network security profile while reducing noncompliance risks and unauthorizedaccess. It also ensures automated protection against malicious endpoints at both the perimeter and network levels.AgentlessNo endpoint agents are required for device profiling, compliance, remediation, and access control, allowing ForeScoutCounterACT to see and control managed, unmanaged, and IoT devices. This greatly simplifies deployment.Open interoperabilityThe Juniper-ForeScout integration is based on industry-standard protocols, enabling it to interoperate with other thirdparty solutions. CounterACT works with popular switches, routers, VPNs, firewalls, and endpoint operating systems withoutrequiring infrastructure changes or upgrades.802.1X and non-802.1X authenticationCounterACT can be deployed with Juniper switches using 802.1X authentication or a robust non-802.1X approach. TheForeScout-Juniper integration also supports hybrid deployments, giving customers a choice to authenticate traditionaldevices using 802.1X while nontraditional devices can connect using a non-802.1X approach.Comprehensive endpoint visibilityand assessmentCounterACT sees the network in incredible detail, identifying and evaluating network endpoints and applications as wellas determining each device’s operating system, configuration, software, services, patch state, and the presence of securityagents. CounterACT automatically classifies a growing number of IoT endpoints as it quickly clarifies and assesses thestatus and security posture of devices on the network—with or without 802.1X infrastructure.In-depth visibilityCounterACT discovers and gains in-depth visibility on all endpoints. In a recent evaluation by testing and research firmMiercom, CounterACT discovered and classified 100 percent of endpoints in all network environments tested. In addition,CounterACT discovered and classified 500 endpoints in less than five seconds. This is in stark contrast to traditional accesscontrol solutions that typically do not discover every device on the network, offer few classification capabilities, and areoften limited to displaying very basic endpoint properties.Solution ComponentsSRX Series Services GatewaysJuniper Networks SRX Series Services Gateways are intelligentnext-generation firewalls that deliver outstanding protection,market-leading performance, six nines reliability and availability,scalability, and services integration. Available in both physicaland virtual form factors, SRX Series firewalls are ideallysuited for service provider, large enterprise, and public-sectornetworks, delivering the highest level of protection from Layer3 to Layer 7. The carrier-grade SRX Series next-generationfirewalls also offer advanced services such as applicationsecurity, advanced security services, intrusion preventionsystem (IPS), and integrated threat intelligence services.Juniper ATP CloudJuniper ATP is a cloud-based service that provides completeadvanced malware protection. Integrated with SRX Seriesfirewalls, Juniper ATP Cloud delivers a dynamic anti-malwaresolution that adapts to an ever-changing threat landscape.Junos Space Security Director Policy EnforcerJuniper’s Policy Enforcer tool, a component of the Junos SpaceSecurity Director software, enforces threat remediation andmicrosegmentation policies on Juniper virtual and physical SRXSeries firewalls, EX Series and QFX Series switches, MX Series3D Universal Edge Routers, third-party switch and wirelessnetworks, private cloud/SDN solutions like the Juniper Contrail Platform and VMware NSX, and public cloud deployments.Juniper ATP’s cloud-based malware detection, Command andControl (C&C), and GeoIP identification feeds, along withtrusted custom feeds, act as threat detection mechanisms forPolicy Enforcer to orchestrate remediation workflows.EX Series Ethernet SwitchesJuniper Networks EX Series Ethernet Switches are designedto meet the demands of today’s high-performance businesses,letting companies grow their networks at their own pacewhile minimizing large up-front investments. Based on openstandards, EX Series switches provide the carrier-class reliability,security risk management, virtualization, application control, andlower total cost of ownership (TCO) that businesses demand.QFX Series Data Center SwitchesJuniper Networks QFX Series Switches are specifically designedfor data centers. They provide the universal building blocksfor creating and managing fabric architectures, improvingperformance, reliability, agility, and flexibility for multicloudenvironments.Third-Party Switches and Wireless ControllersThe joint Juniper-ForeScout solution provides the same level ofautomated threat remediation for endpoint devices connectedto third-party switches and wireless access points.3

Extend Security with Juniper Connected Security and ForeScoutForeScout CounterACTForeScout CounterACT is a physical and virtual securitysolution that dynamically identifies and evaluates traditional andnontraditional devices (security cameras, HVAC systems, andsensors) the instant they connect to a network.CounterACT can be deployed using 802.1X authenticationor a non-802.1X approach. In either scenario, CounterACToffers comprehensive endpoint discovery, classification, andassessment capabilities, allowing it to see and thoroughly profileendpoints that do not have or cannot support endpoint agents.ORCHESTRAESEThis agentless solution workswith managed and unmanaged,TEmobile and virtual endpoints,both known and unknown. Itquickly determines the user,owner, operating system,device configuration, software,services, patch state, and theCO Npresence of security agents.TROLCounterACT then continuouslyFigure 2: ForeScoutmonitors, controls, andCounterACTarchitectureremediates these devices as theycome and go from the network. A broad range of responsesacross user, network, and endpoint are supported, including: Agentless 802.1X and non-802.1X solution Real-time visibility into wired and wireless endpoints Support for multivendor network devices, firewalls, andthird-party SIEMs Integration with existing IT systemsEvery CounterACT appliance, physical or virtual, ships with abuilt-inintegration module that interoperates with EX Seriesswitches, QFX Series switches, and SRX Series firewalls.CounterACT works seamlessly with Juniper devices, requiring noinfrastructure changes, upgrades, endpoint agents, or endpointreconfiguration.Solution Workflow: Juniper ConnectedSecurity and ForeScoutThe Juniper and ForeScout solutions work together to detectand block attacks launched within the environment. Thefollowing bullets detail the full workflow. An endpoint device downloads a potentially malicious filefrom the Internet. An SRX Series firewall sends the file to Juniper ATP Cloudfor analysis. Juniper ATP determines the threat level andcommunicates that information to the SRX Series firewallsand Policy Enforcer. SRX Series firewalls prevent the file from beingdownloaded based on predefined policies and the threatlevel score from Juniper ATP Cloud. At the same time, based on the threat intelligence receivedfrom Juniper ATP Cloud, Policy Enforcer determines thatthe host that downloaded the file is infected. Policy Enforcer reports the infected host’s IP address toForeScout. ForeScout enforces policy actions as defined by the user,including blocking or quarantining the infected host ordevice. Policy Enforcer mitigates lateral propagation of the threatby tracking infected host movement and taking remedialactions such as quarantining/blocking the host, even if itsIP address changes.Summary—End-to-End Monitoring, AutomatedPolicy Enforcement, and Threat MitigationThe joint Juniper-ForeScout security solution givesenterprises complete end-to-end monitoring, automatedpolicy enforcement, and threat mitigation with unparalleledvisibility into wired and wireless networks. Juniper ConnectedSecurity’s open architecture, integrated with ForeScout’sagentless CounterACT solution, delivers a consistent, easy-tomanage security posture deployment that effectively mitigatesvulnerabilities and risks.Next StepsFor more information about Juniper Networks security solutions,please visit urity and contact your Juniper Networks representative.To learn more about comprehensive device visibility and policybased security automation in Juniper switching environments,visit www.ForeScout.com.About ForeScoutForeScout Technologies is transforming security through visibility,providing Global 2000 enterprises and government agencieswith agentless visibility and control of traditional and IoT devicesthe instant they connect to the network. Our technologycontinuously assesses, remediates, and monitors devices andworks with disparate security tools to help accelerate incidentresponse, break down silos, automate workflows, and optimizeexisting investments. As of March 1, 2017, more than 2400customers in over 60 countries improve their network securityand compliance posture with ForeScout solutions. See devices.Control them. Orchestrate system-wide response. Learn how atwww.forescout.com.4

Extend Security with Juniper Connected Security and ForeScoutAbout Juniper NetworksJuniper Networks brings simplicity to networking withproducts, solutions and services that connect the world.Through engineering innovation, we remove the constraintsand complexities of networking in the cloud era to solve thetoughest challenges our customers and partners face daily. AtJuniper Networks, we believe that the network is a resource forsharing knowledge and human advancement that changes theworld. We are committed to imagining groundbreaking ways todeliver automated, scalable and secure networks to move at thespeed of business.Corporate and Sales HeadquartersAPAC and EMEA HeadquartersJuniper Networks, Inc.Juniper Networks International B.V.1133 Innovation WayBoeing Avenue 240Sunnyvale, CA 94089 USA1119 PZ Schiphol-RijkPhone: 888.JUNIPER (888.586.4737)Amsterdam, The Netherlandsor 1.408.745.2000Phone: 31.0.207.125.700Fax: 1.408.745.2100Fax: 31.0.207.125.701EXPLORE JUNIPERGet the App.www.juniper.netCopyright 2020 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Juniper, Junos, and other trademarks are registered trademarks ofJuniper Networks, Inc. and/or its affiliates in the United States and other countries. Other names may be trademarks of their respective owners. Juniper Networks assumes noresponsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.3510642-004-EN May 20205

Working together, Juniper and ForeScout create a secure, end-to-end, multilayer network by defining risk mitigation policies and implementing them at the access, aggregation, core, and network perimeter, greatly enhancing the system’s overall . Connector API. 3 Exte