Real World Intrusion Prevention (IPS) : For The Demands of A New Security Reality
Real World Intrusion Prevention (IPS) : For The Demands of A New Security Reality
WHITE PAPER
For the Demands of a New Security Reality
1
White Paper: Real World Intrusion Prevention (IPS)
80%
enforcement to provide an effective defense
69.7%
70%
67.5% 65.9% system – based against virtually any attack. To
60%
55.4% on deep packet consider IPS deployments at key
50%
44.6% inspection internal points, not only must
40% 32.5% 34.1% technology organizations be concerned about
30.3%
30%
– that blocks up-time, they must also ensure
20%
known and critical business application
8.6%
10%
zero-day attacks performance is not impeded so
0%
without human that their help desk isn’t buried
TippingPoint Cisco IBM ISS McAfee Sourcefire
intervention, with employee complaints.
Source: Infonetics Research IPS Survey - August 2008
and with
TippingPoint is deployed in-band 20-35% more than competition virtually no
3. Low Latency: Application
false positives
performance is not just a function
or application
of bandwidth. Low latency
traffic latency. In order to do this,
must also be ensured. This is a
a very stringent set of product
particularly tough challenge for
requirements must be met – which
security products. If a security
is exactly why most intrusion
product is going to run with
technologies and products remain
thousands of filters turned on
centered on out-of-band intrusion
to automatically block malicious
detection, rather than in-band
traffic, it must perform inspection
intrusion prevention. These
very rapidly, or packets will be
requirements include:
delayed, application response time
will be hindered and employees
1. In-Line Network Reliability: will complain.
To block in real time, a product
must be placed in-line, not off a
4. Broad Attack Coverage: The
tap or mirror port. This means the
fourth challenge focuses on
IPS must be designed from the
evolving broad coverage and speed
ground up to deliver the same
of coverage. To protect networks
reliability and network availability
from the growing number of
as existing routing and switching
sophisticated attacks, an IPS
infrastructure. And, if there is
must provide broad and deep
an issue, the IPS must be able
attack coverage. That means the
to gracefully and transparently
IPS must be able to stop worms,
remove itself from the network
viruses, Trojans, denial of service
without disrupting normal business
attacks, peer to peer bandwidth
traffic.
floods, spyware, phishing, Web
2
White Paper: Real World Intrusion Prevention (IPS)
3
White Paper: Real World Intrusion Prevention (IPS)
4
White Paper: Real World Intrusion Prevention (IPS)
The TippingPoint IPS solutions, and in discovered Figure 4: Percentage of Customers Typically Applying All Filter Updates
more specifically TippingPoint’s software
security research team DVLabs, application 100%
% of Customers Applying
extremely accurate and do not research 70%
filters enabled by default to block by software More TippingPoint customers apply all filter updates
malicious traffic. vendors or
very shortly
thereafter.
Staying Ahead of the Threat
Another critical measure of an IPS
solution is the timeliness of filter Further, the Infonetics data found
development and corresponding that TippingPoint customers are
filter updates to protect against more likely to apply all the IPS
newly discovered or disclosed filter updates provided compared
software vulnerabilities. After all, to customers of other IPS vendors
“better late than never” is not (Figure 4).
what security administrators want
to hear from an IPS vendor. Figure Nearly three quarters of all
3 reports the number of customers TippingPoint
Figure 5: Customer Reporting of Zero-Day Threat Coverage
who responded that their vendor customers Pre-existing coverage Day of zero-day
updates IPS filter sets semi-weekly surveyed (74
or weekly. percent) report TippingPoint 50% 24% 74%
that they
A total of 87 percent of typically apply McAfee 15% 38% 53%
weekly updates. confidence Source: Infonetics Research IPS Survey - August 2008
in their IPS TippingPoint has more Zero-Day threat coverage than the competition
vendor than
These results reflect TippingPoint’s competitors’
significant investments in its customers.
DVLabs security research team’s
IPS filter production and software
vulnerability research capabilities. All TippingPoint IPS filter
TippingPoint leads the IPS industry updates from DVLabs include
“Recommended Settings” that
5
White Paper: Real World Intrusion Prevention (IPS)
90%
0%
90% coverage, followed by 15 percent
80%
11%
80%
3%
11%
of McAfee customers, 10 percent
70% 70% of Cisco customers and 8 percent
% of Respondents
% of Respondents
60% 34%
10% 12% 20%
60%
37%
8%
19% 20% of IBM-ISS customers (Figure 5).
50% 14%
50%
14% 12% 14%
13% 12% 13% 8%
40% 40%
10%
10%
4%
11%
6%
10% 16%
8%
11% vulnerability research capabilities
and the corresponding fact that
0% 0% 3%
0% 0%
TippingPoint Cisco McAfee Sourcefire IBM ISS TippingPoint Cisco McAfee Sourcefire IBM ISS
76% 38% 38% 33% 17% 71% 43% 35% 33% 14%
TippingPoint leads the IPS industry
Source: Infonetics Research IPS Survey - August 2008 in discovered software application
vulnerabilities.
indicate exactly how TippingPoint
recommends deploying each new
filter by default. It is this filter Ease of Use
information that gives customers Network administrators are less
the confidence to automatically likely to deploy intrusion prevention
apply TippingPoint’s IPS filter systems across the expanse of
updates. their networks if the solution is
difficult to set-up and manage.
Sometimes, new IPS filters are The Infonetics survey reveals
delivered even before application manageability factors for each of
vulnerabilities are disclosed to the five IPS vendors, including
the public. When this happens, turn-up time and ease of IPS filter
the IPS vendor is providing “Zero- configuration.
Day” threat coverage. Hackers can
discover application vulnerabilities According to Infonetics’ Jeff
before software vendors deploy Wilson, “This area is among the
patches to cover them. These Zero- most significant findings in the
Day threats can leave networks study. Many IPS deployments get
with gaping security holes. To completely hung up at the initial
address these threats, IPS vendors configuration stage, or worse,
need to employ in-house teams devices are misconfigured and
of researchers dedicated to then fail to block attacks.”
conducting ongoing vulnerability
research and analysis and to
developing Zero-Day filters that TippingPoint customers reported
plug holes before software patches the fastest turn-up times, with 76
become available. percent stating that TippingPoint
IPS appliances can be installed
in two hours or less. Thirty-eight
How do IPS vendors compare percent of Cisco and McAfee
on Zero-Day threat coverage? customers say they can turn-up
According to the Infonetics their IPS devices in two hours.
survey data, half of TippingPoint Only seventeen percent of IBM-
respondents report they receive ISS customers report two-hour
Zero-Day threat protection – two to set-up success.
three times as many as the closest
competitors. Another 24 percent
6
White Paper: Real World Intrusion Prevention (IPS)
% of Respondents
investment of IT resources. The these products 70%
Infonetics study categorized IPS in-band with 60%
filter configuration in three levels: large numbers 50% 66% 53% 65%
56% 60%
of filters 40%
enforcement in an efficient continue to use 0% TippingPoint IBM ISS McAfee Cisco Sourcefire
manner, quickly and independently them out-of- Source: Infonetics Research IPS Survey - August 2008
7
White Paper: Real World Intrusion Prevention (IPS)
1
While Sourcefire customers were included in the Infonetics survey, only a small number of Sourcefire
customers responded to the survey. Therefore, the Sourcefire results are based on a small number (< 30) of
customer responses.
Copyright © 3Com Corporation. TippingPoint and Digital Vaccine are registered trademarks of 3Com Corporation or its subsidiaries. All other company and product names may be trademarks of their www.tippingpoint.com
respective holders. While every effort is made to ensure the information given is accurate, 3Com does not accept liability for any errors which may arise. Specifications and other information in this
document may be subject to change without notice. 503201-001 11/08