ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Ubiquity Security appliance

    Scheduled Pinned Locked Moved IT Discussion
    ubiquitysecurityanti-virusintrusion preventionintrusion detection
    55 Posts 8 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch @NashBrydges
      last edited by

      @nashbrydges said in Ubiquity Security appliance:

      Sandstorm is not on the endpoint. Files are analyzed through a Sophos cloud service via the UTM before being allowed through to the user.

      So you are using MitM.

      NashBrydgesN 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @NashBrydges
        last edited by

        @nashbrydges said in Ubiquity Security appliance:

        @jaredbusch said in Ubiquity Security appliance:

        @nashbrydges said in Ubiquity Security appliance:

        when the UTM manufacturer gathers malicious domain lists from a variety of sources

        Again this is different than the sources that Strongarm.io uses how?

        Just like different AV vendors perform differently in what they identify and block, the same is true for UTMs.

        Of course. But overlap has to be something like 99.99% or else you have very bad AV in one spot or the other.

        1 Reply Last reply Reply Quote 1
        • DashrenderD
          Dashrender @NashBrydges
          last edited by

          @nashbrydges said in Ubiquity Security appliance:

          @jaredbusch said in Ubiquity Security appliance:

          They do use SSL almost exclusively because it protects their payload unless the endpoint has MitM breaking the SSL to inspect the traffic.

          Source please.

          @jaredbusch said in Ubiquity Security appliance:

          Is Sandstorm an AV client on the endpoint? Then it is no different than any other endpoint AV. If it is on the router, then, it is useless unless you are doing MitM.

          Sandstorm is not on the endpoint. Files are analyzed through a Sophos cloud service via the UTM before being allowed through to the user.

          Sure files not downloaded via TLS.

          1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch @NashBrydges
            last edited by

            @nashbrydges said in Ubiquity Security appliance:

            Source please.

            News articles I have read over the last few years.

            Random google result:
            http://www.eweek.com/security/more-hackers-building-ssl-encryption-into-malware-zscaler-finds

            1 Reply Last reply Reply Quote 1
            • black3dynamiteB
              black3dynamite @NashBrydges
              last edited by

              @nashbrydges said in Ubiquity Security appliance:

              @coliver said in Ubiquity Security appliance:

              @nashbrydges said in Ubiquity Security appliance:

              @scottalanmiller has made it clear throughout Mangolassi that he's not generally a fan of UTMs but I have seen first-hand the benefits UTMs can bring to a small business (emphasis on "small"). I agree with all of his points but since I've been able to setup and manage UTMs that have actually prevented malware infections, even while using some of those DNS services, that tends to win me over pretty quickly.

              I'll also agree with @scottalanmiller that it's a cost vs benefit analysis that you'll need to do.

              For what it's worth, I tend to look at the type of activities and services running at a client's business and decide whether a UTM makes sense for them or not and go from there. And for performance vs cost, I've favored Sophos UTMs. For straight-up firewall, it's UBNT all the way, every time.

              How do you know the local AV/Anti-malware wouldn't have resolved that issue? That's where I sit, UTMs are interesting and can be handy but are they that much better then just having a properly secured endpoint?

              Local AV is great for scanning files and processes but does nothing to block access to a website. That is the effect I'm referring to. Blocking access to malicious sites. Preventing the downloading of an infected document/file is also a win. There's definite value in stopping the file from reaching the user if it is identified as malicious. Sure it might have been identified by the desktop AV, but if it hadn't, that additional buffer is beneficial.

              AV like Sophos Endpoint can do most of the stuff that UTMs can do.

              1 Reply Last reply Reply Quote 0
              • NashBrydgesN
                NashBrydges @JaredBusch
                last edited by

                @jaredbusch said in Ubiquity Security appliance:

                @nashbrydges said in Ubiquity Security appliance:

                Sandstorm is not on the endpoint. Files are analyzed through a Sophos cloud service via the UTM before being allowed through to the user.

                So you are using MitM.

                To be clear, Sandstorm will NOT work for HTTPS content unless there's a cert installed on desktop so it can inspect traffic and retain encrypted connection. Much the same as DPI SSL won't work well and gateway AVs are also the same where if no certificate is installed on desktop, you can't maintain an encrypted connection with destination server. But it does work on non SSL traffic.

                As web SSL usage continues to increase, this continue to reduce the efficacy of any gateway AV, DPI SSL or services like Sandstorm for SMBs who refuse to setup the desktop cert (me included). That means more and more reliance on desktop AV/AM solutions for scanning.

                While those services are, in my eyes, are being affected in their usefulness by the increased SSL usage, they do offer other services that can be beneficial to SMBs.

                I see lots of people coming up with reasons why NOT to use a UTM. What I've stated all along is, evaluate the client need and figure out if a UTM is going to work well for them or not.

                In my case, only a handful of the 39 clients have UTMs. ALL of those enjoy benefits afforded them by the UTM other than AV/AM scanning.

                JaredBuschJ 1 Reply Last reply Reply Quote 1
                • JaredBuschJ
                  JaredBusch @NashBrydges
                  last edited by

                  @nashbrydges said in Ubiquity Security appliance:

                  I see lots of people coming up with reasons why NOT to use a UTM. What I've stated all along is, evaluate the client need and figure out if a UTM is going to work well for them or not.

                  From my perspective, I was trying to find the reasons it made sense in the examples you listed and I could not. Lower cost than clean up, sure. But whether or not that has since prevented anything that could have happened is unclear at beast.

                  @nashbrydges said in Ubiquity Security appliance:

                  In my case, only a handful of the 39 clients have UTMs. ALL of those enjoy benefits afforded them by the UTM other than AV/AM scanning.

                  Rights, so you clearly get the point, but because you had such specific examples it was easy to poke with a stick to figure things out.

                  Honestly this thread has giving me new examples to use when speaking with a client on these scenarios and decisions.

                  CCWTechC 1 Reply Last reply Reply Quote 1
                  • CCWTechC
                    CCWTech @JaredBusch
                    last edited by

                    @jaredbusch said in Ubiquity Security appliance:

                    Honestly this thread has giving me new examples to use when speaking with a client on these scenarios and decisions.

                    You're welcome! πŸ™‚

                    1 Reply Last reply Reply Quote 3
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                      Related: My hotel windows look right into the Palo Alto Networks office building.

                      NashBrydgesN 1 Reply Last reply Reply Quote 1
                      • NashBrydgesN
                        NashBrydges @scottalanmiller
                        last edited by

                        @scottalanmiller said in Ubiquity Security appliance:

                        Related: My hotel windows look right into the Palo Alto Networks office building.

                        @scottalanmiller said in Ubiquity Security appliance:

                        Related: My hotel windows look right into the Palo Alto Networks office building.

                        Grab some swag! πŸ˜‰

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          It’s coincidental. Not visiting them πŸ™‚

                          1 Reply Last reply Reply Quote 1
                          • 1
                          • 2
                          • 3
                          • 3 / 3
                          • First post
                            Last post