Arg! The money spent the month before I stated here.
-
@tim_g said in Arg! The money spent the month before I stated here.:
I'm not naive, and I do realize these things shouldn't be that way... and if they were not, then yes the SonicWALL AV is dumb. But that's not the case, and given the environment (not just mine, but many are like that), it can make sense to use it, especially if there is no negative impact.
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
I'm not saying that you are doing something wrong here. I'm saying that someone making the decisions here is clearly not approaching security from even a minimum level. For the UTM to be useful, it requires something else to be wrong. Making the UTM universally, it would seem, a band aid.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Right, and I'd argue (and have) that having UTM makes people feel that they don't need to have good AV. But they do, because threats originate often from inside the LAN where the UTM is powerless.
I don't use the UTM because I can't use AV some places, and as an additional layer of protection in a different way... not to make myself feel like I don't need good AV. Maybe other people, but not me.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
Seems odd, they were willing to pay for a UTM, but not willing to do other things. Not that it is a crazy cost, but it's far from free.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
Seems odd, they were willing to pay for a UTM, but not willing to do other things. Not that it is a crazy cost, but it's far from free.
The UTM is there whether we use it or not. It was included in a package of other stuff we do use. It does not cost anything extra to use it vs not use it.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
Seems odd, they were willing to pay for a UTM, but not willing to do other things. Not that it is a crazy cost, but it's far from free.
The UTM is there whether we use it or not. It was included in a package of other stuff we do use. It does not cost anything extra to use it vs not use it.
Well, it required buying an overpriced device that only costs what it does because it is a UTM. Someone bought a UTM, that's what they paid for. Now that it was already purchased, sure, it doesn't cost twice. But nearly the entire cost of that device was for the UTM. The rest is for the brand name.
-
For perspective, I guess I'm saying that from your perspective where someone else is making the insecure decisions, someone else bought the UTM and installed it, yes it makes sense to enable it.
From the CIO or CEO's perspectives, it's all insane. From an IT department view point, it makes no sense. No sense to have bought a UTM, no sense to not secure the environment, etc.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
Seems odd, they were willing to pay for a UTM, but not willing to do other things. Not that it is a crazy cost, but it's far from free.
The UTM is there whether we use it or not. It was included in a package of other stuff we do use. It does not cost anything extra to use it vs not use it.
Then I would say someone considered the wrong package. For example, someone purchased a SonicWall instead of a EdgeRouter.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
Seems odd, they were willing to pay for a UTM, but not willing to do other things. Not that it is a crazy cost, but it's far from free.
The UTM is there whether we use it or not. It was included in a package of other stuff we do use. It does not cost anything extra to use it vs not use it.
Well, it required buying an overpriced device that only costs what it does because it is a UTM. Someone bought a UTM, that's what they paid for. Now that it was already purchased, sure, it doesn't cost twice. But nearly the entire cost of that device was for the UTM. The rest is for the brand name.
@scottalanmiller said in Arg! The money spent the month before I stated here.:
For perspective, I guess I'm saying that from your perspective where someone else is making the insecure decisions, someone else bought the UTM and installed it, yes it makes sense to enable it.
From the CIO or CEO's perspectives, it's all insane. From an IT department view point, it makes no sense. No sense to have bought a UTM, no sense to not secure the environment, etc.
And I agree!
That aside, it's really nice and does an excellent job. I do like it. SonicWALL is not a bad product from what I've seen over the last 6 years dealing with a number of them.
Is it needed? No, there are so much better options. But if that's what was being used for such a long time and they grew attached to it... well you can imagine why they stick with it.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Right, and I'd argue (and have) that having UTM makes people feel that they don't need to have good AV. But they do, because threats originate often from inside the LAN where the UTM is powerless.
I don't use the UTM because I can't use AV some places, and as an additional layer of protection in a different way... not to make myself feel like I don't need good AV. Maybe other people, but not me.
You're environment is much more likely to be infected by a user's device that shouldn't be on your production network than from some user downloading something that an AV scanner on the UTM is going to detect.
-
@tim_g said in Arg! The money spent the month before I stated here.:
That aside, it's really nice and does an excellent job. I do like it. SonicWALL is not a bad product from what I've seen over the last 6 years dealing with a number of them.
It's the device I've had the worst results with. It's not that it is "bad", but that it is bad in comparison to all of the alternatives that I've worked with
-
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
Is there any possibility that providing that UTM somehow influences these things being allowed to happen?
No, it was like that before and after the UTM. The UTM was not a negotiation for lack of security elsewhere.
Seems odd, they were willing to pay for a UTM, but not willing to do other things. Not that it is a crazy cost, but it's far from free.
The UTM is there whether we use it or not. It was included in a package of other stuff we do use. It does not cost anything extra to use it vs not use it.
Well, it required buying an overpriced device that only costs what it does because it is a UTM. Someone bought a UTM, that's what they paid for. Now that it was already purchased, sure, it doesn't cost twice. But nearly the entire cost of that device was for the UTM. The rest is for the brand name.
@scottalanmiller said in Arg! The money spent the month before I stated here.:
For perspective, I guess I'm saying that from your perspective where someone else is making the insecure decisions, someone else bought the UTM and installed it, yes it makes sense to enable it.
From the CIO or CEO's perspectives, it's all insane. From an IT department view point, it makes no sense. No sense to have bought a UTM, no sense to not secure the environment, etc.
And I agree!
That aside, it's really nice and does an excellent job. I do like it. SonicWALL is not a bad product from what I've seen over the last 6 years dealing with a number of them.
Is it needed? No, there are so much better options. But if that's what was being used for such a long time and they grew attached to it... well you can imagine why they stick with it.
Grew attached to it? i.e. someone not doing their job as Scott would say.
-
@dashrender said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Right, and I'd argue (and have) that having UTM makes people feel that they don't need to have good AV. But they do, because threats originate often from inside the LAN where the UTM is powerless.
I don't use the UTM because I can't use AV some places, and as an additional layer of protection in a different way... not to make myself feel like I don't need good AV. Maybe other people, but not me.
You're environment is much more likely to be infected by a user's device that shouldn't be on your production network than from some user downloading something that an AV scanner on the UTM is going to detect.
Mostly because devices are allowed to leave the network, get infected, and join again. If the UTM covered them at home, it would be different.
Plus I assume that those devices can be multihomes while in the office to the LAN and to the Cell network (4G) so they might bypass the UTM even while still in the office.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@dashrender said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Right, and I'd argue (and have) that having UTM makes people feel that they don't need to have good AV. But they do, because threats originate often from inside the LAN where the UTM is powerless.
I don't use the UTM because I can't use AV some places, and as an additional layer of protection in a different way... not to make myself feel like I don't need good AV. Maybe other people, but not me.
You're environment is much more likely to be infected by a user's device that shouldn't be on your production network than from some user downloading something that an AV scanner on the UTM is going to detect.
Mostly because devices are allowed to leave the network, get infected, and join again. If the UTM covered them at home, it would be different.
Plus I assume that those devices can be multihomes while in the office to the LAN and to the Cell network (4G) so they might bypass the UTM even while still in the office.
Agreed.
-
@tim_g said in Arg! The money spent the month before I stated here.:
Good security also consists of all easily identifiable holes being covered the best that can be done for a cost that makes sense for the environment. If we deploy all devices with good AV, but there are still devices without it such as personal devices and those we deploy that stop functioning correctly sometimes, it's not a bad thing to use the built-in AV the SonicWALL provides as an additional protection layer. (or only AV protection layer in some cases)
I do completely understand what you are saying, but you also need to understand that in some places, there are devices that are not controlled by IT and due to some reasons I beyond the scope of this topic, there's nothing that can be done no matter what. In this case the SonicWALL AV and SSL-DPI is very beneficial. It also helps to keep things off the network, not even giving the client devices a chance to get it.
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Good points. Maybe we should have a different thread to talk about the best way to layer security? There seems to be many opinions on how to do it. I am sure it would help a few people. I know it will depend on the environment but well laid out template would at least give you places to start. Its just the same as crafting a program, you have lots to consider and you have plans in place for as many situations as possible. Good idea or not?
-
@jmoore said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
Good security also consists of all easily identifiable holes being covered the best that can be done for a cost that makes sense for the environment. If we deploy all devices with good AV, but there are still devices without it such as personal devices and those we deploy that stop functioning correctly sometimes, it's not a bad thing to use the built-in AV the SonicWALL provides as an additional protection layer. (or only AV protection layer in some cases)
I do completely understand what you are saying, but you also need to understand that in some places, there are devices that are not controlled by IT and due to some reasons I beyond the scope of this topic, there's nothing that can be done no matter what. In this case the SonicWALL AV and SSL-DPI is very beneficial. It also helps to keep things off the network, not even giving the client devices a chance to get it.
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Good points. Maybe we should have a different thread to talk about the best way to layer security? There seems to be many opinions on how to do it. I am sure it would help a few people. I know it will depend on the environment but well laid out template would at least give you places to start. Its just the same as crafting a program, you have lots to consider and you have plans in place for as many situations as possible. Good idea or not?
I agree, lots of good discussion to have there. Go ahead and open a thread.
-
@jmoore said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
Good security also consists of all easily identifiable holes being covered the best that can be done for a cost that makes sense for the environment. If we deploy all devices with good AV, but there are still devices without it such as personal devices and those we deploy that stop functioning correctly sometimes, it's not a bad thing to use the built-in AV the SonicWALL provides as an additional protection layer. (or only AV protection layer in some cases)
I do completely understand what you are saying, but you also need to understand that in some places, there are devices that are not controlled by IT and due to some reasons I beyond the scope of this topic, there's nothing that can be done no matter what. In this case the SonicWALL AV and SSL-DPI is very beneficial. It also helps to keep things off the network, not even giving the client devices a chance to get it.
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Good points. Maybe we should have a different thread to talk about the best way to layer security? There seems to be many opinions on how to do it. I am sure it would help a few people. I know it will depend on the environment but well laid out template would at least give you places to start. Its just the same as crafting a program, you have lots to consider and you have plans in place for as many situations as possible. Good idea or not?
Sounds good.
-
@tim_g said in Arg! The money spent the month before I stated here.:
@jmoore said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
Good security also consists of all easily identifiable holes being covered the best that can be done for a cost that makes sense for the environment. If we deploy all devices with good AV, but there are still devices without it such as personal devices and those we deploy that stop functioning correctly sometimes, it's not a bad thing to use the built-in AV the SonicWALL provides as an additional protection layer. (or only AV protection layer in some cases)
I do completely understand what you are saying, but you also need to understand that in some places, there are devices that are not controlled by IT and due to some reasons I beyond the scope of this topic, there's nothing that can be done no matter what. In this case the SonicWALL AV and SSL-DPI is very beneficial. It also helps to keep things off the network, not even giving the client devices a chance to get it.
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Good points. Maybe we should have a different thread to talk about the best way to layer security? There seems to be many opinions on how to do it. I am sure it would help a few people. I know it will depend on the environment but well laid out template would at least give you places to start. Its just the same as crafting a program, you have lots to consider and you have plans in place for as many situations as possible. Good idea or not?
Sounds good.
Little did I know what getting a little frustration of my chest would spawn! Good discussion to have on a consistent basis.
-
@travisdh1 said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@jmoore said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
Good security also consists of all easily identifiable holes being covered the best that can be done for a cost that makes sense for the environment. If we deploy all devices with good AV, but there are still devices without it such as personal devices and those we deploy that stop functioning correctly sometimes, it's not a bad thing to use the built-in AV the SonicWALL provides as an additional protection layer. (or only AV protection layer in some cases)
I do completely understand what you are saying, but you also need to understand that in some places, there are devices that are not controlled by IT and due to some reasons I beyond the scope of this topic, there's nothing that can be done no matter what. In this case the SonicWALL AV and SSL-DPI is very beneficial. It also helps to keep things off the network, not even giving the client devices a chance to get it.
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Good points. Maybe we should have a different thread to talk about the best way to layer security? There seems to be many opinions on how to do it. I am sure it would help a few people. I know it will depend on the environment but well laid out template would at least give you places to start. Its just the same as crafting a program, you have lots to consider and you have plans in place for as many situations as possible. Good idea or not?
Sounds good.
Little did I know what getting a little frustration of my chest would spawn! Good discussion to have on a consistent basis.
Yeah, this one exploded.
-
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@dashrender said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
@scottalanmiller said in Arg! The money spent the month before I stated here.:
@tim_g said in Arg! The money spent the month before I stated here.:
All AVs are not equal. THere are none with a 100% detection rate. The best AVs miss things the mediocre ones catch, and vice versa.
Right, and I'd argue (and have) that having UTM makes people feel that they don't need to have good AV. But they do, because threats originate often from inside the LAN where the UTM is powerless.
I don't use the UTM because I can't use AV some places, and as an additional layer of protection in a different way... not to make myself feel like I don't need good AV. Maybe other people, but not me.
You're environment is much more likely to be infected by a user's device that shouldn't be on your production network than from some user downloading something that an AV scanner on the UTM is going to detect.
Mostly because devices are allowed to leave the network, get infected, and join again. If the UTM covered them at home, it would be different.
Plus I assume that those devices can be multihomes while in the office to the LAN and to the Cell network (4G) so they might bypass the UTM even while still in the office.
This is where either forcing the wifi to route through the UTM to reach the server network, or having IDS functionality delivered by some sort of SDN controller (Tipping point can tap into open flow) can handle pushing security down as close to that device as possible on the network (So you don't end up with the squishy internal problem).