SOLUTIONS
L7 Networks, with the slogan "Secure Networks At Layer-7", targets at Layer-7 Application Control, Layer-8 Behavior Management and Content Auditing, Layer-9 Content Control, and Layer-10 SSL Content Control & Auditing. With the global unique transparent installation, even without assigning an IP address to the system, the system can help customers manage Layer 7 to Layer 10 easily, and establish secure internet networks.
Monitor not just by reports, but in real-time
Drill-down views of trac in realtime instead of just top reports.
Control not just apps, but behaviors
Control behaviors of apps, such as Line and its login, le download,
le upload, video playback, TV show, voice call, etc.
Record not just sessions, but contents
Audit contents of webmals / webHDs /messengers / social websites.
Filter not just URLs, but secretes
Data loss prevention (DLP) stops privacy leakage via https clouds.
Identify not just IPs, but users
Integrate with Microsoft AD for user-based policy / reports.
Block with global threat centers
Integrate with Microsoft AD for user-based policy / reports.
Assist your Firewall to audit & filter threats inside https.
Problem 1: Filtering Threats Inside Https
Nowadays cloud services and hacker C&C are all encrypted in https connections, causing traditional security solutions fail to lter the contents. Such services include Hacker Cloud (Botnet C&C / APT), WebMail Cloud (Gmail / Outlook / Yahoo Mail), Social Cloud (Facebook /Twitter / Google Plus), WebHD Cloud (Dropbox / Google Drive / One Drive), Messenger Cloud (Line / Skype / Google Hangout / Facebook Chat). Research reports indicate that atleast 60% of the total trac hides in https tunnels. Auditing, ltering, and forensics the content of trac is not easy anymore. It’s time to face the truth
Problem 2: Realtime Drill-Down Trac Ranking into Https Details
Nowadays cloud services and hacker C&C are all encrypted in https connections, causing traditional security solutions fail to lter the contents. Such services include Hacker Cloud (Botnet C&C / APT), WebMail Cloud (Gmail / Outlook / Yahoo Mail), Social Cloud (Facebook)
Problem 3: Ransonware & Condential Data Leakage
Recently many computers are locked by ransomware, meaning anti-virus is not fast enough to defend vulnerabilities. Stopping botnet’s command and control return path with malware sandbox are the last defend line for enterprises.
Problem 4: Auditing Https for Regulatory Compliance
Corporate scandals and breakdowns such as the Enron case have increased calls for stronger compliance and regulations in dierent kinds of industries, such as GDPR,
Sarbanes–Oxley, ISO27000, PCI-DSS, HIPAA, SEC, FINRA, FSA, IIROC, FERC, NERC, CFTC, NFA.
They all require electronic communications to be logged for years for auditing. Of course it is a must to audit https trac since most crime activities hide themselves in encrypted https tunnels.
Solution: User-Unaware Decryption and Digital Forensics
User-unaware installation is extremely important for such auditing tools. InstantCheck® employs transparent mode or proxy mode to install without changing your network architecture. Currently InstantCheck® can lter detailed behaviors and reconstruct mainstream webmail contents (Gmail / Outlook / YahooMail ) webhd contents (Dropbox /One Drive / Google Drive), messenger contents (Line / WeChat / Facebook Chat / GmailChat), social contents (Facebook / Twitter) for network data forensics.
Traffic analysis & QoS by not just reports, but in real-time
Visibility into https
L7 recognizes applications with the DPI (Deep Packet Inspection) technology.
With its unique drill-down real time view of trac, you can easily get a full picture of your network.
Then assign the analyzed result with its dynamic bandwidth borrowing, prioritization, fair queuing, per-ip rate / quota / session controls, and tree-based QoS channels to optimize your trac. Finally, the built-in report engine can bring you fully customizable charts to demonstrate its activeness.
L7 can also track major application’s detailed behaviors for administrators to setup advanced L8 policies. For example, the built-in URL database can classify website trac into 70+ categories. You can assign porn trac to limited QoS channels while news trac to high-bandwidth QoS channels.
Identify not just IP addresses, but with user names
Integration with AD to track users
L7 combines several approaches to integrate with Microsoft Active Directory:
(1) GPO-dispatched end-point agent to report its User-IP mapping every 20s
(2) WMI-based agent registered to AD for interested login events
(3) Auto-AD authentication by NTLM
(4) Auto proxy authentication by NTLM
(5) Captive portal for web login with AD/LDAP/POP3/SMTP/Radius user database
These techniques can work together simultaneously to get the best knowledge of which
user is using which IP address.
Filter not just apps, but behaviors
NGFW controls apps, we control app behaviors
Modern clouds, such as WebMail Cloud (Gmail / Outlook / Yahoo Mail) having login / send / attach / read / download attachment; Social Cloud (Facebook / Twitter / Google Plus) having login / friend post / status / like / video / wall / share; WebHD Cloud (Dropbox /Google Drive / One Drive) having login / le upload / le download; Messenger Cloud (Line / Skype / Google Hangout / Facebook Chat) having login / message / le transfer.
Next-Generation Firewall (NGFW) may have the ability to block separate cloud apps, but NGFWs cannot look into the cloud to control the behaviors inside the cloud. L7 brings you the ability to control behaviors, not just apps.
Record not just sessions, but contents
Regulatory Compliance
Corporate scandals and breakdowns such as the Enron case have increased calls for stronger compliance and regulations in dierent kinds of industries, such as GDPR,
Sarbanes–Oxley, ISO27000, PCI-DSS, HIPAA, SEC, FINRA, FSA, IIROC, FERC, NERC, CFTC, NFA.
They all require electronic communications to be logged for years for auditing. Of course it is a must to audit https trac since most crime activities hide themselves in encrypted https tunnels.
Content recorder for auditing purpose
Traditional & modern cloud apps mentioned above can be traced and recorded for auditing purpose.
Keyword matched contents will alarm auditors to analyze if any policy violation exists. Only permitted account can see privacy data.
Block with global threat centers
Exchange of threat information with global threat centers
Modern attacks have combined a lot of techniques for hackers to control botnets for starting various attacks or stealing condential information. Multiple agencies in the world have contributed some coverage of C&C servers. L7 held the https://blacklisttoal.com to sync with many world-class blacklists to provide the best coverage of global threats.
Malicious IPs are identied with virus names to accurately stop threats immediately
Filter not just URLs, but secretes
Data Loss Prevention (DLP) module stops insider threats
For regulatory compliance to GDPR, Sarbanes–Oxley, ISO27000, PCI-DSS, HIPAA, SEC, FINRA, FSA, IIROC, FERC, NERC, CFTC, NFA, they require electronic communications to be audited and ltered to stop personal identity information (PII). With additional license toenable DLP, L7 can immediately stop confidential data leakage, even via https encrypted web sites.