All language subtitles for 3. Next Generation Firewall and IPS

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese Download
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,230 --> 00:00:09,720 In this section we are going to take a look to the next generation firewalls and the IP guys firewalls 2 00:00:09,810 --> 00:00:14,510 are as standard security tool for the majority of companies. 3 00:00:14,520 --> 00:00:23,010 But in today's changing threat landscape next generation firewalls are the only firewalls that can provide 4 00:00:23,040 --> 00:00:24,990 proper protection. 5 00:00:25,060 --> 00:00:31,940 The former firewalls were just able to perform some protocol inspections and port inspections. 6 00:00:32,220 --> 00:00:41,990 But these did pack inspection firewalls are moving beyond Port protocol inspection and blocking to add 7 00:00:42,000 --> 00:00:49,560 the application level inspection intrusion probation and bragging bringing intelligence from outside 8 00:00:49,560 --> 00:01:00,080 the firewall so as the name suggests next generation firewalls are a more advanced version of the traditional 9 00:01:00,080 --> 00:01:02,800 firewall and they offer some benefits. 10 00:01:02,810 --> 00:01:11,180 But next generation firewall has some advanced features like regular firewalls next generation firewall 11 00:01:11,180 --> 00:01:19,490 use both static and dynamic packet filtering and weeping and support to ensure that all connections 12 00:01:19,520 --> 00:01:28,040 between the network internet and firewall are valid and secure both firewall types should also be able 13 00:01:28,040 --> 00:01:34,100 to translate to network and port addresses in order to map eyepiece. 14 00:01:34,100 --> 00:01:41,430 There are also fundamental differences between the traditional firewall and next generation firewalls. 15 00:01:41,450 --> 00:01:50,120 The most obvious difference between the two is next generation firewalls ability to filter packets based 16 00:01:50,240 --> 00:01:52,560 on application skies. 17 00:01:52,640 --> 00:02:01,280 These firewalls have extensive control and visibility of applications that is able to identify using 18 00:02:01,360 --> 00:02:04,130 analysis and signature matching. 19 00:02:04,160 --> 00:02:12,230 So that means for example a if you want to block Skype in a network or if you want to block Facebook 20 00:02:12,230 --> 00:02:19,670 in a network or any other application you can do it with the next generation firewall which is not possible 21 00:02:19,670 --> 00:02:23,210 to do it with a traditional firewall. 22 00:02:23,210 --> 00:02:32,600 And also they can use swipe lists or a signature based IP as to distinguish between safe applications 23 00:02:32,630 --> 00:02:39,410 and unwanted ones which are then identified using SSL decryption. 24 00:02:39,410 --> 00:02:48,170 Unlike most traditional firewalls next generation firewalls also include a path through which feature 25 00:02:48,170 --> 00:02:50,810 updates will be received. 26 00:02:50,810 --> 00:02:58,820 And let's go ahead with the benefits of next generation firewalls and next generation firewall performs 27 00:02:58,850 --> 00:03:05,380 traditional firewall features like state for firewall filtering net and VPN termination. 28 00:03:05,510 --> 00:03:12,270 And it's also providing us application visibility and control. 29 00:03:12,290 --> 00:03:18,900 This feature looks deep into the application layer data to identify the application. 30 00:03:19,100 --> 00:03:27,650 For instance it can identify the application based on the data rather than put number to defend against 31 00:03:27,800 --> 00:03:31,370 attacks that use random port numbers. 32 00:03:31,370 --> 00:03:41,180 Next Generation firewall also provide advanced malware protection guys and GSW platforms through multiple 33 00:03:41,180 --> 00:03:50,540 security services not just as a platform to run a separate service but for better integration of functions 34 00:03:50,990 --> 00:03:59,210 and network based anti malware function can run on the firewall itself blocking the files files transfers 35 00:03:59,240 --> 00:04:05,900 that will install malware and saving copies of files for later analytics. 36 00:04:05,900 --> 00:04:13,920 Also next generation firewalls can provide you are L filtering this feature exam mines. 37 00:04:13,940 --> 00:04:14,720 There you are. 38 00:04:14,720 --> 00:04:24,050 Else in each rep request categorizes the URLs and either filters or rape limits the traffic based on 39 00:04:24,050 --> 00:04:25,790 rules. 40 00:04:25,820 --> 00:04:35,450 Also next generation firewalls can run their NGO IP as next generation IP as feature along with their 41 00:04:35,450 --> 00:04:36,160 firewall. 42 00:04:36,770 --> 00:04:45,830 Let's talk about the IP as intrusion prevention system also an IP address is a network security threat 43 00:04:45,920 --> 00:04:53,930 prevention technology that Exim minds the network traffic flows to detect and prevent vulnerability 44 00:04:54,020 --> 00:05:03,050 exploits while durability exploits usually come in the form of malicious inputs to a target application 45 00:05:03,080 --> 00:05:12,380 or service that attackers use to interrupt and gain control of an application or mission following a 46 00:05:12,380 --> 00:05:20,780 successful exploit the attacker can disable the target application or can potentially access to all 47 00:05:20,780 --> 00:05:30,410 the rights and permissions available for the compromised the application the IP is guys often sits directly 48 00:05:30,410 --> 00:05:39,800 behind the firewall and provides a complementary layer of analyses that negatively selects for the dangerous 49 00:05:39,800 --> 00:05:49,430 content and also I need to tell this one a IP as is not as separate hardware in today's networks and 50 00:05:49,490 --> 00:06:00,520 most of are integrated the fire was so unlike its predecessor the intrusion detection system idea as 51 00:06:01,150 --> 00:06:06,690 which is a passive system that scans traffic and reports back on threats. 52 00:06:06,760 --> 00:06:15,670 The eyepiece is placed to inline actively analyzing and taking automated actions on all traffic flows 53 00:06:15,700 --> 00:06:17,480 that enter the network. 54 00:06:17,590 --> 00:06:27,250 Specifically these actions include like sending an alarm to administrator dropping the malicious packets 55 00:06:27,550 --> 00:06:36,040 blocking traffic from the source address and resetting the connection as an inline security component. 56 00:06:36,040 --> 00:06:43,010 The IP is must work efficiently to avoid degrading network performance. 57 00:06:43,060 --> 00:06:49,830 It must also work fast because exploits can happen in near real time. 58 00:06:49,960 --> 00:06:59,020 The IP address must also detect and respond accurately so as to eliminate threats and false positives 59 00:07:02,580 --> 00:07:09,930 and the IP as guys has a number of detection methods for finding exploits. 60 00:07:09,930 --> 00:07:17,880 But signature based detection and statistical anomaly based detection are the two dominant mechanisms 61 00:07:18,450 --> 00:07:27,570 signature based detection is based on a dictionary of uniquely identifying patterns or signatures in 62 00:07:27,570 --> 00:07:33,690 the code of each exploit as an exploit is discovered. 63 00:07:33,840 --> 00:07:41,960 It is signature is recorded and stored in a continuously growing dictionary of signatures. 64 00:07:42,090 --> 00:07:47,790 Signature detection for IP is breaks down into two types. 65 00:07:47,790 --> 00:07:50,930 First exploit facing signatures. 66 00:07:50,970 --> 00:08:00,000 Identify individual exploits by triggering on the unique patterns of a particular exploit attempt. 67 00:08:00,000 --> 00:08:08,400 The IP address can identify specific exploits by finding a match with an exploit facing signature in 68 00:08:08,400 --> 00:08:10,080 the traffic stream. 69 00:08:10,080 --> 00:08:18,450 And second while liability facing signatures are broader signatures that target the underlying vulnerability 70 00:08:18,450 --> 00:08:21,730 in the system that is being targeted. 71 00:08:21,840 --> 00:08:29,490 These signatures allow the networks to be protected from variants of an exploit that may not have been 72 00:08:29,820 --> 00:08:39,090 directly observed in the wild but also raise the risk of false positives and also IP as can provide 73 00:08:39,090 --> 00:08:41,680 statistical anomaly detection. 74 00:08:42,000 --> 00:08:50,760 Statistical anomaly detection takes samples of network traffic at random and compares them to a pretty 75 00:08:50,760 --> 00:08:53,630 calculated baseline performance level. 76 00:08:53,630 --> 00:08:55,690 That is a really really cool feature. 77 00:08:55,700 --> 00:09:04,620 Guys when the sample of network traffic activity is outside the parameters of baseline performance the 78 00:09:04,660 --> 00:09:08,040 eyepiece takes action to handle the situation. 9197

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.