Securing and Optimizing the Next Generation Branch Office
|
|
- Austen Fletcher
- 8 years ago
- Views:
Transcription
1 Securing and Optimizing the Next Generation Branch Office 1
2 Global Organizations Current state of affairs 3 Globally distributed enterprises rely on the WAN for day to day operations to stay competitive and pursue new business opportunities.
3 Global Organizations Current state of affairs 4 Security breaches and network performance issues can cause havoc.
4 Global Organizations Current state of affairs 5 Branch offices are trying to solve this challenge by deploying multiple single function appliances leading to management overhead.
5 Global Organizations Current state of affairs 6 IT organizations need infrastructure that is high performing, simple to manage and requiring minimal administration.
6 Challenge With Current Solutions 7 Solutions delivering performance and security at the branch are: Complex to setup and manage Expensive to deploy as they require multiple appliances Delivering low performance at the cost of security Performance Security
7 Branch Office The next gen branch office solution must be: Fast: Deliver LAN-like performance and improve productivity Secure: Protect from breaches and network attacks at the branch Low TCO: Consolidate appliances, applications to lower cost and management complexity
8 Riverbed McAfee Joint Solution 9 Fast: Market-leading WAN Optimization solution delivers LAN-like performance Secure: Market-leading Web Gateway solution integrated on RSP Low TCO: RSP enables Branch Office in a Box solution that is easy to manage McAfee Web Gateway Anti-Malware Anti-Virus Web Filtering SSL Scanning Proxy / Cache Global Threat Intelligence
9 Joint Solution Benefits 10 Consolidation Drives Lower TCO: Lower capex: appliances, servers Lower opex: management, training, IT support costs, cooling Investment protection via open platform (RSP) Lower Business Risk Proactive, zero-day Web 2.0 protection in a single software image Improve security and IT compliance (BC/DR, RTO, RPO,WAN backup) Certified integrated solution with joint vendor support Business Agility LAN like performance improves user productivity Flexible deployment options for private, public, or hybrid cloud / data centers Application and identity based policy mirrors your business
10 About Riverbed 11
11 About Riverbed 12 The IT Performance Company for Networks, Applications and Storage Stability Publicly Traded Profitable Partnership Business Presence 9,000 Customers Worldwide 24x7 Support 4-hour parts replacement Thousands of resellers Speed Most L-7 application intelligence Integrated QoS, Visibility Scalability 80% of Global 100 use RVBD Clustering, high-availability options Simplicity Technology Most integration options Leverage existing IT
12 Award-winning Products for Key Performance Problems 13 Cascade Enterprise-wide performance monitoring Solve performance problems up to 83% faster Executive dashboards that link with detailed analysis Perfect for operations, consolidation projects Steelhead WAN optimization Accelerate applications by up to 100x Cut bandwidth utilization by 65-95% Enable consolidation, cloud, and more effective DR Also impacts virtualization, application rollouts, and mobility Whitewater Cloud Storage Accelerator Accelerate backup and recovery from public cloud storage Cut backup costs by 50% or more Solution for storage architects and data protection managers
13 Riverbed s Key Technology Differentiators 14 Acceleration The most complete suite of application-intelligent optimizations up to 100x faster applications Deduplication The most granular data dedupe Save 65-95% of both bandwidth and storage Consolidation A complete consolidation approach Centralization, Branch Virtualization, and Cloud Analytics Full flow & packet based analysis Faster response to problems & better data for your executives
14 Riverbed s High Performance Solution 15 BRANCH OFFICE PRIMARY DATA CENTER WAN MOBILE WORKERS PUBLIC CLOUD SECONDARY DATA CENTER
15 Virtualizing Edge Services with RSP 16 v DNS/ DHCP v AD v Print v The Riverbed Services Platform allows you to virtualize edge services into one device WAN DATA CENTER Tape Backup Storage v v v v v v Filers File Servers Web Servers Mail Servers MOBILE WORKERS RiOS Services Platform (RSP)* A few servers still remain in the branch office Additional equipment requiring power, cooling, and space Branch users still require these services: IPAM, Active Directory, Print, Streaming & Security Print Streamin Services g Media Networki ng (DNS/DHC P) Security UTM
16 About McAfee 17
17 Recognized Industry Leader: McAfee Web Gateway 18 Leader Gartner Magic Quadrant : Secure Web Gateway Leader Forrester Wave: Web Filtering IDC ranks McAfee #1 in Appliance Market Share for web security appliances Network World Magazine Clear Choice Winner for Anti-malware Gateway Dec Readers Choice Award from Information Security Magazine and SearchSecurity.com SC Magazine Awards 2010 Best Anti-Malware Solution Mazu, Profiler, 18 and Cascade McAfee are trademarks Web or Gateway registered trademarks of Riverbed Technology. All other trademarks used or mentioned herein
18 About McAfee 19 Founded in 1987 as the world s largest dedicated security company Global research for real-time threat intelligence Integrated solutions and services Compliance processes built into solutions Single management platform for optimized security
19 McAfee Facts million McAfee users 180+ million mobile devices shipped with McAfee 5 million single largest McAfee deployment 7 Gartner Magic Quadrants that feature McAfee 480 McAfee patents, more pending 110+ McAfee Security Innovation Alliance partners 6,121 McAfee employees globally 120 countries that make up McAfee s global footprint
20 Industry leading solution 21
21 Riverbed supports more application-specific optimizations 22 CIFS, Exchange, HTTP, SSL NFS Encrypted Exchange Lotus Notes Citrix ICA Oracle Forms FCIP SRDF CIFS, Exchange, HTTP, SSL X No NFS X No Encypted Exchange X No Lotus Notes X No Citrix ICA X No Oracle Forms X No FCIP X No SRDF
22 McAfee Web Gateway: Single Integrated Solution with Advanced Security 23 Feature Proxy SG Proxy AV MWG 7 Web 2.0 threat protection Real-time web content ratings On-demand cloud intelligence Web 2.0 mashed up content filtering Inline threat analysis (stream scanning) Social networking threat protection True file type checks Compressed archive analysis File and attachment filtering Hardware based SSL performance * * Not required for MWG, due to high performance without hardware acceleration Mazu, Profiler, 23 The and Cascade Re-engergized are trademarks McAfee or registered Brand trademarks of Riverbed Technology. All June other trademarks 2, 2011 used or mentioned herein
23 Riverbed - McAfee Solution vs. Blue Coat 24 Riverbed-McAfee Best-of-breed offerings for WAN Optimization and Web 2.0 Security VS Blue Coat A security device that uses legacy caching technology to deliver WAN optimization
24 Riverbed - McAfee Solution vs. Blue Coat 25 ProxySG ProxyAV WAN Optimization(+QoS) + McAfee Web Gateway + Anti-malware + Antivirus Simple configuration and easy to deploy PacketShaper Complex site-specific configuration involving multiple appliances
25 ROI - Riverbed-McAfee Solution vs. Blue Coat 26 Director ProxySG ProxyAV Reporter PacketShaper Steelhead w/ RSP + McAfee Web Gateway Riverbed CMC
26 Thank You 27
27 Backup 28
28 McAfee Web Gateway Differentiators: Designed For Web 2.0 SECURITY Hybrid security Local: Proactive anti-malware protection Cloud-based: McAfee AV with file reputation, URL filtering with Web reputation Deep content inspection including SSL traffic CONTROL Inbound / outbound filtering of multiple Web protocols Productive use of Web 2.0: Application control Powerful policy engine Prevent data leakage Extensive reporting/auditing PERFORMANCE Robust proxy / cache Enterprise scalability Flexible delivery: Appliances, VMware, blade Flexible deployment: Proxy, transparent bridge, transparent router Manage multiple Web security components 29 McAfee Web Gateway (Webwasher)
29 Local: Anti-Malware Protection for Web 2.0 ActiveX Controls and Browser Helper Objects Windows Executables and Dynamic Link Libraries Java Applets and Applications JavaScript (in HTML, PDF, Stand-alone) Visual Basic Script Visual Basic for Apps macros in Office docs Intent Analysis: Buffer overflow exploit detection Generic Trojan downloader detection Shell code detection Several other detection algorithms Security Policy Maps Classification Into Action Web 2.0 Anti-malware Engines Must Handle Downloads, Active Content and Scripts, Protect from Malware for Which No Signature Exists, and Prevent OS, Browser And Application Exploits 30 McAfee Web Gateway
30 McAfee Global Threat Intelligence (GTI) Delivering the Most Comprehensive Intelligence in the Market Threat Intelligence Feeds Endpoints Appliances Servers Firewalls Other feeds & analysis McAfee Labs File Reputation Engine Reputation Engine Web Reputation Engine Network Reputation Engine Vulnerability Information epo IPS Firewall Web AV AWL DLP Mobile 31
31 Powerful Rules-Based Engine McAfee Web Gateway includes a powerful policy engine that enables unmatched flexibility in creating and applying policy Enable/disable specific functionality Remove malicious links or extract only the malicious code while letting the balance of the page display Control instant messaging 32 McAfee Web Gateway June 2, 2011
32 Control: Powerful Rules-Based Engine Example Granular control over who uses the application and how it is used Enabling or disabling specific functionality as needed Allow Facebook but block all Games or specific games: Mafia Wars Example below: Using the policy engine to determine if a user can view YouTube videos, and what kind of Videos they may view! 33 June 2, 2011
33 Application acceleration results 34 Problem: Slow application performance across the WAN Solution: Address issues of bandwidth, latency, and chatty protocols *Some application-specific features not yet available for Steelhead Mobile
34 Gartner Magic Quadrant for WAN Optimization Controllers, Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. Andy Rolfe, Joe Skorupa, Severine Real
Today s Web: Business Value Of Web 2.0
Klaus-Peter Kaul PLE Content Security Business Unit CE The Changing Landscape Web 2004/5 2010 Read only Corporate brochures Rich, two-way interaction Web applications Mail Applications Hacker Motivation
More informationBill Ting, Product Marketing Riverbed Technology
Bill Ting, Product Marketing Riverbed Technology Who s Riverbed The IT Performance Company Silicon Valley-based company since 2002, HQ in San Francisco, CA NASDAQ Listed with $727M Revenue in 2011, Growing
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationReverse Proxy for Trusted Web Environments > White Paper
> White Paper ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business
More informationHow To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
More informationMcAfee Web Gateway 7.0
McAfee Web Gateway 7.0 Overview Clive Lutley McAfee System Engineer (NSU) September 23, 2010 What will be covered Market Leading Technology Sample Rules Architecture Options The UI and Concepts 2 September
More informationWeb Application Firewall for Untrusted Web Environments > White Paper
> White Paper ProxySG Web Application Firewall Web-based solutions are being implemented for nearly every aspect of business operations, and these are increasingly under attack within public web access
More informationApplication Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
More informationIntelligent Control with an Application Delivery Network >
White Paper Intelligent Control with an Application Delivery Network > BlueCoat ProxySG and PacketShaper Work Together For Secure and Reliable Application Delivery Across the Enterprise WAN Executive Summary
More informationEXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
More informationCISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
More informationWeb Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationThreat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
More informationVirtualized WAN Optimization
Virtualized WAN Optimization The Road to Cloud Computing Written by: Michael Keen, DABCC.com October, 2009 1 DABCC Opinion Strong market potential and growth in the application delivery and WAN optimization
More informationISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones
ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic
More informationExtending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
More informationSecurity Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationProtect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect
Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationSafeNet Content Security Product Overview. Protecting the Network Edge
SafeNet Content Security Product Overview Protecting the Network Edge From idea to action, SafeNet smartly protects information as it moves through its lifecycle. With data encryption and control solutions,
More informationRiverbed WAN Acceleration for EMC Isilon Sync IQ Replication
PERFORMANCE BRIEF 1 Riverbed WAN Acceleration for EMC Isilon Sync IQ Replication Introduction EMC Isilon Scale-Out NAS storage solutions enable the consolidation of disparate pools of storage into a single
More informationSuperior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
More informationHow To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
More informationAstaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
More informationLab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices
Lab Testing Detailed Report DR131118 January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG 900-20 Secure Web Gateway, Proxy Edition Check
More informationThe Ultimate Guide to Gaining Control of the WAN
LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationRIVERBED EXTENDS FROM WAN OPTIMIZATION TO EDGE VIRTUAL SERVER INFRASTRUCTURE (EDGE-VSI)
SOLUTION PROFILE RIVERBED EXTENDS FROM WAN OPTIMIZATION TO EDGE VIRTUAL SERVER INFRASTRUCTURE (EDGE-VSI) DECEMBER 2011 A year ago, we published an in-depth review of Riverbed s broad suite of WAN optimization
More informationAchieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationApplication Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationMcAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
More informationApplications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationSecuring the Borderless Enterprise
Securing the Borderless Enterprise Websense TRITON Solution The Web 2.0 Workplace: New Opportunities, New Risks Web-enabled technologies are reshaping the modern enterprise. Powerful, cloud-based business
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More informationMicrosoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization
Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization A Riverbed whitepaper Riverbed participated in an early Microsoft TAP program to validate interoperability for Exchange
More informationProviding Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
More informationStallioni Sügisseminar
Stallioni Sügisseminar Juha Poutanen, Territory Manager Websense How to open Internet to your employees safely - managing risks of modern Internet web security data security web security email security
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
More informationReplacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
More informationHow To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationCisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
More informationSTEELHEAD PRODUCT FAMILY
RIVERBED STEELHEAD PRODUCT FAMILY IMPROVE PRODUCTIVITY ANd ENABLE GLOBAL COLLABORATION Today, tens of thousands of organizations rely on WAN optimization as the foundation for delivering application and
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationCisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
More informationishaper Unified Appliance for the Next Generation Branch Office ishaper Packeteer. Great Performance for Every Application at Every Location.
ishaper Fast WAN. Fast Apps. Fast Business. ishaper Unified Appliance for the Next Generation Branch Office Packeteer ishaper marries the best of real-time WAN optimization, monitoring and shaping with
More informationDUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
More informationCHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.
CHECK POINT Software Blade Architecture Secure. Flexible. Simple. softwareblades from Check Point Today s Security Challenge Protecting networks against today s constantly evolving threat environment has
More informationPresented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud
Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the
More informationLab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
More informationTERRE ACTIVE / BLUECOAT ROLAND MARTY WOHIN GEHT DIE REISE. Territory Sales Manager Switzerland. Septembre 2013
WOHIN GEHT DIE REISE TERRE ACTIVE / BLUECOAT ROLAND MARTY Territory Sales Manager Switzerland Septembre 2013 1 NEXT GENERATION SECURITY Headquarters Branch Office Intelligence Internet Control Mobile Users
More informationExecutive Brief on Enterprise Next-Generation Firewalls
Executive Brief on Enterprise Next-Generation Firewalls How security technology can reduce costs, improve compliance and increase employee productivity Enterprise Next-Generation Firewalls protect businesses
More informationNGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
More informationContent-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationEasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks
EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,
More informationGateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
More informationWAN Optimization for Microsoft SharePoint BPOS >
White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal
More informationUNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
More informationNetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
More informationUsing Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER
Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationWhite paper. Keys to SAP application acceleration: advances in delivery systems.
White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional
More informationAPPLICATION DELIVERY
RIVERBED DELIVERY THE FIRST DELIVERY CONTROLLER (ADC) DESIGNED FOR ANY CLOUD OR Greater flexibility VIRTUALIZED ENVIRONMENT GARTNER MAGIC QUADRANT RECOGNITION We re a Visionary in the 2012 Magic Quadrant
More informationSecure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationUnified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
More informationSECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
More informationZscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
More informationSECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
More informationLeading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
More informationCloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
More informationSmart Network. Smart Business. Application Delivery Solution Brochure
Smart Network. Smart Business. Application Delivery Solution Brochure Radware Application Delivery Solution The Best Future-Proof ADC Solution Radware ADC is designed to last. It delivers industry-unique
More informationVirtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
More informationBuilding a better branch office. www.citrix.com
Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch
More informationVMware Horizon Mirage Load Balancing
SOLUTION GUIDE VMware Horizon Mirage Load Balancing Solution Guide Version 1.1 July 2014 2014 Riverbed Technology, Inc. All rights reserved. Riverbed, SteelApp, SteelCentral, SteelFusion, SteelHead, SteelScript,
More informationAcceleration, Optimization, Security and the Data Center: Application Delivery s Next Step
Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step Robin Layland Layland Consulting April 2009 The economic downturn is putting pressure on IT to reduce costs and
More informationSecurity Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
More informationWHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
More informationWindows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity
More informationESET Security Solutions for Your Business
ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep
More informationSYMANTEC ENTERPRISE SOLUTION STRATEGY
ENTERPRISE STRATEGY IT OPERATIONS STORAGE MANAGEMENT CONTINUITY Data Center Automation pg 3 Veritas Cluster Server Veritas Server Foundation Veritas Application Director Veritas Configuration Manager Veritas
More informationOmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
More informationWebsense Web Security Solutions
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people
More informationWAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
More informationMcAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
More information