Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP

Size: px
Start display at page:

Download "Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP"

Transcription

1 Company Overview Dima Kumets, Product Manager Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP Infrastructure: 13 data centers, 100% uptime Security Product Line: New security service - Umbrella by OpenDNS (November 2012) #1 Mar-27-13

2 Company Overview Dima Kumets, Product Manager Agenda Challenges in security in EDU Umbrella technical overview Umbrella dashboard Q&A #2 Mar-27-13

3 IT for Education has changed PAST TODAY COMPUTER LABS WI-FI EVERYWHERE MANAGED DESKTOPS LAPTOPS AND BYOD SINGLE PLATFORM MULTI OS AND PLATFROM 1_Light Title Only LIMITED BANDWIDTH EXPLODING BANDWIDTH 100% ON PREM ROAMING USERS #3 Mar Mar Umbrella Confidential

4 Challenges in Education IT Growing bandwidth High Performance Malware Botnets BYOD CIPA Compliance Laptops roaming off premises Needs Challenges #4 Mar Umbrella Confidential

5 Security in the past Got a problem? Buy a box. Increasing bandwidth? Add a box New campus? Add a box Increased enrollment? Add a box 1_Light Title Only Box too slow? Add a box Adding more servers? Add a box More reports to store? Add a box Boxes start to break? Add a box New ports to protect? Add a box Managing too many boxes? Add a box to manage boxes #5 Mar Umbrella Confidential

6 Security Appliances Growing demands are putting IT on a security appliance treadmill And your users? They've left the building. #6 Mar-27-13

7 What is Umbrella? Malware and Botnet protection with BYOD support and AD Integration Mobile Protection for ios and Android Roaming protection for employees and students Web filtering for any device connecting to guest Wi-Fi Web filtering 59+ categories, blacklists, whitelists and bypass feature. Web dashboard easy to use, manage policy, deploy new identities and view reports anywhere Malware and botnet protection prevents infection and blocks bots from reaching command & control points. Zero downtime since launch in 2006 with global data centers and bgp routing #7 Mar-27-13

8 OpenDNS Enterprise Global Network London, UK Telehouse North Amsterdam, NL TeleCity 1 Frankfurt, DE Equinix Frankfurt Seattle, US The Westin Building Palo Alto, US Switch & Data Los Angeles, US Equinix Los Angeles Chicago, US 350 E. Cermak New York, US 111 8th Ave Ashburn, US Equinix Ashburn Tokyo, JP Datacenter TBD Hong Kong, HK Mega iadvantage Dallas, US Dallas Infomart Miami, US Nap of the Americas Singapore, SG Equinix Singapore Sydney, AU Datacenter TBD Point of Presence (PoP) Private Peering Datacenter TODAY PLANNED Sao Paulo, BR Datacenter TBD Globally distributed servers at 13 PoPs with more planned using Anycast IPs with BGP routing and the best peering in the industry. Built from the ground-up for reliability and 100% uptime. #8 Mar-27-13

9 Cloud Architecture: Under the hood Policy Reporting DNS Query Internet No bottlenecks Campus Network Permitted Domain DNS Response Real-Time Threats Malware, Botnet AUP Violations Roaming Users Custom Block Page Real-time Threats and domain categorization is 100% in the cloud. No bottlenecks DNS with protection is faster than plain ISP or carrier DNS. Unprecedented Scale No bandwidth constraints or sizing guides. Full coverage Any and all devices on the network. Roaming users protected using lightweight agent. #9 Mar-27-13

10 Umbrella Enterprise for EDU Network Wide Coverage Protection for any device connecting to the campus network IT managed devices with zero touch deploy Full BYOD coverage including Mac, Windows, tablets, game consoles, etc Block page bypass allow privileged users to bypass blocking without software Deploy in minutes Interoperability certified Enter External IP range in Umbrella dashboard Set DHCP DNS to our IPs Alt - forward :53 to OpenDNS Aruba IPs Campus Integrated OpenDNS login in Virtual controller Virtual controller self configures using API calls to Umbrella Aruba Instant Local recursive DNS Forward DNS to OpenDNS Enter External IP range in Umbrella dashboard Local DNS Cache with OpenDNS Local DNS #10 Mar-27-13

11 Umbrella Insights for EDU Active Directory Integration Group based policy with ranked rules Per-user reporting with roll-ups per group and organization wide Full coverage. Non-AD users protected with default policy Internal IP/IP range based rules available Pre-configured VM, Connector and config files downloaded from dashboard Insights Linux VM for VMWare ESXi forwards DNS Connector on DC cloud sync for users +groups Pre-configured downloads Monitoring from Umbrella Dashboard Active Directory Group #11 Mar-27-13

12 Umbrella Everywhere for EDU Off Network Protection Lightweight agent for Windows and Mac Identification only via EDNS all policy and lists are in the cloud Location aware policy allows different policy on-network vs roaming Security without performance impact Deploy using GPO or RMM in minutes msiexec /i RoamingClient_WIN.msi /qn ORG_ID=<Organization> ORG_FINGERPRINT=<hash> USER_ID=<who is deploying>hide_ui=<0 or 1 for systray icon and notifications> Windows Small MSI Runs as a service CLI or interactive install Mac Small pkg Runs as a service CLI or interactive install Windows Agent OS X Agent #12 Mar-27-13

13 Umbrella Everywhere for EDU Mobile Protection VPN profile for ios devices Deployed via app or MDM Full encryption to protect against man in themiddle Policy enforcement in the cloud ios VPN profile Optional App Android Beta soon Encryption and malware protection ios Android #13 Mar-27-13

14 Umbrella: Customer Highlights MSP & MANAGED WI-FI RETAIL & GUEST WI-FI ENTERPRISE S & SMBs COLLEGES & UNIVERSITIE S K-12 SCHOOLS #14 Mar-27-13

15 Case Study: Network Maine Protected: 188,000+ students at 1,000+ schools and libraries in Maine Customer since: 2010 Why they re using Umbrella: Protection against malware and botnets, web filtering, CIPA Compliance Problem: Hardware solution scaling issues with growing adoption and bandwidth WHAT THEY RE SAYING Our previous content filtering solution was the Achilles heel for the network. Anytime it had a performance problem it was felt everywhere since all http traffic went through these appliances. With Umbrella Enterprise we no longer have to worry about performance or scalability. Jeff Letourneau, Executive Director #15 Mar-27-13

16 Case Study: George Washington University Protected: 25,000 students, 1,600 full-time staff, 3 campuses, many satellite locations. Customer since: 2011 Why they re using Umbrella: Protection against malware and botnets, elimination of appliance management and maintenance, thorough yet easy-to-manage network protection at multiple locations Problem: Finding a powerful solution to fight the increase in malware infections. Appliances required too much time to manage and scale. WHAT THEY RE SAYING Rather than having to put one-off rules into an appliance to allow for exceptions, we can easily assign local technical people the authority to change rules on their own networks in Umbrella. Matthew Wollenweber, Senior Computer Forensics Information Security System Engineer #16 Mar-27-13

17 Umbrella Dashboard Configure

18 Umbrella Dashboard - Policy #18 Mar-27-13

19 Umbrella Dashboard - Identity #19 Mar-27-13

20 Umbrella Dashboard - Identity #20 Mar-27-13

21 Umbrella Dashboard - Identity #21 Mar-27-13

22 Umbrella Dashboard Security #22 Mar-27-13

23 Umbrella Dashboard - Categories #23 Mar-27-13

24 Umbrella Dashboard Blacklist/Whitelist #24 Mar-27-13

25 Umbrella Dashboard - Customization #25 Mar-27-13

26 Umbrella Dashboard Reporting

27 Umbrella Dashboard - Reporting #27 Mar-27-13

28 Umbrella Dashboard - Reporting #28 Mar-27-13

29 Umbrella Dashboard - Reporting #29 Mar-27-13

30 Umbrella Dashboard - Reporting #30 Mar-27-13

31 Q&A Contact: Dima Kumets, Product Manager - dima@opendns.com Free Trial for Airheads salesinfo@opendns.com OpenDNS Confidential

DUBEX CUSTOMER MEETING

DUBEX CUSTOMER MEETING DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE

More information

SECURALIVE WEB SECURITY GATEWAY

SECURALIVE WEB SECURITY GATEWAY SECURALIVE WEB SECURITY GATEWAY allows you to filter users DNS queries using filtering categories and black and white lists of forbidden hosts. On access to a particular site being denied through DNS filtering,

More information

We license by the total # of users with Internet access. No, but you may contact us anytime you need to increase your license count.

We license by the total # of users with Internet access. No, but you may contact us anytime you need to increase your license count. Frequently Asked Questions Get Instant Answers. In order to make sure you have all the information you need about Umbrella, we ve compiled answers to the most common questions we hear. If we didn t answer

More information

Enterprise Buyer Guide

Enterprise Buyer Guide Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight

More information

Four Reasons To Outsource Your DNS

Four Reasons To Outsource Your DNS Four Reasons To Outsource Your DNS Your company s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today s slightly

More information

Internet Security for Remote Users

Internet Security for Remote Users Internet Security for Remote Users ABSTRACT: This document explains the advantages of cloud-based Internet security services for remote/mobile email and Web users. Traditional gateway or in-house security

More information

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront Delivering Media from the Cloud Alex Dunlap Senior Manager, Amazon CloudFront Agenda Today we will: Provide a brief introduction to Amazon CloudFront. Examine common needs and challenges we ve seen from

More information

Dell World Software User Forum 2013

Dell World Software User Forum 2013 Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably

More information

SoftLayer: Introduction

SoftLayer: Introduction SoftLayer: Introduction Kim Mortensen SoftLayer & Cloud Managed Services ITS Channel Sales Denmark kim@dk.ibm.com 2013 IBM Corporation IBM cloud offerings Cloud Managed Services Formerly (SCE+) Have it

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation

Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation Softlayer An IBM company Team-Enablement 5th September 2013 SoftLayer has a global footprint 13 data centers 17 network PoPs Global private network 685 employees (25 in Europe, o/w 4 Sales) 2013 Projected

More information

Microsoft 70-696 Exam

Microsoft 70-696 Exam Volume: 86 Questions Topic 1: Proseware, Inc. 8 Topic 2: Litware, Inc. 14 Topic 3: Contoso, Ltd. 7 Topic 4: Fabrikam, Inc. 13 Topic 5: Mix Questions 44 Topic 1, Proseware, Inc. Case Study Overview General

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

A Secure Cloud Platform For egaming

A Secure Cloud Platform For egaming A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming mark.stuchfield@jtglobal.com consultancy voice & data cloud & hosted solutions internet security

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Networks. Sites and Internal Networks: Setup Guide. Sites and Internal Networks Setup Guide for Umbrella Page 1

Networks. Sites and Internal Networks: Setup Guide. Sites and Internal Networks Setup Guide for Umbrella Page 1 Active Directory Sites and Internal Networks Sites and Internal Networks: Setup Guide Sites and Internal Networks Setup Guide for Umbrella Page 1 Overview Internal Networks allows to you manage your Umbrella

More information

Compliance Ready Mobile Device Management (MDM)

Compliance Ready Mobile Device Management (MDM) Presenting Network Security Solutions: Compliance Ready Mobile Device Management (MDM) Presenters: Your Name iboss Network Security Your Title Background on iboss Network Security Over Nine Years of Engineering:

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD Copyright 2015 DNS Made Easy. All Rights Reserved. Copyright 2015 Tiggee LLC. All Rights Reserved. WE ARE

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

Sophos Cloud and Partner Dashboard Jonathan Shaw

Sophos Cloud and Partner Dashboard Jonathan Shaw Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming

More information

Active Directory Integration: Install and Setup Guide. Insights

Active Directory Integration: Install and Setup Guide. Insights Active Directory Integration: Install and Setup Guide Insights This guide explains how to install and configure the Active Directory Components provisioned and maintained from the Umbrella Dashboard with

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

Using ArcGIS for Server in the Amazon Cloud

Using ArcGIS for Server in the Amazon Cloud Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Company Overview. October 2014

Company Overview. October 2014 Company Overview October 2014 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus What Does Black Lotus Do? We are a security company that protects businesses

More information

EVERYBODY S NETWORK CLOUD

EVERYBODY S NETWORK CLOUD PRIVATE INTERNET WAN PUBLIC CONNECT PARTNERS SERVICE PROVIDER CLOUD EVERYBODY S NETWORK CLOUD THE WIN-WIN WAN MARKET CONTEXT The cloud is the new IT architecture for enterprises. 85% of global IT decision-makers

More information

Generating leads with Meraki's Systems Manager. Partner Training"

Generating leads with Meraki's Systems Manager. Partner Training Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5

Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5 Enterprise Insights Active Directory Integration: Installation and Setup Guide v1.0.5 This guide explains how to install and configure the Active Directory Components provisioned and maintained from the

More information

Monitoring & Measuring: Wi-Fi as a Service

Monitoring & Measuring: Wi-Fi as a Service Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

How To Set Up Egnyte For Netapp Sync For Netapp

How To Set Up Egnyte For Netapp Sync For Netapp Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...

More information

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013

More information

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014 Equinix Cloud Exchange Datacenter Forum Stephane Buchs, IMS 17 th September 2014 Largest carrier-neutral data center provider Market Challenge Expanding addressable market; ensuring consistent performance

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

MTP. MTP AirWatch Integration Guide. Release 1.0

MTP. MTP AirWatch Integration Guide. Release 1.0 MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect 1 Pega as a Service Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect This information is not a commitment, promise or legal obligation to deliver any material,

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery

More information

Meraki: Introduction to Cloud Networking

Meraki: Introduction to Cloud Networking Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

VMware End User Computing Horizon Suite

VMware End User Computing Horizon Suite VMware End User Computing Horizon Suite Luc Gallet lgallet@vmware.com 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

How To Use An Ibm Cloud Server For Business

How To Use An Ibm Cloud Server For Business SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company 2014 IBM Corporation Executive summary Early cloud models shared, virtualized resources are no longer enough to achieve

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Virtualization in Enterprise Environment. Krisztian Egi

Virtualization in Enterprise Environment. Krisztian Egi Virtualization in Enterprise Environment Krisztian Egi Session Outline Virtualization technology overview Challenges in enterprise environment Q & A 2 Virtualization technology overview What s virtualization

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Meraki Wireless Solution Comparison

Meraki Wireless Solution Comparison Meraki Wireless Solution Comparison Why Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without training or dedicated staff Centrally manage thousands

More information

VMware vsphere 5.0 Evaluation Guide

VMware vsphere 5.0 Evaluation Guide VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....

More information

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Paul Cochran - Account Manager. Chris Czerwinski System Engineer Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional

More information

Putting Web Threat Protection and Content Filtering in the Cloud

Putting Web Threat Protection and Content Filtering in the Cloud Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to

More information

The Evolution of Media Workflows

The Evolution of Media Workflows The Evolution of Media Workflows 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com,

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

Introduction to Cloud Networking. Meraki Solution Overview

Introduction to Cloud Networking. Meraki Solution Overview Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of

More information

Connect - Transit, IP-VPN & Metro Services

Connect - Transit, IP-VPN & Metro Services Connect - Transit, IP-VPN & Metro Services Network services connecting every area of your business It s your data and at UKSolutions we realise the importance of it as much as you do. We operate a next

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people

More information

Roaming Client: Deployment Guide for Umbrella. Roaming Client

Roaming Client: Deployment Guide for Umbrella. Roaming Client Roaming Client: Deployment Guide for Umbrella Roaming Client Overview The Roaming Client serves to protect laptops regardless of where they are in the world or how they connect to the Internet. The client

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

overview Introductions Code 42 Reinventing Q&A backup

overview Introductions Code 42 Reinventing Q&A backup overview Introductions Code 42 Reinventing Q&A backup >. Joe Wall CRASHPLANPROe Enterprise Client List SOFTWARE HARDWARE CLOUD Backup: reinvented A Revolution in Enterprise Protection About Code 42 The

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Deployment Guide for Microsoft Lync 2010

Deployment Guide for Microsoft Lync 2010 Deployment Guide for Microsoft Lync 2010 Securing and Accelerating Microsoft Lync with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...3

More information