Premier Partner Technology Dinner
|
|
- Caren Sherman
- 8 years ago
- Views:
Transcription
1 Premier Partner Technology Dinner Aruba Networks, Gigamon, NetApp, & Palo Alto Networks Fogo De Chao, Baltimore, MD September 25 th, 2014
2 Key Take Away s Headquartered in Malvern, PA with offices in NYC & MD Technical Staff includes 20 Engineers and Consultants Average industry tenure of years Continuous training and education, multi-vendor Partner with Best in Class technology vendors Technology practices include: Security, Wireless, Storage, Virtualization, WAN Optimization All vertical and client sizes
3 GigaVUE-HC2 Visibility Fabric Node 2014 Gigamon, Inc. All rights reserved. 3
4 The Gigamon Traffic Visibility Fabric A Revolutionary Way to Securely Access Critical Data at a Fraction of the Cost Enhances the Visibility of all Full Packet Based Data Anywhere on the Network Lowers the Total Cost of Network Monitoring, Security and Compliance 2014 Gigamon, Inc. All rights reserved. 4
5 Top 10 Reasons for Gigamon Problems we Solve 1 Eliminate Span Port Contention 6 Enable Centralized Monitoring Prevent span port shortages from hindering troubleshooting & diagnostics or forcing choices between which tool can be used. Provide a centralized pool of monitoring tools with access to traffic from a large number of network links Monitor 10 Gbps Network with 1 Gbps Tools up to 100 Gbps / 40 Gbps Enable 1 Gbps tools to support 10 Gbps links, and 10 Gbps tools to monitor traffic aggregated from multiple 1 Gbps links. Maximize Network Tool Utilization Ensure tools are fully utilized by mapping data from many network access points to the tools Increase Network Visibility Points Gain access to many network access points (taps/spans) allow the entire network to be mapped to all tools Prevent Tool Oversubscription Ensure only the data that matters is mapped to the tools by prefiltering and mapping the appropriate traffic flows to the tools Reduce Management Complexity Complete data access through patented flow mapping simplifying change control, security burden, and IT group contention. Increase Operational Agility Simplify sharing of network access points, data, and tools among IT groups. Reduce Operational Costs Eliminate or delay tools upgrades, expedite troubleshooting and diagnostics, simplify data access burden, and enable infrastructure upgrades. Completely Open Architecture Our solution is agnostic to all tools, infrastructure, and vendors with the market leading scalability, density, and reliability Gigamon, Inc. All rights reserved Gigamon, Inc. Company Confidential 5
6 The GigaVUE-HC2 Node Flexible Visibility Addressing IT Needs 2014 Gigamon, Inc. All rights reserved. 6
7 GigaVUE-HC2 Modular & Flexible, Multi-Functional GigaVUE HC Series Visibility Node TAPs TAPs TAPs TAPs Aggregation Packet Slicing NetFlow Generation Replication Future Modules & Software Future Possibilities Load Balancing/ Streaming The GigaVUE H Series already enjoys high-density and scalability Out-of-Band De-duplication Multi-purpose capabilities are required for optimized visibility 2014 Gigamon, Inc. All rights reserved. 7
8 Introducing GigaVUE H Series GigaVUE (High Capacity) Node Product Family: Product: Target markets: Specifications: Fully-capable GigaVUE H Series node 2RU medium-sized chassis exceeding 1Tb throughput Highly modular (4 Bays in front / 1 GigaSMART Bay in rear) GigaSMART capable (Rear) Modules for: 10Gb, 40Gb, TAPs 2014 Gigamon, Inc. All rights reserved. 8
9 GigaVUE-HC2 Overview Front to Back Airflow Mgmt and Control ports Four Modular Bays for Front Ports, TAPs, etc. Redundant, Load-sharing Power Supplies Rear Fan Tray (blowing out) Removable Control Card Tray (behind Fans) Rear GigaSMART 2014 Gigamon, Inc. All rights reserved. 9
10 GigaVUE HC2 Bypass Modules: Key Capabilities Physical and Logical Bypass Protection for inline tool deployments Simultaneous inline and out-of-band tool support Bypass Options: One-to-One: Sending traffic to a single inline tool One-to-Many: Distributing inline traffic across multiple inline tools Bi-directional customizable heartbeats for monitoring health of inline tool Network link status propagation: allows failover to redundant path Selectable actions on inline tool failure: Forward traffic into network, bypassing the inline tool Bring network links down, allowing failover to redundant network path Drop traffic 2014 Gigamon, Inc. All rights reserved. 10
11 Active Visibility for Multi-Tiered Security A Better Approach to Integrated Security NetFlow Collector Intrusion Detection System GigaSMART Edge Router GigaStream Out-of-Band Malware Intrusion Prevention Systems Core Switch Saves Time Saves Money Improved Reliability Protects Traffic Throughput Integrates Best-of-Breed Solutions 2014 Gigamon, Inc. All rights reserved. Page 11
12 Introducing GigaVUE HC Series GigaSMART Module Introducing Target Market Benefits Details: 40Gb GigaSMART front processing per module Includes 16 fully functional 10Gb cages Up to 200 Gbps compute and 64 x 10Gb per GigaVUE-HC Gigamon, Inc. All rights reserved. 12
13 GigaVUE HC Series Modules - Rear GigaSMART A Key Component of the Product 40Gb Rear GigaSMART Offering everything from De-Duplication to NetFlow Generation 2014 Gigamon, Inc. All rights reserved. 13
14 Unified Visibility Fabric Architecture Applications Write Read Management Flexible GUI and central provisioning of Fabric Nodes across physical, virtual, and future SDN islands Write Read Orchestration Write Read Services Slicing Masking Tunnel Time Stamp Load Balance Header Stripping Adaptive Packet Filtering Write Read API/SDK Visibility Fabric Nodes Pervasive visibility across physical (corporate to remote) virtual, and future SDN production networks GigaVUE-2404 GigaVUE-420 GigaVUE-212 G-SECURE-0216 GigaVUE-HD8 GigaVUE-HD4 GigaVUE-HC2 GigaVUE-HB1 TAPs & Aggregators G-TAP G-TAP A Series GigaVUE-TA1 Read Write Applications & Tools Infrastructure, User Community 2014 Gigamon, Inc. All rights reserved. 14 = Future Availability
15 Active Visibility for Multi-Tiered Security Internet GigaVUE-HB1 Server/ Virtual Farm Regional Centers Core Switches Distribution Switches VISIBILITY FABRIC ARCHITECTURE OUT-OF-BAND INLINE GigaVUE-HC2 with Bypass Module GigaVUE-HD8 IPS ANTI- MALWARE FILE ACTIVITY MONITORING SECURITY ANALYTICS SIEM DLP IDS Access Switches APM 2014 Gigamon, Inc. All rights reserved. 15
16 Secure Enterprise Mobility Aruba ClearPass Presenter Name and Title CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
17 Todays Secure Mobility Challenges Lack of Policy Solution, Access from Anywhere Unmanaged BYOD use Open Guest Wi-Fi CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
18 The ClearPass Platform Expandable Applications Guest Onboard OnGuard ClearPass Baseline Hardware or VM Appliances (500, 5,000 or 25,000) Remote Location CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
19 What s Needed: Policy Management as Foundation Policy with built-in AAA Services Better decisions based on context - access method, user, device status or location Comprehensive Feature Set Manage all security services from a single platform Granular Authentication Methods Leverage multiple identity stores and auth methods to fit any use case Login/password, certificates CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
20 AAA to Policy Examples Employees receive access to resources from anywhere based on ClearPass defined policy Staff no longer uses preshared keys for Wi-Fi as ClearPass delivers secure login services per user 14K+ Personnel in 100+ Offices Multi-site Magnet Hospital, Northeast U.S. CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
21 Personal devices create IT burden and security gaps CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
22 Solution: Secure Automated Workflows Employee Self-Service Configuration Users self-configure network settings and certificates without IT involvement Built-in Certificate Authority Automatically create and distribute device certificates without using internal PKI. Simple for users Integrate with Device Management Use MDM/EMM data to enforce wireless and wired privileges no jailbroken devices CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
23 Secure Onboarding Examples Physicians self-configure personal devices using ClearPass Onboard for secure Wi-Fi access Over 20 Facilities, 2600 Physicians Simplified certificate distribution for close to 50K BYOD user via ClearPass Onboard ~50000 Endpoints, Multinational Financial CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
24 Open guest networks leave security gaps and provide no visibility CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
25 Solution: Captive Portals, Per User Registration Guest Login Portal Workflows Each guest receives their own credentials or acknowledge acceptance of use Self or Sponsor Approved Registration Authorized access with full reporting and session controls for Wi-Fi / Wired Complete Customization IT can capture visitor information, cache MAC addresses, display ads, alter access privileges CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
26 Guest Access Services Standard and High Capacity Guest (HCG) Sponsor privileges with access verification Self-service Per session controls Automated SMS/ credential delivery Little IT involvement No more wide-open SSIDs and shared keys! CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
27 Recognized as an Industry Leader Leader: 2013 Wireless LAN MarketScape Leader: 2013 Network Access Control Magic Quadrant Leader: 2014 Wired & Wireless Magic Quadrant CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
28 Key Takeaways Security for wired and wireless access Single point of management for multivendor networks Simplified IT and user experience CONFIDENTIAL Copyright Aruba Networks, Inc. All rights reserved
29 THANK YOU
30 Product & Solutions Portfolio Overview NetApp Confidential - Internal Use Only
31 Industry Trends Flash Cloud Software Defined Data Center Converged Infrastructure Mobility NetApp Confidential - Internal Use Only 31
32 GK The Changing Role of IT NetApp Confidential Limited Use 32
33 GK NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 33
34 Clustered Data ONTAP & FAS Unified Scale-out Storage NetApp Confidential - Internal Use Only 34
35 Clustered Data ONTAP FAS System Highlights Unified architecture optimizes storage utilization Same hardware supports both SAN and NAS Single operating system Single management infrastructure Scale to 69PB and 2.6M IOPS % availability, zero planned downtime FAS2500 FAS8000 Comprehensive flash integration, server to array Investment protection and compatibility NetApp Confidential - Internal Use Only 35
36 Scalable Performance for SAN and NAS Scale Out by Adding Controllers (Maximum 24 Controllers) Scale Up Individual Controllers All-Flash FAS All-Flash FAS All-Flash FAS All-Flash FAS All-Flash FAS Hybrid FAS All-Flash FAS Hybrid FAS >2 million sub-millisecond IOPS and nearly 5PB of all-flash capacity NetApp all-flash FAS: Scalable high performance for dedicated workloads Mixed all-flash and hybrid FAS: One storage repository for all workloads 36
37 MW FlexArray Virtualization Software New V-Series delivery model Now a software feature that can be enabled from ONTAP Can be purchased and activated at any time One controller type supports both FAS & 3 rd party storage Native SAN & NAS support Available with all FAS8000 systems Delivers a guaranteed 9- month payback Value proposition of FlexArray Unify and simplify IT management under a single framework Enable SDS, decoupling storage from data management Improve the return on existing IT assets Deliver ONTAP value to more IT operations at a lower cost NetApp Confidential Limited Use 37
38 Clustered Data ONTAP Extending the Reach of Data ONTAP Data ONTAP Edge Remote Office Storage Solution NetApp Private Storage For AWS FlexArray (V-Series) Third-party Array Virtualization NetApp Connect Secure Mobile Access Data ONTAP On Command Management Software NetApp Confidential Limited Use 38
39 Clustered Data ONTAP Comprehensive Flash Integration Server Controller Disk Flash Accel Flash Cache Flash Pool All Flash FAS Best for specific applications 90% better latency; 80% better throughput Best for file services 34% lower $/TB; 40% lower $/IOPs Best for OLTP 46% lower $/TB; 18% lower $/IOPs Low-latency performance coupled with best-in-class data management NetApp Confidential - Internal Use Only 39
40 Flash Arrays Flash Technology Leadership Flash for FAS Flash Pool, Flash Cache, Flash Accel Flash for E-Series 75PB SSD Cache Flash Arrays EF-Series, FlashRay NetApp Confidential - Internal Use Only 40
41 NetApp Confidential - Internal Use Only 41
42 Palo Alto Networks Next Generation Enterprise Security Platform Raazi Zain Regional Sales Manager State of Maryland
43 Palo Alto Networks Company Overview Corporate Highlights Founded in 2005; first customer shipment in 2007 Safely Enabling Applications Able to address all enterprise cybersecurity needs $MM $400 $350 $300 $250 $200 $150 $100 $50 $0 Revenue $396 $255 $119 $13 $49 FY09 FY10 FY11 FY12 FY13 Enterprise customers Exceptional ability to support global customers 14,000 13,500 12,000 Experienced Technology and Management Team 10,000 8,000 6,000 4,000 4,700 9, Employees / 16,000+ Customers Globally 2,000 0 Jul-11 Jul-12 Jul-13 Page Palo Alto Networks. Proprietary and Confidential.
44 2014 Magic Quadrant for Enterprise Network Firewalls Palo Alto Networks is assessed as a Leader, mostly because of its NGFW focus, because it set the direction of the market along the NGFW path, and because of its consistent visibility in shortlists, increasing revenue and market share, and its proven ability to disrupt the market. --Gartner Magic Quadrant for Enterprise Network Firewalls , Palo Alto Networks. Confidential and Proprietary.
45 Cyber Security in the News
46 Common Security Challenges Sophisticated user base Disperse environment multiple locations Mobile / multiple devices difficult to identify users Unable to identify many of the newer / custom applications Lots of evasive applications (Ultrasurf, Tor, Hamachi) Many new, sophisticated malware / attacks Need to protect data (financial/proprietary/employee) Lot s untrusted zones (wlan/mobile devices/partners) Shrinking budgets, limited staff and increased malware cleanup costs The list goes on
47 The Gaps in Legacy Network Security Based on legacy stateful inspection port / protocol Limited visibility into network traffic Point products focusing on single area Bolt on solutions not integrated Signature based need an exact match Simple Allow/Block rules Basic url static web pages Difficult to manage / aggregate data Expensive Page Palo Alto Networks. Proprietary and Confidential.
48 Palo Alto Networks Next-Generation Platform 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment Page Palo Alto Networks. Proprietary and Confidential.
49 The Next Generation Firewall Not just a firewall An Integrated Enterprise Security Platform Also includes: - Application identification - User Identification - SSL decryption Quality of Service Firewall VPN Threat Prevention IPS/APT Web/URL
50 Granular Enablement of Applications. Allow for specific users Allow only certain functions Allow & shape (QoS) Allow & scan for confidential data Allow & scan for threats Allow & limit access time Allow All Block All
51 Prevention Against Unknown (Zero Day) Threats 3 SIGNATURE CREATION Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures 2 Command-and-control Staged malware downloads Host ID and data exfil SANDBOX TESTING WildFire TM Soak sites, sinkholes, 3 rd party sources 4 Global intelligence and protection delivered to all users 1 SUSPICIOUS TRAFFIC Palo Alto Networks Customers
52 Virtual Firewall - Safely Enabling Private Clouds Segment traffic in virtual data center (Vmware ESXi) Visibility into east-west traffic Track adds, moves and changes (vmotion) Integrate into automated workflows (vcenter, etc) VLAN VLAN Page Palo Alto Networks. Proprietary and Confidential.
53 Pillars of An Effective Network Security Traffic Visibility Segmentation Threat Prevention Know what s on your network apps, users, devices, content Identify what shouldn t be on your network Centralize management: policies, logging and reporting Establish zones of similar security levels Control security policies based on apps, users, content Tier administrative tasks for better flexibility Stop known threats w/ native IPS, URL filtering Analyze all unknown/unidentified traffic Stop zero-day malware w/ sandbox analysis , Palo Alto Networks. Confidential and Proprietary.
54 Security Best Practices Zero Trust Architecture WAN / Internet WildFire Analysis Center Branch IPSec VPN Perimeter Global Protect VPN Branch Cyvera Headquarters DR Central Management Data Center Mobile Users Hotels Wi-fi Home Page Palo Alto Networks. Proprietary and Confidential.
55 Upcoming Event Ultimate Test Drive Nov 18 th Baltimore, MD Page Palo Alto Networks. Proprietary and Confidential.
56 What you can do Today: Learn Which Apps Are On Your Network? Which User is Accessing What? Proof of Concept (PoC) - Our firewall in tap more or inline (w/o control) in your network - Gain visibility into Apps/Users/Content/Threats/URL/Countries - Application Visibility Report (AVR) provided with PoC PoC findings at enterprise accounts - Only 25% of port 80 traffic was from legitimate apps; the other 75% was not from authorized apps - Majority of bandwidth consumed by unauthorized apps: Skype, games, P2P - Inadequate segmentation to protect critical data Our security platform provides the visibility you need to improve your network security immediately , Palo Alto Networks. Confidential and Proprietary.
57 Summary Identify and Control Applications - Visibility of applications, regardless of port, protocol, encryption, or evasive tactic - Fine-grained control over applications (allow, deny, limit, scan, shape) - Identify users regardless of ip address, location or device Prevent Threats - Stop a variety of known threats exploits (by vulnerability), viruses, spyware - Detect and stop unknown threats with WildFire - Integrated solution versus point products - Provide security throughout the network (trusted/untrusted zones) Simplify Security Infrastructure - Put the firewall at the center of the network security infrastructure - Reduce complexity in architecture and operations Page Palo Alto Networks. Proprietary and Confidential.
58 Thank You Thank you Page Palo Alto Networks. Proprietary and Confidential.
Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationWhitepaper Unified Visibility Fabric A New Approach to Visibility
Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.
More informationActive Visibility for Multi-Tiered Security // Solutions Overview
Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional security approaches such as firewalls and anti-virus protection are not equipped to mitigate and manage modern
More informationNext Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
More informationPALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa jsherlow@paloaltonetworks.com @jsherlow Palo Alto Networks at a Glance Corporate Highlights
More informationIntelligent Data Access Networking TM
Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate
More informationAgenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
More informationVisibility in the Modern Data Center // Solution Overview
Introduction The past two decades have seen dramatic shifts in data center design. As application complexity grew, server sprawl pushed out the walls of the data center, expanding both the physical square
More informationSecure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
More informationIn-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
More informationEnhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
More informationWhat s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
More informationWhitepaper Active Visibility into SSL Traffic for Multi-tiered Security
Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security Faced with a landscape of dynamic and expanding threats, many organizations today are compelled to take a multi-tiered approach to
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationVM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
More informationSecuring the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
More informationOut-of-Band Security Solution // Solutions Overview
Introduction A few years ago, IT managed security using the hard outer shell approach and established walls where traffic entered and departed the network assuming that the risks originated outside of
More informationFROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
More informationIntegrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
More informationDeploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
More informationVMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
More informationWhat s Next for Network Security - Visibility is king! Gøran Tømte March 2013
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
More informationThe Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
More informationHow Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
More informationPalo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
More informationGame changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
More informationIntroduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
More informationHow Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
More informationSolution Brief Network Design Considerations to Enable the Benefits of Flash Storage
Solution Brief Network Design Considerations to Enable the Benefits of Flash Storage Flash memory has been used to transform consumer devices such as smartphones, tablets, and ultranotebooks, and now it
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More information(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure
(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure David Kernahan Senior Systems Engineer VMware Switzerland GmbH 2014 VMware Inc. All rights reserved. Agenda 1 VMware Strategy
More informationMoving Beyond Proxies
Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security
More informationCybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com About Palo Alto Networks We are the network security company World-class
More informationWhitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot
Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot Since the mid-90 s, users transacting on the internet have been assured of security by the lock icon displayed on their browser and
More informationTech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
More informationVSS - Game Changing Technology
VSS - Game Changing Technology Dean Beaver Vice President of Sales Danaher Business Platforms Test & Measurement $3.0B Environmental $3.3B Dental $2.1B Life Sciences & Diagnostics $6.8B Industrial Technologies
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationNetwork Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
More informationUsing Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
More informationA Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
More informationVMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
More informationFirewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationSolutions Guide End-to-End Visibility for Your Cisco Infrastructure
Solutions Guide End-to-End Visibility for Your Cisco Infrastructure Table of Contents Introduction 3 Overview of Cisco Technologies 3 Monitoring Cisco Centric Infrastructure (ACI) 3 CISCO 40Gb BiDi Links
More informationWildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
More informationAbout the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
More informationStallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST Introducing the Enterprise Security Platform Sami Walle Regional Sales Manager CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationVisibility into the Cloud and Virtualized Data Center // White Paper
Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.
More informationPalo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks
Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on
More informationMANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments
Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...
More informationPaul Cochran - Account Manager. Chris Czerwinski System Engineer
Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional
More informationCisco Unified Access Technology Overview: Converged Access
White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the
More informationNext-Generation Datacenter Security Implementation Guidelines
Next-Generation Datacenter Security Implementation Guidelines March 2015 INTRODUCTION 3 DEPLOYMENT OVERVIEW 4 IMPLEMENTATION GUIDELINES 4 PA-7050 Boundary Firewalls to protect north-south traffic 5 Virtual
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationEnterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
More informationPervasive Security Enabled by Next Generation Monitoring Fabric
Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationMANAGED DATABASE SOLUTIONS
Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution
More informationNew Hitachi Virtual Storage Platform Family. Name Date
New Hitachi Virtual Storage Platform Family Name Date Familiar Challenges and Big Transformations Too Much Information Too Much Complexity 24 x 7 Expectations Continually Rising Costs Software-Defined
More informationDell SonicWALL Portfolio
Dell SonicWALL Portfolio Jiří Svatuška Presales Consultant Transform Connect Inform Protect Dell SonicWALL network security portfolio Network security Secure mobile access Email security Policy and management
More informationCloud Managed Security with Meraki MX
Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationDMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
More informationZscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
More informationEnd-to-End Visibility
End-to-End Visibility for Your Cisco Infrastructure SOLUTIONS GUIDE GIGAMON TABLE OF Contents Introduction... 1 Overview of Cisco Technologies... 1.Monitoring Cisco Application Centric Infrastructure (ACI)...
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationOpen SDN for Network Visibility
SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch
More informationCyberoam Next-Generation Security. 11 de Setembro de 2015
Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in
More informationA Modern Framework for Network Security in Government
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
More informationThe Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
More informationSECURITY PLATFORM FOR HEALTHCARE PROVIDERS
SECURITY PLATFORM FOR HEALTHCARE PROVIDERS Our next-generation security platform prevents successful cyberattacks for hundreds of hospitals, clinics and healthcare networks across the globe. Palo Alto
More informationOmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
More informationUnlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
More informationREMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
More informationBrocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
More informationSolution Brief. Branch on Demand. Extending and Securing Access Across the Organization
Solution Brief Branch on Demand Extending and Securing Access Across the Organization Extending Access to Corporate Resources Across the Organization As organizations extend corporate capabilities to teleworkers
More informationContent-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
More informationHigh Performance Server SAN using Micron M500DC SSDs and Sanbolic Software
High Performance Server SAN using Micron M500DC SSDs and Sanbolic Software White Paper Overview The Micron M500DC SSD was designed after months of close work with major data center service providers and
More informationCisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationMonitoring & Measuring: Wi-Fi as a Service
Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless
More informationProviding Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
More informationBreaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
More informationApplications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
More informationSOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com
SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What
More informationEnabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon
Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationEVOLVED DATA CENTER ARCHITECTURE
EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationFIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
More informationAddressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
More informationEthernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
More informationMANAGED SHAREPOINT SOLUTIONS
Page 0 2015 SOLUTION BRIEF MANAGED SHAREPOINT SOLUTIONS Private SharePoint 2013 SharePoint 2013 with Office apps NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents
More informationHow To Build An Ip Storage Network For A Data Center
1 REDEFINING STORAGE CONNECTIVITY JACK RONDONI, VICE PRESIDENT STORAGE NETWORK, BROCADE 2 THE TRENDS DRIVING STORAGE Virtualization Continues to Drive Change Storage Will Continue To Grow SSD Changes Everything
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationThe Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
More informationNetwork Virtualization Solutions - A Practical Solution
SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security
More information