Check Point submitted the SWG Secure Web Gateway for
|
|
|
- Randolph Fisher
- 10 years ago
- Views:
Transcription
1 Key findings and conclusions: Lab Testing Summary Report September 213 Report 1382 Product Category: Web Security Gateway Vendors/Products Tested: Secure Web Gateway BlueCoat Proxy SG3-5 Appliance Websense Web Security Gateway scores highest in testing, 91.3%, for classifying the one million most popular websites into known categories Detecting and blocking rate for URL filtering in Adult (97.1%) and Gambling (93.4%) categories Excellent granularity of security policies that allows access limits for websites to be set for individual users, groups of users or all users Registers success rate of 97.% in application control differentiation with URL filtering enabled Application Control library is updated continually; currently consists of more than 5, applications and more than 3, social network widgets submitted the Secure Web Gateway for evaluation in ongoing standardized testing for Web control, the Miercom Web Security Industry Assessment 213. Hands-on testing assessed the appliance versus two competing products in this class: the Websense Web Security Gateway (WSG) software platform, Version 7.6, running on a commercial off-the-shelf (COTS) server and the SG3-5 appliance. Crucial areas of functionality for a secure Web gateway were put through a series of challenging processes, including malicious URL coverage, undesirable URL blocking efficacy and application control. Other Web security and performance tests were also performed. The is a comprehensive security solution designed for the data center as well as the perimeter of the enterprise network that Figure 1: URL Classification and Coverage Test URL Successful Classification % SG The classified 91.3% of the one million most popular websites into known categories, and exceeded the software platform by 5.6% and SG3-5 appliance by 13.1%.
2 URL Blocking % SG3-5 The detected and blocked 97.1% of known Adult URLs. This is an improvement of 15% or more over the and Blue Coat Proxy SG3-5 products. provides secure Web access by monitoring network traffic in real time. It can be deployed inline or as monitor/tap and can also act as a proxy. s is recommended for up to 1, users. A higher number of users can be supported with a valid license. For testing, the was running Check Point s software release version R76, which supports IPv4 and IPv6 and works on the GAiA secure operating system. The is the high-end model of five Secure Web Gateways offered. It has a default Figure 3: URL Filtering Gambling URL Blocking % Figure 2: URL Filtering Adult SG3-5 The scored 93.4% in the filtering test for known Gambling URLs. configuration of 12x1GE ports, with optional 1GE and 1GE expansions of up to 26x1GE ports or 12x1GE ports. All Secure Web Gateways enable secure use of Web 2. by providing real-time, multilayered protection against Web-borne malware. All use the Blade Architecture, which consists of software modules or blades that enable tailoring of security functionality based on end-user specifications. URL Classification and Coverage Test The objective of this test was to determine how many of the one million most popular websites the three secure Web gateways could correctly classify into pre-defined or known categories. During the tests, the blocking functionality of each product was disabled. The successfully classified 91.3% of the URLs. The product test performance is shown in Figure 1 on page 1. URL Filtering by Specific Categories This testing assessed the capability of the Web gateways to detect and block URLs in specific categories which were deemed to be undesirable, potentially malicious or malicious. Thousands of URLs in each category were collected from the initial classification of the one million websites. Each product underwent a separate test for each category. Default security policies, as well as the policies necessary to filter for each specific category, were enabled. Secure Web Gateway appliances receive real-time URL updates from cloud-based categorization that blocks millions of malware and phishing websites. This enabled the to have the best performance in URL Filtering Adult (by 15% or more) and URL Filtering Gambling (3% or more). See Figures 2 and 3 for complete results. The appliance also earned the top spot in URL Filtering Hacking Tools (37% or more) and URL Filtering Phishing (22% or more) as shown in Figure 4 on page 3. Application Control Testing assessed the performance of the SWG- 12 and competing products in detecting and/or blocking applications and the traffic created by those applications. Copyright 213 Miercom Page 2
3 Figure 4: URL Filtering for Hacking Tools and Phishing Hacking Tools Phishing URL Blocking % SG URL Blocking % SG The performed nearly three times better than its nearest competitor in categorizing hacking tools. In URL Filtering Phishing, the performance of the was 2% better than the Websense software and three times better than the Blue Coat Proxy SG3-5. Application control is a strength of Secure Web Gateways. The other products tested here had limited application control functionality. Web 2. applications are increasingly used to enable the dynamic relationships some businesses use to stay competitive. However, overwhelmingly popular applications such as Facebook, IM and YouTube can create havoc for the enterprise network. They consume valuable bandwidth, might impact employee productivity and expose the enterprise network to malware, increasing the probability of compromising the network and even cause loss of valuable company data. To mitigate the risks and maximize the value of Web 2. applications for end-user organizations, it is necessary for a secure Web gateway to identify, monitor, report on and implement controls over Web-based applications. The had the latest Application Control library, which consists of more than 5, applications and more than 3, social networking widgets. The Application Control library enhances network security and employee productivity by creating granular security policies for users and groups of users. The policies identify, block or limit usage of Web applications and Web widgets, such as those used in instant messaging, social networking, video streaming and online games. A high degree of granularity can be built into a security policy. Using Facebook as an example, 23 portions of the application can be enabled or disabled. A policy can be set in the that allows access to parts of Facebook that are beneficial to conducting business while preventing access from others that sap employee productivity, such as the chat area. Figure 5 shows the Application and URL Filtering Policy Interface of the, which offers a myriad of combinations to network administrators. The interface is comprehensive yet easy to use. The has a comprehensive, intuitive interface for creating policies and rules. Multiple rule sets can be mixed and matched to provide security control for different ports and networks The high level of granularity available in the interface can cover just about any network security deployment. Figure 5: Application and URL Filtering Policy Configuration Copyright 213 Miercom Page 3
4 Figure 6: Application Control with URL Filtering Enabled % of Applications Blocked SG Application control is a strength of the. This plus the fact that the competing products have limited application control functionality contributing to this result, the outperformed the nearest competitor by more than 3% in the test of application control with URL filtering enabled. Two application control tests were run, one with URL filtering disabled and the other with URL filtering enabled. The was the clear winner in both, registering a blocking rate that was more than 3% greater than the nearest competitor. With URL filtering disabled, the achieved a blocking rate of 91.6%. With URL filtering enabled, the blocking rate was 97.1% as shown in Figure 6. The sample size for both tests was more than 3, unique protocol/application combinations. Throughput, CPU Protection Tests Additional tests evaluated the performance capabilities of the while Web control testing was in progress. In the RFC 2544 throughput test, the maintained 1GE (port line rate) with zero frame loss while filtering malicious traffic. A simulated DoS flood attack was launched in an attempt to overburden the resources of the. No anomalies were observed. The continued to detect the malicious traffic and continued to protect the network from Web-borne threats. Bottom Line The performance of the SWG- 12 Secure Web Gateway was verified as part of the Miercom Web Security Industry Assessment 213. The had strong results in the areas that are crucial for a secure Web gateway. Classification of URLs into known categories, URL filtering for specific categories, application control and application control with URL filtering enabled all exceeded the performance of other tested products. The large, ever-growing Application Control library of applications and Web widgets of the appliance and the high level of granularity that can be built into security policies provide excellent protection from new, emerging threats. The exhibited the performance required for a data center and perimeter deployment to be able to safeguard the enterprise network from Web-borne threats while providing end users with a positive Web experience. Figure 7: Blocking Options for Facebook The check mark indicates that users are blocked from using Facebook-chat. Each of the 23 portions of Facebook has a risk rating, which is visible along with a description in the right pane. Note that Facebookchat has been disabled. Copyright 213 Miercom Page 4
5 Test Bed IP Load Generators Products Under Test Spirent Application Simulator Generator Ixia XM12 Secure Web Gateway BreakingPoint FireStorm SG3-5 Appliance Spirent Studio Performance Websense Web Security Gateway How We Did It The devices under test included the Secure Web Gateway, running firmware version R76, the SG3-5 appliance, version , and the Websense Web Security Gateway, running software version 7.6. Each device was evaluated using a Miercom client, Spirent Studio Performance application traffic simulator, BreakingPoint FireStorm and Ixia XM12. Competitive vendors were notified of this testing and afforded an opportunity to challenge these results. Results are available for Websense and Blue Coat testing in their own separate reports. URL Classification Accuracy The cache of the DUTs was adjusted to allow processing of the URLs. The handled 1 runs of 1, URLs, as did the COTS server running software. The SG3-5 was able to handle five runs of 2, URLs. URL Filtering by Specific Category For detecting/blocking categories of undesirable, potentially malicious and malicious URLs, a database was created in Excel for each category. Miercom used multiple sources to obtain URLs for use in security testing. The URL of each of the one million most popular websites, based on worldwide traffic rating, was obtained in June 213. Application Control Spirent Studio Performance software running on a Miercom server managed a Mu Dynamics Mu- 4 application simulator, which generated application traffic on the test network. The Mu-4 ran Spirent Studio Security software. A Layer 2 switch forwarded traffic to the secure Web gateways for a block/pass decision. Traffic that was allowed to pass was routed back to the Mu-4 via another Layer 2 switch. Throughput and CPU Protection Tests The Ixia XM12 was used to generate traffic in the RFC 2544 throughput test. The BreakingPoint FireStorm was used to generate the DoS attack against the. The tests in this report are intended to be reproducible for customers who wish to recreate them with the appropriate test and measurement equipment. Current or prospective customers interested in repeating these results may contact [email protected] for details on the configurations applied to the Switch Under Test and test tools used in this evaluation. Miercom recommends customers conduct their own needs analysis study and test specifically for the expected environment for product deployment before making a product selection. Copyright 213 Miercom Page 5
6 Miercom Performance Verified The performance of the was verified by Miercom in a hands-on testing evaluation. The Secure Web Gateway proved to be superior in identifying and classifying URLs into known categories, and offering URL filtering for specific categories and application control with URL filtering enabled. With a large and continually updated Application Control library and a high level of granularity built into security policies, the proved its strengths in safeguarding the enterprise network. Miercom is proud to award the the Performance Verified Certification. Technologies Ltd. 5 Ha Solelim Street Tel Aviv 67897, Israel U.S.: Int l: About Miercom s Product Testing Services Miercom has hundreds of product-comparison analyses published over the years in leading network trade periodicals including Network World, Business Communications Review, Tech Web - NoJitter, Communications News, xchange, Internet Telephony and other leading publications. Miercom s reputation as the leading, independent product test center is unquestioned. Miercom s private test services include competitive product analyses, as well as individual product evaluations. Miercom features comprehensive certification and test programs including: Certified Interoperable, Certified Reliable, Certified Secure and Certified Green. Products may also be evaluated under the NetWORKS As Advertised program, the industry s most thorough and trusted assessment for product usability and performance. Report 1382 [email protected] Before printing, please consider electronic distribution Product names or services mentioned in this report are registered trademarks of their respective owners. Miercom makes every effort to ensure that information contained within our reports is accurate and complete, but is not liable for any errors, inaccuracies or omissions. Miercom is not liable for damages arising out of or related to the information contained within this report. Consult with professional services such as Miercom Consulting for specific customer needs analysis. Copyright 213 Miercom Page 6
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
Lab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices
Lab Testing Detailed Report DR131118 January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG 900-20 Secure Web Gateway, Proxy Edition Check
Lab Testing Summary Report
Key findings and conclusions: Huawei AR27V-P router achieved 177.5 Mbps throughput with IMIX traffic and IPsec security enabled Lab Testing Summary Report March 212 Report SR12221B AR Series Routers Performance
Lab Testing Summary Report
Key findings and conclusions: Lab Testing Summary Report March 2012 Report SR120222B AR s Access and Interconnection Vendor Tested: Dual 3G uplinks provide fully redundant WAN connectivity Interoperability
Lab Testing Summary Report
Key findings and conclusions: Cisco WAAS exhibited no signs of system instability or blocking of traffic under heavy traffic load Lab Testing Summary Report September 2009 Report 090815B Product Category:
Lab Testing Summary Report
Lab Testing Summary Report November 2011 Report 111018 Product Category: Supervisor Engine Vendor Tested: Product Tested: Catalyst 4500E Supervisor Engine 7L-E Key findings and conclusions: Cisco Catalyst
WildPackets engaged Miercom to conduct comprehensive,
Lab Testing Summary Report January 2014 Report 140109 Key findings and conclusions: Omnipliance TL network analysis appliance with two-port OmniAdapter 10G card proves in testing a capture-to-disk rate
Router Throughput Tests
Lab Testing Summary Report June 2013 Report 130605 Key findings and conclusions: Cisco 4451-X ISR branch office router, with advanced features enabled, demonstrated 1 GB and 2 GB capacity as advertised
Cisco engaged Miercom to conduct an independent verification of
Key findings and conclusions: Cisco Catalyst switches with custom ASICs provide superior performance in egress buffering Lab Testing Summary Report September 2010 Report 100827 Using frame sizes of 64
NEC s UC for Enterprise (UCE) in conjunction with the
Lab Testing Summary Report May 2011 Report SR110219 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: NEC UCE system transfers seamlessly between a variety of endpoints
Blue Coat WebFilter >
White Paper Blue Coat WebFilter > Delivering the web access your users want with the control you need Why Dynamic Content Filtering has Become Essential Two billion videos per day are watched on YouTube.
Sonus Networks engaged Miercom to evaluate the call handling
Lab Testing Summary Report September 2010 Report 100914 Key findings and conclusions: NBS5200 successfully registered 256,000 user authenticated Total IADs in 16 minutes at a rate of 550 registrations
Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition
Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense
Secure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
Product Summary Report
Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted
Cloud Based Secure Web Gateway
Cloud Based Secure Web Gateway DR160203 March 2016 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Product Tested... 4 Test Focus... 4 How We Did It... 5 Test Bed Setup... 5 Test
Citrix NetScaler VPX 9.2 for Microsoft Hyper-V Detailed Lab Report
Citrix NetScaler VPX 9.2 for Microsoft Hyper-V Detailed Lab Report DR110114 March 2011 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 About Citrix NetScaler... 4 2.2
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
Next-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Unified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
Lab Testing Detailed Report DR100412D. Detailed Competitive Testing of the Websense Web Security Gateway 7.5
Lab Testing Detailed Report DR100412D Detailed Competitive Testing of the Security 7.5 May 2010 Miercom www.miercom.com Contents Executive Summary... 3 Key Findings... 4 Figure 1: Averages of Percentage
Lab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
Intelligent, Scalable Web Security
Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
Comprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Summer 2009 Executive Summary In the summer of 2009, Cascadia Labs performed effectiveness tests on five market-leading
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
C(UTM) security appliances the Check Point VPN-1 Pro, the
Lab Testing Summary Report October 25 Report 5914 Product Category: Unified Threat Management (UTM) Security Appliances Systems Tested: Systems VPN-1 Pro FortiGate 1 Networks Key Findings and Conclusions:
Lab Testing Summary Report
Key findings and conclusions: Cisco Unified Border Element Enterprise Edition, enterprise class Session Border Controller, handles 16,000 concurrent SIP-to-SIP calls at 150 calls per second Lab Testing
SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
WEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
Masters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses
White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT Your business and its data
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
GFI White Paper. How Web Reputation increases your online protection
GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
Qscalability and lifecycle management. We analyzed the overall
Lab Testing Summary Report April 2009 Report 090424 Product Category: Fibre Channel SAN Switch Product Tested: QLogic SANbox 5800V Key findings and conclusions: Stackable design reduces both initial investment
IBM Security Network Protection
IBM Software Data sheet IBM Security Network Protection Highlights Delivers superior zero-day threat protection and security intelligence powered by IBM X- Force Provides critical insight and visibility
Cascadia Labs URL Filtering and Web Security
Presented by COMPARATIVE REVIEW Cascadia Labs URL Filtering and Web Security Results from Q4 2008 Executive Summary Companies rely on URL filtering and Web security products to protect their employees,
Virtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Downloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
Lab Testing Summary Report
` Lab Testing Summary Report October 2009 Report 091028 Product Category: Integrated Services Router Generation 2 Vendor Tested: Products Tested: Cisco ISR 1941W Cisco ISR 2911 Cisco ISR 2951 Cisco ISR
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
GET INSIGHT TAKE ACTION IMPROVE EXPERIENCE PROCERA PACKETLOGIC
GET INSIGHT TAKE ACTION IMPROVE EXPERIENCE PROCERA PACKETLOGIC KEY BENEFITS SEE MORE TRAFFIC Industry s largest signature database (2,300+), updated every week CARRIER-CLASS STRENGTH Scalability and reliability
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Check Point taps the power of virtualization to simplify security for private clouds
Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private
Key Findings. Websense Triton Security Gateway Anywhere
Websense Triton Security Gateway Anywhere A Usability Study and Performance Evaluation Executive Summary In today s global economy the ways in which businesses use the Internet have changed dramatically
NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
Lab Testing Summary Report
Lab Testing Summary Report May 2013 Report 130425 Product Category: Carrier Class SBC Vendor Tested: Products Tested: Session Border Controller Key findings and conclusions: software maintained a call
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Uncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect
Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to
Lab Testing Summary Report
Lab Testing Summary Report July 2006 Report 060725 Product Category: WAN Optimization Appliances Vendors Tested: Citrix Systems TM Riverbed Technology TM Key findings and conclusions: The WANScaler 8800
Check Point 3D Security
Check Point 3D Security Combining Policies, People and Enforcement for Unbeatable Protection John Vecchi Head of WW Product Marketing 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone
Security Administration R77
Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check
ADTRAN NetVanta 5660
ADTRAN NetVanta 5660 Lab Testing Detailed Report 08January2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Product Tested... 4 3.0 Test Bed How We Did It... 6 4.0 Performance Testing...
Putting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
E-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Performance and Feature Comparison of Application Delivery Appliances. Cisco ACE 4710 F5 BIG-IP 3400 F5 BIG-IP 6400 F5 BIG-IP 8800
Performance and Feature Comparison of Application Delivery Appliances Cisco F5 BIG-IP 34 F5 BIG-IP 64 F5 BIG-IP 88 12 April 28 i. Executive Summary Businesses use competitive testing and datasheet information
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
White Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Denial of Service (DOS) Testing IxChariot
TEST PLAN Denial of Service (DOS) Testing IxChariot www.ixiacom.com 915-6681-01, 2005 Contents Overview of Denial of Service functionality in IxChariot...3 A brief outline of the DoS attack types supported
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.
Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
ProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
