Dell Security Next-Generation Firewalls
|
|
|
- Thomas Garrett
- 10 years ago
- Views:
Transcription
1 Dell Next-Generation Firewalls
2 Agenda Evolution of Threats Next-Generation Firewall Features Multi-Core, Parallel Processing Reporting Tools Industry Reports Demo Q&A 2 Confidential
3 The security threat continues to evolve The virtual era requires we Notoriety Money-making business Strategic, wellplanned attacks The future Hackers used to just want their name in lights Usually an individual operating by oneself All aspects of a normal business exist Social media and virtual era aid this business plan Highly coordinated & motivated will keep at it Well-funded? 3 Confidential
4 Vulnerabilities Will Continue to Persist LANDesk ThinkManagement File Deletion (April 27, 2012) Vulnerabilities in the software everyone uses everyday New ZBot variant discovered in the wild (Apr 26, 2012) IBM Tivoli ActiveX Buffer Overflow (April 20, 2012) Fire Safety s lead to Gamarue Worm (Apr 18, 2012) AryaN Botnet analysis - Part 2 (April 13, 2012) Zeus Wire Transfer targeted attacks (April 12, 2012) It s Human Nature Programmers make mistakes Malware exploits mistakes Microsoft Bulletin Coverage (April 10, 2012) Stiniter Android Trojan uses new techniques (Mar 28, 2012) AryaN IRC Botnet discovered in the wild (April 5, 2012) Oracle JRE Sandbox Restriction Bypass - Flashback Trojan (Apr 5, 2012) Microsoft Bulletin Coverage (March 14, 2012) IBM Tivoli Provisioning Manager Express SQL Injection (Mar 29, 2012) VideoLAN VLC Media Player mms Buffer Overflow (Mar 23, 2012) Wells Fargo Account Update Downloader Trojan (Mar 21, 2012) New LockScreen Ransomware Trojan in the wild (Mar 15, 2012) Oracle Java Runtime TTF BO (March 9, 2012) 4 Confidential
5 Seemingly Safe Applications Adobe PDF Reader Adobe Download Manager Confidential
6 Is my firewall good enough? 6 Confidential
7 Traditional Firewalls Stateful Firewall Web Traffic 80 = HTTP 443 = HTTPS To a traditional firewall, all web traffic looks legitimate 7 Confidential
8 Next-Generation Firewall Services 8 Confidential
9 Next-Generation Firewall Features First-Generation Firewall Capabilities Supports Stateful Packet Inspection, NAT, Routing, & IPSec VPNs Application Visibility and Control Real-time visualization & granular control of applications running Integrated IPS Protects against a comprehensive array of network-based threats and vulnerabilities SSL Decryption and Inspection AD/LDAP Integration (SSO) Bump-In-the-Wire Deployment Anti-Malware & Content Filtering Decrypts and inspects SSL traffic for threats, applies application, URL and content control policies User identification and activity are made available through seamless AD/LDAP SSO Transparent mode deployment, in addition to Layer-3 Gateway & Cloud AV, Anti-Spyware, Anti-Spam, & URL/Content Filtering 9 Confidential
10 By User/Group -Not by IP By Content Inspection By Destination Block Apps by Policy Application By Content Visualization Detect and Block & Malware Control By User/Group Detect & Prevent Intrusion Attempts -Not by Filename Users/Groups Policy Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Ingress Massively Scalable Next-Generation Platform Acceptable Apps Managed Bandwidth Egress High Performance Multi-Core Re-Assembly Free DPI Unacceptable Apps Blocked Malware Blocked Cloud-Based Extra-Firewall Intelligence Visualize & Manage Policy Visualization Identify Application Signatures By Application By User/Group LDAP/SSO By Content Inspection Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Manage network bandwidth 10 Confidential
11 Intrusion Detection & Prevention Detect & Prevent Software vulnerabilities such as buffer overflows, peer-topeer and instant messaging exploits, backdoor attacks, and other malware. Comprehensive Pure Pattern Matching Buffer Overflow Detection Botnet detection & blocking DoS / Flood detection Geo IP monitoring & blocking SSL decryption & inspection Reporting On-box reporting IPfix / Netflow exporting 11 Confidential
12 SSL Decryption and Inspection Deep Packet Inspection of Secure Socket Layer (DPI-SSL) SSL traffic decrypted, inspected, then re-encrypted Client DPI-SSL and Server DPI-SSL Inspects SSL sessions on all ports independent of protocol Content can be scanned as well as injected (e.g. HTTP/S block pages) Supports all Services Extends Inspects Granular Control Deep Packet inspection to SSL traffic scanning both LAN and WAN traffic for threats and vulnerabilities Inspects SSL traffic across other security mechanisms, such as URL filtering, IPS & Gateway AV Inclusion/Exclusion list to customize which traffic DPI- SSL inspects, which allows better management of CPU resources 12 Confidential
13 Gateway Anti-Virus and Anti-Spyware Scans & Prevents Installation of malicious spyware and disrupts background communications from existing spyware programs that transmit confidential data 10M+ Signatures detecting millions of pieces of malware and intelligent enough to detect new variants providing effective zero-day protection Unlimited Dell SonicWALL Reassembly- Free Deep Packet Inspection engine scans analyze all files in real time regardless of file size or compression. 13 Confidential
14 Web Content Filtering Dynamically updated rating architecture Application traffic analytics Web-based management Enforced CFS Clients. 16M+ Website rating database used to block inappropriate and illegal content, reduces organizational liability and increases productivity 56+ Granular level blocking based on pre-defined categories. IP-based HTTPS content filtering to control user access to web sites over encrypted HTTPS Report & Analyze Application traffic analytics suite - integration with Dell SonicWALL GMS, Analyzer & Scrutinizer provides realtime and historic analysis of data transmitted through the firewall. 14 Confidential
15 Single Sign-On Radius, AD, & LDAP Authentication Transparent User Authentication Per-Group Policies Per-User Policies Use Cases Visibility & Reporting CFS and Application Policies Firewall Policies SSO Agent The Directory Connector SSO agent uses NetAPI, WMI, Domain Controller Logs, and the LogWatcher agent to identify users based on the workstation IP address TSA Agent The Terminal Services Agent (TSA) provides user-specific information required by the firewall for users accessing the network from multi-user systems RADIUS Accounting The Next-Generation Firewall appliances can function as a RADIUS accounting server, which enables RADIUS accounting message to be used for single sign-on 15 Confidential
16 Multi-Core Parallel Processing Technology 16 Confidential SonicWALL
17 Single-Pass RFDPI Engine Reassembly Free Deep Packet Inspection Low-Latency Ultra-Scalable Single Pass Deep Packet Inspection Engine Stable Throughput vs. Buffering Proxy Engines Input Packet Signature Signature Output Packet TCP Reassembly Pattern Definition Language Interpreter Postprocessors Preprocessors Deep Packet Inspection Engine Policy Decision API Linearly Scalable on a Massively Multi-Core Architecture 1 Core 96 Cores 17 Confidential
18 Dell Global Response Intelligent Defense (GRID) 100% IP ownership of all signatures World-wide Intelligence from +2m end-points Advanced Tracking & Detection 94% effectiveness rating from NSS for IPS and ICSA for Anti-Virus Industry Leading Responsiveness (MAPP leader) Same day signatures, 1000 s new/month Proactive Anti-Malware protection In-house security research team since 1999 Active participant in leading research organizations (WildList, AVIEN, PIRT, APWG and more) Member of the Microsoft Active Protections Program (MAPP) 18 Confidential
19 Industry Reports 19 Confidential SonicWALL
20 Industry Reports Dell - Internal Use - Confidential NSS Labs Results Recommended NGFW 2012 & 2013 Recommended IPS 2012 & 2013 Network World Firewall Challenge Dell SonicWALL made the Cover of Network World as the Winner Best Overall Performance for NGFW Best Overall Performance for UTM Best Overall Performance for SSL Decryption 20 Confidential SonicWALL
21 Dell Next- Generation Firewall Appliances 21 Confidential SonicWALL
22 Dell Next-Generation Firewalls Enterprise, Data Center SuperMassive Series TZ Series SMB/Campus/Branch NSA Series SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 SuperMassive E10800 SuperMassive E10400 SuperMassive E10200 NSA 6600 NSA 5600 TZ 215/W TZ 205/W TZ 105/W NSA 4600 NSA 3600 NSA 2600 NSA 220/250M 22 Confidential SonicWALL
23 Dell Management & Reporting 23 Confidential SonicWALL
24 Global Management System (GMS) Dell Policy Management, Analytics, and Reporting Issues High cost of managing complex security networks. Difficulty capturing data Hard to identify disruptive users. Cumbersome license management Solution Centralized console for managing, monitoring, and reporting. Integrated features incl. logging, analytics, change control, license tracking, and historical reporting. Benefits Greater efficiency via a streamlined console. Accurate compliance reports Higher productivity via user activity reporting. 24 Confidential SonicWALL
25 Analyzer Dell SonicWALL Analytics and Reporting Issues Difficulty capturing data for regulatory compliance audits. Hard to identify disruptive users. Hard to prove SLA levels. Solution Centralized console that is easy-to-use and affordable. Integrated features incl. logging, analytics, and historical reporting. Benefits Greater efficiency via a streamlined console. Accurate compliance reports via relevant data. Higher productivity via user activity reporting. (1) IDC's Worldwide Mobile Worker Population Forecast (2) Cisco Connected World Technology Report, Confidential SonicWALL
26 Scrutinizer Multi-vendor IP Data Flow Analytics and Reporting Issues Identify 5000+application signatures Imprecise By Application isolation of network Not by performance Port & Protocol issues Untraceable By User/Group breaches LDAP/SSO from within Not a by corporate IP data network. By Content Inspection Non-business Not by Filename data traffic Categorize Solution By Application Uncover By Application bottlenecks Category and optimize By Destination network design By Content Identify infected hosts By User/Group Deliver granular reports of user, website, and application usage activity. Control Benefits Prioritize Apps by Policy Lower Manage network Apps by Policy costs via Block Apps by Policy optimized, bandwidth Detect and Block Malware utilization. Detect & Prevent Intrusion Attempts Proactive mitigation of Manage security network threats bandwidth Higher productivity by managing user activity. 26 Confidential SonicWALL
27 Contacts 27 Confidential SonicWALL
28 Dell Contacts Dell Account Executive Peyton Biggs Sales Executive David Koch Sales Engineer Rapatrick Murrell
29 Dell Resources Next-Generation Firewall Live Demo Site livedemo.sonicwall.com Demos on Demand Dell Next-Generation Firewalls
30 Q&A 30 Confidential SonicWALL
Applications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 [email protected]
Dell Next Generation Firewall(Gen6) and Integrated Solution Colin Wu / 吳 炳 東 [email protected] Agenda Company Overview Dell Product Line-Up Architecture Firewall security services Add-on products Wireless
Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager
Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
Application Intelligence, Control and Visualization
Application Intelligence, Control and Visualization Marco Ginocchio Director of Systems Engineering Europe, Middle East, and Africa [email protected] SonicWALL Over 1.7 million security appliances
Network Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Dell SonicWALL Portfolio
Dell SonicWALL Portfolio Jiří Svatuška Presales Consultant Transform Connect Inform Protect Dell SonicWALL network security portfolio Network security Secure mobile access Email security Policy and management
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Providing Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
SonicWALL Unified Threat Management. Alvin Mann April 2009
SonicWALL Unified Threat Management Alvin Mann April 2009 Agenda Who is SonicWALL? Networking Drivers & Trends SonicWALL Unified Threat Management (UTM) Next Generation Protection SonicWALL CONFIDENTIAL
What to Look for When Evaluating Next-Generation Firewalls
What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Huawei Eudemon200E-N Next-Generation Firewall
Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT
10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN
10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,
Forefront Threat Management Gateway (TMG) Whitepaper The Solution.
Forefront Threat Management Gateway (TMG) Whitepaper The Solution. Find out more about our business on www.exertismicro-psecurity.com Introduction Last year Microsoft announced changes to the roadmaps
Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance
Firewall Sandwich Aleksander Kijewski Presales Engineer Dell Software Group 1 Many of your users web sessions are encrypted with HTTPS 2 Many of your users web sessions are encrypted with HTTPS and so
Next-Generation Firewall Overview
Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any
Why Protection and Performance Matter
Why Protection and Performance Matter - The Benefits of Multi-core Reassembly-Free Deep Packet Inspection. Next-Generation Firewalls combine multi-core architecture with real-time Deep Packet Inspection
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework
Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected
Next-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
SuperMassive E10000 Series
SuperMassive E10000 Series Next-Generation Firewall The Dell SonicWALL SuperMassive E10000 Series is Dell SonicWALL s Next-Generation Firewall platform designed for large networks to deliver scalability,
Dell SonicWALL report portfolio
Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
USG6600 Next-Generation Firewall
USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
SonicWALL ECLASS Netw
SonicWALL ECLASS Netw NETWORK SECURITY SuperMassive E10000 Series Next-Generation Firewall The SonicWALL SuperMassive E10000 Series is SonicWALL s Next-Generation Firewall platform designed for large networks
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Why protection & performance matter
Why protection & performance matter By Daniel Ayoub, CISSP, CISA Next-Generation Firewalls combine multi-core architecture with real-time Deep Packet Inspection to fulfill the protection and performance
Clean VPN Approach to Secure Remote Access for the SMB
Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Moving Beyond Proxies
Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
Next-Generation Firewall Overview
Next-Generation Firewall Overview Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are accessing any application,
USG6300 Next-Generation Firewall
USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
SonicWALL Content Security Manager Integrated Solutions Guide
SonicWALL Content Security Manager Integrated Solutions Guide Document Scope This solutions document describes how to deploy a SonicWALL Content Security Manager (CSM) content filtering appliance along
Palo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Clean VPN Approach to Secure Remote Access
Clean VPN Approach to Secure Remote Access A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond the Perimeter
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Best Practices in Deploying a Secure Wireless Network
Best Practices in Deploying a Secure Wireless Network CONTENTS Abstract 2 Today s concerns 2 Purpose 2 Technology background 3 Today s challenges 4 Key security requirements of an integrated network 4
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
Palo Alto Networks Next-Generation Firewall Overview
Palo Alto Networks Next-Generation Firewall Overview The firewall is the most strategic network security infrastructure component, it sees all traffic, and as such, is in the most effective location to
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY VISION FUTURE-READY SECURITY Because a security solution represents
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway
TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST Introducing the Enterprise Security Platform Sami Walle Regional Sales Manager CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a
The Challenge of a Comprehensive Network Protection. Introduction
Index Introduction...3 Corporate Network Security Management Challenge...5 Multi-layers and heterogeneous network...5 Roaming Clients...5 Control of unproductive and restricted applications...5 Securing
