Comprehensive security solution provides reliable connectivity and faster VPN throughput with unprecedented visibility from WatchGuard Dimension

Size: px
Start display at page:

Download "Comprehensive security solution provides reliable connectivity and faster VPN throughput with unprecedented visibility from WatchGuard Dimension"

Transcription

1 Comprehensive security solution provides reliable connectivity and faster VPN throughput with unprecedented visibility from WatchGuard Dimension First established in 1949 out of a small metal building on the fringes of downtown Houston, Wholesale Electric has become a leader in the electrical supply industry, serving markets domestically and internationally. The privately held company of 475 employees currently operates out of 15 locations across North America. Situation Today, Wholesale Electric is facing more competition than ever from several recent entrants into their core geographic market. In order to improve operational effectiveness and achieve organizational objectives, Wholesale Electric looked to address some technology challenges. Their biggest priorities were providing a high level of security and improving the reliability of their VPN connections to enhance site-to-site connectivity and enable remote system management. As one centrally located IT group, it is critical that we have constant, uninterrupted access to remote site networking and end user machines. We don t utilize any private network circuits. Everything, including internal networking, is routed across the Internet, said Bill Fife, Director of Technology, Wholesale Electric. Customer: Wholesale Electric Website: wholesaleelectric.com Industry: Distribution Region: United States Size: 475 Employees 15 Locations Product: WatchGuard AP200 WatchGuard XTM 505 WatchGuard XTM 510 WatchGuard XTM 515 WatchGuard Case Study Distribution Wholesale Electric 1 of 6

2 With our prior units, we would have to occasionally restart the WAN interfaces and VPN tunnels. WatchGuard s appliances just seemingly take care of themselves, giving us more reliable connectivity. We have a much better security posture with significantly more information. Bill Fife, Director of Technology, Wholesale Electric Wholesale Electric had been using some very old McAfee small office units for managing remote office traffic and VPNs, which were nearly two years out of support, and well past end of sale. Application control, IPS, inline anti-virus - these are things that we just did not have on our prior units because the units simply did not have the computational ability. The technology was not there and it was desperately needed, said Fife. As we all know, Internet usage is increasing exponentially and will never decrease. You are always going to need faster throughput, but you also need control over what travels through the box. Thus, Fife s mission was to find a single device that could provide all of these services under a common management platform. Historically, Wholesale Electric had very little visibility into their remote office firewall devices. They had no access to data on traffic running through their security boxes, and didn t understand how those boxes were behaving from an analytics perspective. From an operations standpoint, they also wanted to gain more control and insight into user behavior to assess their productivity and efficiency. Wholesale Electric believed such security intelligence and behavioral insight would improve business decision-making moving forward. Solution Recognizing their need for stronger network security and optimization, Wholesale Electric began researching options. We considered SonicWall and McAfee, as well as some others, but they were not headed in the desired direction. I had not been happy with McAfee because they abandoned the product line we d been using and their larger sized firewall support contracts were very expensive, said Fife. After quickly narrowing their options down to WatchGuard and SonicWall, Fife and his team talked to industry peers who had used the products, and explored analyst reviews to get a true sense of the products performance. From their discussions and research, there was a clear consensus that the firewall and VPN throughput speeds, high bandwidth and other key performance indicators coming from WatchGuard were highly credible and accurate. With that, Wholesale Electric decided to do a proof of concept with the WatchGuard XTM 5 Series firewall appliances. WatchGuard Case Study Distribution Wholesale Electric 2 of 6

3 WatchGuard s appliances just seemingly take care of themselves, giving us more reliable connectivity. We have a much better security posture with significantly more information. The WatchGuard system engineer accessed my units and built a test VPN tunnel. I watched him create these tunnels and noticed the ease with which it could be done, said Fife. Even though I had previously built VPN tunnels on our other devices, this seemed very simple. It just started running the way it should. With confidence in the XTM 5 Series boxes, Wholesale Electric moved forward with a full deployment of the WatchGuard firewall appliances. We deployed a standard firewall policy template and then customized configurations for every office implementing features such as Application Control, IPS, Reputation Defense and Gateway AntiVirus where needed. It was a simple, efficient process, said Fife. After a seamless implementation of WatchGuard s XTM 5 Series boxes, Wholesale Electric introduced WatchGuard Dimension to provide enhanced security intelligence and inform better decision-making. I wanted to see what Dimension would show us, said Fife. Here is a version-independent and FREE product that can parse through all of our log data. Just send over the device logs and let it do its job. WatchGuard Dimension gave Wholesale Electric a suite of big data visibility and reporting tools that pin pointed key security issues and identified trends in their network security. Using the product, Fife and his team could choose from over 70 reports to give them at-a-glance, high-level information or allow them to drill down to find the exact information they needed. With these tools, Wholesale Electric could better understand how their security boxes and their users were behaving. Benefits Since implementing WatchGuard s XTM solution and Dimension for security intelligence, Fife and his team are now able to work more efficiently in their day-to-day roles, provide better service to end users, and ultimately make smarter, more informed business decisions. We have gained time in our day, eliminated the need to disrupt on-site personnel for almost all WAN issues and can virtually guarantee they remain on-line, said Fife. WatchGuard Case Study Distribution Wholesale Electric 3 of 6

4 Benefits cont. We have gained time in our day, eliminated the need to disrupt on-site personnel for almost all WAN issues and can virtually guarantee they remain on-line. WatchGuard Dimension Visibility into network security improves decision-making and optimizes resources Wholesale Electric uses WatchGuard Dimension to get a 365-degree view of network security. Fife and his team are able to generate multiple reports to filter data in order to see critical information or active users and connections. They use this information to better understand how their systems are behaving, and make more informed decisions to protect their business and optimize operations. In one instance, Dimension exposed applications that were making excessive connection attempts (hundreds of thousands per day) to update the AntiVirus files for Symantec s Endpoint Protection. The excessive connection attempts were wastefully depleting XTM resources and could have caused serious problems within a single process, or even crashed the entire unit. Once those attempts were determined to be an HTTP proxy configuration error, the configuration was updated and activity normalized. Because there were no end user complaints or bandwidth disruptions, this significant problem would have gone unnoticed except for Dimension. Ability to detect proxy IPS errors on mobile devices to solve issues quickly and effectively Fife and his team use Dimension in multiple ways to provide visibility into their environment. In one example, they used Dimension to detect proxy IPS errors on mobile devices. Using Dimension we were quickly able to trace down and resolve an interesting problem, said Fife. We have some cellular data cards from AT&T and for whatever reason those users suddenly began receiving a Squid proxy IPS error when visiting our site. I was able to pinpoint that specific error utilizing Dimension s Log Search feature and determined that only AT&T cellular cards users were seeing the error. Access was quickly restored after implementing a special Firewall rule. This visibility has given Wholesale Electric a stronger sense of the security risks facing their company and a stronger position from which they can address those risks. Increased Employee Productivity Wholesale Electric has used Dimension analytics and reporting to quickly uncover employee use of social media on company machines during working hours, which had been causing decreased productivity and exposure to network security issues. One of the first things that was very quickly noticed was that employees were spending way too much time watching YouTube videos. So we were able to discuss things with their supervisors and we now have several productivity hours regained. In years prior, we had not been able to track that, said Fife. WatchGuard Case Study Distribution Wholesale Electric 4 of 6

5 Benefits cont. It allows us to focus on things we should be doing versus remediating malware infections which can be time-intensive. With WatchGuard Technologies in place, IT administrators and supervisors know that their employees are not only protected, but more productive. WatchGuard XTM 5 Series Firewall Appliances More reliable connectivity and faster VPN throughput Wholesale Electric has established more reliable connectivity and faster VPN throughput two of their primary objectives with a WatchGuard security solution. With our prior units, we would have to occasionally restart the WAN interfaces and VPN tunnels. WatchGuard s appliances just seemingly take care of themselves, giving us more reliable connectivity. We have a much better security posture with significantly more information, said Fife. More than two years after implementing the WatchGuard XTM 505, 510, and 515 boxes, Fife rates the overall performance as very high. I have viewed WatchGuard s real-time bandwidth monitor and noticed iscsi SAN data traveling at 250 Mbps across the VPN. That is not even a highly tuned VPN tunnel it is just a generically configured tunnel with high encryption. That is pretty nice throughput, said Fife. Multiple security products integrated in one box under one license, for complete protection Fife values the simplicity and comprehensiveness of the WatchGuard unified threat management solution, which provides Wholesale Electric with high performing firewall/ VPN with powerful security services and a suite of flexible management tools in an all-in-one solution. For Fife, this reduces the time needed to manage multiple single-point security products, saves money on support and hardware, and gives him peace of mind knowing that all of his security capabilities are working together for a holistic, comprehensive approach to network protection. You get intrusion protection, anti-virus, WebBlocker so we have multiple security products integrated into the box under one license for three years, and here is the price. That is a very attractive offer, said Fife. Reduced downtime and improved productivity due to fewer infections WatchGuard s XTM boxes gave Wholesale Electric Intrusion Prevention Service (IPS), WebBlocker and Gateway AntiVirus to stop threats security tools they previously lacked. These tools, along with other layers of integrated defense, significantly reduced the number of infections on Wholesale Electric machines. They cut time spent managing and repairing infections, which minimized downtime and helps keep employees more productive. WatchGuard Case Study Distribution Wholesale Electric 5 of 6

6 Benefits cont. It allows us to focus on things we should be doing versus remediating malware infections which can be time-intensive, said Fife. Fife also noted that when Wholesale Electric started using more of the WatchGuard functionality at different locations, they saw a big reduction in the incidence of malware, spyware, and general PC infections. We now have better security. With WebBlocker and the new cloud-based service, we can perform an additional check for mobile malware and extended threats, which are separate categories within WebBlocker, said Fife. In addition, WebBlocker has given Wholesale Electric control over access to sites that host objectionable material or pose network security risks. The WebBlocker functionality takes it beyond simple URL blocking such as prohibiting Facebook, Myspace, etc. You can now block entire groups of social networking or videos, said Fife. When we add WebBlocker protection onto the HTTP and HTTPS proxies at all of our locations we ll be protected against sites hosting elevated exposure and emerging exploits threats. Dynamic DNS, key loggers, bot networks... so once again, it s another layer of security. About WatchGuard WatchGuard Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, Best-of-Breed security features, and policy-based management tools. WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity Service, an innovative support program. WatchGuard is headquartered in Seattle, Washington with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com. SMART SECURITY americasinfo@watchguard.com 505 Fifth Avenue South, Suite 500, Seattle, WA WatchGuard Case Study Distribution Wholesale Electric 6 of 6

Leading Telecom Provider Ensures Customers Have Proper Network Protection with WatchGuard

Leading Telecom Provider Ensures Customers Have Proper Network Protection with WatchGuard Leading Telecom Provider Ensures Customers Have Proper Network Protection with WatchGuard Entel is the largest telecommunications provider in Chile and Peru with more than 4,700 employees. It was established

More information

WatchGuard solution provides transparency and visibility into Anthem College s nationwide network

WatchGuard solution provides transparency and visibility into Anthem College s nationwide network WatchGuard solution provides transparency and visibility into Anthem College s nationwide network Providing quality post-secondary education for more than a century, Anthem College prepares students for

More information

DOWNTIME CAN SPELL DISASTER

DOWNTIME CAN SPELL DISASTER DOWNTIME CAN SPELL DISASTER Technical Brief Ensure Network Uptime: High Availability with XTM FireCluster August 2010 Network downtime is expensive for businesses in today s 24/7 global economy. Any malfunctions

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated

More information

How To Control Your Computer With Watchguard Application Control

How To Control Your Computer With Watchguard Application Control Take Back Control: Increase Security, Empower Employees, Protect the Business Application Control White Paper October 2010 Introduction: Balancing Productivity with Security As workers find new and creative

More information

Clustering and Queue Replication:

Clustering and Queue Replication: Clustering & Queue Replication Clustering and Queue Replication: How WatchGuard XCS Provides Fully Redundant Messaging Security Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Introduction

More information

UTM-Enabled Network Protection

UTM-Enabled Network Protection Unlocking the Promise of UTM-Enabled Network Protection What small, midsized, and distributed enterprises need to know to get the most from Unified Threat Management Based on a Frost & Sullivan Executive

More information

WatchGuard Gateway AntiVirus

WatchGuard Gateway AntiVirus Gateway AntiVirus WatchGuard Gateway AntiVirus Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Malware Continues to Grow New and ever-changing threats appear with alarming regularity,

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

WatchGuard Technologies. 2011 WatchGuard Technologies

WatchGuard Technologies. 2011 WatchGuard Technologies WatchGuard Technologies 2011 WatchGuard Technologies About WatchGuard Founded in 1996 - privately held Firewall appliance pioneers Headquartered in Seattle, WA with 400+ employees globally More than 600,000

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment PCI DSS Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment White Paper Published: February 2013 Executive Summary Today s retail environment has become increasingly

More information

Configuration Example

Configuration Example Configuration Example Use WatchGuard Application Control with Your Existing Firewall Example configuration files created with WSM v11.10.1 Revised 7/21/2015 Use Case An organization wants to block the

More information

Take Back Control: Increase Security, Empower Employees, Protect the Business

Take Back Control: Increase Security, Empower Employees, Protect the Business Take Back Control: Increase Security, Empower Employees, Protect the Business Application Control White Paper October 2010 Introduction: Balancing Productivity with Security As workers find new and creative

More information

Secure Remote Access Give users in office remote access anytime, anywhere

Secure Remote Access Give users in office remote access anytime, anywhere Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly

More information

Security Administration R77

Security Administration R77 Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check

More information

WatchGuard network security solution provides safe environment for Walker County School District students and staff

WatchGuard network security solution provides safe environment for Walker County School District students and staff WatchGuard network security solution provides safe environment for Walker County School District students and staff The Walker County School District is a public school system in the state of Georgia that

More information

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

Technical Brief ActiveSync Configuration for WatchGuard SSL 100 Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

Uncover security risks on your enterprise network

Uncover security risks on your enterprise network Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up

More information

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard: Your Security Partner of Choice. Carlos Vieira WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices

More information

Configuration Example

Configuration Example Configuration Example Centralized Branch Office VPN Architecture (Hub & Spoke) Example configuration files created with WSM v11.10.1 Revised 7/24/2015 Use Case In this configuration example, an organization

More information

NASCIO 2015 State IT Recognition Awards

NASCIO 2015 State IT Recognition Awards NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA calvin.rhodes@gta.ga.gov

More information

How To Secure Your Business

How To Secure Your Business security In our world and in our time, security is a term that places a tremendous responsibility on the people who claim it. You need to be certain that your security partner demonstrates the right values

More information

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Providing Secure IT Management & Partnering Solution for Bendigo South East College Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,

More information

Network protection and UTM Buyers Guide

Network protection and UTM Buyers Guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection

More information

How To Choose A Network Firewall

How To Choose A Network Firewall Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No

More information

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are

More information

WatchGuard SSL 2.0 New Features

WatchGuard SSL 2.0 New Features WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features

More information

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction. TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and

More information

Configuration Example

Configuration Example Configuration Example BOVPN Virtual Interface Load Balancing with OSPF Example configuration files created with WSM v11.10 Revised 5/22/2015 Use Case In this configuration example, an organization has

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

How To Improve Nts Information Technology

How To Improve Nts Information Technology Brief Introduction to NTS Information Technologies & Tools March 2012 Company Profile 1000+ Employees Corporate HQ Calabasas, CA Founded 1961 25 Locations Worldwide NASDAQ: NTSC $144 MM Revenue (FY2011)

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Configuration Example

Configuration Example Configuration Example Use Public IP Addresses Behind an XTM Device Example configuration files created with WSM v11.7.2 Revised 3/22/2013 Use Case There are several reasons to use publicly routable IP

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense

More information

NETWORK SECURITY 101 The Value of a Protected Network

NETWORK SECURITY 101 The Value of a Protected Network NETWORK SECURITY 101 The Value of a Protected Network JUNE 2005 Network Security as Insurance Every year, companies make significant investments in comprehensive insurance policies to protect assets. Businesses

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F

Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F Getting Started The Firebox X Core and Peak e-series is a line of high performance, real-time

More information

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies

Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies 2010 WatchGuard Technologies Cyber-Bullying Stopcyberbullying.org, an

More information

Executive Brief on Enterprise Next-Generation Firewalls

Executive Brief on Enterprise Next-Generation Firewalls Executive Brief on Enterprise Next-Generation Firewalls How security technology can reduce costs, improve compliance and increase employee productivity Enterprise Next-Generation Firewalls protect businesses

More information

Cloud-based Web Security Isn t Hype: It s Here and It Works

Cloud-based Web Security Isn t Hype: It s Here and It Works Cloud-based Web Security Isn t Hype: It s Here and It Works June 2010 INTRODUCTION It s not news that the web is dangerous and getting more dangerous by the day. Cyber criminals have ample economic motive

More information

Configuration Example

Configuration Example Configuration Example Use a Branch Office VPN for Failover From a Private Network Link Example configuration files created with WSM v11.10.1 Revised 7/22/2015 Use Case In this configuration example, an

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Layer-2 Design: Link Balancers Simplified

Layer-2 Design: Link Balancers Simplified Technology White Paper Layer-2 Design: Link Balancers Simplified Build Smarter Networks Table of Contents 1. Executive Summary... 3 2. Overview of the Problem... 3 3. Layer-2 Design Principles... 4 4.

More information

Web Security Monitor. I R O N P O R T S - S E R I E S F e a t u r e Overview

Web Security Monitor. I R O N P O R T S - S E R I E S F e a t u r e Overview I R O N P O R T S - S E R I E S F e a t u r e Overview I r o n P o r t Web Security Monitor I n s ta n t ly a s s e s s a n d p r o t e c t a g a i n s t a r a n g e o f W e b s e c u r i t y t h r e at

More information

CASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months

CASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months CASE STUDY NEXON ASIA PACIFIC PAGE 1 Nexon Asia Pacific is a Managed Security Service Provider (MSSP) that delivers infrastructure and software to provide secure connectivity and productivity applications,

More information

IBM Internet Security Systems

IBM Internet Security Systems IBM Global Services IBM Internet Security Systems Norberto Gazzoni Italy Channel Manager norberto_gazzoni@it.ibm.com +39 347 3499617 IBM Internet Security Systems Ahead of the threat. 2006 IBM Corporation

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security

More information

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security

More information

Supporting voice and business-critical applications across multiple sites

Supporting voice and business-critical applications across multiple sites MPLS Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity Reliable, highly available MPLS-based WAN solution that supports

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

Nominee: Barracuda Networks

Nominee: Barracuda Networks Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network

More information

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit. Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business

More information

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.] Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

WEBSENSE TRITON SOLUTIONS

WEBSENSE TRITON SOLUTIONS WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats

More information

BYOD: Bring Your Own Device or Bring Your Own Danger?

BYOD: Bring Your Own Device or Bring Your Own Danger? Bring Your Own Device BYOD: Bring Your Own Device or Bring Your Own Danger? White Paper Published: January 2013 What is BYOD? BYOD stands for Bring Your Own Device, and is used to describe the phenomenon

More information

WatchGuard Certified Training Partner (WCTP) Program

WatchGuard Certified Training Partner (WCTP) Program WatchGuard Certified Training Partner (WCTP) Program Revised: July 2010 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.

More information

WatchGuard Certified Training Partner (WCTP) Program

WatchGuard Certified Training Partner (WCTP) Program WatchGuard Certified Training Partner (WCTP) Program Revised: August 2014 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance

More information

Dell SonicWALL report portfolio

Dell SonicWALL report portfolio Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer

More information

The Next Level of Secure Channel Partnership

The Next Level of Secure Channel Partnership The Next Level of Secure Channel Partnership Copyright 2015 ADVANCED NETWORK SECURITY WatchGuard s Channel Ecosystem Is Focused, and the Opportunity for Engaged WatchGuardONE Partners Is Better Than Ever

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

Firewall Buyers Guide

Firewall Buyers Guide Looking to replace your network firewall? Whether you want to consolidate everything into a unified solution or add next-generation features, this guide is for you. It provides an overview of what to consider

More information

Cisco ASA 5500 Series Business Edition

Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive

More information

Configuration Example

Configuration Example Configuration Example Set Up a Public Web Server Behind a Firebox Example configuration files created with WSM v11.10.1 Revised 7/21/2015 Use Case In this configuration example, an organization wants to

More information

Phish Blocker: Spyware Blocker:

Phish Blocker: Spyware Blocker: The following are included with base package of protection: Web Filter: Computer Team s Untangle Network Defender web filter (internet filter) enables administrators to enforce network usage policies and

More information

DEFENDING THE REMOTE OFFICE: WHICH VPN TECHNOLOGY IS BEST? AUGUST 2004

DEFENDING THE REMOTE OFFICE: WHICH VPN TECHNOLOGY IS BEST? AUGUST 2004 DEFENDING THE REMOTE OFFICE: WHICH VPN TECHNOLOGY IS BEST? AUGUST 2004 DEFENDING THE REMOTE OFFICE: WHICH VPN TECHNOLOGY IS BEST? EXECUTIVE SUMMARY Using the Internet to connect the distributed small-

More information

FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012

FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012 FEATURE OVERVIEW FGX Series firewall Last updated February 2012 Celestix FGX Features Deep Packet Firewall VPN Virtual system DoD/DDoS attach defense Intrusion protection Anti-virus Anti-spam URL filtering

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

Fireware Essentials Exam Study Guide

Fireware Essentials Exam Study Guide Fireware Essentials Exam Study Guide The Fireware Essentials exam tests your knowledge of how to configure, manage, and monitor a WatchGuard Firebox that runs Fireware OS. This exam is appropriate for

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Security from Above: How Cloud based Security Delivers Up to the Minute Network Protection

Security from Above: How Cloud based Security Delivers Up to the Minute Network Protection Security from Above: How Cloud based Security Delivers Up to the Minute Network Protection February 2010 THE NEED TO RECONSIDER SECURITY APPROACHES The convergence of numerous trends is causing organizations

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution Today s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers

More information

Komplettschutz für den Mittelstand

Komplettschutz für den Mittelstand Komplettschutz für den Mittelstand 26.04.2007 Paderborn Clemens Guttenberger System Engineer DACH Agenda Produktüberblick LiveDemo Fireware 9.0 SecurityServices Fireware Edge 8.5 Fragen Über uns : Gründungsjahr

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged Converged Private Networks voice and high-speed data connectivity Reliable, highly

More information

ContentProtect Security Appliance. Reveal. Optimize. Protect.

ContentProtect Security Appliance. Reveal. Optimize. Protect. ContentProtect Security Appliance Reveal. Optimize. Protect. Take Control of Your Internet Connection Internet content and applica- The ContentProtect Security you have is always the content tions have

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

Cisco RSA Announcement Update

Cisco RSA Announcement Update Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of

More information

Cisco Cloud Web Security

Cisco Cloud Web Security Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that

More information

WatchGuard Certified Training Partner (WCTP) Program

WatchGuard Certified Training Partner (WCTP) Program WatchGuard Certified Training Partner (WCTP) Program Revised: April 2012 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.

More information

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the

More information

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks

More information