Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP
|
|
|
- Elvin Elliott
- 10 years ago
- Views:
Transcription
1 Company Overview Dima Kumets, Product Manager Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP Infrastructure: 13 data centers, 100% uptime Security Product Line: New security service - Umbrella by OpenDNS (November 2012) #1 Mar-27-13
2 Company Overview Dima Kumets, Product Manager Agenda Challenges in security in EDU Umbrella technical overview Umbrella dashboard Q&A #2 Mar-27-13
3 IT for Education has changed PAST TODAY COMPUTER LABS WI-FI EVERYWHERE MANAGED DESKTOPS LAPTOPS AND BYOD SINGLE PLATFORM MULTI OS AND PLATFROM 1_Light Title Only LIMITED BANDWIDTH EXPLODING BANDWIDTH 100% ON PREM ROAMING USERS #3 Mar Mar Umbrella Confidential
4 Challenges in Education IT Growing bandwidth High Performance Malware Botnets BYOD CIPA Compliance Laptops roaming off premises Needs Challenges #4 Mar Umbrella Confidential
5 Security in the past Got a problem? Buy a box. Increasing bandwidth? Add a box New campus? Add a box Increased enrollment? Add a box 1_Light Title Only Box too slow? Add a box Adding more servers? Add a box More reports to store? Add a box Boxes start to break? Add a box New ports to protect? Add a box Managing too many boxes? Add a box to manage boxes #5 Mar Umbrella Confidential
6 Security Appliances Growing demands are putting IT on a security appliance treadmill And your users? They've left the building. #6 Mar-27-13
7 What is Umbrella? Malware and Botnet protection with BYOD support and AD Integration Mobile Protection for ios and Android Roaming protection for employees and students Web filtering for any device connecting to guest Wi-Fi Web filtering 59+ categories, blacklists, whitelists and bypass feature. Web dashboard easy to use, manage policy, deploy new identities and view reports anywhere Malware and botnet protection prevents infection and blocks bots from reaching command & control points. Zero downtime since launch in 2006 with global data centers and bgp routing #7 Mar-27-13
8 OpenDNS Enterprise Global Network London, UK Telehouse North Amsterdam, NL TeleCity 1 Frankfurt, DE Equinix Frankfurt Seattle, US The Westin Building Palo Alto, US Switch & Data Los Angeles, US Equinix Los Angeles Chicago, US 350 E. Cermak New York, US 111 8th Ave Ashburn, US Equinix Ashburn Tokyo, JP Datacenter TBD Hong Kong, HK Mega iadvantage Dallas, US Dallas Infomart Miami, US Nap of the Americas Singapore, SG Equinix Singapore Sydney, AU Datacenter TBD Point of Presence (PoP) Private Peering Datacenter TODAY PLANNED Sao Paulo, BR Datacenter TBD Globally distributed servers at 13 PoPs with more planned using Anycast IPs with BGP routing and the best peering in the industry. Built from the ground-up for reliability and 100% uptime. #8 Mar-27-13
9 Cloud Architecture: Under the hood Policy Reporting DNS Query Internet No bottlenecks Campus Network Permitted Domain DNS Response Real-Time Threats Malware, Botnet AUP Violations Roaming Users Custom Block Page Real-time Threats and domain categorization is 100% in the cloud. No bottlenecks DNS with protection is faster than plain ISP or carrier DNS. Unprecedented Scale No bandwidth constraints or sizing guides. Full coverage Any and all devices on the network. Roaming users protected using lightweight agent. #9 Mar-27-13
10 Umbrella Enterprise for EDU Network Wide Coverage Protection for any device connecting to the campus network IT managed devices with zero touch deploy Full BYOD coverage including Mac, Windows, tablets, game consoles, etc Block page bypass allow privileged users to bypass blocking without software Deploy in minutes Interoperability certified Enter External IP range in Umbrella dashboard Set DHCP DNS to our IPs Alt - forward :53 to OpenDNS Aruba IPs Campus Integrated OpenDNS login in Virtual controller Virtual controller self configures using API calls to Umbrella Aruba Instant Local recursive DNS Forward DNS to OpenDNS Enter External IP range in Umbrella dashboard Local DNS Cache with OpenDNS Local DNS #10 Mar-27-13
11 Umbrella Insights for EDU Active Directory Integration Group based policy with ranked rules Per-user reporting with roll-ups per group and organization wide Full coverage. Non-AD users protected with default policy Internal IP/IP range based rules available Pre-configured VM, Connector and config files downloaded from dashboard Insights Linux VM for VMWare ESXi forwards DNS Connector on DC cloud sync for users +groups Pre-configured downloads Monitoring from Umbrella Dashboard Active Directory Group #11 Mar-27-13
12 Umbrella Everywhere for EDU Off Network Protection Lightweight agent for Windows and Mac Identification only via EDNS all policy and lists are in the cloud Location aware policy allows different policy on-network vs roaming Security without performance impact Deploy using GPO or RMM in minutes msiexec /i RoamingClient_WIN.msi /qn ORG_ID=<Organization> ORG_FINGERPRINT=<hash> USER_ID=<who is deploying>hide_ui=<0 or 1 for systray icon and notifications> Windows Small MSI Runs as a service CLI or interactive install Mac Small pkg Runs as a service CLI or interactive install Windows Agent OS X Agent #12 Mar-27-13
13 Umbrella Everywhere for EDU Mobile Protection VPN profile for ios devices Deployed via app or MDM Full encryption to protect against man in themiddle Policy enforcement in the cloud ios VPN profile Optional App Android Beta soon Encryption and malware protection ios Android #13 Mar-27-13
14 Umbrella: Customer Highlights MSP & MANAGED WI-FI RETAIL & GUEST WI-FI ENTERPRISE S & SMBs COLLEGES & UNIVERSITIE S K-12 SCHOOLS #14 Mar-27-13
15 Case Study: Network Maine Protected: 188,000+ students at 1,000+ schools and libraries in Maine Customer since: 2010 Why they re using Umbrella: Protection against malware and botnets, web filtering, CIPA Compliance Problem: Hardware solution scaling issues with growing adoption and bandwidth WHAT THEY RE SAYING Our previous content filtering solution was the Achilles heel for the network. Anytime it had a performance problem it was felt everywhere since all http traffic went through these appliances. With Umbrella Enterprise we no longer have to worry about performance or scalability. Jeff Letourneau, Executive Director #15 Mar-27-13
16 Case Study: George Washington University Protected: 25,000 students, 1,600 full-time staff, 3 campuses, many satellite locations. Customer since: 2011 Why they re using Umbrella: Protection against malware and botnets, elimination of appliance management and maintenance, thorough yet easy-to-manage network protection at multiple locations Problem: Finding a powerful solution to fight the increase in malware infections. Appliances required too much time to manage and scale. WHAT THEY RE SAYING Rather than having to put one-off rules into an appliance to allow for exceptions, we can easily assign local technical people the authority to change rules on their own networks in Umbrella. Matthew Wollenweber, Senior Computer Forensics Information Security System Engineer #16 Mar-27-13
17 Umbrella Dashboard Configure
18 Umbrella Dashboard - Policy #18 Mar-27-13
19 Umbrella Dashboard - Identity #19 Mar-27-13
20 Umbrella Dashboard - Identity #20 Mar-27-13
21 Umbrella Dashboard - Identity #21 Mar-27-13
22 Umbrella Dashboard Security #22 Mar-27-13
23 Umbrella Dashboard - Categories #23 Mar-27-13
24 Umbrella Dashboard Blacklist/Whitelist #24 Mar-27-13
25 Umbrella Dashboard - Customization #25 Mar-27-13
26 Umbrella Dashboard Reporting
27 Umbrella Dashboard - Reporting #27 Mar-27-13
28 Umbrella Dashboard - Reporting #28 Mar-27-13
29 Umbrella Dashboard - Reporting #29 Mar-27-13
30 Umbrella Dashboard - Reporting #30 Mar-27-13
31 Q&A Contact: Dima Kumets, Product Manager - [email protected] Free Trial for Airheads [email protected] OpenDNS Confidential
DUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
We license by the total # of users with Internet access. No, but you may contact us anytime you need to increase your license count.
Frequently Asked Questions Get Instant Answers. In order to make sure you have all the information you need about Umbrella, we ve compiled answers to the most common questions we hear. If we didn t answer
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront
Delivering Media from the Cloud Alex Dunlap Senior Manager, Amazon CloudFront Agenda Today we will: Provide a brief introduction to Amazon CloudFront. Examine common needs and challenges we ve seen from
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry
AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL
SoftLayer: Introduction
SoftLayer: Introduction Kim Mortensen SoftLayer & Cloud Managed Services ITS Channel Sales Denmark [email protected] 2013 IBM Corporation IBM cloud offerings Cloud Managed Services Formerly (SCE+) Have it
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation
Softlayer An IBM company Team-Enablement 5th September 2013 SoftLayer has a global footprint 13 data centers 17 network PoPs Global private network 685 employees (25 in Europe, o/w 4 Sales) 2013 Projected
Microsoft 70-696 Exam
Volume: 86 Questions Topic 1: Proseware, Inc. 8 Topic 2: Litware, Inc. 14 Topic 3: Contoso, Ltd. 7 Topic 4: Fabrikam, Inc. 13 Topic 5: Mix Questions 44 Topic 1, Proseware, Inc. Case Study Overview General
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
A Secure Cloud Platform For egaming
A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming [email protected] consultancy voice & data cloud & hosted solutions internet security
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Networks. Sites and Internal Networks: Setup Guide. Sites and Internal Networks Setup Guide for Umbrella Page 1
Active Directory Sites and Internal Networks Sites and Internal Networks: Setup Guide Sites and Internal Networks Setup Guide for Umbrella Page 1 Overview Internal Networks allows to you manage your Umbrella
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Systems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
Sophos Cloud and Partner Dashboard Jonathan Shaw
Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming
Active Directory Integration: Install and Setup Guide. Insights
Active Directory Integration: Install and Setup Guide Insights This guide explains how to install and configure the Active Directory Components provisioned and maintained from the Umbrella Dashboard with
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
Using ArcGIS for Server in the Amazon Cloud
Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Company Overview. October 2014
Company Overview October 2014 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus What Does Black Lotus Do? We are a security company that protects businesses
EVERYBODY S NETWORK CLOUD
PRIVATE INTERNET WAN PUBLIC CONNECT PARTNERS SERVICE PROVIDER CLOUD EVERYBODY S NETWORK CLOUD THE WIN-WIN WAN MARKET CONTEXT The cloud is the new IT architecture for enterprises. 85% of global IT decision-makers
Generating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5
Enterprise Insights Active Directory Integration: Installation and Setup Guide v1.0.5 This guide explains how to install and configure the Active Directory Components provisioned and maintained from the
Monitoring & Measuring: Wi-Fi as a Service
Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Who s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014
Equinix Cloud Exchange Datacenter Forum Stephane Buchs, IMS 17 th September 2014 Largest carrier-neutral data center provider Market Challenge Expanding addressable market; ensuring consistent performance
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
MTP. MTP AirWatch Integration Guide. Release 1.0
MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of
Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect
1 Pega as a Service Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect This information is not a commitment, promise or legal obligation to deliver any material,
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Bitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Meraki: Introduction to Cloud Networking
Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
VMware End User Computing Horizon Suite
VMware End User Computing Horizon Suite Luc Gallet [email protected] 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
How To Use An Ibm Cloud Server For Business
SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company 2014 IBM Corporation Executive summary Early cloud models shared, virtualized resources are no longer enough to achieve
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Virtualization in Enterprise Environment. Krisztian Egi
Virtualization in Enterprise Environment Krisztian Egi Session Outline Virtualization technology overview Challenges in enterprise environment Q & A 2 Virtualization technology overview What s virtualization
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Meraki Wireless Solution Comparison
Meraki Wireless Solution Comparison Why Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without training or dedicated staff Centrally manage thousands
VMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
Paul Cochran - Account Manager. Chris Czerwinski System Engineer
Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional
Putting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Mobile Device Management Version 8. Last updated: 16-09-14
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Introduction to Cloud Networking. Meraki Solution Overview
Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of
Connect - Transit, IP-VPN & Metro Services
Connect - Transit, IP-VPN & Metro Services Network services connecting every area of your business It s your data and at UKSolutions we realise the importance of it as much as you do. We operate a next
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
Roaming Client: Deployment Guide for Umbrella. Roaming Client
Roaming Client: Deployment Guide for Umbrella Roaming Client Overview The Roaming Client serves to protect laptops regardless of where they are in the world or how they connect to the Internet. The client
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
overview Introductions Code 42 Reinventing Q&A backup
overview Introductions Code 42 Reinventing Q&A backup >. Joe Wall CRASHPLANPROe Enterprise Client List SOFTWARE HARDWARE CLOUD Backup: reinvented A Revolution in Enterprise Protection About Code 42 The
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Deployment Guide for Microsoft Lync 2010
Deployment Guide for Microsoft Lync 2010 Securing and Accelerating Microsoft Lync with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...3
