UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY



Similar documents
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Simple security is better security Or: How complexity became the biggest security threat

NETASQ MIGRATING FROM V8 TO V9

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Move over, TMG! Replacing TMG with Sophos UTM

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Cisco Small Business ISA500 Series Integrated Security Appliances

USG6600 Next-Generation Firewall

USG6300 Next-Generation Firewall

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Network Security Solution. Arktos Lam

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Securing the Small Business Network. Keeping up with the changing threat landscape

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

SonicWALL Advantages Over WatchGuard

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Readiness Assessments: Vital to Secure Mobility

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Huawei Eudemon200E-N Next-Generation Firewall

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Firewall Feature Overview

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

Astaro Gateway Software Applications

Kaseya IT Automation Framework

Network protection and UTM Buyers Guide

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Firewall and UTM Solutions Guide

Unified Threat Management, Managed Security, and the Cloud Services Model

Next Generation Enterprise Network Security Platform

INTRODUCTION TO FIREWALL SECURITY

Steps for Basic Configuration

Gigabit SSL VPN Security Router

Putting Web Threat Protection and Content Filtering in the Cloud

How To Choose A Network Firewall

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES

Implementing Cisco IOS Network Security

APV9650. Application Delivery Controller

IINS Implementing Cisco Network Security 3.0 (IINS)

Gateway Security at Stateful Inspection/Application Proxy

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

IxLoad-Attack: Network Security Testing

Secure Cloud-Ready Data Centers Juniper Networks

Next Gen Firewall and UTM Buyers Guide

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Analyzing HTTP/HTTPS Traffic Logs

Fortinet Certified Network Security Administrator

Ranch Networks for Hosted Data Centers

IBM. Vulnerability scanning and best practices

Providing Secure IT Management & Partnering Solution for Bendigo South East College

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Network Security. Protective and Dependable. Pioneer of IP Innovation

Securing Networks with PIX and ASA

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet

Unified Security, ATP and more

Cloud Managed Security with Meraki MX

Simplify Your Network Security with All-In-One Unified Threat Management

Jort Kollerie SonicWALL

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Sophos Certified Architect Course overview

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Using a Firewall General Configuration Guide

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

The Advantages of Security as a Service versus On-Premise Security

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

The Cisco ASA 5500 as a Superior Firewall Solution

UNIFIED PERFORMANCE MANAGEMENT

Stormshield Network Security vs Fortinet

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Palo Alto Networks Next-Generation Firewall Overview

Cisco IOS Advanced Firewall

Results of Testing: Juniper Branch SRX Firewalls

WatchGuard Technologies WatchGuard Technologies

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Advantages of Managed Security Services

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Ovation Security Center Data Sheet

Cisco Wide Area Application Services (WAAS) Software Version 4.0

Recommended IP Telephony Architecture

Check Point taps the power of virtualization to simplify security for private clouds

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Content-ID. Content-ID URLS THREATS DATA

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Transcription:

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

VISION FUTURE-READY SECURITY Because a security solution represents an investment for several years, Stormshield Network Security products offer the requisite modularity and features for keeping abreast of future changes in the information system. SEAMLESS SECURITY In a Bring-Your-Own-Everything world, it has become even more of a challenge keeping users in check while developing an agile corporation that moves with the times. The only way for security to be effective is when it is seamless for both users and administrators. COLLABORATIVE SECURITY When modern threats bypass conventional protection systems as routinely as they already do, a new security approach is imperative. Stormshield Network Security solutions are built upon the concept of Multi-layer Collaborative Security. This holistic model, based on the active collaboration between the security engines on our various solutions marks the future of information system defense in depth. TRUSTED SECURITY As trusted vendors, Arkoon and Netasq deploy technologies that have been certified at the highest level in Europe (EU RESTRICTED, NATO RESTRICTED, and ANSSI EAL4+). The awarded certifications and qualifications guarantee an adapted level of protection for the strategic data of even the most sensitive corporations and organizations

COMPREHENSIVE RANGE SN300 SN150 SN200 UNIFIED SECURITY SN500 SN700 SN900 BUSINESS CONTINUITY IN COMPLEX ARCHITECTURES SN2000 SN6000 SN3000 FLEXIBILITY & PERFORMANCE FOR CRITICAL INFRASTRUCTURES AS WELL AS STRENGTHENED SECURITY FOR VIRTUALIZED ENVIRONMENTS Many organizations have opted for virtualization in order to streamline their IT infrastructure while at the same time enjoying the benefits of a technology that offers a significant decrease in the total cost of ownership (TCO), more simple operation, higher scalability and faster restoration in the event of a disaster. To provide support for the choice they have made, Stormshield Network Security virtual appliances offer the same level of protection and the same wealth of features as those found on physical products in the range. CLOUD-BASED SOLUTIONS In order to allow corporations to deploy a virtual infrastructure in the cloud securely while maintaining full control, the feature-rich quality of Stormshield Network Security solutions can be found in the Stormshield Network Cloud UTM application dedicated to Amazon Web Service environments. Effective protection of virtualized servers, web services and applications in an Amazon Web Service Cloud Simplified implementation via the Amazon Web Service Marketplace

ENSURE THE CONTINUITY OF YOUR BUSINESS The new Stormshield Network Security appliances are the fruit of Arkoon s and Netasq s combined technologies. The experience and references we have acquired in sensitive environments with stringent technological requirements should reassure organizations of all sizes. All protection technologies needed for responding to the most sophisticated attacks are embedded in the entire range. Stormshield Network Security s intrusion prevention system (IPS) combines targeted reactive databases with proactive analyses to detect known and unknown attacks. CONNECT COWORKERS Shifting behavioral habits, the growing complexity of organizations or pressure from competition are factors that force corporations and their employees to hone their agility. Mobility, telecommuting, the use of personal mobile terminals for work are just a few of the new challenges that need to be taken on with total peace of mind. With the virtual private network, (IPSec and SSL VPN), coworkers get secure access to corporate resources regardless of where they are and from any terminal. The SSL VPN feature adapts particularly well to BYOD environments. STAY IN CONTROL OF YOUR INTERNET USAGE The Internet is an indispensable source of information and applications, but access to them must be guarded. Thanks to advanced filtering and the management of quality of service, you can define the way you want the internet to be used and how and which visited websites will be scanned, including encrypted or Web 2.0 websites. MANAGE VULNERABILITIES Vulnerabilities on workstations and servers are open invitations to advanced threats that attempt to creep into the information system. Stormshield possesses the only effective application and network vulnerability detection technology embedded in a single firewall/utm solution: Stormshield Network Vulnerability Manager. Using its network traffic scan, obsolete or vulnerable applications on workstations and servers are detected in real time and an adapted protection can be applied in a single click. SAVE TIME The configuration of a security appliance is a crucial operation that must be as simple as it is thorough. The administration interface on Stormshield Network Security products has been designed to be ergonomic and intuitive in order to assist you in securing your corporate network quickly and with zero errors. KEEP YOUR COMMITMENTS TO COMPLIANCE Stormshield Network Security products are a key component in ensuring compliance with standards, regulations and norms that require access control (PCI-DSS, ISO 27001 or the Data Protection Act, etc.).

Specifi cations for hardware solutions Small businesses, Agencies, Branch offices Mid-size organizations, Agencies Large corporations, Datacenters PERFORMANCE* SN150 SN200 SN300 SN500 SN700 SN900 SN2000 SN3000 SN6000 Firewall (1518 byte UDP) 400 Mbps 600 Mbps 800 Mbps 1 Gbps 2 Gbps 4 Gbps 25 Gbps 50 Gbps 80 Gbps Firewall + IPS (1518 byte UDP) 200 Mbps 500 Mbps 700 Mbps 1 Gbps 2 Gbps 3 Gbps 9 Gbps 14 Gbps 18 Gbps Firewall + IPS (1 Mbyte HTTP) 150 Mbps 400 Mbps 600 Mbps 800 Mbps 1.2 Gbps 1.4 Gbps 4 Gbps 6 Gbps 8 Gbps NETWORK CONNECTIVITY Concurrent connections 30,000 75,000 150,000 250,000 600,000 1,200,000 2,000,000 2,500,000 10,000,000 New connections per second 2,500 15,000 18,000 20,000 22,000 25,000 90,000 120,000 180,000 Max number of VLAN 64 64 64 256 256 512 512 1,024 1,024 VPN IPSec throughput (AES128-SHA1) 80 Mbps 250 Mbps 300 Mbps 500 Mbps 650 Mbps 800 Mbps 3 Gbps 4.5 Gbps 6 Gbps IPSec VPN tunnels (Max) 25 50 100 500 1,000 1,000 5,000 5,000 10,000 Simultaneous SSL VPN clients 5 10 15 25 50 100 165 450 500 HIGH AVAILABILITY (HA) Active / passive - - HARDWARE 10/100/1000 Interfaces 1 + 2x2 ports 8 8 12 12 10-26 10-26 10-58 1 + 4 ports e-mails, personal (switch) files, shared network files would all become accessible to the assailant 1Gb /10Gb fiber Interfaces - - - - - 0-2 [1Gbps] 0-8 0-8 0-28 Local Storage - SD Card** SD Card** 120GB 120GB 120GB 128GB SSD 128GB SSD 256GB SSD Size <0,5U - 19 0,5U - 19 0,5U - 19 1U - 19" 1U - 19" 1U - 19" 1U - 19" 1U - 19" 2U - 19" Usage control Firewall/IPS/IDS mode, identity-based firewall, application firewall, Microsoft Services Firewall, detection and control of the use of mobile terminals, application inventory, vulnerability detection, URL filtering (embedded database or cloud mode), transparent authentication (Active Directory SSO Agent, SSL, SPNEGO), multi-user authentication in cookie mode (Citrix- TSE), global/local security policy. Protection from threats Intrusion prevention, protocol analysis, application inspection, protection from denial of service attacks (DoS), protection from SQL injections, protection from Cross-Site Scripting (XSS), protection from malicious Web2.0 code and scripts, Trojan detection, detection of interactive connections (botnets, Command&Control), protection from data evasion, advanced management of fragmentation, automatic quarantining in the event of an attack, antispam and antiphishing: reputation-based analysis heuristic engine, embedded antivirus (HTTP, SMTP, POP3, FTP), detection of unknown malware via sandboxing, SSL decryption and inspection, VoIP protection (SIP), collaborative security: adaptation of the filter policy according to security events or detected vulnerabilities. Confidentiality Site-to-site or nomad IPSec VPN, remote SSL VPN access in multi-os tunnel mode (Windows, Android, ios, etc), SSL VPN agent configurable centrally (Windows), Support for Android/ iphone IPSec VPN. Network - Integration IPv6, NAT, PAT, transparent (bridge)/ routed/hybrid modes, dynamic routing (RIP, OSPF, BGP), multi-level internal or external PKI management, internal LDAP directory, explicit proxy, policybased routing (PBR), QoS management, DHCP client/relay/server, NTP client, DNS proxy-cache, http proxycache, high availability, WAN link redundancy, LACP management. Management Web-based management interface, object-oriented security policy, real-time configuration help, firewall rule counter, more than 15 installation wizards, embedded log reporting and analysis tools, interactive and customizable reports, sending to syslog, SNMP v1, v2, v3 agent, automated configuration backup, external storage (option). Specifi cations for virtualized solutions For Network For Cloud MAIN CHARACTERISTICS V50 V100 V200 V500 VU VS5 VS10 Protected IP addresses 50 100 200 500 Unlimited - - Protected virtual machines - - - - Unlimited 5 10 Vulnerability Manager - - - - - Yes Yes Concurrent connections 100,000 200,000 400,000 600,000 3,000,000 1,000,000 2,000,000 Max number of VLAN 128 128 128 128 512 512 512 Max number of IPSec VPN Tunnels 100 500 1,000 1,000 10,000 10,000 10,000 Max number of Simultaneous SSL VPN clients 20 35 70 175 500 500 500 * Performance is measured in a laboratory and under conditions ideal for version 1. Results may vary according to test conditions and the software version ** Optional

CLOUD SERVICES CLOUD REPORTING Turnkey automated report generator CLOUD BACKUP Automatic configuration backup service CLOUD UPDATE Automatic updates Without the need for any prior human or hardware investment, you will be able to obtain comprehensive periodic reports with detailed indicators on the activity of your network. Equipped as such with a synthetic view of events, you can therefore improve and gain full unhindered control over your security. This free service allows you to automatically back up the latest configurations of your Stormshield Network Security appliances in the Stormshield Cloud infrastructure or on one of your servers. In this way, you would be able to retrieve or restore an earlier configuration easily in the event of a reinitialization, hardware exchange or error. The Cloud Update service automatically updates: Contextual signatures for the intrusion prevention engine Application databases Vulnerability databases URL filter databases Antivirus signatures RBL servers and antispam whitelists Minor and major versions SERVICES SERVICE PACKS An extended period of unavailability on your security device may have disastrous consequences on your business. Stormshield offers a clear and simple range of 4 security service packs that include the hardware maintenance of your product. TECHNICAL SUPPORT Through your partner, you will benefit from the assistance provided by our multilingual technical support teams. Our teams are based in our premises, working closely and directly with the R&D teams. This will guarantee vendor expertise in addressing any issue. TRAINING Provided by Stormshield or by one of our certified and approved partners, our Administrator and Expert training courses allow you to acquire full knowledge on how to operate our products. Enriched with many practical exercises, our training course has added value thanks to its certification which is recognized on the market. Arkoon and Netasq, fully owned subsidiaries of Airbus Defence and Space CyberSecurity, run the Stormshield brand and offer innovative end-to-end security solutions both in France and worldwide to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security). WWW.STORMSHIELD.EU