Network Security Overview

Similar documents
Achieve deeper network security and application control

Achieve Deeper Network Security

Achieve Deeper Network Security and Application Control

Securing Your Small Business

Securing the small business

Et nulparum intrusion Prevention Solutions (IPS)

11 cool things your firewall

Why switch from. Page title appears here. cum evendi dest faceat raest, a poritis. fuga. It pel ipsunt mo quunt.

Types of cyber-attacks. And how to prevent them

Controlling laptop and. corporate networks

Anatomy of a cyber-attack

Next-Generation Firewalls: Critical to SMB Network Security

Best Practices for Secure Mobile Access

10 easy steps to secure your retail network

How to Deploy Models using Statistica SVB Nodes

Navigating the NIST Cybersecurity Framework

Logging and Alerting for the Cloud

Hybrid Cloud Computing

Jort Kollerie SonicWALL

Top 10 Most Popular Reports in Enterprise Reporter

How To Use Shareplex

Solving the Security Puzzle

SharePlex for SQL Server

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Dell One Identity Cloud Access Manager SonicWALL Integration Overview

Understanding Enterprise Cloud Governance

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Securing Endpoints without a Security Expert

The Hillstone and Trend Micro Joint Solution

How to Build a Massively Scalable Next-Generation Firewall

formerly Help Desk Authority Quest Free Network Tools User Manual

Eight Ways Better Software Deployment and Management Can Save You Money

Dell One Identity Cloud Access Manager How to Configure for High Availability

Managing the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies

Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Dell InTrust Preparing for Auditing Cisco PIX Firewall

Identity and Access Management for the Cloud

A Massively Scalable Approach to Network Security

Dell SonicWALL Portfolio

Quest vworkspace Virtual Desktop Extensions for Linux

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Spotlight Management Pack for SCOM

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Reverse Proxy Three Myths Busted

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Dell vworkspace Supports Higher Education s Desktop Virtualization Needs

Governed Migration using Dell One Identity Manager

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Proactive Performance Management for Enterprise Databases

DevOps for the Cloud. Achieving agility throughout the application lifecycle. The business imperative of agility

Applications erode the secure network How can malware be stopped?

SSL Performance Problems

Understanding and Configuring Password Manager for Maximum Benefits

How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code

Move Data from Oracle to Hadoop and Gain New Business Insights

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell One Identity Manager Scalability and Performance

Securing the Small Business Network. Keeping up with the changing threat landscape

Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance

Identifying Problematic SQL in Sybase ASE. Abstract. Introduction

Introduction to Version Control in

Ensuring High Availability for Critical Systems and Applications

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Organized, Hybridized Network Monitoring

Dell InTrust Preparing for Auditing CheckPoint Firewall

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Requirements When Considering a Next- Generation Firewall

Object Level Authentication

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

Networking for Caribbean Development

What to Look for When Evaluating Next-Generation Firewalls

Network Security Solution. Arktos Lam

Beyond the Hype: Advanced Persistent Threats

SonicWALL Corporate Design System. The SonicWALL Brand Identity

Desktop Authority vs. Group Policy Preferences

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Adopting a service-centric approach to backup & recovery

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

IBM Security Intrusion Prevention Solutions

New Features and Enhancements

Go beyond basic up/down monitoring

Spotlight Management Pack for SCOM

Content-ID. Content-ID URLS THREATS DATA

Dell InTrust Preparing for Auditing and Monitoring Microsoft IIS

A Layperson s Guide To DoS Attacks

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Security Analytics Engine 1.0. Help Desk User Guide

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Understanding & Improving Hypervisor Security

Enterprise Reporter Report Library

WildFire. Preparing for Modern Network Attacks

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

FROM PRODUCT TO PLATFORM

Security Features in Password Manager

Transcription:

Page title appears here Achieve deeper network security This is placeholder body copy. Ebit doloreici te quo volupta denestoria verem del erumquidit, sumquia nulparum num sandites es as exeratur sum aliqui doluptionsed ea cum quiae et ant dis alit, et perum fuga. It pel ipsunt mo quunt. invendit maio. Eolesequi se debis dici simi olum voluptate laborem sitatia qui invendit maio. Et porectiatur, cum evendi dest faceat raest, a poritis dem quo qui re eicabor umquam ipsanda ntotasi quiae vere adi reces etur suntionsequi repersperum la sequi solesequi se debis dici simi Borehen imolum sitatiabeyond qui the obvious. For deepervoluptate network laborem security, look

Table of contents Overview 2 Rising security threats 3 The move towards next-generation firewalls 4 Not all next-generation firewalls are created equal 5 The need for deeper network security 6 Byte-by-byte packet inspection 7 SSL decryption and inspection 8 An IPS with anti-evasion capabilities 9 Network-based malware protection that is updated continuously 10 The security of an industry leader 11 Dell SonicWALL SuperMassive Series 12 Dell Network Security Appliance (NSA) Series 13 1 2013 Dell Software. All rights reserved..

Overview Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are simply not effective in today s advancedthreat environment. In order to safeguard your organization from today s ever-evolving threats, your NGFW must be able to deliver a deeper level of network security. 2 2013 Dell Software. All rights reserved..

Rising security threats The growing use of cloud computing, mobile solutions, Bring Your Own Device (BYOD) policies and the rise of shadow IT have added new levels of risk, complexity and cost to securing an organization s data and intellectual property. Businesses of every size must now combat a wide range of increasingly sophisticated threats, including advanced persistent threats (APTs), cybercriminal activity, spam and malware. At the same time, many organizations are also grappling with tighter budgets and don t have the resources to easily address their growing security challenges. APT 3 2013 Dell Software. All rights reserved..

The move towards next-generation firewalls To combat growing security challenges, more and more organizations are migrating from traditional firewalls that focus only on stateful packet inspection (SPI) and access control rules to next-generation firewalls. NGFWs have revolutionized network security by providing more robust protection against emerging threats. In addition to traditional firewall features, NGFWs feature a tightly integrated intrusion prevention system (IPS), real-time decryption and inspection of SSL sessions and full control and visualization of application traffic as it crosses the network. Gartner: Around 30 percent of enterprises will deploy nextgeneration firewalls by 2017. - Fierce Enterprise Communication, June 2013 4 2013 Dell Software. All rights reserved..

Not all next-generation firewalls are created equal Not all next-generation firewalls can identify and stop today s modern attacks. Sophisticated modern attacks often employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual property. These attacks are often encoded using complicated algorithms to evade detection by intrusion prevention systems. Once a target has been exploited, the attacker will attempt to download and install malware onto the compromised system. In many instances, the malware that is used is a newly evolved variant which traditional anti-virus solutions cannot detect. Advanced attacks often rely on SSL encryption to hide the malware download or even to disguise command and control traffic that is sent by the attacker from halfway around the world. 5 2013 Dell Software. All rights reserved..

How Dell NGFWs deliver deeper network security Dell SonicWALL NGFWs are capable of providing organizations of any size with a deeper level of network security because they scan all traffic regardless of port or protocol. Dell NGFWs ensure that every byte of every packet is inspected while maintaining the high performance and low latency that busy networks require. Additionally, Dell NGFW security goes deeper than other firewalls by delivering real-time SSL decryption and inspection, an intrusion prevention system (IPS) that features sophisticated anti-evasion technology and a network-based malware protection system that leverages the power of the cloud. APT Now organizations can block sophisticated new threats that emerge on a hourly basis. 1 U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361 6 2013 Dell Software. All rights reserved..

Byte-by-byte packet inspection Dell NGFWs are equipped with a patented, singlepass, low-latency, Reassembly-Free Deep Packet Inspection (RFDPI) engine that inspects every byte of every packet while maintaining high performance and low latency. Dell NGFWs scan all traffic, regardless of port or protocol, to protect the network from internal and external attacks against application vulnerabilities. Application visibility and control capabilities are used to examine every packet and identify which applications are in use and who is using them. Traffic in Traffic out Reassembly-free packet scanning without proxy or content size limitations 7 2013 Dell Software. All rights reserved..

SSL decryption and inspection SSL decryption and inspection is arguably the single most important feature required to provide a deeper level of network security. Organizations that are not inspecting SSL traffic are effectively blind to onethird of the traffic on the network. Further, attacks that utilize SSL will have a 100-percent success rate in this type of scenario. In order to combat these sophisticated attacks effectively, organizations need the ability to inspect all traffic on any port, whether or not that traffic is SSL-encrypted. One of the challenges, however, is that most of the NGFWs available today perform dismally when decrypting and inspecting SSL traffic. By contrast, Dell SonicWALL NGFWs offer best-in-class scalability and performance for SSL decryption and inspection as evaluated by both Network World magazine. Without SSL decryption and inspection, today s organizations are blind to a third of the traffic on their network. Dell NGFWs decrypt and inspect all of your traffic on every port, whether or not the traffic is SSL-encrypted. As much as 35 percent of corporate network traffic is encrypted using SSL. SSL Performance Problems NSS Labs, 2013 8 2013 Dell Software. All rights reserved..

An IPS with sophisticated anti-evasion capabilities Cybercriminals often try to circumvent the IPS by using complex algorithms to evade detection. Dell NGFWs feature advanced IPS threat protection to decode hidden attacks before they can harm your organization. Dell offers cutting-edge IPS threat protection that is capable of reverse-engineering these advanced evasion techniques. In the 2012 NSS Labs Security Value Map (SVM) for IPS, the Dell SonicWALL SuperMassive E10800 with integrated IPS earned the top recommend rating. In the 2012 NSS Labs IPS testing, Dell s NGFW had higher security effectiveness and performance than some dedicated IPS vendors. 9 2013 Dell Software. All rights reserved..

Network-based malware protection that is updated continuously Every hour, new variants of malware are developed. Dell NGFWs keep you abreast of these threats with network-based malware protection that leverages a cloud database that is updated continually and has more than 13.5 million variants of malware, so your organization can block new threats as they arise. This means that the RFDPI engine can identify the malicious code contained in new mutations to provide an additional layer of protection. Dell SonicWALL NGFWs have been independently tested and certified for network-based malware protection by ICSA Labs. ICSA Labs, 2013 10 2013 Dell Software. All rights reserved..

The security of an industry leader Dell has over 20 years of experience in the industry, and Gartner has recognized Dell as an industry leader in network security. All Dell NGFW customers benefit from Dell s commitment to delivering a deeper level of security for around-the-clock protection across the entire organization. The SuperMassive is aptly named... [it] can decrypt SSL traffic very fast in fact these one-off tests show it to be the fastest device by far. - Scaling Up With SonicWALL s SuperMassive, Network World, 2012 11 2013 Dell Software. All rights reserved..

Dell SonicWALL SuperMassive Series The E10000 NGFW platform is designed for very large networks to deliver scalability, reliability and deep security for 10+ gigabit networks. Built to meet the needs of large data centers, carriers and service provider deployments, the field-upgradeable SuperMassive E10000 Series provides superior protection and unparalleled performance, and is the industry s leading firewall for concurrent connections and connections per second. The SuperMassive 9000 Series of firewalls ensures security effectiveness by enforcing intelligent policy decisions, which helps to ease administrative burdens. Housed in an elegant, one-rack unit appliance, SuperMassive 9000 firewalls also serve to save space and lower power and cooling costs. For the second consecutive year, the SuperMassive E10800 has earned the coveted rating of Recommend in NSS Labs 2013 Next-Generation Firewall Security Value Map 12 2013 Dell Software. All rights reserved..

Dell SonicWALL NSA Series The Network Security Appliance (NSA) Series delivers the high level of security, application control and performance that administrators have come to expect. And, because the NSA Series firewalls 13 2013 Dell Software. All rights reserved.. are affordable and easy to deploy, configure and maintain, they are an ideal choice for the mid-market and SMBs.

How can I learn more? Download the whitepaper, Achieve Deeper Network Security View the webinar The need for a deeper level of security without compromise For feedback on this e-book or other Dell SonicWALL e-books or whitepapers, please send an email to feedback@sonicwall.com. For more information Dell SonicWALL 2001 Logic Drive San Jose, CA 95124 www.sonicwall.com T +1 408.745.9600 F +1 408.745.9300 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. ( Dell ). Dell, Dell Software, the Dell Software logo and products as identified in this document are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN DELL S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. About Dell Software Dell Software helps customers unlock greater potential through the power of technology delivering scalable, affordable and simple-to-use solutions that simplify IT and mitigate risk. The Dell Software portfolio addresses five key areas of customer needs: data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, drives unmatched efficiency and productivity to accelerate business results. If you have any questions regarding your potential use of this material, contact: Dell Software 5 Polaris Way Aliso Viejo, CA 92656 www.dellsoftware.com Refer to our Web site for regional and international office information. 10/13 DS 0554