Network Security Solution Arktos Lam
Dell Software Group(DSG) 2 Confidential
Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software
We deliver security through a comprehensive lifecycle approach with the whole business in mind. Outside in and inside out protection, from device to cloud. Connected Security Data Data Security Configuration & Patch Management Identity Identity & Access Management Network Next-Gen Firewall Secure Remote Access Email Security Security Services Managed Security Services Security & Risk Consulting Incident Response Threat Intelligence 4 Confidential
Dell Next-Generation Firewalls 5 Confidential
Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs). Typically, midsize businesses have 100 to 1,000 employees, with revenue ranging from $50 million to $1 billion. Gartner recognizes Dell as a Leader in network security. Download the full report for free: http://www.sonicwall.com/us/en/14539.html
NSS Labs Recommends Dell as a trusted IPS provider.
Next-Generation Firewalls Stateful Packet Inspection Secure Remote Access (VPN) Access Control Rules In-line, bump-in-the-wire Application Control Integrates with AD Server Intrusion Prevention Anti-Malware SSL Decryption 8 Confidential
Client & Server Threat Protection 9 Confidential
Inspects all Traffic, Regardless of Port or Protocol 10 Confidential
Normalizes Traffic to Prevent Evasion & Obfuscation 11 Confidential
Allow Custom Signatures to be Created & Installed 12 Confidential
Inspects Traffic in Multiple Directions 13 Confidential
Detect and Block Malware Before it Enters the Network 14 Confidential
Detect and Block Communications from Systems that are already Compromised 15 Confidential
Monitor & Block Traffic Based on Geographic Origin 16 Confidential
Decrypt & Inspect SSL Encrypted Traffic 17 Confidential
Protect the Network from Denial of Service and Flood Attacks 18 Confidential
Provide Contextual Awareness Based on User 19 Confidential
Provide Traffic Analytics and Integrate With Other Analytics Engines 20 Confidential
Dell Next Generation Firewalls SuperMassive Series TZ Series NSA Series SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 SuperMassive E10800 SuperMassive E10400 SuperMassive E10200 NSA 6600 NSA 5600 TZ 215/W TZ 205/W TZ 105/W NSA 4600 NSA 3600 NSA 2600 NSA 220/W/250M/W 21 Confidential
SuperMassive 9000 Series model lineup SuperMassive 9600 32x1.2 Ghz, 32 GB Ram SPI Firewall Throughput 20 Gbps IPS / AIC Throughput 12 Gbps Maximum Connections 1.5M SuperMassive 9400 32x1.2 Ghz, 16 GB Ram SPI Firewall Throughput 20 Gbps IPS / AIC Throughput 10 Gbps Maximum Connections 1.25M SuperMassive 9200 24x1.0 Ghz, 32 GB Ram SPI Firewall Throughput 10 Gbps IPS / AIC Throughput 7.5 Gbps Maximum Connections 1.25M 22 Confidential
New NSA Series models NSA 6600 NSA 5600 4.5 Gbps IPS & Application Control 12 Gbps Firewall Throughput 3 Gbps DPI Throughput 24x1.0 GHz, 4 GB RAM 3 Gbps IPS & Application Control 9 Gbps Firewall Throughput 1.6 Gbps DPI Throughput 10x1.3 GHz, 4 GB RAM NSA 4600 2 Gbps IPS & Application Control 6 Gbps Firewall Throughput 800 Mbps DPI Throughput 8x1.1 GHz, 2 GB RAM NSA 3600 1.1 Gbps IPS & Application Control 3.4 Gbps Firewall Throughput 500 Mbps DPI Throughput 6x800 MHz, 2 GB RAM 23 Confidential
Dell product portfolio Network security Application Intelligence and Control GAV/ Anti-Spyware Intrusion Prevention Comprehensive Anti-Spam Service Enforced Client Anti-Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect Secure remote access Email security Hosted End Point Control Email Protection Connect Mobile Email Anti-Virus Spike License Pack Email Compliance Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Clean wireless SonicPoint-N Series Web Application Firewall Mobile Connect Policy & management WAN acceleration Global Management System Analyzer Scrutinizer 24 Confidential
Secure Remote Access 25 Confidential
The Dell approach to secure remote access Detect what is running on the end point device Remote Access Detect Protect Connect Protect applications with granular access control based on user identity and device integrity Connect Connect users securely and easily to applications on any device Traveling employee Employee at a kiosk Day extender Employee smart phones/ tablets Customer/Supplier Behind a Firewall Business partner from any browser Internal users Dell SSL VPN Solution Corporate Perimeter Directories LDAP LDAP AD RADIUS Applications Web apps Client/Server apps File shares Databases VoIP VDI infrastructure 28 Confidential
Connect: Mobile Connect Unified client app supporting SSL VPN connectivity to the E-Class SRA, SRA and Next-Generation Firewall solutions Determine if the device is Jailbroken or rooted (E-Class SRA Only) Unified policy controls to limit access from Android or ios enabled devices Easily downloadable from Google play or App Store for ios ios Android Dell SSL VPN solution Corporate perimeter Directories LDAP LDAP AD RADIUS Applications Web apps Client/Server apps File shares Databases VoIP VDI infrastructure 32 Confidential
35 Confidential