Network Security Solution. Arktos Lam

Similar documents
How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Jort Kollerie SonicWALL

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Next-Generation Firewalls: Critical to SMB Network Security

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Dell SonicWALL Portfolio

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Applications erode the secure network How can malware be stopped?

Providing Secure IT Management & Partnering Solution for Bendigo South East College

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Nominee: Barracuda Networks

Achieve Deeper Network Security

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Executive Brief on Enterprise Next-Generation Firewalls

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Streamline your network security

What to Look for When Evaluating Next-Generation Firewalls

Achieve Deeper Network Security and Application Control

Dell Security Next-Generation Firewalls

How To Choose A Dell Sonicwall Firewall From Awna.Com

Fortigate Features & Demo

High Performance NGFW Extended

Protect Breakout: Connected Security for a Connected World

Application Intelligence, Control and Visualization

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Clean VPN Approach to Secure Remote Access for the SMB

Unified Threat Management, Managed Security, and the Cloud Services Model

SourceFireNext-Generation IPS

Why protection & performance matter

Running head: Next Generation Firewalls 1

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Protecting Network Infrastructure. Mobile Workers. Florian Malecki - SonicWALL EMEA Enterprise Product Marketing Manager

Why Protection and Performance Matter

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Clean wireless. High-performance clean wireless solutions

Content-ID. Content-ID URLS THREATS DATA

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

USG6600 Next-Generation Firewall

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

USG6300 Next-Generation Firewall

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Clean wireless. High-performance clean wireless solutions

:: Protecting your infrastructure ::

Why protection and performance matter

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

NGFWs will be most effective when working in conjunction with other layers of security controls.

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

A NEW SET OF NETWORK SECURITY CHALLENGES

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

McAfee Network Security Platform Administration Course

SonicWALL Security Solutions

Move over, TMG! Replacing TMG with Sophos UTM

Clean VPN Approach to Secure Remote Access

How to Build a Massively Scalable Next-Generation Firewall

SuperMassive E10000 Series

Network protection and UTM Buyers Guide

Dell SonicWALL product lines

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Security. Better security for a better enterprise

Networking for Caribbean Development

Data Center security trends

Astaro Gateway Software Applications

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

SonicWALL ECLASS Netw

Readiness Assessments: Vital to Secure Mobility

Cisco ASA 5500 Series Firewall Edition for the Enterprise

How To Sell Security Products To A Network Security Company

The Evolution of the Enterprise And Enterprise Security

Next-Generation Firewall Market Analysis: The SonicWALL Difference CONTENTS

Network Security. Intertech Associates, Inc.

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Next-Generation Firewalls: CEO, Miercom

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Customer Service Description Next Generation Network Firewall

SonicWALL Unified Threat Management. Alvin Mann April 2009

Dell SonicWALL report portfolio

Cisco Small Business ISA500 Series Integrated Security Appliances

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

SonicWALL Security Solutions

TERRE ACTIVE / BLUECOAT ROLAND MARTY WOHIN GEHT DIE REISE. Territory Sales Manager Switzerland. Septembre 2013

Gateway Security at Stateful Inspection/Application Proxy

Best Practices for Secure Mobile Access

2012 North American Enterprise Firewalls Market Penetration Leadership Award

Cisco ASA 5500 Series Firewall Edition for the Enterprise

10 Cool Things Your Firewall Should Do. A firewall that blocks threats is only the beginning

The New Face of Next Generation Firewalls

FROM PRODUCT TO PLATFORM

Next Gen Firewall and UTM Buyers Guide

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Gigabit SSL VPN Security Router

WatchGuard Technologies WatchGuard Technologies

Transcription:

Network Security Solution Arktos Lam

Dell Software Group(DSG) 2 Confidential

Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software

We deliver security through a comprehensive lifecycle approach with the whole business in mind. Outside in and inside out protection, from device to cloud. Connected Security Data Data Security Configuration & Patch Management Identity Identity & Access Management Network Next-Gen Firewall Secure Remote Access Email Security Security Services Managed Security Services Security & Risk Consulting Incident Response Threat Intelligence 4 Confidential

Dell Next-Generation Firewalls 5 Confidential

Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs). Typically, midsize businesses have 100 to 1,000 employees, with revenue ranging from $50 million to $1 billion. Gartner recognizes Dell as a Leader in network security. Download the full report for free: http://www.sonicwall.com/us/en/14539.html

NSS Labs Recommends Dell as a trusted IPS provider.

Next-Generation Firewalls Stateful Packet Inspection Secure Remote Access (VPN) Access Control Rules In-line, bump-in-the-wire Application Control Integrates with AD Server Intrusion Prevention Anti-Malware SSL Decryption 8 Confidential

Client & Server Threat Protection 9 Confidential

Inspects all Traffic, Regardless of Port or Protocol 10 Confidential

Normalizes Traffic to Prevent Evasion & Obfuscation 11 Confidential

Allow Custom Signatures to be Created & Installed 12 Confidential

Inspects Traffic in Multiple Directions 13 Confidential

Detect and Block Malware Before it Enters the Network 14 Confidential

Detect and Block Communications from Systems that are already Compromised 15 Confidential

Monitor & Block Traffic Based on Geographic Origin 16 Confidential

Decrypt & Inspect SSL Encrypted Traffic 17 Confidential

Protect the Network from Denial of Service and Flood Attacks 18 Confidential

Provide Contextual Awareness Based on User 19 Confidential

Provide Traffic Analytics and Integrate With Other Analytics Engines 20 Confidential

Dell Next Generation Firewalls SuperMassive Series TZ Series NSA Series SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 SuperMassive E10800 SuperMassive E10400 SuperMassive E10200 NSA 6600 NSA 5600 TZ 215/W TZ 205/W TZ 105/W NSA 4600 NSA 3600 NSA 2600 NSA 220/W/250M/W 21 Confidential

SuperMassive 9000 Series model lineup SuperMassive 9600 32x1.2 Ghz, 32 GB Ram SPI Firewall Throughput 20 Gbps IPS / AIC Throughput 12 Gbps Maximum Connections 1.5M SuperMassive 9400 32x1.2 Ghz, 16 GB Ram SPI Firewall Throughput 20 Gbps IPS / AIC Throughput 10 Gbps Maximum Connections 1.25M SuperMassive 9200 24x1.0 Ghz, 32 GB Ram SPI Firewall Throughput 10 Gbps IPS / AIC Throughput 7.5 Gbps Maximum Connections 1.25M 22 Confidential

New NSA Series models NSA 6600 NSA 5600 4.5 Gbps IPS & Application Control 12 Gbps Firewall Throughput 3 Gbps DPI Throughput 24x1.0 GHz, 4 GB RAM 3 Gbps IPS & Application Control 9 Gbps Firewall Throughput 1.6 Gbps DPI Throughput 10x1.3 GHz, 4 GB RAM NSA 4600 2 Gbps IPS & Application Control 6 Gbps Firewall Throughput 800 Mbps DPI Throughput 8x1.1 GHz, 2 GB RAM NSA 3600 1.1 Gbps IPS & Application Control 3.4 Gbps Firewall Throughput 500 Mbps DPI Throughput 6x800 MHz, 2 GB RAM 23 Confidential

Dell product portfolio Network security Application Intelligence and Control GAV/ Anti-Spyware Intrusion Prevention Comprehensive Anti-Spam Service Enforced Client Anti-Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect Secure remote access Email security Hosted End Point Control Email Protection Connect Mobile Email Anti-Virus Spike License Pack Email Compliance Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Clean wireless SonicPoint-N Series Web Application Firewall Mobile Connect Policy & management WAN acceleration Global Management System Analyzer Scrutinizer 24 Confidential

Secure Remote Access 25 Confidential

The Dell approach to secure remote access Detect what is running on the end point device Remote Access Detect Protect Connect Protect applications with granular access control based on user identity and device integrity Connect Connect users securely and easily to applications on any device Traveling employee Employee at a kiosk Day extender Employee smart phones/ tablets Customer/Supplier Behind a Firewall Business partner from any browser Internal users Dell SSL VPN Solution Corporate Perimeter Directories LDAP LDAP AD RADIUS Applications Web apps Client/Server apps File shares Databases VoIP VDI infrastructure 28 Confidential

Connect: Mobile Connect Unified client app supporting SSL VPN connectivity to the E-Class SRA, SRA and Next-Generation Firewall solutions Determine if the device is Jailbroken or rooted (E-Class SRA Only) Unified policy controls to limit access from Android or ios enabled devices Easily downloadable from Google play or App Store for ios ios Android Dell SSL VPN solution Corporate perimeter Directories LDAP LDAP AD RADIUS Applications Web apps Client/Server apps File shares Databases VoIP VDI infrastructure 32 Confidential

35 Confidential