Huawei Network Edge Security Solution



Similar documents
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

IPS Anti-Virus Configuration Example

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Huawei Eudemon200E-N Next-Generation Firewall

Advantages of Managed Security Services

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Huawei One Net Campus Network Solution

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

How To Create A Network Access Control (Nac) Solution

USG6600 Next-Generation Firewall

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

Huawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction

USG6300 Next-Generation Firewall

IPS Attack Protection Configuration Example

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

SVN5800 Secure Access Gateway

Huawei Agile WAN Solution

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

8. Firewall Design & Implementation

Secure Cloud-Ready Data Centers Juniper Networks

SCADA SYSTEMS AND SECURITY WHITEPAPER

Internet Content Provider Safeguards Customer Networks and Services

HUAWEI USG6000 Next-Generation Firewall V100R001. Product Description. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Huawei AR G3 FAQ TOP14

Data Center Solution V100R001C00. Network Design Guide. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

DDoS Protection Technology White Paper

How To Build A Network Security Firewall

Log Audit Ensuring Behavior Compliance Secoway elog System

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Innovative Defense Strategies for Securing SCADA & Control Systems

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Secure networks are crucial for IT systems and their

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Firewall and UTM Solutions Guide

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Section 12 MUST BE COMPLETED BY: 4/22

How To Protect Your Network From Attack From A Network Security Threat

Common Cyber Threats. Common cyber threats include:

Zone Labs Integrity Smarter Enterprise Security

Firewalls. Chapter 3

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Cisco Security Optimization Service

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Lesson 5: Network perimeter security

Data Sheet. DPtech Anti-DDoS Series. Overview

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Secospace elog. Secospace elog

Why Migrate to the Cisco Unified Wireless Network?

NIP6300/6600 Next-Generation Intrusion Prevention System

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

PART D NETWORK SERVICES

Software. Quidview 56 CAMS 57. XLog NTAS 58

Computer System Security Updates

Security Technology White Paper

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper

Secure Network Design: Designing a DMZ & VPN

1 Network Service Development Trends and Challenges

Achieving PCI-Compliance through Cyberoam

Network Security Demonstration - Snort based IDS Integration -

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Introducing IBM s Advanced Threat Protection Platform

Best Practices For Department Server and Enterprise System Checklist

Cisco Small Business ISA500 Series Integrated Security Appliances

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Conquering PCI DSS Compliance

Introduction to Cyber Security / Information Security

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

ICANWK406A Install, configure and test network security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Overview. Firewall Security. Perimeter Security Devices. Routers

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

IPS AIM for Cisco Integrated Services Routers

United Security Technology White Paper

Improving Network Efficiency for SMB Through Intelligent Load Balancing

How To Choose A Network Firewall

Customer Training Catalog Training Programs IDC

Secure VoIP for optimal business communication

FIREWALL POLICY DOCUMENT

Architecture Overview

Advantages of Managed Security Services

Transcription:

Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD.

Huawei Network Edge Security Solution

Huawei Network Edge Security 1 Overview At present, enterprises are confronted with mounting security threats that are causing havoc across their network (such as malicious codes, Trojan horses, viruses, spyware, worms, and phishing), which can severely impact an enterprise campus network efficiency and security. In the information era, high bandwidth must be reserved for emerging new applications, such as Web 2.0, P2P video streaming, and broadband access over cable networks. In addition, many switches and routers provide 10G ports. To enhance security at the network edge and guard against intrusions/malicious attacks, enterprises must have a sophisticated network lattice in place, with well positioned switches and routers and highly integrated network capacity expansion. To combat against these emerging threats, Huawei, backed by its highly professional security solution team and carrier-class hardware platform, has provided a compete network edge security solution complemented with the following advantages: Retaining of original user network typologies and devices to ensure network performance and reliability. Intuitive GUIs for better user experience Flexible configuration of security policies and reports. Updated security policies and reports using the cloud knowledge base. Secure and reliable network operation using service continuity design and real-time intelligent security monitoring platform. Challenges How to protect the Internet egress against security threats from the Internet. How to protect the Demilitarized Zone (DMZ) that is vulnerable to external attacks. How to protect the data center that carries critical service data for enterprises. How to set up a secure access edge between various service departments to prevent the viruses from spreading. How to monitor all internal terminals while reducing network risks. How to build secure communication channels between an enterprise s headquarters and its branches.

2 Huawei Network Edge Security Solution Components Huawei Network Edge Security Solution Internet Egress Security Security Zone Isolation Antivirus User Action Management Unified Security Management Networking Diagram Internet MPLS Intranet E1000E-X/E8000E-X E1000E-X/E8000E-X Web Server E-mail Application Server Data center DMZ Server E1000E-X Core network Network management center E1000E-X Database Database E200E-X WiFi E200E-X E200E-X E200E-X E200E-X 10 GELINK GELINK Training center Office building Office building R&D department Core router Core switch Aggregation switch

Huawei Network Edge Security 3 Advantages Internet Egress Security High performance (a maximum of 200 Gbit/s throughput) that secures the Internet egress Highest virtual private network (VPN) performance and capacity that ensures consistent access to VPN Excellent scalability that facilitates service expansion Flexible device deployment and assembled product modules Security Zone Isolation Prevents the spread of security threats within an enterprise. Secures enterprise information by creating isolated security zones (such as OA office building and R&D department). Enhances security within an enterprise by protecting critical data and areas that are vulnerable to attacks. User Action Management Improves work efficiency. Reduces campus network risks. Reduces legal risks. Unified Security Management Provides various services, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) services. Supports the management and policy delivery of security devices, switches and routing devices. Supports customized development, enabling the management of logs of all devices, databases, servers and hosts in the live network. Provides various service report analysis. Reduces network operation and maintenance (O&M) costs. Network Real-time Intrusion Defense Provides powerful virus detection engine. Supports powerful event management and statistical analysis functions. Adopts virtual engine technology, allowing the deployment of detection rules to take effect in different areas. Provides a complete library and professional security solution team. Antivirus Detects viruses embedded in files. Creates a simulated environment to remove viruses in advance. Proven high detection rate (99%). Enables a signature to cover tens of thousands of virus variations through static heuristic engine. Publishes a new script engine on the antivirus engine within hours.

4 Huawei Network Edge Security Security Products Firewall/UTM IDS Eudemon 200E-X Eudemon 1000E-X Eudemon 8000E-X NIP200/1000 Log and Management Software Elog VSM Log Mgmt and Audit Unified management

Huawei Network Edge Security