UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY



Similar documents
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

McAfee Security. Management Client

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Forcepoint Stonesoft Management Center

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

ETERE SNMP CONSOLE: A centralized, automatic and real-time monitoring of broadcast system networks

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

The syslog-ng Store Box 3 F2

Kaseya IT Automation Framework

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Information Technology Solutions

Check Point Security Administrator R70

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

Strengthen security with intelligent identity and access management

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA USA. November v1.0

The syslog-ng Store Box 3 LTS

How To Use Ibm Tivoli Monitoring Software

Ovation Security Center Data Sheet

V1.4. Spambrella Continuity SaaS. August 2

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Information Technology Policy

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

CERTIFICATION PROGRAM TRAINING NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Inspection of Encrypted HTTPS Traffic

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES

The SIEM Evaluator s Guide

Whitepaper. Tangible Benefits of Cloud Networking versus the alternative.

WhatsUp Gold vs. Orion

Cyberoam Perspective BFSI Security Guidelines. Overview

Proposal for Online Backup

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

How To Achieve Pca Compliance With Redhat Enterprise Linux

Q1 Labs Corporate Overview

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Clavister InSight TM. Protecting Values

Fortinet Certified Network Security Administrator

CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT

Secospace elog. Secospace elog

Host-based Protection for ATM's

End-to-End Application Security from the Cloud

Stormshield Network Security vs Fortinet

PCI Compliance for Cloud Applications

Challenges and Solutions

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

Ovation Security Center Data Sheet

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

IBM Security IBM Corporation IBM Corporation

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

End-user Security Analytics Strengthens Protection with ArcSight

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

I D C A N A L Y S T C O N N E C T I O N

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

What is Security Intelligence?

Remote Services. Managing Open Systems with Remote Services

Boosting enterprise security with integrated log management

How To Buy Nitro Security

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Cloud and Data Center Security

NETGEAR ReadyRECOVER Offsite Data Protection: Replication Overview and Configuration Guide

AVeS Cloud Security powered by SYMANTEC TM

NETASQ MIGRATING FROM V8 TO V9

INTRODUCING isheriff CLOUD SECURITY

Securing Virtualization with Check Point and Consolidation with Virtualized Security

BeyondInsight Version 5.6 New and Updated Features

HP E-PCM Plus Network Management Software Series

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

NET ACCESS HIPAA COMPLIANT FLEXCloud

HP PCM Plus v4 Network Management Software Series

SPECIAL SPECIFICATION 8498 Video Management Software

TimePictra Release 10.0

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Swordfish

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

anomaly, thus reported to our central servers.

PRIVACY, SECURITY AND THE VOLLY SERVICE

How To Create A Help Desk For A System Center System Manager

Simply Sophisticated. Information Security and Compliance

HP PCM Plus v3 Network Management Software Series Overview

Managed Services. Business Intelligence Solutions

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

Sophos Cloud and Partner Dashboard Jonathan Shaw

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

TECHNICAL NOTE Stormshield Network Firewall AUTOMATIC BACKUPS. Document version: 1.0 Reference: snentno_autobackup

Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Transcription:

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

ADMINISTRATION TOOLS Stormshield Network Security solutions simplify the tasks involved in the configuration, operation and management of your network security thanks to straightforward high-performance tools. These tools come in 3 forms: Embedded web interface, Dedicated applications, Or Cloud-based services. Using this tool suite, you will be able to automate repetitive tasks and take advantage of the many user comfort optimizations that will save precious time during administration operations. An overview of your network s and users activity lets you easily anticipate security incidents or illegal behavior while constantly improving your level of protection.

Manage and Operate your security Web Interface Web application dedicated to the administration and configuration of your appliance Simple and intuitive, this interface eases the setup of an effective security policy. With its ergonomic design, administering and operating your security policy now take considerably less time. Web interface easily accessible from a simple browser and available in 4 languages Numerous wizards that provide help for setting up advanced configurations Single configuration point for all security policies (traffic rules, antivirus scan, URL filtering, etc.) Automatic audit of filter policies in real time Management of the security policy by object Maintenance of the appliance (backup, configuration restoration or firmware upgrades) Dashboard presenting a general view of the appliance s status (list of latest alarms, license status, status of services, etc.) Centralized Manager Centralized management tool adapted to large deployments and infrastructures Managing a wide deployment of appliances is almost always complex and tedious. Stormshield Network Centralized Manager helps you to save a considerable amount of time in the daily management of large appliance infrastructures and in the deployment of your global security policy. This single focal point for managing the infrastructure offers several levels of administration, allowing the distributed management of security. Supervision console with appliance tracking Possibility of automating the deployment of complex VPN architectures Automatic deployment of security policies Management of administrator role granularity Follow-up of maintenance operations Customizable monitoring curve and alerts

Interactive View Interactive reporting and log viewer tool The event log analysis feature and customizable reports provide you with perfect visibility over your network s activity. Furthermore, as the interactive view is in direct communication with your filter policy, you can react immediately whenever a suspicious incident is identified. For example, you will be able to isolate a workstation on which critical vulnerabilities have been detected. Web interface easily accessible from a simple browser Viewing and searching in event logs 27 embedded reports covering 6 themes (3 of which are reports that give better visibility over risks: most vulnerable applications, most vulnerable workstations, most vulnerable servers, etc.) Modification of the security policy directly from event logs or reports by clicking on an item Possibility of creating your own reports Administration Embedded Solutions Centralized Solutions Operation Global Administration Easy centralized Administration tool for your deployment The simplicity and performance of this tool allow you to centralize the management of the security policy and appliances, optimize daily operational tasks and view the entire topology of your extended network. Centralization of appliance management: 1 single management point Deployment of a security policy on several appliances View of appliances in a topological view Easy deployment of objects in a distributed environment Simultaneous execution of configuration scripts on several appliances Management of appliance variables in configuration scripts Simultaneous execution of maintenance actions (update, backup, etc.) on several appliances One-click firewall login Easy integration into third-party solutions

Event Reporter Dedicated application for advanced log analysis Stormshield Network Event Reporter is an effective high-performance tool for viewing and analyzing events reported on your deployed appliances (connection logs, security alerts, system events, etc.). The intuitiveness of this tool and the fact that learning how to use it is so simple transform it into a precious aid for diagnosing any malfunction or abnormal behavior on your network. Analyzes events to identify anomalies concerning the network or user behavior Analyzes system events (reboot, high availability switchover, etc) and administration operations (in particular modifications to the configuration) Analyzes security alerts (virus detection, attack detection, attempts to use a prohibited service, etc.) User-friendly sort and search filter functions Consolidated view of events from several appliances Real-Time Monitor Dedicated application for monitoring your security solution in real time With this tool, you will have in hand a powerful solution for monitoring and diagnosing the status of your security in real time. This application also provides all the necessary information for evaluating the proper function of your appliance. Comprehensive and detailed dashboard relating to the operation of an appliance Supervision of the status of VPN tunnels, active services, connected users, etc. List of system events, administration operations performed and security alerts Tracking of traffic on network interfaces in real time List of applications deployed in your network and detection of vulnerable services and applications Real-time log analysis Sort and filter options for each view in the tool Event Analyzer Powerful reporting and Security Intelligence tool All the information and indicators needed for making the right decisions concerning your security are found in this tool. Stormshield Network Event Analyzer automatically generates the relevant activity reports that would allow you to manage and enhance your security policy continuously. By ensuring the secure archiving of event logs and reports, you will be keeping your commitments of complying with regulatory requirements (HIPAA, SOX, Basel II and PCI-DSS). 3-dimensional data aggregation Easier readability enhanced by filters, sort functions and pivots with a simple drag & drop Automatic generation and secure archiving of reports Archiving of logs in compliance with relevant regulations Role-based access management Automation of administration tasks Intuitive and customizable web portal

CLOUD-BASED SERVICES Cloud Reporting Turnkey automated report generator Without the need for any prior human or hardware investment, you will be able to obtain comprehensive periodic reports with detailed indicators on the activity of your network. Equipped as such with a synthetic view of events, you can therefore improve and gain full unhindered control over your security. These reports, which are generated automatically in the Stormshield cloud, can be sent to you daily and/ or monthly. Detailed dashboard and security indicators Immediate identification of security incidents and illegal behavior Evaluation of compliance with or deviation from the security policy Possibility of activating the service upon demand according to your requirements Does not require any infrastructure deployment Implementation of other value-added services offered by your partner Cloud BackUp Automatic configuration backup service This free service allows you to automatically back up the latest configurations of your Stormshield Network Security appliances in the Stormshield Cloud infrastructure or on one of your servers. In this way, you would be able to retrieve or restore an earlier configuration easily in the event of a reinitialization, hardware exchange or error. You no longer need to waste precious time performing backup operations. Backups in the Stormshield Cloud, on an internal server or on your partner s server Up to 5 archives in cloud mode, unlimited if using an internal server Fully customizable backup frequency Secured communication channel in SSL, possibility of encrypting the configuration Note : Available for firewalls under maintenance Arkoon and Netasq, fully owned subsidiaries of Airbus Defence and Space CyberSecurity, run the Stormshield brand and offer innovative end-to-end security solutions both in France and worldwide to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security). WWW.STORMSHIELD.EU