Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland



Similar documents
Barracuda Backup. Michael Ulrich Channel Sales Manager Switzerland

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Archivage des s et des Fichiers:

Infrastruktur Sicherheit mit Checkpoint

Unified Threat Management, Managed Security, and the Cloud Services Model

Operations in a Networked World SAP / Basel, 20 April 2015 Ruediger Spies, VP Enterprise SW Markets r.spies@pac-online.com,

NF Group Vorstellung beim IN-Breakfast

BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort. Systems Engineer, Citrix Systems GmbH

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Dell SonicWALL Portfolio

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

USP IT-Security Consulting & Projects

Securing Dispersed Networks

Nominee: Barracuda Networks

Trend Micro Wer denkt schon an die Security der SAP Anwendungen? Timo Wege, Technical Consultant DACH Trend Micro Deutschland GmbH

White Paper. ZyWALL USG Trade-In Program

Astaro Gateway Software Applications

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

und ch/

Boston Area Windows Server User Group April 2010

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Citrix Enterprise Mobility more than just device management (MDM)

Is Cloud relevant for SOA? Corsin Decurtins

Digital transformation

How To Choose A Network Firewall

Cisco ASA und FirePOWER Services

Your Security Partner of Choice

DTR Business Systems, Inc. Rene Beltran

Cisco die richtige Architektur für Big Data und Internet of Things Josephine Bruggeman - CISCO April 20th, 2015

The Top Ten Advantages of Using Cisco Enterprise Networking in 2014

Quantum BACKUP. RECOVERY. ARCHIVE. IT S WHAT WE DO.

SAP Fiori: Verbesserte Anwendererfahrung mit Apps für Geschäftsfunktionen

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Move over, TMG! Replacing TMG with Sophos UTM

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

Best value security report

WatchGuard: Your Security Partner of Choice. Carlos Vieira

Businessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Tivoli Storage Manager - Produktübersicht

ABB s approach concerning IS Security for Automation Systems

Bezpečnosť bez kompromisov

Zscaler Internet Security Frequently Asked Questions

Ethernet I/O System. SNMP manual V1.0

DV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications. Systems Engineer, Citrix Systems GmbH

PART D NETWORK SERVICES

Cyber Security. John Leek Chief Strategist

Sample Global Network Security Market. 1 technavio insights

Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls. Tim Hooks Scott Rolf

OVERVIEW. Enterprise Security Solutions

The Cisco ASA 5500 as a Superior Firewall Solution

Agenda. 16:00 Registration & Welcome coffee. 18:30 Fortinet Demo. 16:30 Triple C - Opening. 19:00 Q & A - Closing. 19:30 Sunset BB Dinner

How To Build A Data Center

Wir stellen uns vor We introduce ourselves

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

Storage XenMotion Tampa Technology Project

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Advantages of Managed Security Services

The Future Of The Firewall

Service Datasheet. Education Communication Platform

How To Get A Computer With A Cell Phone And A Computer (For Free)

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

DC1 Citrix Cloud Strategy Solutions for Private, Hybrid & Public Clouds. Olivier Maes, Sr Director Cloud Platform Group, Citrix Systems

CenterBeam Managed Services Overview

Mind the gap: Top pitfalls to avoid when reaching for the cloud. A whitepaper byfatpipe, the specialist in WAN & Internet Connectivity Optimisation

13 Ways Through A Firewall

INTRODUCTION TO FIREWALL SECURITY

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

opinion piece Security Consolidation and Optimisation

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest

XV1100K(C)/XV1100SK(C)

Clean VPN Approach to Secure Remote Access for the SMB

Web Application Security

Cloud Computing; is it right for my business?

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Automate your IT Security Services

Fujitsu Dynamic Cloud Bridging today and tomorrow

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Enterprise Solutions. Solutions for Enterprise Customers Data, Voice, Security. Get Started Now: to learn more.

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

APT Detection using Splunk

TRENDS IN THE THREAT LANDSCAPE

Seamless payment for cultural needs MUNICH 25TH MARCH 2015, CHRISTOPH JUNG, HEAD OF SALES DACH

How to Turn the Promise of the Cloud into an Operational Reality

CS; SSART-Treffen, November 18, Internet Banking: Increasing power of cyber crime... and what to do?

BP8 Citrix Integrations with System Center Configuration Manager 2012

Virtual Privacy vs. Real Security

FRAUNHOFER INSTITUTe For MATERIAL FLow and LOGISTIcs IML MARKETSTUDY: aided by:

The Value of Automated Penetration Testing White Paper

Challenges and Solutions

13 Ways Through A Firewall What you don t know will hurt you

Cloud vs On-Premise Software: And the Winner is

USG6600 Next-Generation Firewall

Myth #1: Cloud is such a vague concept, it s impossible to know where to start.

Release the full potential of your Cisco Call Manager with Ingate Systems

Transcription:

Moderne Sicherheit Fokussiert auf Business Continuity, Mobilität & Application Control Marc Mathys Country Manager Switzerland

Network Security History in a Nutshell 1990s The Internet is bad if we do not connect to the Internet, life is good 2000s The Internet is bad, but necessary If we implement enough checks and controls, life is still good 2010s Life is bad we messed it up.

Reasons in a Nutshell FIRST: The bad guys are really after YOU SPAM dropped by more than 50% Successful targeted attacks from all over the place increased massively SECOND: Transformation of users 2000s users were stupid, aware of that, i.e. losers 2010s users are stupid, not aware of that and perceive themselves as system admins, managing their i phones, i pads and connecting to your data on your network, The losers evolved into i diots

Consequences in a Nutshell The perimeter is lost forever Build a defense line for your precious applications and data Establish an internal perimeter with a positive security model Users are neither trustworthy nor controllable How do I adapt *and* cut costs?

Cost Effectiveness the Perimeter Spending effect saturates at the perimeter Do not overspend, many things have been relatively commoditized

Cost Effectiveness MDM People perceive mobile devices as their OWN More cost and intrusion lowers acceptance and effectiveness dramatically

Cost Effectiveness Deep Perimeters Internal Firewalls and Application Delivery Controller re establish security Deep perimeters can be decentralized as well!!!

Wisdom To adapt and save costs we need consolidation but in a different way than others suggest

Consolidate Best of Bread Infrastructure

Analysts agree: UTM is the solution

Myth Consolidation is simply the reduction of devices

Truth Consolidation is the reduction of complexity (and might lead to a reduction of vendors and systems eventually)

Reduce Complexity? That s what Barracuda is all about

Example #1: Business Continuity No Web browsing! xdsl Web browsing 50% xdsl Email 50% MPLS VoIP NoDelay VoIP NoDelay Business 70% Web browsing 10% Business 100% Email 20% VoIP NoDelay MPLS Not every User Not all Applications Business 80% Email 15%

Example #1: Business Continuity Identity Awareness & Application Control are not features, but TOOLS to enable Business Continuity You might also consider WAN Optimization & Link Balancing useful!

Example #2: Managing VPN can be fun

Example #3: Application Delivery Availability CRM, ERP Web Applications Custom Applications Intranet Partner Portals Acceleration Control Security Authentication Firewall All in one platform Remote sites Users Devices

Example #4: Web Filtering & Mobility? Barracuda Firewall uses the elasticity of the Cloud The Cloud? Safe enough for scanning public content! Malicious content never touches the network Let the firewall be the firewall, use the CPU for important security tasks On premise Web Filter compatible with mobility Centralized management and hosted reporting HQ, branch offices, mobile users: ONE POLICY Flexible deployment: physical of virtual 18

Example #5: Large File Transfer Without Barracuda With Barracuda Inefficient LFT Slow Unsecured Bypasses Policy

Security and Storage together Security Resources to Protect Storage

Comprehensive Portfolio Security Storage Barracuda Web Security Barracuda SSL VPN Barracuda Backup Barracuda Spam & Virus Firewall Barracuda Web Application Firewall Barracuda Message Archiver Barracuda NG Firewall Barracuda Load Balancer Copy Barracuda Firewall Barracuda Link Balancer SignNow

Convergence Web Filter + Firewall + Spam & Virus Firewall Message Archiver Web Security Service Copy

Central Management :Web or Mobile

Reduce complexity? Take this home Management + Global Command Center Outstanding Support Instant Repacement: 4 years HW refresh Licensing: Product + Support, no user fees Free POC, try & buy

Advertisement Von Projektabwicklung zur Kundenbindung mit Services für Backup Referent: Michael Ulrich, Channel Manager Antoine Donzé, Sales Engineer Vortrag: 16:30 Uhr im Raum I Beim Thema Backup geben Kunden Ihre Daten ungern in die Cloud ein lokaler und vertrauter Ansprechpartner ist Kunden nach wie vor enorm wichtig. Wir zeigen Ihnen, wie sich die Ansprüche von Kunden entwickeln und wie Sie einen eigenen Service mit einem zentralen Management dafür aufbauen können. Erleben Sie es Live!

Live Demo Central Management