How to choose the right NGFW for your organization: Independent 3 rd Party Testing



Similar documents
Network Security Solution. Arktos Lam

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Dell SonicWALL Portfolio

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

What to Look for When Evaluating Next-Generation Firewalls

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Achieve Deeper Network Security

Achieve Deeper Network Security and Application Control

Providing Secure IT Management & Partnering Solution for Bendigo South East College

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Application Intelligence, Control and Visualization

Jort Kollerie SonicWALL

Next-Generation Firewalls: Critical to SMB Network Security

Protect Breakout: Connected Security for a Connected World

Why protection & performance matter

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Why Protection and Performance Matter

Unified Threat Management, Managed Security, and the Cloud Services Model

Applications erode the secure network How can malware be stopped?

Sophos Acquires Cyberoam

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

SonicWALL Unified Threat Management. Alvin Mann April 2009

WatchGuard: Real World Security. Carlos Vieira Country Manager Spain & Portugal

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

High Performance NGFW Extended

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Ten easy steps to secure your small business

PCI DSS. Get Compliant, Stay Compliant Seminar

Next-Generation Firewalls: CEO, Miercom

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Lesson 5: Network perimeter security

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Move over, TMG! Replacing TMG with Sophos UTM

Clean VPN Approach to Secure Remote Access for the SMB

Internal Network Firewall (INFW) Protecting your network from the inside out

Is Your Network Ready for VoIP?

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

SourceFireNext-Generation IPS

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Simple security is better security Or: How complexity became the biggest security threat

Consolidating SMB Network Security Infrastructure. Ways to Cut Costs and Complexity

McAfee - Overview. Anthony Albisser

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Check Point Positions

How To Get A Cloud Service For A Small Business

The Fortinet Secure Health Architecture

The Fortinet Secure Health Architecture

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Cloud Managed Security with Meraki MX

Cisco Small Business ISA500 Series Integrated Security Appliances

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

The Attacker s Target: The Small Business

NGFWs will be most effective when working in conjunction with other layers of security controls.

How To Buy Nitro Security

Gateway Security at Stateful Inspection/Application Proxy

Network protection and UTM Buyers Guide

How To Sell Security Products To A Network Security Company

BroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in

White Paper. ZyWALL USG Trade-In Program

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

Astaro Gateway Software Applications

FROM PRODUCT TO PLATFORM

Data Center security trends

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Clean VPN Approach to Secure Remote Access

Reaping the Full Benefits of a Hybrid Network

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Intelligent Logging & Reporting Cyberoam iview Appliance

Q1 Labs Corporate Overview

Next Gen Firewall and UTM Buyers Guide

IBM Internet Security Systems

DOBUS And SBL Cloud Services Brochure

Contents. Release Purpose. Platform Compatibility. SonicOS TZ 105 / TZ 205 Series Release Notes. SonicOS

How to Build a Massively Scalable Next-Generation Firewall

Discover Security That s Highly Intelligent.

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

ICSA Labs Network Firewall Certification Testing Report Enterprise (VoIP) - Version 4.1x. SonicWALL, Inc.

Next Generation Enterprise Network Security Platform

Transcription:

How to choose the right NGFW for your organization: Independent 3 rd Party Testing Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell

Marketing 2 Confidential

Marketing vs. Reality 3 Confidential

Stretching the truth 4 Confidential

All about the Benjamin's 5 Confidential

6 Confidential

7 Confidential

8 Confidential

Who do you trust? 9 Confidential

Who do businesses trust? 10 Confidential

The right stuff 11 Confidential

Unbiased 12 Confidential

Vendor A Vendor B Network Firewall Enterprise Certified Network Firewall Corporate Certified Next- Generation Firewall Evaluated * *Vendor B chose not to release this report to the public 13 Confidential

was not susceptible to attacks launched inbound or outbound to or through the product, including fragmentation and trivial Denial-Of-Service attacks. Dell NSA E-Class E7500 14 Confidential

2012 NGFW SVM 15 Confidential

Most secure and fastest NGFW to receive NSS Labs Recommended rating in 2012 Dell SuperMassive E10800 16 Confidential

2012 IPS SVM 17 Confidential

2012 IPS SVM 100% 95% 90% $40 $30 $20 $10 $0 18 Confidential

The advanced architecture of the SuperMassive running SonicOS 6.0 provides an extremely high level of protection and performance. Dell SuperMassive E10800 100% Resistance to Know Evasion Tests 19 Confidential

20 Confidential

21 Confidential

Gartner defines the UTM market as multifunction network security products used by small or midsize businesses(smbs). Gartner defines midsize businesses as those with 100 to 1,000 employees, and with revenue ranging from $50 million to $1 billion. 22 Confidential

See for yourself! NSS Labs Intrusion Prevention System, Security Value Map http://www.networkworld.com/news/2012/081412-security-value-map-261605.html NSS Labs Next Generation Firewall, Security Value Map http://www.sonicwall.com/us/14233.html ICSA Labs Next Generation Firewall Evaluation http://www.sonicwall.com/us/15598.html Network World Fast Forwarding Firewall Faceoff http://www.sonicwall.com/shared/download/networld_snwl_reprint.pdf Gartner 2012 Unified Threat Management Magic Quadrant http://www.sonicwall.com/us/14606.html 23 Confidential

Who is Dell? Leading provider of next-gen network security Founded in 1991 à Acquired by Dell in May 2012 2M+ Security appliances shipped worldwide 750K+ Intelligence feeds gathered daily In-house threats research team 130+ Patents 24 Confidential

Complete Solution Anti- Malware Intrusion Prevention Total Protection Application Intelligence Anti- Spam 25 Confidential

Dell Next-Gen Firewalls & Unified Threat Management firewalls SuperMassive E10000 Series Data centers, ISPs E10800 E10400 E10200 E-Class NSA Series Medium to large organizations NSA E8510 NSA E8500 NSA E6500 NSA E5500 NSA Series Branch offices and medium sized organizations NSA 4500 NSA 3500 NSA 2400 NSA 250M NSA 220 TZ Series Small and remote offices TZ 215 TZ 205 TZ 105 26 Confidential

Product Portfolio Network security WAN acceleration App Intell & Control GAV/ASW/ IPS CASS Enforced Anti-Virus Content Filtering Mobile Connect Clean wireless SonicPoint-N Series Global VPN Client SSL VPN Client Virtual Assist Secure remote access EPC Connect Mobile Spike Access Advanced Reporting Native Access Modules Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Web App Firewall Mobile Connect Email security Hosted Email Protection Email Anti-Virus Email Compliance Backup and recovery Site-to-Site Backup Offsite Backup Universal System Recovery Local Archiving Recovery Manager for Exchange Policy & management GMS Analyzer Scrutinizer 27 Confidential

http://livedemo.sonicwall.com 28 Confidential

Thank You! Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell Follow me on Twitter: @DanielAyoub 29 Confidential