Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Agenda Product Overview Hardware Interfaces Software Features
Sales Guide for DES-3810 Series Aug 2011 D-Link HQ.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Guide to Network Defense and Countermeasures Second Edition
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
1 Tainet IP PBX solutions Tainet Communication System Corp.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Beyond connectivity Sally Davis, President, Products and Services BT Global Services November 20, 2003.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Internet Security Seminar Class CS591 Presentation Topic: VPN.
MIGRATION FROM SCREENOS TO JUNOS based firewall
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Samsung Proprietary & Confidential 2/29.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Module 4: Designing Routing and Switching Requirements.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Video Conferencing Proposal August 20, 2003 Presented to Carolina Conference.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Advancing the Carrier IP/MPLS Edge Routing Technology Group Cisco Systems, Inc. April.
Profit from a practical IP Billing Solution Suresh Balasubramanian Senior Product Manager Macrovision.
VPN’s & Remote Access Issues David Trepp VP of Technology
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Cisco 2921/K9, Hot Required by Small to Enterprise Branch Offices.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
CERTIFICATION EXAM QUESTIONS DESIGNING CISCO NETWORK SERVICE ARCHITECTURE (ARCH) V 2.1 Presented By : com.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Chapter 1: Explore the Network
Product Introduction --QoS VPN Router G3 16/12/2015 Business WLAN
Network Security Solution
Networking in the Enterprise
Networking in the Enterprise
Virtual Private Networks (VPN)
Wireless IP products: GWN series
CONNECTING TO THE INTERNET
IS4550 Security Policies and Implementation
ISMS Information Security Management System
Virtual Private Network
Professional Network Services
AT&T Firewall Battlecard
Global One Communications
Presentation transcript:

Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution Summary SECURITY ROUTERS

Current Network Limitations Exisitng Limitations –Dual Networks Costs Data and Voice –Mismatched Products Wan Connectivity and Switching Capabilities –Cost vs. Capabilities

New Network Requirements New Requirements –Web Hosting DMZ, Firewalling Capabilities, Server Protection –Voice over IP Latency constrains and Quality of Service Needs –Voice Mail Centralized Voice Mail –Distance Learning Remote Classrooms –Video Teleconferencing Quality of Service and Multicasting Requirements

New Network Requirements (Cont.) New Requirements –Network Security Infrastructure Authentication User Policies –Intrusion Detection Dragon IDS Auditing –WEB Content and Monitoring Feature of the IDS for discovery and FireWalling for Accessibility

Enterasys’ Mission To be the Leading Provider of Secure, Highly Intelligent Enterprise Networking Solutions that Deliver Tangible Business Benefits

Leader in the Field 68% of the Fortune 50 are Enterasys customers — Fortune 70% of the largest U.S. banks are Enterasys customers — S&P Report, Online Banking Report 17 of the 25 largest global public manufacturing companies are Enterasys customers 4 of the top 5 most wired universities are Enterasys customers — Yahoo! Internet Life, US News & World Report 100% of the top 25 federal contractors are Enterasys customers — Washington Technology 62% of the top biotech and pharmaceutical firms are Enterasys customers — Information Week

X-Pedition Security Router Next generation integrated networking solutions for branch offices –Multiple form factors –Wide selection of WAN interfaces –Comprehensive IP routing –Site-to-site, extranet & remote access VPN –Distributed, policy managed Firewall –Web based management + Cisco like CLI –In future – IDS, UPN (802.1x), Convergence technologies XSR-1800 Series

Technology Solutions vs. Technology Products Other Vendor’s Vertical Products   Firewall VPN Gateway WAN Router Network IDS VPN Routing Management Intrusion Detection Firewall X-Pedition Security Router is… A complete routing & security solution for branch office locations Designed for cost effective performance & security X-Pedition Security Router is… A complete routing & security solution for branch office locations Designed for cost effective performance & security

The User Personalized Network Authentication – The network should know who I am. Provides resources based on a user’s “Role” within the organization Priority/Permission – The network experience should match the information experience Network privileges stay with user regardless of where or when they log on Works with customers’ existing active directory Dynamic user-based policy aligns the network operation with business priorities

XSR-1850 Base System 2 port Fract T1/E1 NIM VPN + Firewall feature set Proposed Solution XSR-1850 Internet Charlotte Office Mt. Pisgah Academy, Asheville, NC Remote access VPN terminating L2TP/IPSec tunnels from Win XP PCs. Firewall protection. T1 or E1 circuit to central site. L2TP / IPSec T1 Remote Access VPN for 120 Churches And 30 Schools XSR-1850 Gigabit Backbone

Summary The Enterasys’ value proposition intersects with market demands –Integrated security, comprehensive management, price / performance leadership Future-proof architecture enables value-added functionality –State of the art design scales to higher performance models using the same software and hardware architecture –Future features & application upgrades with modular software images Enterasys is a very viable source for enterprise networking –Full range of networking solutions –Focused on enterprise accounts

Realize your vision Questions?