SonicWALL Access Security Legacy & Current Themes
First, A bit of history The 20 year evolution of aventail
The Aventail to SMA transition 1996 Aventail is founded by Evan Kaplan 2005 Netifice acquires Aventail Managed Services business 2006 Netifice and Megapath merge 2007 SonicWall acquires Aventail 2012 Dell acquires SonicWall 2015 GTT acquires Megapath Managed Services business 2016 SonicWall becomes independent again
20 Years Technology curve 1996 2003 2008 2016 Speed/Performance 50 Kbps 250 Kbps 2Mbps 200Mbps GPRS/ 2G 3G 4G/LTE 100MHz 3.2GHz Dual core 3 GHz Multi Core 4GHz
Evolution of SMA 2003-04 2008-09 2015-16 Key Features HW/SW Product Aventail EX750/ EX 1600 / EX2500 CPU - 2.4 GHz DDR 2GB /1GB/ 512MB SRA EX6000/ EX7000/ EX9000 CPU- 2GHz/2.1 GHz/ 2X2.4 GHz DDR – 1GB/2GB/32GB SMA 6200/7200 CPU - 3GHz, 4 cores DDR3 - 8GB/16GB Key Features SSL VPN Solution Endpoint Control Clientless Web-based access Unified Policy Engine Remote Access Service Advanced EPC Per App VPN App Access Control Access Security Solution Blended Cloud SSO with MFA Demand Based license pooling Global Traffic Optimization Google search engine – birth?(disruptive technologies), security posture with endpoint evolution. Smartphones Mobile 3G with HSPA+ BYOD Telecommuting Cloud transformation Mobility Internet of things Virtualization Disruptive trends Broadband Internet SSL VPN/Encryption IT Outsourcing
SMA innovation through the Years First one Terabit Global High Availability Cluster with integrated global traffic management First SSL VPN solution with global load balancing and pooled licensing First Application Access Control with digital signature verification of client applications First VPN deep packet inspection for access control via is SSL VPN First client device identity access control for mobile devices First mobile SSL VPN for smartphones First SSL VPN with Complete End Point Control for Mac Devices First vendor to deliver the name based routing using access policy resources via its SSL VPN First to combine the full functionality of an IPSec solution with the flexibility of SSL VPN First SSL VPN gateway to provide cross-platform End Point Control capabilities First SSL VPN to Secure PDAs First Leading SSL VPN with Full Clientless Access from a UNIX Machine First SSL VPN Solution 1997 2003 2007 2016
SMA Feature Maturity Time End Point Control MDM HTML5 SaaS Applications CASB Sandbox MDM End Point Control Native Access HA Active/Passive Remote Assist Context Sharing Analytics APIs Introduction Growth Maturity Decline HTML5 Multi-tenancy
SMA Current Themes
SEVEN Core Themes for Access security Access Control Superior Security Global High Availability Advanced Authentication Intuitive User Experience Central Management and Reporting Extensibility
ACCESS CONTROL ACE Access Control Engine + EPC End Point Control + AAC App Access Control
FIPS 140-2 level 2 : ICSA SSL-TLS certified : Suite B Superior Security Advanced Ciphers Cryptography Select Layer 3 SSL VPN Security Certifications Layer 3-7 Application Proxy Advanced Ciphers Support Cryptography Support Layer 3 SSL VPN THREATS DETECTION + PROTECTION + PREVENTION FIPS 140-2 level 2 : ICSA SSL-TLS certified : Suite B
Global High Availability Scalable Performance Global Traffic Optimization Global Traffic Optimization (GTO) Scalable Performance Dynamic Pooled Licensing Dynamic High Availability Dynamic Licensing Dynamic High Availability G-HA + GTO + DPL
Advanced Authentication Cloud Single Sign On Multi Factor Authentication SAML Gatekeeper Authentication Repositories Kerberos Constrained Delegation Smartphones Tablets Laptops SSO with MFA + SAML + LDAP + RADIUS
Intuitive User Experience Clientless Access User Workplace Mobile OS Integration Session Persistence Secure Network Detection Single Paine of Glass WorkPLACE Portal
Real Time Health and License Consumption Monitoring Central Management & SONAR MONITORING Central Management (CMS) Global Patching SONAR Monitoring SIEM Integration Maintenance Scheduling User Reporting SIEM Integration Scheduler Real Time Health and License Consumption Monitoring
Management and Authentication APIs + Turnkey 3rd Party Integration Extensibility Management and Authentication APIs + Turnkey 3rd Party Integration
Thank you