Redefining NGFW/UTM Security

Slides:



Advertisements
Similar presentations
Feature: Identity Management - Login © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Advertisements

© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Unified. Simplified. Unified Communications Launch 2007.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Srinivas L Technology Specialist – Security | Microsoft
Feature: OLE Notes Migration Utility
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Feature: Web Client Keyboard Shortcuts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Document Attachment –Replace OLE Notes © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Unified. Simplified. Unified Communications Launch 2007.
Windows ® Azure ™ Platform. Network Architecture Packet Filtering Built-In Firewalls Connect Service SSL WCF Security Agenda.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

Information explosion 1.4X 44X Protect communications.
On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing environment.
Web Content Security Unlock the Power of the Web
BUILD SECURE PRODUCTS AND SERVICES
The time to address enterprise mobility is now
Deployment Planning Services
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Enterprise Security in Practice
Deployment Planning Services
SaaS Application Deep Dive
Modernizing your Remote Access
The Information Protection Problem
Threat Management Gateway
Information Protection
The utility belt for managing security and compliance in Office 365
Design and Implement Cloud Data Platform Solutions
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Prevent Costly Data Leaks from Microsoft Office 365
Cybersecurity Strategy
Citrix Virtual Desktops version 7
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Office365 Exchange Online Risun Antony Technology Specialist
Title of Presentation 12/2/2018 3:48 PM
Office 365 Security & Compliance: Exchange Online Protection
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Data Loss Prevention in Office 365
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Шитманов Дархан Қаражанұлы Тарих пәнінің
Title of Presentation 5/24/2019 1:26 PM
Microsoft Virtual Academy
Microsoft Data Insights Summit
Presentation transcript:

Redefining NGFW/UTM Security

Formidable experience and expertise Setting new benchmarks in data leakage prevention, threat mitigation and actionable security Cloud based security: Anytime, Anywhere enforcement of Security Policies Founded in 2002, HQ in Mumbai, India 8,000+ customers in over 12 countries Disruptive leader with many firsts – 1st DLP, 1st performance management security device, 1st Indian company to be ICSA Labs certified, 1st to launch comprehensive BYOD security on network firewalls Trusted security partner to leading lights in BFSI, enterprise, SMEs and SMBs

Power to CXOs: Security, Performance, Compliance EASY SCALABILITY SCALE UP AND OUT CLOUD DATA LEAKAGE PREVENTION BUSINESS CONTINUITY REAL-TIME VISIBILITY AND CONTROL PERFORMANCE Business continuity- HA , Failover, // context – user , time , application, network and content sense ZERO HOUR THREAT PROTECTION CONTEXT-AWARE SECURITY INTELLIGENCE Customizable SLA’s

Data Leak Prevention Visibility Monitor Detection Precaution User Applications Web Mails Corporate Uploads Web Chats & IM The Content Sent through application HTTP,. HTTPS, SMTP Instant Messenger Utilization of internet by usage in organization Attachments going of your network Unwanted applications Like, open proxies, P2P, Malware infected web sites – to ensure the chances of information leak Identify who is accessing Which applications What content is being Sent out What information is Being Sent out through Instant Messenger & Web chats Which user is sending Information using Yahoo, MSN, Rediff, Gmail, Rapidshare, Web Mails Define policies based on User then IP Address Add rules for popular Mail sites to match Mails on Subject, To, CC, BCC, Message Body, attachment size, attachment type, User Email Addresses, With Wide range of matching options. Add rule for popular Social networking sites Set Runtime Alerts Based on DLP rules

Building BYOD-happy businesses Intelligent device-awareness Eliminates manual efforts to configure & enforce security policy for new devices Introduces key BYOD drivers; eliminates barriers of adoption

…The Technology Enterprise Cloud Security-Remote Filter

NextGen UTM Features

VPN IPS ISP Failover & Load Balancing Firewall Bandwidth Management On-Appliance reporting IPS

Recurrent Pattern Detection - Antispam Outbound Spam Protection BENEFITS Zero False Positive guarantee with high spam, phishing, and malware catch rates. Increased customer satisfaction—add premium anti-spam to your current offerings.. Reduced costs— your engineers will no longer need to keep up with new spam attack tactics and sources. We do it for you.. Low TCO with our high performance, low maintenance technology, and proven protection.

Zero Hour Protection Antivirus RBL Engine GajShield Delete Known Viruses Incoming Http, Https Traffic ZERA Quarantine Mail With GajShield Antivirus integrated into the device or application, objects (files, web scripts, emails, etc.) are scanned and classified by our antivirus engine. This enables you to delete or quarantine these objects and block malicious web scripts before they can impact your customers.  

Cloud based Embedded Web-Content Filtering Comprehensive Security against compromised sites, Malware, and Phishing site. Web traffic analyzed with over 100 Millions sites into 85 categories, updates in real time. URL Filtering increase security by : - Stopping spam Malware sites - Dynamic on-the-fly updates of compromise websites Increase Productivity by controlling access of : - Sites, unrelated to work - Bandwidth consumption - Max download restriction based on users Image safe search integration – Google, Yahoo

Applications hidden in port 443 Next Generation Security with Application Filtering Applications hidden in port 443 Basic UTM unable to detect rogue applications like Bittorent, Tor or Skype Malware Risk Files downloaded could be infected Data Safety Proxy applications could be used to leak data Vulnerability Applications can bypass firewall to gain access to network Legal Troubles Copyrighted files downloaded could cause legal trouble

Supports more than 6500+ applications Next Generation Security with Application Filtering Supports more than 6500+ applications

Next Generation Security with Application Filtering Traffic Control of Non business traffic Drop unrequired traffic Secure against Advance Persistent Threat More bandwidth to business and improved user experience Prevent data leaks by application control

User based network visibility Supports Authentication against multiple database A B User based network visibility All security policies can be applied based on user and groups Unwanted traffic can be dropped and non-business traffic can be throttled User visibility and control leads to efficient network security management

User Layer Supports Authentication against multiple database Radius Server LDAP Server Active Directory Local Database GajShield now support multiple database for user authentication Guest users or contract workers can be created on local database thus saving cost on CAL license User can login through multiple device with the same username Do not have to create multiple logins for guest users.

Context Sensitive Data Leak Prevention System Application Layer Network based Data Leak Prevention Context Sensitive Data Leak Prevention System Gain visibility and form to outgoing data Create rules to make applications read only Create context sensitive rules to allow social media for business use Archive business chats and mails for compliance Inspect HTTP/HTTPS/SMTP traffic for data leaks

How secure is your traffic ? Application Layer Reporting Layer In-depth Visibility and Compliance Know how secure your network traffic is Block all non secure traffic to improve security and performance of your applications Prevent data leaks through non-secure channels. How secure is your traffic ? Inspect productivity of your organisation Block non-productive sites to improve bandwidth use Prioritise business traffic over non-critical traffic Productivity report Understand the user internet use pattern Visibility on the reason of use Productive and non-productive users User Report

Application Layer Network based Data Leak Prevention More than 68% of data leak happens through Web and Email GajShield unique patent pending ‘Context Sensitive Data Leak Prevention’ help prevent data leaks

GajShield Product Range   Soho/SMB Market Model No of Ports Gs15nu 4 Ports GS20nu Gs40dc Gs80dc 6 Ports Gs160dc 8 Ports Mid Market/Enterprise Market Gs240dc 6 Fixed + Modular Slot(1) Gs360dc Gs560dc 8 Fixed + Modular Slot (2) With RPS Gs980dc 10 Fixed + Modular Slot (4) With RPS Gs1160dc

Subscriptions Offerings Basic Bundle Subscriptions Basic Subscription includes Anti Virus, Web Content and Application Filter, Intrusion Prevention System , 8x5/24x7Support, hardware warranty and RMA fulfilment Premium Bundle Subscriptions Premium Subscription includes Anti Virus, Anti Spam, Web Content and Application Filter, Intrusion Prevention System , 8x5/24x7 Support, hardware warranty and RMA fulfilment Complete Bundle Subscriptions Complete Subscription includes Anti Virus , Anti Spam, Web Content and Application Filter, Data Leakage Prevention, Intrusion Prevention System , 8x5/24x7 Support, hardware warranty and RMA fulfilment

Reporting & Compliance Data Protection Clean Network Cost Savings Dedicated Security Expertise Smooth Security User Sense Easy Deployment Integrates with existing environment App Awareness Committed Support Manageability High- performance Security Context Awareness

Network Security for the new world order 10/13/2018 4:06 AM Network Security for the new world order © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.