Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Guide to Network Defense and Countermeasures Second Edition
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Website Hardening HUIT IT Security | Sep
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Motorola Mobility Services Platform
Barracuda Load Balancer Server Availability and Scalability.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Vantage Report 3.0 Product Sales Guide
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Network security Product Group 2 McAfee Network Security Platform.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
2015 Security Conference Dave Gill Intel Security.
2015 Security Conference Ash Patel Intel Security.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Introduction to Avaya’s SDN Architecture February 2015.
What’s New in Fireware v WatchGuard Training.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Barracuda NG Firewall ™
OIT Security Operations
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
100% Exam Passing Guarantee & Money Back Assurance
Hybrid Management and Security
Intrusion Prevention Systems
Securing the Network Perimeter with ISA 2004
Active Cyber Security, OnDemand
Forefront Security ISA
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Healthcare Cloud Security Stack for Microsoft Azure
Sizing …today. T: Here’s how. .
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
Check Point Connectra NGX R60
Healthcare Cloud Security Stack for Microsoft Azure
Presentation transcript:

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Top of Content Box Line Subtitle Line Title Line September 2014 ​ McAfee Next Generation Firewall ​ and Security Connected Threat Ecosystem

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. “Connected” NGFW Performance Enhanced NGFW First NGFW Firewall Evolution 2 Connected to endpoint security Connected to SIEM Connected to advanced threat detection Connected to real-time global threat database Central management for large networks High availability Advanced evasion protection Inspection Application and user awareness Traditional FW Completeness of Security

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Delivers the Big Picture of Security 3 3

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Benefits 4 Network Personnel Service availability High performance Managed QoS Minimal downtime Administrators Centralized, holistic network view Easy-to-use tools and workflow automation McAfee Next Generation Firewall Security Specialists Proven malware protection Continual security updates and support Detailed reports and forensics Granular policies CIO / CISO / CEO / CFO Ensure business continuity and protect key assets Complete, cost-effective security solution

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 5 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 6 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Flexible Delivery Unified Software Core 7 Adjustable security levels support a wide variety of deployment scenarios Performance levels are maintained even with deep packet inspection enabled NEXT GENERATION FIREWALL FIREWALL LAYER 2 FIREWALL IPS MILITARY GLOBAL ENTERPRISE COMMERCIAL SMB VPN SOFTVIRTUALPHYSICAL McAfee

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Enables Multiple Deployment Configurations Unified Software Core 8 Reconfigure security effortlessly as requirements change without license renegotiations or hardware “forklift” upgrades FW / VPN L2FW IPS FW / VPN

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. “All inclusive” licensing enables easy budgeting for long-term TCO reduction Lower TCO Unified Software Core 9 Typical Cost McAfee Change in threat Landscape More performance needed Security as a business enabler Total cost

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 10 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Centralized Management Resource Optimization Hierarchical templates and aliases Security automation with scheduling e.g. upgrades Policy validation and analysis Security automation with plug and play Hierarchical Templates And Aliases Policy Validation and Analysis Security Automation with Scheduling Security Automation with Plug and Play InitialConfiguration POLICY TEMPLATE MAIN POLICY SUB POLICY 2 SUB POLICY 3 SUB POLICY 1

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 12 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee NGFW is tested against 800 million+ evasions or combinations Evasions – what, why and when? Advanced Evasion Prevention Means to disguise an attack Bypass network security devices leaving no traces Extremely difficult to track Unlimited variations and combinations Most network security devices are easily evaded 13 Internet Security Device Vulnerable Target A c k t a t Attack A c k t a t A c k t a t

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Fundamental Difference Advanced Evasion Prevention 14 Traditional Inspection Architecture ta t a ? McAfee NGFW Stream-Based Full Stack Normalization Protocol agents ta ck at ck attack ! All traffic must be normalized before inspection in order to expose attacks

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Advanced Evasion Prevention Device Testing 15 With Evader getting access to the “protected” network is as simple as: Select the Exploit 1 Identify Attack Target 2 Cisco Palo Alto Networks Check Point Fortinet Juniper SourceFire Tipping Point Select the Evasion Technique 3

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 16 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Native Active-Active Clustering High Availability 17 Node 1 Node 6 …16 Node 2Node 3 Node 5Node 4 Mix of hardware and software versions Internet “I can update a FW cluster without dropping a single packet” – McAfee NGFW customer

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Cost-effective and secure site-to-site connectivity provides adjustable resilience and capacity High Availability Multi-Link and Augmented VPNs 18 2 Mbps = up to 6 Mbps + HQ Distant Site + MPLS ADSL ISP A ISP B

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Built-in VPN Secure Remote Access Native IPsec VPN and SSL VPN connectivity Strong encryption protects sensitive corporate data and communications Outlook web access (OWA) and intranet access via customizable SSL VPN Portal 19 Corporate HQ Client-based IPsec VPN access Clientless access through secure portal Remote SSL VPN Portal Login: _____ SSL VPN Portal Login: _____ McAfee NGFW

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Differentiators 20 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee NGFW Security Connected Ecosystem McAfee ePO (Endpoint Management) McAfee ESM (SIEM) McAfee Advanced Threat Defense 21 McAfee GTI Reputation in the Cloud Integrates network, endpoint and global threat information for superior protection McAfee Next Generation Firewall & SMC

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 22 McAfee ePO (Endpoint Management) McAfee ePO Integration IP addresses Ports Login credentials, etc. Discover and take action on dangerous or malicious endpoint behaviors Direct links to endpoint log events 22

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 23 McAfee ESM (SIEM) McAfee ESM (SIEM) Integration Quickly respond to alerts and unusual patterns on your network 23 Alerts based on deviations Sum events and track averages Unusual user behavior Suspicious network activity spikes Anomalous communication patterns } ID Anomalies } 23

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 24 McAfee ATD Integration McAfee Advanced Threat Defense Deep analysis of suspect files exposes zero-day and advanced threats 24

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Security Connected Ecosystem 25 McAfee GTI Integration McAfee GTI Reputation in the Cloud Respond to real-time global threat information including insights from McAfee Labs McAfee NGFW uses file reputation services from GTI 25 File reputation URL reputation Web categorization Message reputation IP reputation Certification reputation

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. logs 26 McAfee SIEM New File McAfee Advanced Threat Defense McAfee Next Generation Firewall McAfee Global Threat Intelligence (GTI) Malware Warning! McAfee ePolicy Orchestrator AV Scan Less Time to Find, Freeze and Fix advanced threats FIND FREEZE FIX Security Connected Ecosystem How it Works

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. One harmonized appliance family protects investments with hardware modularity and simple licensing McAfee Next Generation Firewall Appliances 27 Same appliance adaptable for multiple use-cases Modular hardware Scale from branch office to data center deployments Rugged designs for demanding environments Highly Flexible Deployment 1000 Series 1400 Series 3200 Series 5200 Series 300 Series 4G 20G 60G 120G McAfee SMC

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Third Party Recognition “Long legacy with HIGH AVAILABILITY” “Early focus on ANTI-EVASION” RECOMMENDED by NSS Labs VALIDATED for real world quality, protection and performance 28

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Next Generation Firewall Benefits The best protection for your business and digital assets Adapts easily to your security needs Scales effortlessly with your growing business Optimizes productivity of employees and customers Lowers TCO for both security and network infrastructure 29

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. 30

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Flexible Product for Different Needs 31 ADVANCED THREAT PROTECTION HIGH AVAILABILITY CONTEXT AWARE SECURITY CENTRALIZATION OF OPERATIONS SITUATIONAL AWARENESS & FORENSICS INVESTMENT PROTECTION RESOURCE OPTIMIZATION FLEXIBLE & QoS AWARE VPN MULTI-TENANCY McAFEE NGFW CAPABILITIES DATACENTERS & CLOUD SERVICES BUSINESS CONTINUITY & APPLICATIONS MISSION CRITICAL NETWORKS MULTI-TENANT BUSINESESS SITE-TO-SITE CONNECTIVITY SCOPE OF PROTECTION