WildPackets Confidential Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager.

Slides:



Advertisements
Similar presentations
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Advertisements

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Chapter 12 Network Security.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Data Security in Local Networks using Distributed Firewalls
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Department Of Computer Engineering
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
 2013, Infotecs ViPNet Technology Advantages.  2013, Infotecs GmbH In today’s market, along with the ViPNet technology, there are many other technologies.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Market Analysis Decision Group.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Protection from internal threats: Evolution of DLP or Who sets trends.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Retail Customer ETM® System Impact WE SEE YOUR VOICE TM.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
1 1 Hosted Network Security EarthLink Complete™ Data.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Making Networks Smarter. Trends Everything is moving to the network –Telephony –Video –Web services (and further.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Chapter 6: Securing the Local Area Network
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Cegedim Relationship Management Key Perspectives on Customer Databases November 2013.
Profit from a practical IP Billing Solution Suresh Balasubramanian Senior Product Manager Macrovision.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Role Of Network IDS in Network Perimeter Defense.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Some Great Open Source Intrusion Detection Systems (IDSs)
Barracuda NG Firewall ™
Mitä sovelluksia verkossasi liikkuu? Ja miten sovellukset toimivat?
Top 5 Open Source Firewall Software for Linux User
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Lecture 5. Security Threats
Securing the Network Perimeter with ISA 2004
Virtualization & Security real solutions
I have many checklists: how do I get started with cyber security?
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
IS4680 Security Auditing for Compliance
Intrusion Prevention Systems
Firewalls Jiang Long Spring 2002.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

WildPackets Confidential Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager

WildPackets Confidential Agenda IT Security Market Landscape Key WildPackets Differentiators What WildPackets Can Offer CALEA

WildPackets Confidential The Security Landscape Let’s take a deep breath after all that Forensics talk … Security is broad topic – Forensics is only a subset The current IT security landscape: –Secure Content Management: Anti-Spam/Anti-Virus/Content Filtering –Access Control –Compliance –IDS/IPS –Firewall/VPN WW security software revenue for 2005 = $7.4B; expected to be exceed $8.5B for 2006 New markets are emerging –Network Behavior Analytics (NBA) –Anti-Data Leakage –Security Information Management –Fraud Identification and Management

WildPackets Confidential Security Market ala WildPackets All software needs to address security Most security software is designed to control and/or manage, but not troubleshoot Typical security solutions, like firewalls, IDS/IPS, etc, do little to protect threats from within There’s no “holy grail” to security solutions – many applications are needed to cover all of the threats

WildPackets Confidential Key WildPackets Security Differentiators Troubleshoot, troubleshoot, troubleshoot Protect your network from within Establish and monitor adherence to network security policies Monitor what traditional security solutions do not –Top talkers –Bandwidth hogs –Security handshake protocols down to the packet exchange –Unauthorized application, web or IM utilization

WildPackets Confidential Troubleshoot, Troubleshoot, Troubleshoot What we offer –I can’t connect!! –Typical security solutions on the market today omit troubleshooting and analysis (Duh – it’s hard!) –Back to partnerships - Ex. Wireless IDS/IPS vendors have solicited WildPackets to enhance their offerings with troubleshooting –The most comprehensive, flexible, distributable, integrated and extensible network management solution on the planet Value - Complete solutions for customers –End Customer – fills a whole –Partnership Great differentiation Simple integration via our extensibility

WildPackets Confidential Protect Your Network from Within What we offer – Filters, Experts –Worms –Traffic anomalies –Malfunctioning hardware Value –Security systems typically work at the edge –Report problems as they happen –Begin troubleshooting immediately

WildPackets Confidential Network Security Policies What we offer –Establish policies for allowed behavior –Monitor and alert based on violation Value –One tool that includes policy definition and compliance –Eliminate the need for “endpoint” solutions

WildPackets Confidential Monitoring What we offer –Top Talkers – legitimate? –Bandwidth hogs – impacting? –Protocol usage – unusual? –Application usage – acceptable? Value –24x7 remote monitoring with engines –Transition from monitoring to troubleshooting on the fly –Monitor all network layers – from packets to applications

WildPackets Confidential How WildPackets Fits In We enhance other security solutions We verify the performance of other security solutions We need to partner!

WildPackets Confidential CALEA

WildPackets Confidential Thank You Questions