Products and Services Overview Blue Ridge Networks / Cominfo Systems.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
The System Center Family Microsoft. Mobile Device Manager 2008.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
The future of Desktops Transform Your Desktop with Virtualization.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Connect with life Gopikrishna Kannan Program Manager | Microsoft Corporation
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Unified Logs and Reporting for Hybrid Centralized Management
Security and Policy Enforcement Mark Gibson Dave Northey
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Netop Remote Control Trusted. Secure. Experienced.
Remote Networking Architectures
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Public Key Infrastructure from the Most Trusted Name in e-Security.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Clinic Security and Policy Enforcement in Windows Server 2008.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Tim Vander Kooi Systems
Implementing Network Access Protection
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Configuring Network Access Protection
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Basharat Institute of Higher Education
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Forefront Security ISA
Threat Management Gateway
Unit 27: Network Operating Systems
Goals Introduce the Windows Server 2003 family of operating systems
Public Key Infrastructure from the Most Trusted Name in e-Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Enabling the hybrid cloud with remote access appliances
Increase and Improve your PC management with Windows Intune
Designing IIS Security (IIS – Internet Information Service)
Microsoft Virtual Academy
Presentation transcript:

Products and Services Overview Blue Ridge Networks / Cominfo Systems

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. Teaming Cominfo and Blue Ridge Networks signed Teaming agreement to serve Pakistan’s market Cominfo is a exclusive product and service provider of Blue Ridge Networks in Pakistan Combination of exceptional product line and outstanding service brought two companies together

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. Benefits of Teaming Local Urdu and English speaking technical support Local workforce available to visit client sites for training and support Immediate product implementation and replacement No middleman and markups Office expansions are scheduled for Lahore Islamabad, Rawalpindi, and Dubai

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ What we do BorderGuard Virtual Private Networks EdgeGuard End Point Security Site to Site Remote Access Specialized VPN Applications Trusted Configuration Management Scan and Block Flexible Authentication Service

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Markets Served Banking Finance Government Health Care Legal Transportation 250+ total customers in 37 countries.

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Differentiated Solutions Secure Mobile Computing –Remote Access with PKI Authentication –Endpoint Security Enforcement –Nomadic Secure IP Voice, Video, Data Secure Central Management –Service Provider Model –Low Cost, Rapid Deployment –Carrier and Media Agnostic Global Reach Ease of Use Without Security Compromise –Enterprise Scale Hardware and Software Systems

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ BorderGuard™ 5000/6000 VPN Appliances –Multiple models span mid-range market –Up to 2.2 Gbps AES256 packet encryption –Up to 24,000 simultaneous connections –RSA public-key authentication built-in FIPS certified Common Criteria, EAL2, EAL4+ (in evaluation) RemoteLink™ Rapid deployment and mobility features Supports mobile security for voice, video, data applications Protocol agnostic Embedded PKI for strong authentication Transparent to end-user Secure Networking Product Portfolio

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Management Console –Headless, plug-and-play central management appliance –Easy to use browser-based interaction from any PC –Manages high assurance VPNs Site-to-site Remote access –Granular administrator role-based administration –Ideal for Unified PKI authentication and full integration with client’s Active Directory –Instant user revocation with Red List –Detailed audit collection for better management and reporting Remote Access Client Software –Windows 2000, XP, XP embedded, Vista and PocketPC –Supports seamless wireless roaming with persistent secure connection –Easy to install and easy to use –Optimized for X.509 cert based authentication and smartcards Secure Networking Product Portfolio

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Session Initialization Parameters Encryption Level A Encryption Level B BorderGuard Public Key Client Private Key BorderGuard Public Key Client Private Key High Assurance Security Privacy Audit Integrity Authorization Authentication PKI Privacy Audit Integrity Authorization Authentication PKI Mutual Mandatory Authentication SE IKE

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Usability – Active Directory Integration Log Server Policy Server Remote Access Enterprise Untrusted Network CRL OCSP Active Directory Using a Common Access Card (CAC) or a Personal Identity Verification (PIV) card, a secure tunnel request is made to BorderGuard VPN appliance Management Console queries CRL servers for cert path discovery and validation Management Console queries OCSP responders for cert validation The Management Console’s Red or Green List allows administrators to block access for any reason The user authenticates to Active Directory using an end-to-end cryptographic process No intermediary servers, no additional network access policy data required ** User’s network access is limited until successful Active Directory authentication occurs Flexible Authentication

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ RemoteLink Secure Remote Office VoIP Secure Thin Clients Non-Window Devices

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ RemoteLink RemoteLink™ Mobile Dynamic configuration via portable token Software and OS independent Supports any Ethernet attached devices Robust protection of user devices Simple and effective redundancy and scalability Transparent to end-user applications

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Secure Virtual Ethernet Service Any-to-any, full mesh, enterprise connectivity 100% end-to-end security Unicast and Multicast Any wired or wireless networks; – DSL, Cable Modem, T1, etc. – Cell wireless, satellite, WiMax Any Data applications and Protocols Any VoIP applications Any IP Video applications Anywhere on the globe

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ SVES Deployment Regional Office Branch Office Remote workstation Enterprise HQ SVES creates a complete end to end private and secure network on the global Internet. Internet Enterprise Remote workstation

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Secure Intranets Logical Full Mesh Among All Sites

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Secure Extranets Only connectivity to/from central site resources No connectivity among remote sites

Trusted Framework for Policy Enforcement, Admission Control, and Compliance of Microsoft Windows Fixed and Mobile Workstations EdgeGuard™

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ EdgeGuard Security Framework EdgeGuard Management System Malware Protection EdgeGuard Agent Security Framework NAP / NACApplication 3Application N The EdgeGuard Security Framework enables multiple applications Trust System NetLock RegistryLockFileLockOPSWAT Stateful Workflow Control ProcessLock TPM Server Application: Windows Server 2003 SQL Server 2005 Client Application: Windows XP SP2 Windows Vista Near real-time visibility and manageability

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Example EdgeGuard Applications NAP/NAC –EGA provides Posture Assessment for client systems –Continuous assessment, enforcement and remediation off-net Enhanced Policy Enforcement for Endpoints –Application Control –Red List – unstartable applications –Green List – unstoppable applications Trusted Enclaves for Process Containment –TEs may contain User Apps and System Services –Highly effective defense against malware –Not HIPS

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ EdgeGuard Deployment Log Retrieval Server Policy Distribution Server Remote workstation Enterprise EdgeGuard allows continuous Posture Assessment through signed policy files and signed audit logs Untrusted Network EdgeGuard Management Console Disk Encryption On Service Pack Updated Personal Firewall On DAT File Updated Anti-Virus On StatusEdgeGuard Policy Remediation Site Disk Encryption On Service Pack Updated Personal Firewall On DAT File Updated Anti-Virus On StatusEdgeGuard Policy EdgeGuard Agent

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Policy Examples End-point Security Management –Ensures that third-party security products like anti-virus, personal firewall, disk encryption, etc. are executing and have up to date policy. –Provides quarantined access for remediation like anti-virus update or patch management. –Prevents Red-listed programs from executing. –Ensures that Green-listed programs are executing. –Provides trusted push of scripts and executables for zero-day attack remediation. Trusted Configuration Management –Protects selected registry hives from alteration. –Prevents alteration of specified DLLs or data files. Device Management and Access Control –Enforces which network interfaces may be used and in which networks. –Controls what networks or hosts may be accessed and from where. –May be used to limit the use of writable storage media such as USB storage devices or CD-Ws. Authentication Management –Ensures that the client system has successfully authenticated to specified enterprise systems like Active Directory prior to allowing network access. –Can enforce arbitrary pre and post connection authentication chains. Note: Any policy can be conditioned upon “location”.

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. Point of Contacts Country Manager Zhahid MushtaqRichard Gurdak Phone Webwww.cominfosystems.comwww.blueridgenetworks.com AddressAnum Classics Mezzanine Floor Shahrahe Faisal Karachi Parke Long Court, Suite 103 Chantilly, Virginia 20151

©2008 Blue Ridge Networks/Cominfo Systems. All rights reserved. 6/3/ Thank You