It’s A New World. CONFIDENTIAL All Rights Reserved 2 The Business Impact Most of your network traffic will be coming from outside the private network.

Slides:



Advertisements
Similar presentations
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Advertisements

RSA Media & Analyst Briefing March 2-4, The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger 2 Changing WorldBusiness Priorities.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Guide to Network Defense and Countermeasures Second Edition
FIREWALLS Chapter 11.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Solutions Road Show 2014 March’ 2014 | India Protection from Next Gen Threats Pralobh Menon Sales Engineer DELL SonicWALL (South) Pralobh Menon Dell India.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Meet the Next Generation Firewall (NGFW)
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
SonicWALL UTM Firewall Overview November 2010 Andy Barrow SonicWALL Product Manager
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Barracuda Load Balancer Server Availability and Scalability.
Intranet, Extranet, Firewall. Intranet and Extranet.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
ShareTech 2015 Next-Gen UTM.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
Vantage Report 3.0 Product Sales Guide
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 6 Planning and Deploying Messaging Security.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
NSA 2400MX Partner Overview Name Title Phone.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Security fundamentals Topic 10 Securing the network perimeter.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Secure Services Shared Hosted MS Exchange 2010.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Security fundamentals
Web Content Security Unlock the Power of the Web
Chapter 1: Explore the Network
Network Security Solution
Barracuda Web Security Flex
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Securing the Network Perimeter with ISA 2004
Check Point Connectra NGX R60
Presentation transcript:

It’s A New World

CONFIDENTIAL All Rights Reserved 2 The Business Impact Most of your network traffic will be coming from outside the private network you are trying to secure 2001: Network Perimeter2008: Resource Perimeter Internal Users Traveling Executives Day Extenders Employee at a Kiosk Customer or Supplier Behind a Firewall VOIP Users Employee Using a Wireless Hotspot Employee PDA User Corporate Data Centers Customers or Suppliers Remote Access External Users Corporate Data Centers

CONFIDENTIAL All Rights Reserved 3 Fundamental Changes in Technology  Ubiquity of broadband  Proliferation of mobile devices  Rise in IP telephony  Increased teleworking

CONFIDENTIAL All Rights Reserved 4 Enterprise-class Networking Drivers & Trends 4 Technology Trends  Growth in real-time applications  SaaS / Web 2.0  Virtualization of services  Data Center consolidation Infrastructure Demands Business Drivers  Reduction in operating costs  Focus on TCO  Mobilization of the workforce  Compliance  Outsourcing growth  Gaining competitive advantage  Growth in bandwidth; thirst for unimpeded traffic routing  Integration concerns  Handling latency sensitive traffic becomes challenging – voip, collab.  De-perimeterization The Communications Landscape Is Rapidly Evolving

CONFIDENTIAL All Rights Reserved 5 Your Users are Increasingly Out of Your Control Network Applications and Resources Internal UsersExternal Users  Users  Devices  Network environments  Mobility  Remote access Home Office Users Traveling Executives Day Extenders Kiosks/Public Machine Users Business Partners/ Extranet Users VOIP Users Wireless LAN Users PDA & Smart Phone Users

CONFIDENTIAL All Rights Reserved 6 Current Solutions Present Challenges  Lack of integration and correlation between solutions increases management overhead, complexity and cost  Lowered performance and higher false positive rate; inability to handle real-time traffic increases risk  Policy focuses on blocking ports rather than widespread inspection of applications and application threats Solutions Traditional Firewall Traffic Legacy System Access IDS/IDP Basic Applications Worms Application Access Application Layer Threats Proxy Software Vulnerabilities

CONFIDENTIAL All Rights Reserved 7 7 Global ManagementSecure Wireless SonicPoint GlobalManagementSystem Content SecurityNetwork Security Security & CSM Business Continuity Continous Data Protection Remote Access SSL-VPN SonicWALL Solution Suite

CONFIDENTIAL All Rights Reserved 8 8 worldwide customer more than 1 million appliances

CONFIDENTIAL All Rights Reserved 9 9 Enterprise-Products: SonicWALL E-Class GMS (Global Management System) Network Security Appliance E5500 Network Security Appliance E6500 Network Security Appliance E7500 SonicWALL Aventail EX -750 SonicWALL Aventail EX-1600 SonicWALL Aventail EX Security ES Security ES 8000

CONFIDENTIAL All Rights Reserved 10  Enterprise-class Deep Packet Inspection and Application Firewall  Revolutionary Multi-Core Performance  Threat Protection over both External and Internal Networks  Integrated Business Continuity & High Availability Features SonicWALL NSA E-Class Series E7500 E6500 E5500 The SonicWALL® Network Security Appliance (NSA) Series - the first multi- core Unified Threat Management (UTM) platform that delivers enterprise- class deep packet inspection without compromising performance

CONFIDENTIAL All Rights Reserved 11 Next Generation E-Class Architecture 11 SonicWALL Solution 1. Consolidated & Integrated Security Technology 2. Inspection of Real-time & Latency Sensitive Applications/Traffic 3. Scalable & High Performing Enough to Protect Against Perimeter and Internal Network Challenges Multi-Tiered Protection Technology Enterprise-class Requirements Patented Re-Assembly Free Inspection Multi-Core High Perf. Architecture

CONFIDENTIAL All Rights Reserved 12 E-Class Features/Benefits Ultimate Connectivity  Secure IPSec Site-to-Site VPN Connectivity  Exceptional User Policy Control and Access to Resources  Wireless Mobility  Network Availability 1. Security Integration  Complete UTM Protection with Gateway Anti-Virus, Anti-Spyware and IDP  Next Generation Application Firewall  Content & Application Filtering  “Clean VPN” Protection 3. Reliability & Optimization  Highly Redundant Hardware – Power/Fans  One Point of Network Control  Business Application Prioritization & QoS  Integrated Server Load Balancing Feature-set 4. Flexible Deployments  Data Center, Campus & Department Network Applications  Transparent L2 Bridge Mode  Integrated Wireless Switch Deployment  Ease of Deployment & Management

CONFIDENTIAL All Rights Reserved 13 NSA E-Class Series Overview NSA E7500  The Ultimate in UTM, FW and VPN performance  5GB FW / 1GB UTM / 1.2 GB IPS  CPU: 16 Core 600Mhz – 9.6 Ghz of Processing Power  Interfaces: 4 Gig auto-sensing copper; 4 Gig SFP  Features: Information Center; Dual Power Supplies; Dual Redundant Fans The NSA E Class is offered at three price points NSA E7500 NSA E5500 NSA E6500 NSA E5500  Mid-Enterprise Performance & Value  2 GB FW / 400Mbps UTM / 550Mbps IPS  CPU: 8 Core 550Mhz – 4.4 Ghz of Processing Power  Interfaces: 8 Gig auto-sensing copper  Features: Information Center; Dual Redundant Fans NSA E6500  Best in Class UTM, FW and VPN performance  3GB FW / 750Mbps UTM / 850Mbps IPS  CPU: 16 Core 550Mhz – 8.8 Ghz of Processing Power  Interfaces: 8 Gig auto-sensing copper  Features: Information Center: Dual Redundant Fans

NSA Feature: Application Visibility  Traditional Firewalls can only determine port and protocol  SonicWALL’s Patented RFDPI Technology provides Application Classification and Inspection  Control, Block or bandwidth limit what applications are used on a per user basis Business Related Non-Business Related Corporate Network HTTP TCP IM Permit Business Related Applications Block or Bandwidth limit Non-Business Related Applications

CONFIDENTIAL All Rights Reserved 15 SonicWALL Deep Intelligence SonicWALL UTM Appliance IT Actionable Info Threat Information Top VPN Users Application Usage Bandwidth Misuse Network Traffic End User Activities HTTP FTP IM/P2P Mail VPN Threats Protocols Attacks Potential Threats Bandwidth Intelligence VPN Reporting Employee Net Usage Deep Intelligence Pro-Active Alerting No Intelligence Alert Your Staff Network Visibility  SonicWALL UTM & ViewPoint Delivers Deeper Business Intelligence

Best-of-Breed Performance  “This box offers 1.3Gbps of UTM performance, which is nearly triple the speed of the fastest product in our comparative UTM test last November “  “Overall, the E7500 provides a dramatic boost in speed that makes UTM possible in enterprises needing gigabit speeds.” Joel Snyder SonicWALL’s Performance Advantage Patented Re-Assemble Free Deep Packet Inspection Engine (RFDPI) Multi-core architecture offers parallel processing for increased scalability On-chip security co-processing and hardware acceleration **Competitive data obtained from vendor datasheet.

SonicWALL Security

CONFIDENTIAL All Rights Reserved 18 IT Security Concerns Top 5: Virus, Spyware, SPAM, Intrusion & Theft

CONFIDENTIAL All Rights Reserved 19 Spam Many messages are obviously spam

CONFIDENTIAL All Rights Reserved 20 Is it Spam? Other messages will be disagreed upon

CONFIDENTIAL All Rights Reserved 21 Phishing Some s are easy to determine as phish

CONFIDENTIAL All Rights Reserved 22 Phishing? Sometimes it is hard to tell

CONFIDENTIAL All Rights Reserved 23 Outbound Risks and Compliance U.S. Federal: HIPAA, GLBA, SOX, Sec 17a-4, NASD3010, PATRIOT Act Section 326 European: Safe Harbor, EU Data Protection Directive 95/46 Organization: VISA CISP, MasterCard Site Data Protection Program, FERPA State: CA SB 1386 & AB 1950 / NY Bill A04254 / IL H.B Corporate: Prevent offensive language, add disclaimers, block files Many more… All organizations need to be address compliance requirements

CONFIDENTIAL All Rights Reserved 24 Inbound and Outbound Threats Threats Require Inbound and Outbound Protection

CONFIDENTIAL All Rights Reserved 25 Proliferation of Systems Typical Mail Data Center Management of Multiple Systems Becomes Complex

CONFIDENTIAL All Rights Reserved 26 Collect Worldwide Threat Data

CONFIDENTIAL All Rights Reserved 27 Analyze for Bad/Good Patterns Likely Virus Bad PatternGood Pattern 50 people … in 6 different countries … receive a new attachment …that has never been seen before … within 30 minutes 40 million s … sent by … from 3 IP addresses … in Seattle … and never junked Good SonicWALL Analyzes Patterns

CONFIDENTIAL All Rights Reserved 28 Cross Analyze Patterns with Content Evaluation and Reputation SonicWALL Determines a Definitive Judgment – Not Just a Score

CONFIDENTIAL All Rights Reserved 29 SonicWALL Security Stops Today’s and Tomorrow’s Threats Threats Evolve – SonicWALL Protects

CONFIDENTIAL All Rights Reserved 30 SonicWALL Security  Anti-Spam, Anti-Phishing, Anti-Virus  Compliance and Policy Management  Appliance and Software options  Works with any system (SMTP)  Unified inbound and outbound protection  Installs in < 1 Hour…managed in < 10 minutes/week  For businesses from Less than 50 users to Over 5000 Users

CONFIDENTIAL All Rights Reserved 31 Quick Configuration  5 Steps to Configure  Full install in < 1 hour  High availability options

CONFIDENTIAL All Rights Reserved 32 Anti-Spam, Anti-Phishing, Anti-Virus  Complete protection  Inbound/Outbound  Spam, Virus, Phishing  Zombies, DHA, DoS  Automatic updates  No rules to write  Complete flexibility  Per-user and per-group

CONFIDENTIAL All Rights Reserved 33 Administrative and End-User Junk Box  Web-based Junk Box  Search, sort, preview  View all threats  1-click UnJunk  Retrieves  Adds to allowed list  Provides feedback  Administrative, End-User

CONFIDENTIAL All Rights Reserved 34 Junk Box Summary  Easy quarantine view  summary  Configurable  Frequency  Specific time and day  11 languages  All or just questionable  Preview and UnJunk  1-click

CONFIDENTIAL All Rights Reserved 35 Policy & Compliance Approach Robust tools to Identify, Monitor, and Enforce

CONFIDENTIAL All Rights Reserved 36 Policy and Compliance Management  Powerful filters  Search any message part  Scan within attachments  Check for disguised text  Match against dictionaries  Judgment-based policies  15 action options  Bounce, quarantine, log  Add disclaimers  Strip attachments  Etc.  Apply to specific groups  LDAP-based

CONFIDENTIAL All Rights Reserved 37 Auditing  Full audit  All good mail  All bad mail  Inbound  Outbound  Searchable  From, To, Subject  Today or multi-day  Detailed information  Per-recipient data  Full audit trail

CONFIDENTIAL All Rights Reserved 38 Reporting and Monitoring  25+ Web-based reports  Dashboard, System Status  Spam, Phishing, Virus  Policy and Compliance  Return-on-Investment  Custom reports  ed reports  Schedulable reports

CONFIDENTIAL All Rights Reserved 39 Instant Deployment

CONFIDENTIAL All Rights Reserved 40 High Availability Deployment

Thank you.