WatchGuard: Your Security Partner of Choice Your Name Here.

Slides:



Advertisements
Similar presentations
Enabling business beyond the corporate network.
Advertisements

New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
True Unified Threat Management
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
The Most Analytical and Comprehensive Defense Network in a Box.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Fortinet An Introduction
ShareTech 2015 Next-Gen UTM.
Imperva Total Application Security Idan Soen, CISSP Security Engineer SecureSphere – The First Dynamic Profiling Firewall Idan Soen, CISSP Security Engineer.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Network security Product Group 2 McAfee Network Security Platform.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Purpose of this Presentation –To provide an overview of WatchGuard’s XTM solutions –Presenter may build upon this deck depending on objectives and audience.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
© 2009 WatchGuard Technologies An Introduction to XTM Devices, Services and Bundles 13 June 2016.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Small Business Solutions Copyright 2014 Trend Micro Inc.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Web Content Security Unlock the Power of the Web
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Barracuda Web Filtering Service
Threat Management Gateway
Virtualization & Security real solutions
Check Point Connectra NGX R60
Cloud Security for Endpoints
Presentation transcript:

WatchGuard: Your Security Partner of Choice Your Name Here

About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices in 25 countries globally 1,000,000 solutions securing businesses worldwide LiveSecurity team monitors global threats daily Value leader in virtually every analysis ACOLADES

Product Line Overview

Everyone claims to have security services… …But does that mean they are equal? No!

In-house Vs. Best-in-class Do you know anyone who is the best at everything?

Network Security Extensible Threat Management combines firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions. Extensible Threat Management (XTM) XTM 2 & 3 Series: For small offices, branch offices and wireless hotspots XTM 5 & 8 Series: For mid-sized businesses XTM 10 & 15 Series: For large distributed enterprises XTM 2050 & 2520: For large data centers XTMv Four full product virtual software license versions TRAFFIC SHAPING PROXY TECHNOLOGY GATEWAY ANTI-VIRUS FIREWALL CENTRALIZED MANAGEMENT REPUTATION ENABLED DEFENSE APPLICATION CONTROL VPN IPS SPAM BLOCKER WEB BLOCKER INTERACTIVE REAL-TIME MONITORING IDENTITY-BASED FIREWALLING SECURE LOGGING OVER 65 REPORTS XTM 2520: World’s Fastest, Greenest 1U* UTM Device

…and Subscriptions Software Subscriptions spamBlocker is the best in the industry at distinguishing legitimate communication from spam outbreaks in real time Application Control enables IT administrators to monitor and control access to web and business applications Intrusion Prevention Service works hand-in- hand with your WatchGuard firewall's application layer content inspection to provide real-time protection from threats, including spyware, SQL injections, cross-site scripting, and buffer overflows LiveSecurity Service customer support Reputation Enabled Defense delivers a powerful, cloud-based URL reputation service that protects web users from malicious web pages, while dramatically improving web processing overhead Gateway AntiVirus is a fully integrated, heuristic and signature-based security subscription that identifies and blocks known spyware, viruses, trojans, and blended threats in real time WebBlocker content and URL filtering subscription helps eliminate legal liabilities resulting from inappropriate web surfing, while increasing employee productivity and protection from web- based attacks

Application Control

Companies Increasingly “Like” Social Media Robert Half Technology. “SOCIAL WORK? More Companies Permit Social Networking on the Job”. May 26, Retrieved from:

Users and Applications are Out of Control! 1. Retrieved from: 2. Retrieved from 3. Sources: X-Force, Websense, Whitehat Security, Imperva, 7Scan

Social Networks Threaten Productivity

You Can’t Control What You Can’t See Traditional port-based firewalls lack the ability to see, let alone control, many apps Productivity Loss Bandwidth-hungry apps slow networks Data Loss / Attack Vector –Social networks breed a culture of trust –Rife with technical vulnerabilities

It’s an App World. You Need Application Security

WatchGuard Solves Your Problem See the applications in use on your network Enable secure & productive business use of applications Restrict unproductive, insecure & bandwidth draining usage

How WatchGuard Solves Your Problem Identification, control, and reporting on applications and sub-functions Applications easy to find – organized by category and searchable by query Broad and granular control of applicationsIntegration with firewall policy table

AntiVirus

Best-in-Class AntiVirus: More experience, better technology Partners focused on AV for over a decade Proactive AV technologyMore secure AV engines Much larger staff of human AV analysts Streamin g BufferedSo What? FastestNot as FastSpeed at the sake of security Supports few signatures Supports many signatures Buffered engines catch more malware. Basic Compressio n Extended Compressio n Harder to evade AV No file/packet reassembly Full reassembly Harder to evade AV

URL Filtering

Best-in-Class URL Filtering: Partnering with the #1 Provider Websense is the #1 stand- alone web security company Earned the most web security revenue four years in a row - IDC Has provided URL filtering for decades The industry's most accurate, current and comprehensive URL master database

Websense is a top leader and visionary in the Web security market, according to Gartner.

AntiSpam

Best-in-Class AntiSpam: Best OEM Solution Provider Mailshell is focused on security and AntiSpam Has provided AntiSpam since % detection rate with next to no false positives 1000’s of companies leverage Mailshell’s security and anti- spam technology XTM Vendor AntiSpam since 1999 In-house 2009 (CAAS) 2003-ish

Best-in-Class AntiSpam: Don’t take our word for it! Virus Bulletin. “Anti-Spam Comparative Review.” January Mailshell Performance Stats : 99.84% spam catch rate; 0 false positives

IPS & App Control

Best-in-Class IPS: Experienced Intrusion Prevention and DPI partner Over a decade of IPS experience State of the Art DPI Technology Patent-Pending Application Control Technology Has received well-known industry awards

What is Unified Threat Management, and Why Do You Need It?

A Blended Approach to Security Blended threats require blended solutions — Break your security out of “silos!”

The Technology Treadmill Drives Consolidation Discrete Network, Sound Smartphone Integrated Motherboard Laptop / All In One Discrete PC Components GPS Camera Cellular Phone

UTM Combines Multiple Perimeter Services into One Box Unified Threat Management Application Control URL Filtering Anti SPAM Gateway AntiVirus Intrusion Prevention Service Firewall

How do You Benefit From Consolidation? LOWER COST (Hardware, OS Licensing, Maintenance, Training, Etc.) HIGHER SECURITY (Single Pane of Glass Management, Common Policies, Etc.)

Why Choose WatchGuard?

TOP UTM PERFORMANCE #1 UTM Performance at all price points STRONG MANAGEABILITY #1 Most Highly Recognized BEST-IN-CLASS TECHNOLOGY #1 Industry Leading Modules Three Key Reasons Our Customers Love Our Products

Anti Virus URL Filtering Anti Spam IPS APP Control In-house XTM Option for best-in-class security at a higher price. Best-in-Class Security Technology

XTM: WatchGuard’s Security Platform Latest, highest performance platform available Common management console gives policy-driven control of technologies Standardized across products Unparalleled security foundation Best-in-Class Technologies from leading vendors WatchGuard XTM Platform WatchGuard Proxy-based Engine WatchGuard Firmware / OS Industry Standard Hardware AntiVirus URL Filtering VPN Reputation Enabled Defense AntiSPAM IPS App Control … Policy-based Management Console Designed for modularity; easy to add or replace technologies

The Value of WatchGuard’s Proxy-based Architecture THE COMPETITION: Stateful Inspection WATCHGUARD: Full Proxy Architecture

Who Relies On WatchGuard?

Thank You!