Meet the Next Generation Firewall (NGFW)

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
True Unified Threat Management
Cyberoam NG series: Future-ready Security Confidential. For internal use only Cyberoam Technologies Pvt. Ltd.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
FirePOWER Services for ASA Sizing Guidance and Performance Discussion
Unified Logs and Reporting for Hybrid Centralized Management
Network Security Overview Tales from the trenches.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
UTM S Series OVERVIEW November, UTM S Series - What it is A modular all-in-one next-generation firewall.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Norman Endpoint Protection Advanced security made easy.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
© 2009 WatchGuard Technologies WatchGuard XTM 1050 and 8 Series Solutions Date 2009.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
COEN 252 Computer Forensics
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Network security Product Group 2 McAfee Network Security Platform.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
© 2013 Cisco and/or its affiliates. All rights reserved. Zuzana Humajová Product Sales Specialist – EN/Mobility.
Network Equipment Assignment 3 LTEC 4550 Aaron Whitaker.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
1 Fortinet Confidential What is the Campaign Messaging? Campaign Messaging/Overview Today’s enterprise is increasingly looking to upgrade traditional firewalls.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
AT&T Premises-Based Firewall Enhanced SBS Solution
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
UNM Enterprise Firewall
Sizing …today. T: Here’s how. .
Firewalls Routers, Switches, Hubs VPNs
Hosted Security.
AT&T Firewall Battlecard
Presentation transcript:

Meet the Next Generation Firewall (NGFW) Network Security at the Speed of Enterprise

Defining a Next Generation Firewall (NGFW): An NGFW is an enterprise-class, high-performance gateway security appliance that provides top-of-the-line firewalling, intrusion prevention, and application control. Firewalling Intrusion Prevention Application Control #1 #1 #1

Corporate Headquarters Data Centers Corporate Headquarters School Systems MSSPs Who is an NGFW for?

Industry Verticals Retail / Hospitality Companies Restaurant Chain Corporate HQs Hospitals or Healthcare Campuses University Campuses K-12 School District Offices Large Financial Institutions MSSPs

Typical NGFW and UTM Buyer Profiles Organization type Data Centers, corporate HQs, schools, MSSPs Small to medium-sized businesses, multi-site branch office deployments Organization size (# of people) 1,000 – 20,000+ 1 – 1,000+ Buyer Dedicated security specialist focused on policy, compliance, and risk management IT manager juggling security, networking, systems, applications, etc.

Why an NGFW? Large, complex organizations demand high-speed, always-on networks that: Secure corporate Internet traffic against hackers, malware, network attacks, intrusion attempts, data theft, and other cybercrime. Connect offices, remote and virtual employees. Provide real-time and historical visibility into network, security, and user events. Allow visibility and fine-tuned control at the application level.

Introducing the Next Generation: WatchGuard XTM 2050 State-of-the-art in true line speed, security, network visibility, and manageability – at a price that delivers unrivaled value to the enterprise customer.

XTM 2050: Fast Facts 20 Gbps Packet Filter Throughput Up to 10 Gbps XTM Throughput 1.6 Gbps VPN Throughput 16x1 GB Copper Ports 2x10 GB SFP+ Fiber Ports

A “Hard to Kill” Feature Set What does this Mean for You? A “Hard to Kill” Feature Set Redundant Power Supplies Fans, NICs, and HDDs No FireCluster (for Full-box Redundancy) Down Software Failover Features, including WAN f/o & VPN f/o Time

XTM 2050 Bundle: Formidable Enterprise-class Security The XTM 2050 appliance This top-line, next generation firewall excels at defending corporate resources while securely connecting users at the speed of enterprise. Application Control Fine-grained control and unparalleled visibility over an industry-leading 1800+ applications lets you set and govern acceptable use policies. Intrusion Prevention Service Scans traffic on all major protocols using continually updated signatures to detect and block all types of threats. LiveSecurity® Plus Maximize your security investment by utilizing our best-in-industry support and maintenance package – or, upgrade to our Gold or Platinum level.

The XTM 2050: Blazing Firewall AND XTM Throughput True Line Speed The FortiGate product has speedy firewall throughput, but incurs a hefty 97% performance degradation when processing threats.

The XTM 2050: Formidable Security at a Compelling Price Point

WatchGuard XTM 2050 Versus: SonicWall SuperMassive E10100 and E10200 The XTM 2050 provides more robust security and higher resistance to IPS evasion techniques (TCP Split Handshake attack, fragmentation, etc.) Fortigate-3040B The XTM 2050 provides vastly superior real-time visibility and simpler ease of use in the areas of VPN, application control, and policy creation

Why Buy a WatchGuard XTM 2050 Versus a Competitor NGFW??? XTM 2050 crushes network threats while maintaining a blazing fast throughput XTM 2050 offers a broad, rich, intuitive feature set that is unparalleled across the industry Priced for unrivaled value

Additional Resources NGFW Portal: www.watchguard.com/ngfw XTM 2050 Specifications: http://www.watchguard.com/products/xtm-2050/detailed-specs.asp XTM 1050 / 2050 Datasheet: http://www.watchguard.com/docs/datasheet/wg_ngfw_ds.pdf Overview: Next Generation Firewalls for the Enterprise: http://www.watchguard.com/docs/datasheet/wg_ngfw_overview.pdf

Questions & Answers Tim.Helming@watchguard.com