Simplifying Email, Web & Network Protection. Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro.

Slides:



Advertisements
Similar presentations
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Module 5: Configuring Access for Remote Clients and Networks.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewalls and Intrusion Detection Systems
All-In-One Security Overview The most benefits for your dollar, period.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 19: Configuring Windows Firewall
Course 201 – Administration, Content Inspection and SSL VPN
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Astaro Overview – Page 2 © Astaro 2008 Agenda  Internet Security today  Astaro Company Overview  Astaro Product Overview  Summary  Appendix - Astaro.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Course 201 – Administration, Content Inspection and SSL VPN
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Barracuda Load Balancer Server Availability and Scalability.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Hacker Zombie Computer Reflectors Target.
ShareTech 2015 Next-Gen UTM.
Internet Security facilities for secure communication.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Module 7: Advanced Application and Web Filtering.
Security fundamentals Topic 10 Securing the network perimeter.
Security fundamentals Topic 9 Securing internet messaging.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Security fundamentals
Barracuda NG Firewall ™
Network Security Solution
TMG Client Protection 6NPS – Session 7.
Module 3: Enabling Access to Internet Resources
Top 5 Open Source Firewall Software for Linux User
Critical Security Controls
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
Configuring TMG as a Firewall
What’s New in Fireware v12.1.1
Hosted Security.
AT&T Firewall Battlecard
Presentation transcript:

Simplifying , Web & Network Protection

Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro Security Gateway Security Applications Web Security Security Network Security Appliances and Software Additional Astaro Products Business Value Network Security Web Security Security

Astaro Overview – Page 3 © Astaro 2007 Astaro Company Profile Founded in 2000 Pioneered what is called Unified Threat Management market Profitable, growing 60% Award-Winning Products Astaro Security Gateway – the most flexible solution for integrated , web, and network protection protects networks in over 60 countries Easy to deploy and manage Global Presence Headquarters in Karlsruhe, Germany and Boston, USA 100+ employees in EMEA, Americas and APAC 24x7 technical support partners & reseller worldwidet (700+ in EMEA)

Astaro Overview – Page 4 © Astaro 2007 Customers

Astaro Overview – Page 5 © Astaro 2007 Recognition Best of the year 2004 Best of the year 2005 Best of the year 2006 Editor's choice (2x) 5/5 Star Review (2x) Best of the year 2004 Best of the year 2005 Editor's choice Recommended product Product of the year 2005 Product of the year 2006

Astaro Overview – Page 6 © Astaro 2007 The Security Struggle MULTIPLYING THREATS DEMAND MULTIPLE DEFENSES THAT ARE DIFFICULT TO INTEGRATE AND MANAGE ∞ Evaluate ∞ Purchase ∞ Train ∞ Install ∞ Integrate ∞ Configure ∞ Manage ∞ Update Firewall VPN Spam Blocking Anti- Virus Intrusion Detection URL Filtering Anti- Spyware

Astaro Overview – Page 7 © Astaro 2007 Firewall 1995 VPN URL Filter IDS Anti Virus Firewall 2000 Central report tool Central config tool Central mgmt tool Signing/encryption VoIP Security VPN Remote access NAC Wireless security P2P filter IM filter Anti Spyware Multi protocol AV IPS VPN URL Filter IDS Anti Virus Firewall 2005 App 3 App 2 App 1 UTM Gateways Clean pipe 2010 The growing demand for Internet Security

Astaro Overview – Page 8 © Astaro 2007 Astaro Security Gateway Complete Perimeter Security Network Security Web Security Security

Astaro Overview – Page 9 © Astaro 2007 Integrated , Web and Network Protection Content Filter Anti Virus & Spyware IM & P2P Control Web Filtering Firewall IPS VPN Network Protection Security Spam Filter Anti Virus & Phishing Encryption

Astaro Overview – Page 10 © Astaro 2007 Layered Security External users Internet Firewall and VPN Intrusion Protection Content Filtering– Virus/Spam/URL/ Spyware/Phishing Internal users LANs DatabaseWeb Internal Resources Astaro Security Gateway V7

Astaro Overview – Page 11 © Astaro 2007 Integrated Management Installation Update Logging and Reporting Network Security Web Security Security Management Interface

Astaro Overview – Page 12 © Astaro 2007 Web Security Network Security Security Content Filtering Virus Protection IM and P2P Control Web Security Spyware Protection

Astaro Overview – Page 13 © Astaro 2007 Spyware Protection Blocks downloads of spyware, adware, and other malicious software Prevents infected systems from sending information back to the spyware server Checks against a database of known spyware URLs Gateway spyware blocking complements desktop anti-spyware tools

Astaro Overview – Page 14 © Astaro 2007 Virus Protection for the Web Block viruses, worms, trojans, and other “malware” before they reach desktops Scans HTTP and FTP traffic Web & ftp downloads Web-based (MSN Hotmail, Yahoo! Mail) Dual virus scanners with multiple detection methods Virus signatures, heuristic analysis Database of more than 300,000 virus signatures Frequent automatic updates Flexible management Can specify file formats and text strings to block

Astaro Overview – Page 15 © Astaro 2007 Content Filtering (URL Blocking) Enforces policies on appropriate use of the web Administrators can define web use policies based on pre-defined categories of web sites Nudity, gambling, criminal activities, shopping, drugs, job search, sports, entertainment, etc. Sophisticated classification techniques text classification, recognition of symbols and logos Whitelists and blacklists to tailor access for groups of users Measure and report on activities

Astaro Overview – Page 16 © Astaro 2007 IM & P2P Control Manage the use of Instant Messaging Clients AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google Talk/Jabber, Skype Manage the use of Peer-to-Peer applications Bittorrent, Edonkey, Gnutella,WinMX, Winny, Manolito, Ares, Direct Connect Flexible control For each application administrator can define, if it should be allowed or blocked and if he should receive a notice about its usage.

Astaro Overview – Page 17 © Astaro Security Network Security Web Security Security Virus Protection Spam Protection Phishing Protection Security

Astaro Overview – Page 18 © Astaro 2007 Virus Protection for Block viruses, worms, trojans, and other “malware” before they reach servers of desktops Scans SMTP and POP3 traffic Dual virus scanners with multiple detection methods Virus signatures, heuristic analysis Database of more than 300,000 virus signatures Frequent automatic updates Flexible management Can specify file formats and text strings to block s and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined Gateway virus protection supplements desktop virus scanning.

Astaro Overview – Page 19 © Astaro 2007 Spam Protection Identifies and disposes unsolicited s (spam) Scans SMTP and POP s Multiple methods to identify spam Realtime Blackhole Lists, header and text analysis, whitelists, blacklists, URL scanning, greylisting, BATV, SPF record checking… Heuristic methods create a “spam score” based on probability Flexible management s and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined User can individually release blocked messages via daily spam report or end user portal

Astaro Overview – Page 20 © Astaro 2007 Protection Against “Phishing” “Phishing” – Criminals imitate s from banks, credit card companies, eBay and other sources to obtain confidential user information Astaro identifies and blocks phishing s through several techniques: Virus scanner identifies phishing signatures URL filtering database captures phishing servers in the “suspicious” category Content downloaded from web sites will be blocked if it matches patterns of phishing content Internet Server Web Server Databases of Phishing Sites Scans for phishing signatures

Astaro Overview – Page 21 © Astaro Security Network Security Web Security Security Encryption

Astaro Overview – Page 22 © Astaro Encryption En-/Decryption and Digital Signatures for s supports OpenPGP and S/MIME Completely transparent No additional Software on Client required Easy Setup Only three configuration steps to start Central Management of all keys and certificates No key or certificate distribution required Allows Content/Virus scanning even for encrypted SMTP s SMTP in clear text Server Encrypted ‘snmffdsa g Dsfg sdfgdsfgfdg Fdsg fgsdfgsdfgdsf Sfdgsdfdsfgsdf Fg fdsgdsfgsdfg Dfgdfsgfdsgfdsg dslsgdsfg External User Internal User

Astaro Overview – Page 23 © Astaro 2007 Network Security Web Security Security VPN Gateway Firewall Intrusion Protection Network Security

Astaro Overview – Page 24 © Astaro 2007 Firewall Stateful Packet Inspection Packet filtering – inspects packet headers Stateful packet inspection – tracks events across a session to detect violations of normal processes Time-based rules and Policy-based routing Application-Level Deep Packet Filtering Scans packet payloads to enforce protocol- specific rules Security proxies to simplify management HTTP, FTP, POP3, SMTP, DNS, Socks, Ident NAT (Network Address Translation) and masquerading DoS (Denial of Service Attack) protection Transparent mode eases administration

Astaro Overview – Page 25 © Astaro 2007 Virtual Private Network (VPN) Gateway Encrypts data to create a secure private communications “tunnel” over the public Internet Supports IPSec, SSL, L2TP, and PPTP VPNs Windows, Linux, Unix and MacOS x clients Advanced encryption Supports all major encryption methods Many authentication methods Internal certificate authority Full Public Key Infrastructure (PKI) support Supports VPN tunnels based on dynamic IP interface addresses (DynDNS)

Astaro Overview – Page 26 © Astaro 2007 Intrusion Protection Identifies and blocks application- and protocol- related probes and attacks Database of over 6,000 patterns and rules Probing, port scans, interrogations, host sweeps Attacks on application vulnerabilities Protocol exploitations Intrusion detection and prevention Notify administrator, or block traffic immediately Powerful management interface One click to enable or disable complete rule sets e.g. for - or webservers

Astaro Overview – Page 27 © Astaro 2007 Astaro Security Gateway Appliances Astaro Security Gateway 110/120 Astaro Security Gateway 220 Astaro Security Gateway 320 Astaro Security Gateway 425 Astaro Security Gateway 525/525F Environment Small office/ branch office Small to Medium business Medium business Medium business, enterprise division enterprise division Hardware specs 3 x 10/100 Base-TX ports integrated HD 8 x 10/100 Base-TX ports integrated HD 4 x 10/100 Base-TX ports 4 x Gigabit Base-TX port integrated HD 4 x Gigabit ports – PCI bus 4 x Gigabit ports – PCI Express bus Hardware acceleration card integrated HD Dual Intel Xeon CPU 10 x Gigabit ports – PCI Express bus - 525: 10 x Copper - 525F: 4 x Copper/6 x SFP Hardware acceleration card 2 integrated HD (RAID1) 1) 2 redundant Power supplies ) Performance Firewall VPN IPS 100 Mbps 30 Mbps 55 Mbps 260 Mbps 150 Mbps 110 Mbps 420 Mbps 200 Mbps 180 Mbps 1,200 Mbps 265 Mbps 450 Mbps 3,000 Mbps 400 Mbps 750 Mbps Astaro Security Gateway Software Runs on Intel-compatible PCs and servers 1) hot-swappable

Astaro Overview – Page 28 © Astaro 2007 Other Astaro Products Centralized management and real-time monitoring of installations with multiple ASG appliances Astaro Command Center Advanced IPSec VPN client with personal firewall and integrated dialer Astaro Secure Client Centralized security reporting engine that collects, correlates and analyzes security data and provides a huge portfolio of grafical reports Astaro Report Manager

Astaro Overview – Page 29 © Astaro 2007 Business Value Enhance Security Block threats with complete perimeter security Integrated management reduces human error and increases speed of response Increase productivity Keep systems, networks and web sites up and running Increase productivity by blocking spam and inappropriate web surfing Simplify management A complete perimeter security solution that is easy to deploy, manage and update, and that scales seamlessly from small offices to large headquarters installations. Network Security Web Security Security

Discussion and Follow-Up