© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Senior Network Architect.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Enabling business beyond the corporate network.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Built on the Powerful Microsoft Azure Platform, Nimble Schedule Streamlines and Automates Scheduling with Cloud-Based Mobile Services MICROSOFT AZURE ISV.
Norman SecureSurf Protect your users when surfing the Internet.
MOREnet Service Packages Overview MOREnet Service Packages Overview.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Director of Research, SANS Institute
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Supported by the Microsoft Azure Platform, Management Controls’ Software Suite Tracks Costs of Projects, Delivers Control, Savings MICROSOFT AZURE ISV.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Gain High Availability Performance and Scale of Applications Running on Windows Azure with KEMP Technologies’ Virtual LoadMaster COMPANY PROFILE: KEMP.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
© 2016 Catalyze, Inc. Go-To-Market Services HIPAA Compliance in the Cloud: Catalyze Provides Microsoft Azure Customers with a HITRUST Certified Platform-as-a-Service.
GameChanger’s Rate Quote Issue Solution is Deployed to Microsoft Azure for a Fast, Flexible Direct to Consumer Insurance Sales Solution MICROSOFT AZURE.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Cloud Security Anyone, anywhere, any app, any device.
Call-Center Agents, Customers Communicate More Conveniently with SMS Chat App COMPANY PROFILE: EARLY CONNECT Early Connect is a regional SaaS ISV founded.
Blue Coat Cloud Continuum
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Web Content Security Unlock the Power of the Web
Accelerating Your Journey to a Safe Cloud
The time to address enterprise mobility is now
Hybrid Cloud Web Filtering Platform
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
“Introduction to Azure Security Center”
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
TRITON APX SUITE DEMO Uvid u interfejs i funkcionalnosti
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Threat Management Gateway
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Prevent Costly Data Leaks from Microsoft Office 365
Yocale, Built on Azure: Convenient Online Booking Keeps Appointment Books Filled and Eliminates Scheduling Hassles for Local Business Owners MICROSOFT.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Lifesize® Technical Update
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
Presentation transcript:

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Senior Network Architect Brendan McCarthy Sales Manager Anthony Bruno Director of Operations and Services Support Rich Turiel

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Enabling the Modern Classroom As we have seen the Web itself develop in to 2.0 and 2.0+ stages, it is time to admit that Web Content Filtering has reached its own 2.0 stage. The need to block way beyond the URL is vital to an acceptable solution. Application blocking (Snapchat, Instagram), Google image encryption work arounds, allowing YouTube based on content of the video rather than block or allow everything, these are just some of the every day problems that technicians face in having to carry out the school districts filtering policy. WiscNet has a new partnership with iboss that takes web content filtering to a new level and answers the school districts needs for web filtering 2.0.

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Today’s Schools Demand More than a Web Filter Education Drivers Compliance requirements, internet-enabled learning tools and rampant social media access More Mobile devices than ever & BYOD users; devices travel on and off campus High bandwidth demands, including BYOD and streaming apps High concentration of sensitive data and susceptibility to APT attacks Limited resources Required Solution More effective reporting, granular application, Google, Youtube, and social media controls Easy extension of policies to devices via cloud; easily identify BYOD users with captive portal automatically binding devices to user directory. Low latency delivery and built in bandwidth management controls Outbound data exfiltration monitoring and increased detection of evasive malware capabilities Ease-of-Deployment and excellent customer support; easy navigation via leading-edge interface

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Proactive Security Built for Modern Threats Founded: 2003, product released 2007Founded: 2003, product released 2007 North America HQ: San Diego, CANorth America HQ: San Diego, CA Customers: 4000+Customers: Recognition: #3 security company on Deloitte Fast 500™Recognition: #3 security company on Deloitte Fast 500™ Customer Retention: 98.5% last 2 yearsCustomer Retention: 98.5% last 2 years Patents/Patents Pending: 60+Patents/Patents Pending: 60+ GSA Contract: ten-year IT Schedule 70GSA Contract: ten-year IT Schedule 70 Product Suite:Product Suite: –FireSphere™ Advanced APT Defense –Web and Application Security –Mobile Security

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. How do other solutions compare? Most solutions are just URL filters with “zero” or very limited security focus that Education needs. Most solutions look at “2” common ports 80/443 or just DNS. “All on” or “all off” for social media sites. Zero flexibility for students and staff. Limited YouTube. Limited or canned reports that are not granular enough and don’t offer options for non-technical user reports. All or Nothing SSL Decryption. No bandwidth shaping or throttling needed for state testing days or critical services. Do not support IPV6. Outsourced support. Who's taking those critical support calls when issues arise? Issues scaling traffic with numerous servers or limitations through cloud deployment only.

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. How does iboss compare? Full (AV, Behavioral Sandboxing, network base-lining, Data Anomaly detection, Intrusion detection prevention). Recognized by Gartner on their SWG MQ report for four straight years. Full (LAYER 7 TRAFFIC) visibility. Full on/off controls with all the popular social media sites for students and staff to customize. Including wiping of comments and suggested videos on YouTube. Full forensic report level detail on everything including options for non technical report recipient's. Select SSL Decryption and Full SSL Decryption options. We already look at HTTP and HTTPS without decryption needed by default. Full Bandwidth controls. Shaping and throttling or preserving of traffic. Scale 10G+ networks traffic with fewer servers. Google SSO for Chrome Books Full BYOD and MDM of mobile devices True filtering of IPV6 All US-based Support, Certified Network Architects based in CA and FL

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. iboss has been awarded more state contracts than any of its competitors Unsurpassed Scalability Deployed in many 100K+ node networks (added 6 in 2014 alone) More state contracts that any other competitor. (Average 100K+ devices, 4 Gbps connectivity) Can scale to millions of endpoints and 10/100Gbps+ Trusted to Secure Millions of Students Across the Most State Contracts In addition to 10 state contracts, iboss holds extensive regional contracts throughout the states of Texas, Nebraska, Louisiana, Pennsylvania, Michigan.

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Powerful Solution That's Easy To Manage Increase cyber security posture while enabling more access to educational content in the classroom FireSphere ™ Advanced APT Defense Continuous Data Exfiltration Monitoring Network Anomaly Detection Behavioral Sandboxing CISO Command Center Mobile Security Cloud Web Security Mobile Device Management BYOD Management Apple DEP Support Chromebook Security Web Security Web Filtering Application Management Granular Social Media Controls Bandwidth Management Safe Google & YouTube Proxy Enforcement Threat & Event Console

© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Thank you! For more information, visit Please contact Rich Turiel for pricing: Phone: Connect with us: