ShareTech 2015 Next-Gen UTM.

Slides:



Advertisements
Similar presentations
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Advertisements

Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
ShareTech Wireless UTM WF Series. Here comes your footer Page 2 ShareTech WF UTM Age of Changes ShareTech Wireless UTM Traditional Wireless UTM vs ShareTech.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
ShareTech Next-Gen UTM
Wireless Networking Solutions for Schools AP-300.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
MIGRATION FROM SCREENOS TO JUNOS based firewall
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
 SG Series Introduction  Spec and Features  SG-100N SG-100N Application My Cloud Intro and Config.  SG-100C SG-100C Application IP Cam Intro and Config.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
DIR-657 HD Media Router 1000 Sales Guide Wireless & Router Product Div. Feb 2011 D-Link WRPD.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Network Techlab (India) Pvt. Ltd.
Securing Information Systems
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
ShareTech Eye Cloud Service System. Here comes your footer Page 2 Eye Cloud Service System Stage of Development ShareTech Information Co., Ltd. Early.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Web Site Content Protection Solution. Protecting Web Site Content with.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
Vantage Report 3.0 Product Sales Guide
DIR-827 HD Media Router 2000 Sales Guide Wireless & Router Product Div. May 2011 D-Link WRPD.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Lesson 11: Configuring and Maintaining Network Security
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
0 中文 NSS Tested Industry Leading DC Firewall “NSS is happy to see Huawei proactively seeking to subject its security platforms to independent evaluation.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Barracuda NG Firewall ™
CompTIA Security+ Study Guide (SY0-401)
Barracuda Firewall The Next-Generation Firewall for Everyone
Product Introduction --QoS VPN Router G3 16/12/2015 Business WLAN
Network Security Solution
UTM Content Security Gateway
Top 5 Open Source Firewall Software for Linux User
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Working at a Small-to-Medium Business or ISP – Chapter 8
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
TECHNOLOGY GUIDE THREE
HUAWEI eSight Secure Center Feature Introduction
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
ISMS Information Security Management System
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
Cloud Computing for Wireless Networks
Presentation transcript:

ShareTech 2015 Next-Gen UTM

Online Behavior Record United Threat Management What is UTM? Advanced Defense Next-Gen Firewall Firewall Intrusion Detection Virus Protection Web Filtering Co-Defense Online Behavior Record United Threat Management ShareTech Information Co., Ltd.  Page 2 Page 2

Traditional Deployment 1: FW + IDP + AV + APP Users Viruses Internet Malware Data Center FW IDP AV APP Worms Servers Hackers Much higher cost Unreliable networks Poor Performance More complex and harder to manage ShareTech Information Co., Ltd.  Page 3

Integrated UTM Solutions Users Viruses Internet Malware Data Center FW IDP AV APP Worms Servers Hackers ShareTech Information Co., Ltd.  Page 4

Traditional Deployment 2: Bad Impression on UTM Disadvantages of UTM Poor performance Insufficient protection level Lack of integration Difficult to manage APP 100% 50% 0% FW AV IDP FW AV IDP APP ShareTech Information Co., Ltd.  Page 5

How do ShareTech define Next-Gen UTM ?

3-IN-ONE Multi-Purpose Next-Gen UTM Defense in Depth Security Integration Cloud Management ShareTech Information Co., Ltd.  Page 7

Next-Gen UTM 3-IN-ONE Multi-Purpose Next-Gen UTM Cloud Management Defense in Depth Security Integration ShareTech Information Co., Ltd.  Page 8

Integrated Monitoring 3-IN-ONE : Defense in Depth Hardware Performance Intrusion Detection Online Record Secure Connection Mail Security Integrated Monitoring ShareTech Information Co., Ltd.  Page 9

3-IN-ONE : Defense in Depth Hardware Performance x86 operating systems Future network bandwidth available which exactly matches our needs Custom ports on UTM interface High Availability (Modular copper / fiber) Improve performance of UTM (up to 1.5Gbps) USB Instant Recovery ShareTech Information Co., Ltd.  Page 10

Policies Optimization Network Layer Optimization 3-IN-ONE : Defense in Depth UTM ≠ poor performance CPU Performance Solo Core Dual Core Quad Solo Core Dual Core Quad Core Parallel processing AV IDP APP Policies Optimization Network Layer Optimization Hardware I / O ShareTech Information Co., Ltd.  Page 11

3-IN-ONE : Defense in Depth USB Instant Recovery Support USB backup Administrators can schedule backups Always make adequate backups Efficient recovery made in 5 mins ShareTech Information Co., Ltd.  Page 12

3-IN-ONE : Defense in Depth Instrusion Detection Session Malware Firewall IDP Instruction Detection BotNet Detection APP Control URL Database Flow Analysis Anti-Virus Skype Application Bot Vulnerability Java Script ShareTech Information Co., Ltd.  Page13

3-IN-ONE : Defense in Depth Online Record Record user's browsing behaviors Preventive control Complete record Data storage and audit IM MAIL FTP WEB PAGES ShareTech Information Co., Ltd.  Page14

Mail Audit and filtering 3-IN-ONE : Defense in Depth Mail Security Quarantine / Mail Audit / Mail Record Outgoing Mail Audit and filtering Quarantine/Delete/ Block IP/Send Copies Anti-Virus Spam Engine Business Policies Record Incoming Quarantine / Mail Audit / Mail Record ShareTech Information Co., Ltd.  Page15

3-IN-ONE : Defense in Depth Secure Connection SSL VPN IPSec VPN 3G/4G/WiFi/APP PPTP VPN Branch &Spot MAIL SERVER TERMINAL SERVER WEB SERVER Hotels & Cafe ShareTech Information Co., Ltd.  Page 16

3-IN-ONE : Defense in Depth Integrated Monitoring CMS monitors, enables, reboots and manages devices remotely Monitor various UTM devices Integrated with switch (Co-Defense) Business cost drop Control authorization for administrators Branch Spot Oversea Branch Office Headquarter ShareTech Information Co., Ltd.  Page17

3-IN-ONE : Security Integration (SG Series) ShareTech Information Co., Ltd.  Page 18

3-IN-ONE : Security Integration (UTM + MyCloud Storage) ShareTech Information Co., Ltd.  Page 19

3-IN-ONE : Security Integration (UTM + IP CAM + WiFi) Integrate both network and physical security Implementing secure wireless Networks Physical Monitoring Network Security Wireless Networking SSID1 ShareTech Information Co., Ltd.  Page 20

3-IN-ONE : Security Integration (UR Series) UR-98X (2U) Max 16-42 interface FW 32 Gbps VPN 6 Gbps UR-96X (1U) Max 6-14 interface FW 10 Gbps VPN 2 Gbps UR-94X (1U) Max 6 interface FW 2 Gbps VPN 1 Gbps ShareTech Information Co., Ltd.  Page 21

Security Control Record 3-IN-ONE : Security Integration (UR Series) Block hacking attacks Block malware IDP Protection BotNet Protection Anti-Virus(WEB/FTP/Mail) Anti-Spam Co-Defense HTTP/SSL Secure Control QoS Web Content Filtering IM Control Flow Analysis APP Control VPN/SSL VPN Control Online Authentication Record Mail IM Events FTP Download Anomaly IP Analysis Firewall Protection ARP Spoofing ShareTech Information Co., Ltd.  Page 22

IDP Intrusion Protection 3-IN-ONE : Security Integration (SG Series) Models SG-100N SG-100C Available SOHO/SMB Firewall O IDP Intrusion Protection My Cloud (NAS) X IP CAM Monitoring (an IP CAM included) AP Control (50 pcs) Wireless Module Optional ShareTech Information Co., Ltd.  Page 23

3-IN-ONE : Security Integration Networking Security SMB Hotel Video Surveillance Wireless Technologies School Chain Store Cloud Storage Factory Government ShareTech Information Co., Ltd.  Page 24

3-IN-ONE : Security Integration (Industrial Firewall) Monitor Room VPN Internet ShareTech Information Co., Ltd.  Page 25

3-IN-ONE : Cloud Management (Eye Cloud) Eye Cloud is a next-gen cloud service platform providing user friendly interface to support instant equipment maintenance and management. When anomaly occurs, administrators will be notified of the problem. Configuration files can be automatically saved at schedule for disaster recovery. Furthermore, scheduled reports will be distributed. It is the best cloud management platform that creates win-win situations for both system service providers and users. 2014 Taiwan SMEs Innovation Award ShareTech Information Co., Ltd.  Page 26

Technical Support Sales Inquiry www.sharetech.com.tw help@sharetech.com.tw Sales Inquiry sales@sharetech.com.tw ShareTech Information Co., Ltd.  Page 27