1 1 Hosted Network Security EarthLink Complete™ Data.

Slides:



Advertisements
Similar presentations
Innovating Since 1998 Direct EDJE, we make A World of Difference Direct Response Order Management Software A Proven Solution Since.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
LittleOrange Internet Security an Endpoint Security Appliance.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Department Of Computer Engineering
Firewall Slides by John Rouda
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value.
TalkTalk network security overview 14 th April 2011.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Hacker Zombie Computer Reflectors Target.
Sales Education and Performance Consulting Presents Private Network Transport (PNT) and Class of Service (CoS)
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Your Business Challenges
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Security fundamentals Topic 10 Securing the network perimeter.
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
Module 10: Windows Firewall and Caching Fundamentals.
1 Business in a Box Partner With Us. 2 What is Business in a Box? Business in a Box Xact Communications leverages VoIP (Voice Over Internet Protocol)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet regulatory compliance?
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IPsec VPN More Bandwidth for the Buck
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Cloud Firewall.
AT&T Premises-Based Firewall Enhanced SBS Solution
CONNECTING TO THE INTERNET
Data Center Firewall.
Click to edit Master subtitle style
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
At a Glance Presented By: James Hall and James D. Saylor
CompTIA Security+ Study Guide (SY0-401)
Your Business Opportunity
Free Actual Tests Actual Dumps PDF - Dumps4download.co.in.
AbbottLink™ - IP Address Overview
Using Software Restriction Policies
AT&T Firewall Battlecard
Global One Communications
Presentation transcript:

1 1 Hosted Network Security EarthLink Complete™ Data

2 Nationwide Network Core Network Nodes Nationwide Network Multi-Service Access POPS Nationwide Network MPLS Backbone Nationwide Network IP Backbone and Fiber Infrastructure

3 Architecture Our Hosted Network Security solution utilizes a suite of carrier-grade switches, management and analysis hardware –Two geographically diverse switches for redundancy Automatic fail over in the event of an outage –Separation of service using virtual domains allows us to keep security profiles private

4 Service Description – Hosted Network Security Comprehensive network-based security solution, providing a variety of security services for businesses. Hosted Network Security is a value added service for the EarthLink Complete™ Data MPLS product suite, providing a stable, secure and reliable network solution for private and public data needs.

5 5 Hosted Network Security Packages

6 Includes: Firewall with stateful inspection NAT & PAT Benefits: Keeps track of the state of network connections Has the ability to identify legitimate packets for different types of connections Only packets matching a known active connection will be allowed to pass through the firewall Rejects all other packets Can be customized to allow or block ports and protocols Basic Package

7 Includes: Basic Package plus… URL Filtering (whitelist & blacklist) Web Content Filtering Application Control Benefits: Specify which websites should be accessible (whitelisted) or blocked (blacklisted) at the firewall using URL Filtering Choose categories of websites to block or allow at the firewall such as pornography, racism & hate, and arts & entertainment using Web Content Filtering Use Application Control to manage the type of applications that can access data outside the firewall. Permit or block non-approved application categories such as chat or peer-to-peer clients to improve productivity and protect valuable company information. Advanced Package

8 Includes : Advanced Package plus… Further customization options via content filtering and application control for more granular security coverage Data Leak Prevention (DLP) allows you to define specific patterns in the data that would be allowed or blocked Intrusion Detection Service (IDS) and Intrusion Prevention Service (IPS) Anti-Virus, Anti-Malware, Anti-Spyware via scanning of data streams Benefits : Content Filtering can be set at category/sub-category level allowing for more granular security control Allow specific applications to operate through the firewall using Application Control even though the application category itself may be blocked Confidential information such as Social Security Numbers, credit card #s, and other critical company assets can be defined and protected via DLP The ability to identify malicious content within a data stream to both log and block via IPS The system detects, logs and blocks harmful software (malware, viruses & tracking software) from entering network Premium Package

9 Do it MyselfHosted Network Security Basic Hosted Network Security Advanced Hosted Network Security Premium Security Devices$50,000No equipment to buy or renew! 1 Security FTE for 3 years $300,000Included in price – our certified security experts 24x7 Monitoring / Management Tools $50,000Included in price – our Network Security Center Total $400,0000$27,000$32,400$43,200 Cost Effective Protection

10 Hosted Network Security product includes free reporting for each service within the myLink portal: –Basic Security Report –Bandwidth Analysis Report –Web Filtering Reports –Forensic Analysis Report –Threat Analysis Report Reporting

11 [Customer] Hosted Network Security Proposal

12 Your Network Solution [Customize for customer, examples follow] Multi-site security coverage for locations in your private network

13 Your Network Design [Insert Network Design]

14 Your Design Features [Customize for customer, examples follow] Solution design provides the most cost effective security solution for your private network Includes up to 5 usable IP addresses (/29)

15 Your Service Summary EXAMPLE REPLACE WITH CUSTOMER’S ACCESS SUMMARY (delete this box)

16 Service Level Agreements SLACompensation Loop MTTR - DS1/DS34 Hours15% MRC Loop MTTR DSL18 Hours15% MRC Install DS1/DS345 Business Days15% MRC Install DSL30 Business Days15% MRC CPE MTTR Next business day if isolated to the CPE by 2 P.M. PST5% MRC Network Availability (Core Network)99.999%15% MRC Latency (Round trip, P2P Core Network)45ms15% MRC Data Delivery Ratio (real time)99.9%15% MRC

17 Project Management Keeps project on schedule Coordinates EarthLink Business’s internal resources: circuit provisioning, equipment install, networking testing Outlines project roles and responsibilities: inside wiring, building access, address corrections, definition of demarcation point, etc. Serves as the point of escalation during network implementation

18 Key Differentiators Leading IP infrastructure Nationwide footprint Robust product set, customizable solutions End-to-end bi-directional CoS over asynchronous access elements Personalized support - an extension of your IT staff Online portal will consistently monitor your network and automatically open trouble tickets Proven service provider across multiple industries EarthLink growth engine with access to capital for network upgrades, new technologies