Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices
Social Networking = Business Networking When did Facebook become a business application? Blogging Facebook Twitter IM Streaming video Streaming audio Downloading files Playing games Webmail Wikis Malware, Trojans, BotNets, Intrusions out of control + Business Social Networking out of control = Escalating Demand for Network Bandwidth
Acceptable Business ApplicationsUnacceptable Application Chaos IT Controls Challenged
Application Chaos So many on Port 80 Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Cloud Computing & the Next Generation Firewall ? ? ? ? ? ? ?
Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Application Chaos So many on Port 80 Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Cloud Computing & the Next Generation Firewall
Application Chaos So many on Port 80 Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Cloud Computing & the Next Generation Firewall
Application Chaos So many on Port 80 Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Cloud Computing & the Next Generation Firewall
Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Egress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Cloud Computing & the Next Generation Firewall Critical Acceptable Block
Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Egress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Cloud Computing & the Next Generation Firewall Critical Bandwidth Managed Bandwidth Block