Download presentation
Presentation is loading. Please wait.
Published byNoelia Burchfield Modified over 10 years ago
1
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Top of Content Box Line Subtitle Line Title Line June 2014 McAfee Next Generation Firewall
2
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee – Big Picture of Security 2 2
3
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Next Generation Firewalls – New Era 3 Connected NGFW Connected to end point security Connected to real-time global threat database Connected to advanced breach detection Advanced NGFWs Central management for large networks High availability Advanced evasion protection First NGFWs Inspection Application and user awareness Traditional FWs time Completeness of security 2012 20142013 2008 1988
4
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Marrying the Network, Security and Admin Requirements 4 Networking People Service availability Performance Managed QoS Avoidance of any downtime Security Specialists Proven protection from malware Constant security updates and support Reports and forensics High granularity CIO Best overall solution to ensure business continuity and protect key assets Cost effectiveness – good value for money McAfee NGFW Satisfies all These Needs Administrators Holistic network view Easy-to-use tools and workflow automation
5
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Meeting Various Customer Needs 5 Superior solution for distributed enterprises looking for comprehensive security, scalability and ease of operations Datacenters & cloud services Classified data & IPR Business continuity & applications Mission critical networks Multi-location & multi-tenant businesses Financial transactions & assets
6
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Flexible Product for Different Needs 6 ADVANCED THREAT PROTECTION HIGH AVAILABILITY CONTEXT AWARE SECURITY CENTRALIZATION OF OPERATIONS SITUATIONAL AWARENESS & FORENSICS INVESTMENT PROTECTION RESOURCE OPTIMIZATION FLEXIBLE & QoS AWARE VPN MULTI-TENANCY McAFEE NGFW CAPABILITIES DATACENTERS & CLOUD SERVICES BUSINESS CONTINUITY & APPLICATIONS MISSION CRITICAL NETWORKS MULTI-TENANT BUSINESESS SITE-TO-SITE CONNECTIVITY SCOPE OF PROTECTION
7
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. What Makes McAfee NGFW Different? 7 Unified Software Core Strong Centralized Management High Availability Advanced Evasion Prevention Security Connected
8
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Flexible Delivery Unified Software Core 8 Adjustable security level to meet deployment need High performance maintained even with deep inspection NEXT GENERATION FIREWALL FIREWALL LAYER 2 FIREWALL IPS MILITAR Y GLOBA L ENTERPRIS E COMMERCIA L SMB VPN SOFTVIRTUALPHYSICAL McAfee
9
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. NGFW Management in Various Configurations Unified Software Core 9 Adapts to the dynamic business needs – no license renegotiations or forklift upgrade of hardware L2FW FW/VPN L2FW FW/VPN IPS FW/VPN
10
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. ‘All inclusive’ licensing enables easy budgeting and maintains the long term Total Cost of Ownership flat TCO Effect Unified Software Core 10 Typical Cost McAfee Change in threat Landscape More performance needed Security as a business enabler Total cost
11
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Centralized Management Resource Optimization Hierarchical templates and aliases Security automation with scheduling e.g. upgrades Policy validation and analysis Security automation with plug and play Hierarchical Templates And Aliases Policy Validation and Analysis Security Automation with Scheduling Security Automation with Plug and Play InitialConfiguration POLICY TEMPLATE MAIN POLICY SUB POLICY 2 SUB POLICY 3 SUB POLICY 1
12
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Native Active-Active Clustering High Availability 12 Node 1 Node 6 …16 Node 2Node 3 Node 5Node 4 Mix of hardware and software versions Internet “I can update a FW cluster without dropping a single packet” – McAfee NGFW customer
13
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Cost-effective and secure site-to-site connectivity with adjustable resilience and capacity High Availability Multi-Link and Augmented VPNs 13 2 Mbps = up to 6 Mbps + HQ Distant Site + MPLS ADSL ISP A ISP B
14
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Security Connected ePO End-Point Management ESM SIEM Advanced Threat Defense Enterprise Authentication McAfee Antivirus/GAM McAfee NGFW SMC 14 McAfee GTI Reputation in the Cloud Holistic security solution merging network and end-point threats and management together
15
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee NGFW is tested against >800 million evasions or combinations Evasions – what, why and when? Advanced Evasion Prevention Means to disguise an attack Objective to bypass network security devices with no tracks Extremely hard to track Unlimited amount of variations and combinations Most network devices are ineffective 15 Internet Security Device Vulnerable Target A c k t a t Attack A c k t a t A c k t a t
16
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Fundamental Difference Advanced Evasion Prevention 16 Traditional Inspection Architecture ta t a ? McAfee NGFW Stream Based Full Stack Normalization Protocol agents ta ck at ck attack ! Effectiveness based on all traffic normalization before inspection
17
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Advanced Evasion Prevention How Easy is an Evasion 17 With Evader getting access to the “protected” network is as simple as: Select the Exploit 1 Identify Attack Target 2 Cisco Palo Alto Networks Check Point Fortinet Juniper SourceFire Tipping Point Select the Evasion Technique 3
18
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. One harmonized appliance family protecting investments with hardware modularity and simple licensing Flexible McAfee NGFW Appliance Portfolio 18 Same appliance for multiple use-cases Modular hardware Fit from branch office to data center deployments Rugged designs for demanding environment 1000 Series 1400 Series 3200 Series 5200 Series 300 Series 2G 20G 60G 120G McAfee SMC
19
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. Third Party Recognition ‘Long legacy with HIGH AVAILABILITY’ and ‘early focus on ANTI-EVASION’ 2013 NSS Labs test results: RECOMMENDED VALIDATED for real world quality, protection, and performance 19
20
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. McAfee Next Generation Firewall Provides Adaptability to dynamic enterprise security environment Operational efficiency and high up-time ensuring business continuity Holistic ’Connected NGFW’ approach to network security Efficient protection against Advanced Evasions 20
21
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line. 21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.