Download presentation
Presentation is loading. Please wait.
Published byNorman Bryan Modified over 9 years ago
1
It’s A New World
2
CONFIDENTIAL All Rights Reserved 2 The Business Impact Most of your network traffic will be coming from outside the private network you are trying to secure 2001: Network Perimeter2008: Resource Perimeter Internal Users Traveling Executives Day Extenders Employee at a Kiosk Customer or Supplier Behind a Firewall VOIP Users Employee Using a Wireless Hotspot Employee PDA User Corporate Data Centers Customers or Suppliers Remote Access External Users Corporate Data Centers
3
CONFIDENTIAL All Rights Reserved 3 Fundamental Changes in Technology Ubiquity of broadband Proliferation of mobile devices Rise in IP telephony Increased teleworking
4
CONFIDENTIAL All Rights Reserved 4 Enterprise-class Networking Drivers & Trends 4 Technology Trends Growth in real-time applications SaaS / Web 2.0 Virtualization of services Data Center consolidation Infrastructure Demands Business Drivers Reduction in operating costs Focus on TCO Mobilization of the workforce Compliance Outsourcing growth Gaining competitive advantage Growth in bandwidth; thirst for unimpeded traffic routing Integration concerns Handling latency sensitive traffic becomes challenging – voip, collab. De-perimeterization The Communications Landscape Is Rapidly Evolving
5
CONFIDENTIAL All Rights Reserved 5 Your Users are Increasingly Out of Your Control Network Applications and Resources Internal UsersExternal Users Users Devices Network environments Mobility Remote access Home Office Users Traveling Executives Day Extenders Kiosks/Public Machine Users Business Partners/ Extranet Users VOIP Users Wireless LAN Users PDA & Smart Phone Users
6
CONFIDENTIAL All Rights Reserved 6 Current Solutions Present Challenges Lack of integration and correlation between solutions increases management overhead, complexity and cost Lowered performance and higher false positive rate; inability to handle real-time traffic increases risk Policy focuses on blocking ports rather than widespread inspection of applications and application threats Solutions Traditional Firewall Traffic Legacy System Access IDS/IDP Basic Applications Worms Application Access Application Layer Threats Proxy Software Vulnerabilities 1 1 2 3 3
7
CONFIDENTIAL All Rights Reserved 7 7 Global ManagementSecure Wireless SonicPoint GlobalManagementSystem Content SecurityNetwork Security Email Security & CSM Business Continuity Continous Data Protection Remote Access SSL-VPN SonicWALL Solution Suite
8
CONFIDENTIAL All Rights Reserved 8 8 worldwide customer more than 1 million appliances
9
CONFIDENTIAL All Rights Reserved 9 9 Enterprise-Products: SonicWALL E-Class GMS (Global Management System) Network Security Appliance E5500 Network Security Appliance E6500 Network Security Appliance E7500 SonicWALL Aventail EX -750 SonicWALL Aventail EX-1600 SonicWALL Aventail EX-2500 Email Security ES 6000 Email Security ES 8000
10
CONFIDENTIAL All Rights Reserved 10 Enterprise-class Deep Packet Inspection and Application Firewall Revolutionary Multi-Core Performance Threat Protection over both External and Internal Networks Integrated Business Continuity & High Availability Features SonicWALL NSA E-Class Series E7500 E6500 E5500 The SonicWALL® Network Security Appliance (NSA) Series - the first multi- core Unified Threat Management (UTM) platform that delivers enterprise- class deep packet inspection without compromising performance
11
CONFIDENTIAL All Rights Reserved 11 Next Generation E-Class Architecture 11 SonicWALL Solution 1. Consolidated & Integrated Security Technology 2. Inspection of Real-time & Latency Sensitive Applications/Traffic 3. Scalable & High Performing Enough to Protect Against Perimeter and Internal Network Challenges Multi-Tiered Protection Technology Enterprise-class Requirements Patented Re-Assembly Free Inspection Multi-Core High Perf. Architecture
12
CONFIDENTIAL All Rights Reserved 12 E-Class Features/Benefits 12 2. Ultimate Connectivity Secure IPSec Site-to-Site VPN Connectivity Exceptional User Policy Control and Access to Resources Wireless Mobility Network Availability 1. Security Integration Complete UTM Protection with Gateway Anti-Virus, Anti-Spyware and IDP Next Generation Application Firewall Content & Application Filtering “Clean VPN” Protection 3. Reliability & Optimization Highly Redundant Hardware – Power/Fans One Point of Network Control Business Application Prioritization & QoS Integrated Server Load Balancing Feature-set 4. Flexible Deployments Data Center, Campus & Department Network Applications Transparent L2 Bridge Mode Integrated Wireless Switch Deployment Ease of Deployment & Management
13
CONFIDENTIAL All Rights Reserved 13 NSA E-Class Series Overview NSA E7500 The Ultimate in UTM, FW and VPN performance 5GB FW / 1GB UTM / 1.2 GB IPS CPU: 16 Core 600Mhz – 9.6 Ghz of Processing Power Interfaces: 4 Gig auto-sensing copper; 4 Gig SFP Features: Information Center; Dual Power Supplies; Dual Redundant Fans The NSA E Class is offered at three price points NSA E7500 NSA E5500 NSA E6500 NSA E5500 Mid-Enterprise Performance & Value 2 GB FW / 400Mbps UTM / 550Mbps IPS CPU: 8 Core 550Mhz – 4.4 Ghz of Processing Power Interfaces: 8 Gig auto-sensing copper Features: Information Center; Dual Redundant Fans NSA E6500 Best in Class UTM, FW and VPN performance 3GB FW / 750Mbps UTM / 850Mbps IPS CPU: 16 Core 550Mhz – 8.8 Ghz of Processing Power Interfaces: 8 Gig auto-sensing copper Features: Information Center: Dual Redundant Fans
14
NSA Feature: Application Visibility Traditional Firewalls can only determine port and protocol SonicWALL’s Patented RFDPI Technology provides Application Classification and Inspection Control, Block or bandwidth limit what applications are used on a per user basis Business Related Non-Business Related Corporate Network HTTP TCP IM Email Permit Business Related Applications Block or Bandwidth limit Non-Business Related Applications
15
CONFIDENTIAL All Rights Reserved 15 SonicWALL Deep Intelligence SonicWALL UTM Appliance IT Actionable Info Threat Information Top VPN Users Application Usage Bandwidth Misuse Network Traffic End User Activities HTTP FTP IM/P2P Mail VPN Threats Protocols Attacks Potential Threats Bandwidth Intelligence VPN Reporting Employee Net Usage Deep Intelligence Pro-Active Alerting No Intelligence Alert Your Staff Network Visibility SonicWALL UTM & ViewPoint Delivers Deeper Business Intelligence
16
Best-of-Breed Performance “This box offers 1.3Gbps of UTM performance, which is nearly triple the speed of the fastest product in our comparative UTM test last November “ “Overall, the E7500 provides a dramatic boost in speed that makes UTM possible in enterprises needing gigabit speeds.” Joel Snyder SonicWALL’s Performance Advantage Patented Re-Assemble Free Deep Packet Inspection Engine (RFDPI) Multi-core architecture offers parallel processing for increased scalability On-chip security co-processing and hardware acceleration **Competitive data obtained from vendor datasheet.
17
SonicWALL Email Security
18
CONFIDENTIAL All Rights Reserved 18 IT Security Concerns Top 5: Virus, Spyware, SPAM, Intrusion & Theft
19
CONFIDENTIAL All Rights Reserved 19 Spam Many messages are obviously spam
20
CONFIDENTIAL All Rights Reserved 20 Is it Spam? Other messages will be disagreed upon
21
CONFIDENTIAL All Rights Reserved 21 Phishing Some emails are easy to determine as phish
22
CONFIDENTIAL All Rights Reserved 22 Phishing? Sometimes it is hard to tell
23
CONFIDENTIAL All Rights Reserved 23 Outbound Risks and Compliance U.S. Federal: HIPAA, GLBA, SOX, Sec 17a-4, NASD3010, PATRIOT Act Section 326 European: Safe Harbor, EU Data Protection Directive 95/46 Organization: VISA CISP, MasterCard Site Data Protection Program, FERPA State: CA SB 1386 & AB 1950 / NY Bill A04254 / IL H.B. 1633 Corporate: Prevent offensive language, add disclaimers, block files Many more… All organizations need to be address compliance requirements
24
CONFIDENTIAL All Rights Reserved 24 Inbound and Outbound Threats Threats Require Inbound and Outbound Protection
25
CONFIDENTIAL All Rights Reserved 25 Proliferation of Systems Typical Mail Data Center Management of Multiple Systems Becomes Complex
26
CONFIDENTIAL All Rights Reserved 26 Collect Worldwide Threat Data
27
CONFIDENTIAL All Rights Reserved 27 Analyze for Bad/Good Email Patterns Likely Virus Bad PatternGood Pattern 50 people … in 6 different countries … receive a new attachment …that has never been seen before … within 30 minutes 40 million emails … sent by newsletter@microsoft.com … from 3 IP addresses … in Seattle … and never junked Good Email SonicWALL Analyzes Patterns
28
CONFIDENTIAL All Rights Reserved 28 Cross Analyze Patterns with Content Evaluation and Reputation SonicWALL Determines a Definitive Judgment – Not Just a Score
29
CONFIDENTIAL All Rights Reserved 29 SonicWALL Email Security Stops Today’s and Tomorrow’s Threats Threats Evolve – SonicWALL Protects
30
CONFIDENTIAL All Rights Reserved 30 SonicWALL Email Security Anti-Spam, Anti-Phishing, Anti-Virus Compliance and Policy Management Appliance and Software options Works with any email system (SMTP) Unified inbound and outbound protection Installs in < 1 Hour…managed in < 10 minutes/week For businesses from Less than 50 users to Over 5000 Users
31
CONFIDENTIAL All Rights Reserved 31 Quick Configuration 5 Steps to Configure Full install in < 1 hour High availability options
32
CONFIDENTIAL All Rights Reserved 32 Anti-Spam, Anti-Phishing, Anti-Virus Complete protection Inbound/Outbound Spam, Virus, Phishing Zombies, DHA, DoS Automatic updates No rules to write Complete flexibility Per-user and per-group
33
CONFIDENTIAL All Rights Reserved 33 Administrative and End-User Junk Box Web-based Junk Box Search, sort, preview View all threats 1-click UnJunk Retrieves Adds to allowed list Provides feedback Administrative, End-User
34
CONFIDENTIAL All Rights Reserved 34 Junk Box Summary Easy quarantine view Email summary Configurable Frequency Specific time and day 11 languages All or just questionable Preview and UnJunk 1-click
35
CONFIDENTIAL All Rights Reserved 35 Email Policy & Compliance Approach Robust tools to Identify, Monitor, and Enforce
36
CONFIDENTIAL All Rights Reserved 36 Policy and Compliance Management Powerful filters Search any message part Scan within attachments Check for disguised text Match against dictionaries Judgment-based policies 15 action options Bounce, quarantine, log Add disclaimers Strip attachments Etc. Apply to specific groups LDAP-based
37
CONFIDENTIAL All Rights Reserved 37 Email Auditing Full email audit All good mail All bad mail Inbound Outbound Searchable From, To, Subject Today or multi-day Detailed information Per-recipient data Full audit trail
38
CONFIDENTIAL All Rights Reserved 38 Reporting and Monitoring 25+ Web-based reports Dashboard, System Status Spam, Phishing, Virus Policy and Compliance Return-on-Investment Custom reports Emailed reports Schedulable reports
39
CONFIDENTIAL All Rights Reserved 39 Instant Deployment
40
CONFIDENTIAL All Rights Reserved 40 High Availability Deployment
41
Thank you. www.sonicwall.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.