Download presentation
Presentation is loading. Please wait.
Published byPatrick Hodges Modified over 9 years ago
1
FireProof
3
The Challenge
4
Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge
5
Firewall concerns CPU intensive First line of defense - hacker prone Single Firewall is not an option – Due to its importance in the network, you must have an additional back up Firewall – Single point of failure – Limited performance growth – Service interruption during maintenance and upgrade The Challenge
6
Firewall fault tolerance No Internet access in case of firewall failure The Challenge Access router Firewalls
7
Optimal firewall performance Limited to single Firewall performance Static load distribution Expensive performance improvement The Challenge Access router Firewalls
8
Requirements Downtime is not an option – Continuously available systems – Transparent Recovery – Consistent service – Reliable Optimize Security Resources – Manageable – Efficient use of network The Challenge
9
Security ITM Solutions
10
FireProof High availability for all firewalls (transparent and non-transparent) Hardware based- no additional software installed on the firewall Compatible with any OS Compatible with multiple firewall vendors All firewalls are active Firewall resource optimization Security Solutions
11
Defacto standard Recognized leader by NAI, Secure Computing, Axent, Netscreen, Checkpoint (OPSEC certified) for Firewall load balancing and HA Security Solutions
12
FireProof - the solution FireProof assures that your security resources are always available and optimized Security Solutions Local clients Firewalls Access router FireProof
13
Non-stop service Health monitoring – Monitor Firewalls health Monitor physical servers Monitor full data path – In case of failure, clients are directed to alternate Firewall Redundancy – 2 Units can work in a redundant configuration – If one fails the other takes over Resilience – Recovery and warm-up period Security Solutions
14
Full path health monitoring Security Solutions Local clients Firewalls FireProof Ping TCP Port
15
Traffic redirection FireProof takes into account both incoming and outgoing traffic Load balancing algorithms – Cyclic – Least number of users – Least number of bytes – Least number of packets – Customized algorithm Firewall weights Security Solutions
16
Traffic redirection Firewall grouping by application Security Solutions Firewalls Email filtering FireProof Application? email
17
Application Switch Security Solutions Multi-layer switching architecture Gigabit connectivity Switching Asics per port PPC 750 RISC processor 1U box
18
Conclusion
19
FireProof provides certainty through non-stop service of your security environment FireProof ensures the best service by optimizing your security resources Conclusion
20
Awards Conclusion
22
thank you
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.