Presentation is loading. Please wait.

Presentation is loading. Please wait.

WINS Monthly Meeting 11/5/2004 WINS Monthly Meeting 11/5/2004.

Similar presentations


Presentation on theme: "WINS Monthly Meeting 11/5/2004 WINS Monthly Meeting 11/5/2004."— Presentation transcript:

1 WINS Monthly Meeting 11/5/2004 WINS Monthly Meeting 11/5/2004

2 Agenda Introductions Introductions Widener Internet Solution Widener Internet Solution Allot NetEnforcer (Accounting/Shaping/Steering) Allot NetEnforcer (Accounting/Shaping/Steering) Allot Cache Server Pool Allot Cache Server Pool Fortigate 3600 Fortigate 3600 Bluecoat Phishing Solution Bluecoat Phishing Solution Bluecoat Spyware Solution Bluecoat Spyware Solution Intermute Spyware Solution Intermute Spyware Solution Question & Answers Question & Answers

3 Introductions Name Name Title Title Location Location

4 Widener Internet Solution

5 Allot NetEnforcer (Accounting/Shaping/Steering) Implement Application- and IP-Based Accounting The NetAccountant software add-on for the NetEnforcer collects traffic data per session, gathering information on source address, destination address, application type and policy. Use your owen application or the NetAccountant Reporter to create tabular and graphical reports for capacity planning and resource management. Implement Application- and IP-Based Accounting The NetAccountant software add-on for the NetEnforcer collects traffic data per session, gathering information on source address, destination address, application type and policy. Use your owen application or the NetAccountant Reporter to create tabular and graphical reports for capacity planning and resource management. Three Steps to Policy-Powered Networking Policy-Powered Networking lets you efficiently manage traffic crossing the LAN/WAN boundary of an enterprise network. The process of implementing a Policy-Powered Networking solution includes three steps: Three Steps to Policy-Powered Networking Policy-Powered Networking lets you efficiently manage traffic crossing the LAN/WAN boundary of an enterprise network. The process of implementing a Policy-Powered Networking solution includes three steps: 1. Monitor network and bandwidth usage Use the NetEnforcer's NetWizard setup utility to auto-discover applications in your network. Using this information, you can determine which protocols affect your network performance and should be managed. 1. Monitor network and bandwidth usage Use the NetEnforcer's NetWizard setup utility to auto-discover applications in your network. Using this information, you can determine which protocols affect your network performance and should be managed. 2. Define policies that link business priorities to computing needs Use the QoS Policy Form to quickly define QoS attributes for the desired policies. Assign minimum and maximum percentages of bandwidth, and prioritize traffic from 1 to 10. For additional policy definition, use the Policy Editor to define policies based on addresses, protocols, VLAN tags, Type of Service, or time of day. 2. Define policies that link business priorities to computing needs Use the QoS Policy Form to quickly define QoS attributes for the desired policies. Assign minimum and maximum percentages of bandwidth, and prioritize traffic from 1 to 10. For additional policy definition, use the Policy Editor to define policies based on addresses, protocols, VLAN tags, Type of Service, or time of day. 3. Enforce the rules Let NetEnforcer examine all traffic crossing the WAN link. Upon matching a traffic session with a rule, NetEnforcer forwards the packets per the specified policy actions. Continually monitor network resources using NetEnforcer's Traffic Monitor and refine policies to maintain maximum network control and application performance. 3. Enforce the rules Let NetEnforcer examine all traffic crossing the WAN link. Upon matching a traffic session with a rule, NetEnforcer forwards the packets per the specified policy actions. Continually monitor network resources using NetEnforcer's Traffic Monitor and refine policies to maintain maximum network control and application performance.

6 Allot Cache Server Pool Policy-Based Load Balancing Software Transparently distribute client traffic to Web server farms Distribution of traffic according to individual server capabilities Assure 100% uptime by automatically rerouting down-server traffic Web and other Internet-based server farms are a critical company resource. However, increased complexity of server farms and the need for improved server performance have created the need for network managers to more efficiently control and distribute server traffic.

7 Widener Fortigate 3600 Installed in July Installed in July Detects, quarantines, and eliminates viruses and Detects, quarantines, and eliminates viruses and worms in real-time. Scans incoming and worms in real-time. Scans incoming and outgoing email attachments (SMTP, POP3, outgoing email attachments (SMTP, POP3, IMAP), HTTP and FTP traffic including web-based IMAP), HTTP and FTP traffic including web-based email, and encrypted VPN tunnels – without email, and encrypted VPN tunnels – without degrading Web performance degrading Web performance Detection and prevention of over 1300 intrusions Detection and prevention of over 1300 intrusions and attacks, including DoS and DDoS attacks, and attacks, including DoS and DDoS attacks, based on user-configurable thresholds. Automatic based on user-configurable thresholds. Automatic updates of IPS signatures from FortiProtect updates of IPS signatures from FortiProtect Network Network Processes all Web content to block inappropriate Processes all Web content to block inappropriate material and malicious scripts via URL blocking material and malicious scripts via URL blocking and keyword/phrase blocking and keyword/phrase blocking Industry standard stateful inspection firewall Industry standard stateful inspection firewall Industry standard PPTP, L2TP, and IPSec VPN Industry standard PPTP, L2TP, and IPSec VPN support support FortiGate units can be deployed in conjuction FortiGate units can be deployed in conjuction with existing firewall and other devices to with existing firewall and other devices to provide antivirus, content filtering, and other provide antivirus, content filtering, and other content-intensive applications content-intensive applications Interfaces 10/100Base-T Ports 1 1000Base-SX Ports (Fiber) 4* 1000Base-T Ports (Copper) 2 System Performance Concurrent sessions 1,000,000 New sessions/second 25,000 Firewall throughput (Gbps) 4Gbps 168-bit Triple-DES throughput (Mbps) 600 Unlimited concurrent users Policies 50,000 Schedules 256 Fortinet FortiGate-3600 – Product of the Year - Gold Award – Enterprise firewall system searchNetworking.com February 2004 A fortress in a box – FortiGate 3600 offers a smorgasbord of security services on one machine FCW.com October 2003

8 Bluecoat Phishing What is a Phishing Attack? A phishing attack is an attempt by fraudsters to fool a user into divulging confidential information over the Internet. Phishing attacks often start by spammers sending out email messages and asking customers to “confirm” their account information by clicking on a link found in the message. The user is then asked to enter their personal information such as name, social security number, bank account number, password, and PIN. Once captured spammers can use this information to deplete bank accounts, charge credit cards, and steal user identities. Blue Coat keeps employees safe while on the Internet at work. The ProxySG can be configured to deflect phishing attacks in two ways. Earlier (and less sophisticated) phishing attacks employ the use of a pop-up ad to request additional information. The ProxySG provides a pop-up blocking feature that allows you to permit only required pop-ups such as those needed for Outlook Web mail. The second method to control phishing scams by the ProxySG is to recognize and display the origin of any secondary form presented to the user. The ProxySG does this by determining the origin of any Web site that has a form and then posting a banner noting the origin. Because the most recent phishing scams deploy a separate form when requesting personal user information, the ProxySG can prompt the user with the origin address (URL or IP) of the form. Typically, a legitimate site with a form will be displayed with the actual URL such as www.cnn.com. An IP address displayed indicates that a user is being redirected to another server and should use extreme care. The banner is only displayed if the page contains a form.

9 Bluecoat Spyware Solution What is Spyware? Spyware is a general term for software that covertly monitors the actions of a PC. Spyware can either be deployed with or without the consent of the user. Commercial spyware (also known as adware) occurs when a user accepts (often through an arcane license agreement) the placement of software agents on their PC in exchange for free software. Usually the software being downloaded provides no business benefit to a corporation. The no-cost version of Kazaa desktop client, for example, requires the user to accept downloads of numerous spyware (adware) agents. Blue Coat provides the necessary on-proxy performance and policy extensions required for URL filtering to comprehensively block Websites known to host spyware and adware. The Blue Coat ProxySG supports five leading on-proxy URL filtering databases, plus custom categories, overrides and exceptions to advise, coach and enforce users. Administrators can block ‘Drive-by-Installs’ from any locations that may be installing Spyware. By blocking downloads of.CAB,.OCX,.EXE and.DLL files the installation of spyware can be prevented.

10 Intermute Spyware Solution Spyware in the Corporation, the latest Enterprise Threat Spyware in the Corporation, the latest Enterprise Threat It is no secret that spyware has promoted itself from simply a PC nuisance to a high- level enterprise problem. IT and network managers are seeing the enterprise implications of desktop spyware - and realizing that staggering costs and risks are associated with spyware running on corporate PCs. It is no secret that spyware has promoted itself from simply a PC nuisance to a high- level enterprise problem. IT and network managers are seeing the enterprise implications of desktop spyware - and realizing that staggering costs and risks are associated with spyware running on corporate PCs. Productivity is declining in organizations where PC users suffer from spyware distractions, sluggish, infested computers, and broken Internet connections that can result from manual attempts to remove spyware from PCs. IT help desk staffs are being flooded with calls for assistance with PCs that "don't work", are painfully slow, or have web browsers behaving strangely. In addition, after years of defending the corporate network from outside threats such as hackers and viruses, spyware threats are now routinely found running within the walls of the organization. Spyware easily slips past traditional network security barriers. Spyware is threatening organizations confidential information, productivity and overall network integrity. Traditional security solutions can't stop spyware. Productivity is declining in organizations where PC users suffer from spyware distractions, sluggish, infested computers, and broken Internet connections that can result from manual attempts to remove spyware from PCs. IT help desk staffs are being flooded with calls for assistance with PCs that "don't work", are painfully slow, or have web browsers behaving strangely. In addition, after years of defending the corporate network from outside threats such as hackers and viruses, spyware threats are now routinely found running within the walls of the organization. Spyware easily slips past traditional network security barriers. Spyware is threatening organizations confidential information, productivity and overall network integrity. Traditional security solutions can't stop spyware. InterMute, Inc. ▪ 100 Grossman Drive ▪ Braintree, MA 02184 ▪ www.intermute.com

11 Questions & Answers Next Meeting Friday Dec 3rd Next Meeting Friday Dec 3rd


Download ppt "WINS Monthly Meeting 11/5/2004 WINS Monthly Meeting 11/5/2004."

Similar presentations


Ads by Google