Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
RSA Media & Analyst Briefing March 2-4, The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger 2 Changing WorldBusiness Priorities.
Triple-Layered Security. INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Dell SonicWALL E-Class Secure Remote Access (SRA) Overview
Solutions Road Show 2014 March’ 2014 | India Protection from Next Gen Threats Pralobh Menon Sales Engineer DELL SonicWALL (South) Pralobh Menon Dell India.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Challenges in Network Security 2011 SonicWALL Inc.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
SonicWALL WXA – WAN Acceleration
Security issues for mobile devices Cvetko Andreeski.
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
Barracuda Networks Steve Scheidegger Commercial Account Manager
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
ContentKeeper Electronic Mail Template Concepts Presented by Date.
Your storage on the ground; Your files in the cloud.
Company Presentation September 15, CONFIDENTIAL.
Market Analysis Decision Group.
Fortinet An Introduction
Dell Connected Security Solutions Simplify & unify.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Hybrid Cloud Web Filtering Platform
Barracuda Firewall The Next-Generation Firewall for Everyone
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda Firewall The Next-Generation Firewall for Everyone
Securing the Network Perimeter with ISA 2004
SonicWALL Access Security Legacy & Current Themes
Prevent Costly Data Leaks from Microsoft Office 365
SonicWall & GDPR Alexis Holmes, Channel SE UK & I
Check Point Connectra NGX R60
Hosted Security.
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD

2 SonicWALL Confidential Number of iPad ’ s are Growing

3 SonicWALL Confidential Number of iPhone ’ s are Growing

4 SonicWALL Confidential...and Android is on the Fight

5 SonicWALL Confidential Smartphone and Tablet Sales Continue to Grow The “ Consumerization of IT ” is here: By 2012, annual worldwide sales of mobile devices will increase to 650 million units. 1 By 2013, smartphones will overtake PCs as the most common web access devices worldwide.2 By 2014, smartphones that users purchase outside company policy for work or attach to corporate networks will sell faster than any other smartphone segment. 3 By 2015, analysts forecast cumulative smartphone sales of 2.5 billion units with annual tablet sales reaching 326 million units. 4 1 Roberta Cozza, “ Forecast Mobile Communications Devices by Open Operating System, Worldwide, ” Gartner, April 5, “ Gartner: Mobile To Outpace Desktop Web By 2013, ” Media Post Communications, January 13, IDC report: “ Worldwide Business Use Smartphone 2010 – 2014 Forecast and Analysis ”, September Worldwide Smartphone Sales Forecast to 2015, ” Coda Research Consultancy, May “ iPad to dominate tablet sales until 2015 as growth explodes, says Gartner, ” Charles Arthur, The Guardian, September 22, 2011

6 SonicWALL Confidential The Need for Mobile Connectivity More and more iOS and Android enabled devices are being sold Employees are purchasing their own iOS and Android devices Employees are asking for access to corporate protected resources IT continues to struggling with how to deal with security and access

7 SonicWALL Confidential

8 SonicWALL Confidential

9 SonicWALL Confidential

10 SonicWALL Confidential

11 SonicWALL Confidential

12 SonicWALL Confidential

13 SonicWALL Confidential Best Practices From Outside the Perimeter: 1. Establish Reverse Web Proxy 2. Establish SSL VPN Tunnels 3. Scan VPN Traffic through a Next-Gen Firewall 4. Add Strong Authentication 5. Deploy Endpoint Control for Laptops 6. Create a Secure Virtual Desktop for Laptops 7. Enforce Cache Cleaner technology for Laptops From Inside the Perimeter: 1. Scan WiFi Traffic through a Next-Gen Firewall 2. Control Application Traffic 3. Prevent Data Leakage 4. Block Inappropriate Web Access 5. Block Outbound Botnet Attacks

14 SonicWALL Confidential

15 Global Marketing Confidential Innovations In Firewalls Help Control BYOD at Work Next-Generation Firewalls

16 SonicWALL Confidential Application Intelligence, Control and Visualization Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Identify By Application - Not by Port & Protocol By User/Group -Not by IP By Content Inspection -Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Users/Groups Ingress Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Policy Visualize & Manage Policy Cloud-Based Extra-Firewall Intelligence Egress Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Visualization

17 Global Marketing Confidential SSL VPN Support for iOS & Android from Dell SonicWALL

18 SonicWALL Confidential Dell SonicWALL Mobile Connect for iOS

19 SonicWALL Confidential Dell SonicWALL Mobile Connect for Android

20 SonicWALL Confidential Dell SonicWALL Mobile Connect Dell SonicWALL E- Class SRA Appliances Dell SonicWALL SRA Appliances Dell SonicWALL Next- Generation Firewalls Step 1: Download Mobile Connect Step 2:Install Mobile Connect Step 3: Configure SSL VPN Connection

21 SonicWALL Confidential Mobile Connect for SRA and Next- Generation Firewalls Step 1: Define the profile for the SRA or Next-Generation Firewall Step 2: Input Username/Password Step 3: Connection is established to the SRA or Next-Generation Firewall

22 SonicWALL Confidential Secure Access using Mobile Connect (Enterprise) Dell SonicWALL Aventail Secure Remote Access Protect Connect Web Apps Client/Server Apps File Shares Databases VoIP Citrix/RDP/Vmware View ApplicationsDirectories Corporate Network LDAP AD RADIUS LDAP Dell SonicWALL Mobile Connect provides secure network level access to corporate resources from iPhone, iPad, iPod Touch and Android devices.

23 SonicWALL Confidential Mobile Connect SonicWALL Clean VPN Dell SonicWALL Aventail Secure Remote Access Protect Connect Web Apps Client/Server Apps File Shares Databases VoIP Citrix/RDP/Vmware View ApplicationsDirectories Corporate Network LDAP AD RADIUS LDAP Dell SonicWALL NSA Network Security Protected “ Clean ” Traffic Dell SonicWALL Next-Generation Firewalls combined with Dell SonicWALL Aventail Secure Remote Access provides a defense-in-depth combination of high performance real time network security with granular application and end point remote access control. Provides Identification and Access Control Provides Deep Packet Inspection Scanning

24 SonicWALL Confidential Cross Platform SSL VPN Solutions Windows / Mac / iOS / Android

25 SonicWALL Confidential Safe Access and TONS of Capabilities to do work Safely

26 SonicWALL Confidential Ton den Braber Thank You!