NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.

Slides:



Advertisements
Similar presentations
Chapter 1: Introduction to Scaling Networks
Advertisements

Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Agenda Product Overview Hardware Interfaces Software Features
BIG-IP Link Controller
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
Cyberoam NG series: Future-ready Security Confidential. For internal use only Cyberoam Technologies Pvt. Ltd.
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
MSIT 458: Information Security & Assurance By Curtis Pethley.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
What’s New in Fireware XTM v WatchGuard Training.
Meet the Next Generation Firewall (NGFW)
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
Access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
SonicWALL UTM Firewall Overview November 2010 Andy Barrow SonicWALL Product Manager
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Your Business Challenges
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Network Components By: Zach Przybilla CECS 5460 Fall 2015.
High Performance Web Accelerator WEB INSIGHT AG Product Introduction March – 2007 MONITORAPP Co.,Ltd.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Advancing the Carrier IP/MPLS Edge Routing Technology Group Cisco Systems, Inc. April.
NSA 2400MX Partner Overview Name Title Phone.
Cisco PIX Firewall Family
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Cisco 2921/K9, Hot Required by Small to Enterprise Branch Offices.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Barracuda Link Balancer
Network Security Solution
Barracuda Firewall The Next-Generation Firewall for Everyone
Securing the Network Perimeter with ISA 2004
Sizing …today. T: Here’s how. .
AT&T Firewall Battlecard
Presentation transcript:

NSA 240 Overview For End Users

2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go invisible  Poor Application Visibility  Abundance of unknown application use  Ports are ineffective at blocking application use  Network misuse is rampant  Increased Performance Demands  Bandwidth efficiency is a top concern, increasing security slows performance  Admins don’t want the tradeoff between security and performance

SonicWALL CONFIDENTIAL All Rights Reserved 3  Increase overall network productivity  Demystify the Application Landscape, blocking or controlling the top misused applications  Revolutionary UTM Performance  Unlimited UTM Threat Protection  Extend reliability with option 3G or Modem Add-on Card support Introducing the SonicWALL NSA 240 The SonicWALL® NSA240 – the first small-form factor multi-core Unified Threat Management (UTM) platform that won’t compromise performance RFDPI Scalability Application Focus Key Technology Advantages Better Protection Unlimited Scalability Best-in-class Performance Application Visibility

x Unprotected - 70% of traffic is no scanned properly or at all x Slow access - No method of distinguishing business vs non-business traffic x Mystery traffic % Unknown Application Use x Limited Control - Uncontrolled web access, not tied to users; Non-business activity overwhelms bandwidth ; no end point protection strategy x No Redundancy - No failover or primary option to 3G or Modem Next Generation Protection Office Network Typical Protection SonicWALL Solution Protected – 100% traffic scanning including unlimited file sizes - Truly scalable UTM Best in class Performance – Optimize the network by distinguishing business vs non- business traffic; deploy gigabit networking Uncover App Usage – Identify Unknown Application Use with the App FW Feature-set Ultimate Control – Control web and application access, from network to the end point Flexibility & Redundancy - Failover or primary options for using 3G or Modem add on cards with multiple ISP failover options; stateful failover protection

CONFIDENTIAL All Rights Reserved 5 1. Security Upgrade: Next Generation Security  Customers who have stateful inspection and now require complete inspection of network traffic without the trade off between security & performance 2. Bandwidth Control & Network Efficiency  Customers requiring control over business and non-business traffic 3. Demystify Application Use & Provide Control  Customers require complete understanding of network & application activity by individual user 4. Expansion: Delivering “Clean VPN”  Companies looking to expand their business while deploying next generation technology to “clean” site to site and client to site connections 5. Building Redundancy Into The Network  Customers can deploy 3G or modem failover OR use them as primary interfaces in areas where network lines are scarce or required quickly. NSA 240 Use Cases User Population Expanding App Usage Open Access to Internet Increase in “Unknown” Traffic Limited Control Over Content Security Required By Application Ever-increasing thirst for Bandwidth Ever-increasing thirst for Bandwidth Network Use

6 NSA Series Specs NSA 240  Gigiabit Connectivity: 9 Interfaces (3 GbE, 6 FE), 2 USB ports for future use, PC Card Slot  More memory: 256 MB Ram, 32MB Flash  Exceptional Speed: 110 Mbps full UTM, 150 Mbps VPN, 600 Mbps Stateful  Redundancy & Flexibility: 3G Capability via PC Card slot (with Express card adapter support)  Networking Features: PortShield, VLAN, L2 Bridge Modes supported  SonicOS with Application Firewall (enabled via services) NSA 240 Front NSA 240 Back Console Port 3 GbE Ports 6 FE Ports Card Slot for 3G/Modem Future Expandability USB ports Interface Status Monitor 3G Wireless Cards Multi-core Processor CategoryNSA 240 UTM 110 Mbps IMIX 195 Mbps VPN 150 Mbps Stateful 600 Mbps GAV 115 Mbps IPS 195 Mbps Conn/sec 2,000 Site-to-Site # 25/50 Total Connections 25,000/35,000 Total Connections UTM 12,500/17,500

Breaking Down Competitive Barriers  Industry leading UTM performance  Increased Threat Prevention Capabilities  Scans more protocols  RFDPI based Deep Packet Inspection  No file size limits  No concurrent session limits  Application Inspection and policy enforcement  Application Enforcement for better network efficiency  Flexible Network Redundancy  Ethernet/Ethernet/3G or Modem  Secondary Gateway for VPN  Optional Stateful High Availability SonicWALL CONFIDENTIAL All Rights Reserved *Firewall and VPN throughput measured using UPD traffic adhering to RFC Gateway AV/Anti-Spyware/IPS throughput measured using industry standard Spirent WebAvalanche HTTP performance test. Cisco, Juniper, Check Point, Fortinet and WatchGuard performance based on datasheet numbers. What makes the NSA 240 superior over the Competition?

Thank You!