SonicWALL Access Security Legacy & Current Themes

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
The Most Analytical and Comprehensive Defense Network in a Box.
Dell SonicWALL E-Class Secure Remote Access (SRA) Overview
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
MIGRATION FROM SCREENOS TO JUNOS based firewall
A Survey on Interfaces to Network Security
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Company Presentation September 15, CONFIDENTIAL.
Dell Connected Security Solutions Simplify & unify.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
Edge Security with Forefront Sandeep Modhvadia Security Specialist.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Blue Coat Cloud Continuum
BTC Network Systems A Division of Becerra Trading Company This Information is confidential and proprietary to BTC Network Systems BTC is an Information.
Reduce Risk Across Hybrid IT
Web Content Security Unlock the Power of the Web
Florian Malecki – International Product Marketing Director April 2016
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
CudaLaunch for Barracuda NG Firewall.
Hybrid Cloud Web Filtering Platform
Web Content Security Unlock the Power of the Web
Network Security Solution
Barracuda Web Security Flex
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Top 10 Strategic Technology Trends for 2013
Hybrid Management and Security
Cloud-First, Modern Windows Management and Security
Security managed from the cloud.
Microsoft Ignite /31/ :08 AM
Forefront Security ISA
Take Advantage of the Perfect Storm
How Smart Networks are Changing Corporate Networks
Zero-Code Solution on Azure Helps Businesses Optimize Processes with Automation and Agility “Implementing Azure has empowered us to help our customers.
Cloud Computing.
Data Protection & Security
2018 Real Cisco Dumps IT-Dumps
Company Overview & Strategy
Next-Gen CASB We are Bitglass, the total data protection company and a global CASB and agentless mobile security company based in Silicon Valley enabling.
Goals Introduce the Windows Server 2003 family of operating systems
Access and Information Protection Product Overview October 2013
Check Point Connectra NGX R60
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Top 10 Strategic Technology Trends for 2013
Technical Capabilities
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Agenda Need of Cloud Computing What is Cloud Computing
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
IT Management, Simplified
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

SonicWALL Access Security Legacy & Current Themes

First, A bit of history The 20 year evolution of aventail

The Aventail to SMA transition 1996 Aventail is founded by Evan Kaplan  2005 Netifice acquires Aventail Managed Services business 2006 Netifice and Megapath merge 2007 SonicWall acquires Aventail 2012 Dell acquires SonicWall 2015 GTT acquires Megapath Managed Services business 2016 SonicWall becomes independent again

20 Years Technology curve 1996 2003 2008 2016 Speed/Performance  50 Kbps 250 Kbps 2Mbps 200Mbps GPRS/ 2G 3G 4G/LTE 100MHz 3.2GHz Dual core 3 GHz Multi Core 4GHz

Evolution of SMA 2003-04 2008-09 2015-16 Key Features HW/SW Product Aventail EX750/ EX 1600 / EX2500 CPU - 2.4 GHz DDR 2GB /1GB/ 512MB SRA EX6000/ EX7000/ EX9000 CPU- 2GHz/2.1 GHz/ 2X2.4 GHz DDR – 1GB/2GB/32GB SMA 6200/7200 CPU - 3GHz, 4 cores DDR3 - 8GB/16GB Key Features SSL VPN Solution Endpoint Control Clientless Web-based access Unified Policy Engine Remote Access Service Advanced EPC Per App VPN App Access Control Access Security Solution Blended Cloud SSO with MFA Demand Based license pooling Global Traffic Optimization Google search engine – birth?(disruptive technologies), security posture with endpoint evolution. Smartphones Mobile 3G with HSPA+ BYOD Telecommuting Cloud transformation Mobility Internet of things Virtualization Disruptive trends Broadband Internet SSL VPN/Encryption IT Outsourcing

SMA innovation through the Years First one Terabit Global High Availability Cluster with integrated global traffic management First SSL VPN solution with global load balancing and pooled licensing First Application Access Control with digital signature verification of client applications First VPN deep packet inspection for access control via is SSL VPN First client device identity access control for mobile devices First mobile SSL VPN for smartphones First SSL VPN with Complete End Point Control for Mac Devices First vendor to deliver the name based routing using access policy resources via its SSL VPN First to combine the full functionality of an IPSec solution with the flexibility of SSL VPN First SSL VPN gateway to provide cross-platform End Point Control capabilities First SSL VPN to Secure PDAs First Leading SSL VPN with Full Clientless Access from a UNIX Machine First SSL VPN Solution 1997 2003 2007 2016

SMA Feature Maturity Time  End Point Control MDM HTML5 SaaS Applications CASB Sandbox MDM End Point Control Native Access HA Active/Passive Remote Assist Context Sharing Analytics APIs Introduction Growth Maturity Decline HTML5 Multi-tenancy

SMA Current Themes

SEVEN Core Themes for Access security Access Control Superior Security Global High Availability Advanced Authentication Intuitive User Experience Central Management and Reporting Extensibility

ACCESS CONTROL ACE Access Control Engine + EPC End Point Control + AAC App Access Control

FIPS 140-2 level 2 : ICSA SSL-TLS certified : Suite B Superior Security Advanced Ciphers Cryptography Select Layer 3 SSL VPN Security Certifications Layer 3-7 Application Proxy Advanced Ciphers Support Cryptography Support Layer 3 SSL VPN THREATS DETECTION + PROTECTION + PREVENTION FIPS 140-2 level 2 : ICSA SSL-TLS certified : Suite B

Global High Availability Scalable Performance Global Traffic Optimization Global Traffic Optimization (GTO) Scalable Performance Dynamic Pooled Licensing Dynamic High Availability Dynamic Licensing Dynamic High Availability G-HA + GTO + DPL

Advanced Authentication Cloud Single Sign On Multi Factor Authentication SAML Gatekeeper Authentication Repositories Kerberos Constrained Delegation Smartphones Tablets Laptops SSO with MFA + SAML + LDAP + RADIUS

Intuitive User Experience Clientless Access User Workplace Mobile OS Integration Session Persistence Secure Network Detection Single Paine of Glass WorkPLACE Portal

Real Time Health and License Consumption Monitoring Central Management & SONAR MONITORING Central Management (CMS) Global Patching SONAR Monitoring SIEM Integration Maintenance Scheduling User Reporting SIEM Integration Scheduler Real Time Health and License Consumption Monitoring

Management and Authentication APIs + Turnkey 3rd Party Integration Extensibility Management and Authentication APIs + Turnkey 3rd Party Integration

Thank you