Copyright © Siemens Enterprise Communications GmbH & Co. KG 2009. All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee.

Slides:



Advertisements
Similar presentations
Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Advertisements

RiT PatchView Solution
Chapter 1: Introduction to Scaling Networks
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
Sales Guide for DES-3810 Series Aug 2011 D-Link HQ.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
IP EDGE DEVICES A solution for the Internet Migration Patrick Cocquet, 6WIND CEO, IPv6 Forum VP Dubai IPv6 Forum Summit – February 2001.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
The Most Analytical and Comprehensive Defense Network in a Box.
 Category 6 Ethernet Cable, Single-mode Fiber Cable, and RJ45 Jacks  APC Netshelter SX 48U Racks and NetShelter AV Roof Fan Tray 825mm  Cisco 3800 ISR.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Cisco Unified Wireless Network Webinar Commercial WLAN.
1 13-Jun-15 S Ward Abingdon and Witney College LAN design CCNA Exploration Semester 3 Chapter 1.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Khaja Ahmed Architect Windows Networking Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Meraki Overview Company and product introduction Brian Sellers Regional Sales Manager Austin, Texas (512) Fred Meek Systems.
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
IPv6 Deployment Plan The Global IPv6 Summit 2001.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
© 2011 Cisco and/or its affiliates. All rights reserved. 1 High Performance Network Analysis Enterprise Operate Practice Cisco Services Andrew Wojtkowiak.
Network Admin Course Plan Accede Institute Of Science & Technology.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Why and How to Manage your infrastructure lifecycle? David Baudrez Vertical.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Israel, August 2000 Eyal Nouri, Product Manager Optical-Based Switching Solutions Introduction to the OptiSwitch TM Solution.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Advancing the Carrier IP/MPLS Edge Routing Technology Group Cisco Systems, Inc. April.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
IS3220 Information Technology Infrastructure Security
EX SERIES SWITCHES KEEPING IT SIMPLE Ing. Stephen Attard Computime Ltd Senior Network Engineer.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Barracuda NG Firewall ™
REMOTE MANAGEMENT OF SYSTEM
A Solution for Every Network
Instructor Materials Chapter 1: LAN Design
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Media Conversion Solution
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Campus Communications Fabric
A Solution for Every Network
IS3120 Network Communications Infrastructure
A Solution for Every Network
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
A Solution for Every Network
A Solution for Every Network
A Solution for Every Network
A Solution for Every Network
Sales Guide DGS-1100 Series B1 D-Link HQ, July 2014
AT&T Firewall Battlecard
Presentation transcript:

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 1 Jun 09 Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG Enterasys Secure Networks Tamara Maksimovic CCNA-SEC, CCDA, CCNP ESSE-D, ESSE-NAC Technical Consultant

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 2 Jun 09 Enterasys-Who we are?  Originally founded as Cabletron Systems 25 years ago  Today we are part of a global joint venture with SIEMENS  Thousands of customers in more than 70 countries  100+ of the FORTUNE Global 500  Strong presence in government and higher education  Hundreds of global patents resulting from more than US $1 billion R&D investment  The perfect-sized company  We measure our success by your satisfaction  There is nothing more important than our customers  Deliver on our promises on-time, on-budget  95% of our customers would purchase from us again

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 3 Jun 09 What we do?  Enterasys delivers Secure Networks™ that ensure the confidentiality, integrity, availability and performance of IT services and the business users that rely on them  Ensure only the right users have access to the right information from the right place at the right time  Secure any network  “What you need, is what you get” policies based on identity  Protect financial and knowledge investments through open-architecture, standards-based technologies  Visibility and control of large and diverse enterprise networks  Backwards compatibility assures multi-generation useful lifecycle to accelerate ROI  Design, deploy, optimize, support and service integrated hardware and software solutions  Intelligently sense and automatically respond to security threats on your network  Proactively prevent threats from entering your network

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 4 Jun 09 Secure Networks™ Defined © 2008 Enterasys Networks, Inc. All rights reserved. 4 Management Software Centralized Visibility and Control IDS, IPS, NBA, SIEM and Network Access Control Advanced Security Applications Security-Enabled Infrastructure Switches, Routers, Wireless

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 5 Jun 09 Page 5 Open Communications Portfolio

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 6 Jun 09 Page 6 Enterasys Networks Portfolio Switches Premium Core and Distribution Secure Core Routers Routers WAN VPN / Firewall Security-Enabled Infrastructure Switches, routers and wireless Industrial Switches Centralized Command & Control Advanced Management Management SNMP Event Management Control and Inventory Security policies and visibility Quality of Services in one touch CSIRT - Incident respond team Automation and searches automatically Advanced Security Applications Compliance and Security Network Access Control - NAC Compliance and audit Logs Correlation (SIEM) Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Behavioral Analysis (NBAD) Remediation and Assessment Edge Switches Wireless

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 7 Jun 09 Page 7 SecureStack A2 Series Convergence Multi classification in layers 2/3/4 Differentiated Services (DiffServ) 8 priority queues per port Management of queue Strict Priority and WRR Connectivity 8 units per stack of switches closed-loop stacking via RJ45 Redundancy of management Redundant Power Supply (optional) Power over Ethernet IEEE 802.3af MAC Address Spanning Tree (802.1d, 802.1w, 802.1s) 1024 VLAN 802.1Q Link Aggregation 802.3ad Remote Monitoring (RMON) Compliance Identity and user authentication Authentication 802.1x and MAC (RFC3580) Integration with NAC Solution MAC Locking per port dynamic and static

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 8 Jun 09 Page 8 SecureStack B Series Convergence Multi classification in layers 2/3/4 Differentiated Services (DiffServ) 8 priority queues per port Management of queue Strict Priority and WRR Connectivity 8 units per stack of switches Dedicated closed-loop stacking Redundancy of management Redundant Power Supply (optional) Power over Ethernet IEEE 802.3af MAC Address Spanning Tree (802.1d, 802.1w, 802.1s) 1024 VLAN 802.1Q Link Aggregation 802.3ad Remote Monitoring (RMON) Compliance Identity and user authentication Authentication 802.1x, MAC, and PWA (optional) Integration with NAC Solution Secure Policies through Secure Networks (optional)

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 9 Jun 09 Page 9 SecureStack C Series Convergence Multi classification in layers 2/3/4 Differentiated Services (DiffServ) 8 priority queues per port Management of queue Strict Priority and WRR Connectivity 8 units per stack of switches Dedicated closed-loop stacking Redundancy of management Redundant Power Supply (optional) Power over Ethernet IEEE 802.3af Routing IPv4 e IPv6 RIP, OSPF, VRRP, DVMRP, PIM e IGMP MAC Address Spanning Tree (802.1d, 802.1w, 802.1s) 1024 VLAN standard 802.1Q Compliance Identity and user authentication Authentication 802.1x, MAC, and PWA Integration with NAC Solution Secure Policies through Secure Networks

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 10 Jun 09 Page 10 D-Series Convergence Multi classification layers 2/3/4 Differentiated Services (DiffServ) 8 priority queues per port Queue management Strict Priority e WRR Connectivity Compact Switch with low noisy mechanism Recommended for classroom and meeting room Works in high temperature up to 60 ºC (50 ºC PoE) Redudant power supply (optional) Power over Ethernet (PoE) IEEE 802.3af MAC Address Spanning Tree (802.1d, 802.1w, 802.1s) 1024 VLAN 802.1Q Link Aggregation 802.3ad Remote Monitoring (RMON) Compliance Identity and user authentication Authentication 802.1x, MAC, and PWA (optional) Integration with NAC Solution Secure Policies through Secure Networks

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 11 Jun 09 Page 11 G-Series Convergence Multi classification layers 2/3/4 Differentiated Services (DiffServ) 8 priority queues per port Queue management Strict Priority e WRR Connectivity Switch-router – type modular 3 expansion slots Swappable redundant power supplies Support up to 96 GbE ports or up to 12 10GbE + 24 GbE Power over Ethernet (PoE) IEEE 802.3af Routing IPv4 e IPv6 RIP, OSPF, VRRP, DVMRP, PIM e IGMP MAC Address Spanning Tree (802.1d, 802.1w, 802.1s) 1024 VLAN 802.1Q Compliance Identity and user authentication Authentication 802.1x, MAC, and PWA Integration with NAC Solution Secure Policies through Secure Networks

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 12 Jun 09 Page 12 Limited Lifetime Warranty “Enterasys Networks supports the limited lifetime warranty for products SecureStack, G-Series and D-Series” The limited lifetime warranty cover until 5 years after EOSL the following: Switches Power Supplies FAN Trays Stack cables Advanced Replacement For some regions (please contact your local distributor) Software and phone support are included Bugs and fixes New features (not all, please contact ETS GTAC) Phone support

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 13 Jun 09 Page 13 Matrix N Series Convergence High multi-frame classification layers 2/3/4 Full TOS and Differentiated Services (DiffServ) From 4 to 16 priorities queues per port Management queue Strict Priority and WRR Connectivity Modular chassis switch-router Distributed architecture Resiliency and high availability (N+6) Diversity: + 30 modules types Power over Ethernet (PoE) IEEE 802.3af Routing IP Unicast and Multicast RIP, OSPF, VRRP, DVMRP, PIM, IGMP, PBR Spanning Tree (802.1d, 802.1w, 802.1s) 4094 VLAN 802.1Q Flow Based Architecture, including NetFlow Compliance Identity, user and multi-user authentication Authentication 802.1x, MAC and PWA Integrated NAC Solution Secure Policies through Secure Networks

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 14 Jun 09 Page 14 SecureSwitch I-Series Connectivity Standalone industrial switch Very robust support: High temperature, vibration, impact and energy Support International Protection (IP) Rating 50 Redundant DC Power Supply Class 1 Division 2 Spanning Tree (802.1d, 802.1w, 802.1s) 802.1Q Link Aggregation 802.3ad Convergence Multi classification in layers 2/3/4 Differentiated Services (DiffServ) 8 priority queues per port Management of queue Strict Priority and WRR Compliance Identity and user authentication Authentication 802.1x, MAC, and PWA Integration with NAC Solution Secure Policies through Secure Networks

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 15 Jun 09 Page 15 Matrix X Series – Secure Core Router Convergence Protocol classification layers 2/3/4 IP TOS and Differentiated Services (DiffServ) Min 8 priority queue per port Management queue SPQ, WFQ e Best Effort Connectivity Modular chassis crossbar architecture Distributed architecture with high performance forwarding mechanism High density of 10GbE ports Resiliency, high availability in hardware and software Firmware hitless and virtual operation “non-stop” Routing IP unicast e multicast RIP, OSPF, BGP, VRRP, DVMRP, PIM e IGMP Spanning Tree (802.1d, 802.1w, 802.1s) 1024 VLAN 802.1Q Compliance High availability for critical mission networks DDoS protection embedded QoS on demand for applications Business continuity architecture

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 16 Jun 09 Page 16 XSR Security Router Series Convergence Services classification Differentiated Services (DiffServ) Management queue WFQ e Class Bases WFQ Traffic management TD, RED, WRED Connectivity Routers with high performance “Stateful” Firewall (optional) VPN support client-to-site and site-to-site with hardware acceleration (optional) Critical mission QoS for WAN applications Diversity of WAN interfaces Routing IP Unicast and IP Multicast RIP, OSPF, BGP, VRRP, PIM, IGMP, PBR, NAT Routing and VLAN tagged decision Remote Auto Install Compliance Security policies enabled “Stateful” Firewall VPN Hardware Acceleration URL filters

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 17 Jun 09 Page 17 HiPath Wireless Convergence Effectively serve convergence needs for multiple vertical industries VoWLAN optimized - End to end high quality and secure voice Fixed Mobile Convergence (FMC) feature set Connectivity Indoor and Outdoor solution Centralized management and user location High Availability and high density of WIFI users Solution for medium and large WIFI networks WIDS and Rogue detection Access Points a/b/g /n available LAN-TO-LAN and BSS Infrastructure RF Planning Centralized multi-Controller management platform for large wireless networks Compliance User identity and authentication HiGuard security Comprehensive defense against WLAN security threats Traffic routed through the Controller or locally - always perform encryption and QoS

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 18 Jun 09 Page 18 NetSight ® Management Suite Convergence QoS Provisioning: Multi-frame classification layer 2/3/4 Differentiated Services (DiffServ) and CoS Compliance documentation report Connectivity Interactive GUI SNMP for management Dynamic topology map L2 and L3 Event, alarm and CSIRT management User and devices location Customizable windows to manage (Flex View) VLAN configuration 802.1Q Protocol Configuration Spanning Tree, CDP, GVRP, FST, SpanGuard,... Statistics, reports and visibility Inventory, backups and upgrades Compliance Network Access Control - NAC Support Secure Networks™ Architecture Guest management wired and wireless Port Web Authentication for dummies Network Access ControlManagement SNMPSecure Policies Patches S.O. Anti-vírus Firewall 

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 19 Jun 09 Page 19 Enterasys Network Access Control Convergence Ip phone and camera authentication Auto-QoS for all devices in the network Automatic traffic shaping Auto discovery from convergence devices Connectivity Infrastructure integration – easy to use Based on RFC 3580, 802.1x, MAC Authentication, Subnet Authentication and WEB Authentication to deploy pre and pos control and authorization Ip phone auto-authentication and QoS provisioning up to 3000 devices per appliance Agent based or agent less embedded Secure Networks on demand and centralized reporting for all network Where, when and who is accessing the network Remediation Services embedded Compliance Compliance for all devices in the network Assessment embedded, including dissolvable agent for guest users Auto remediation and risk reporting Network Access Control Patches S.O. Anti-vírus Firewall 

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 20 Jun 09 Page 20 Dragon Intrusion Detection and Prevention Convergence H323 and SIP dynamic inspection Anomaly, signature and protocol baseline analysis DDoS protection for convergence systems Reporting of use for convergence devices Connectivity Intrusion Detection and Prevention Systems Library with Signatures Multiples models and systems integration Management and configuration through GUI Packet capture and forensic analysis Rebuilding TCP sessions for forensic analysis Virtual sensors at same hardware appliance VLAN, IP Subnets, TCP/UDP well-know ports and physical ports Many response actions: Snipping, Shunning, DIR (ASM integration) Compliance Acceptable use policy for device, IP subnets and users Security all-in-one for CSIRT Collets evidences and perform forensic analysis Security Reporting easy to use Threat Notification! Action: Deny traffic

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 21 Jun 09 Page 21 Dragon Security Command Console – DSCC Incidents Management Advanced incident drill down management: IP Address, user, event, date and hour Magnitude evaluation Automate Incident Response (ASM integration) Features GUI interactive monitoring Security log and security correlation: Support kind of logs Parsing and log customization Security risk management Security offense management Security Incident evaluation (credibility, relevance and severity) Behavioral analysis for network, based on security events, IDS/IPS integration and xFLOW One click management Compliance Reporting Customizable security reporting Templates of reports and regulation: SOX, BASE II, HIPPA, CoBIT,... Weekly reporting and notification Behavioral Analysis Dashboard (Overview) CSIRT Incident Response Compliance Reporting

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 22 Jun 09 Page 22 Security Information & Event Manager (SIEM) Operation Systems Applications Firewalls IDS/IPS Switches Routers Flow Sensors NormalizeOrganizeFilterCorrelation PrioritizeVisibility Behavioral Management Dashboard (Overview) Incident Management Compliance Reporting NetFlow J-Flow Q-Flow

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 23 Jun 09 Enterasys Unique Sales Points  Our solutions are uniquely capable of improving operational efficiencies  Open standards-based, interoperability protects existing financial and knowledge investments  Save money, time and people through centralized management visibility & control  Supports rapid change for dynamic business environment (new applications, new security threats)  Cost-effective technology that is less expensive than Cisco  Greener to operate  Lower startup cost  Lower operational cost  Lower overall support cost  More consistent and efficient way to provision IP services

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 24 Jun 09  Industry leader in network integrated security and control solutions  Security solutions aimed at achieving business oriented objectives  Security built into the data switches – more for their money!  Identity-based networking by user, device, and application  Future proof, open standards based architecture  Scalable, high performance solutions Enterasys Unique Sales Points

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 25 Jun 09  Enterasys world class service and support  Focused, industry-leading data networking sales and support teams  Full suite of Educational, Professional, and Technical Support services available  Completely in-sourced technical assistance center with an average tenure of +10 yrs supporting Enterasys solutions  Emphasis is on solving your customer problems, not passing them to someone else Enterasys Unique Sales Points

Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG SEN CMC BOM For internal use only Page 26 Jun 09 You can right now! Copyright © Siemens Enterprise Communications GmbH & Co. KG All rights reserved. Siemens Enterprise Communications GmbH & Co. KG is a Trademark Licensee of Siemens AG