Network Security for the Distributed Enterprise January 2011.

Slides:



Advertisements
Similar presentations
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
Advertisements

Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Confidential and Proprietary May 7, 2015 Real-Time Data Where You Can Use It.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
©2015 EarthLink. All rights reserved. EarthLink Secure WiFi™ Connect with customers and empower employees.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hosted Exchange 2010 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses Web Site:
Secure Computing Network
Citrix Partner Update The Citrix Delivery Centre.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Copyright all rights reserved Smartvue Corporation VIDEO SURVEILLANCE BUILT FOR IT TM.
Netop Remote Control Trusted. Secure. Experienced.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
EDUCAUSE Security 2006 Internet John Brown University.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Banking Clouds V International Youth Banking Forum.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
PCI DSS Managed Service Solution October 18, 2011.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Network Techlab (India) Pvt. Ltd.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
ShareTech 2015 Next-Gen UTM.
Joseph Ferracin Director IT Security Solutions Managing Security.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Vantage Report 3.0 Product Sales Guide
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
1 1 Hosted Network Security EarthLink Complete™ Data.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Wireless Intrusion Prevention System
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
IS3220 Information Technology Infrastructure Security
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Avtec Inc Virtualization - Securely Moving to the Cloud.
OIT Security Operations
Avenues International Inc.
Work on the Fly Hosted Solutions for Timeslips Customers
Barracuda Web Filtering Service
The Impact of Cloud Technology on Multi-Unit Operators
Breaches by Merchant Type
Tailor slide to customer industry/pain points
ISMS Information Security Management System
Check Point Connectra NGX R60
Cloud Security for Endpoints
AT&T Firewall Battlecard
Presentation transcript:

Network Security for the Distributed Enterprise January 2011

Market Focus  Lots of mid to large enterprises benefit from Cybera’s solutions  Retail and restaurant chains use Cybera to help make their stores PCI compliant  Sold direct, and through channel partners such as security VAR’s and system integrators 2 PARTIAL CUSTOMER LIST

Industry Leadership  Member of PCI Security Standards Council  Several other industry associations  Product and growth recognition: – Inc. 5000: 2007, 2008, 2009, 2010 – Deloitte Technology Fast 500: 2009, 2010 – NACStech Expo Trends: 2010 – Entrepreneur Magazine Hot 100: 2006 – Numerous local industry, growth, and culture awards  Partnered with industry leading technology vendors 3

4 4 The Multi-site Enterprise Problem: Network security is not easy  Today, every enterprise network must be secure –As security threats have grown, so have the security requirements –Regulations like PCI and HIPAA now mandate security solutions at all sites  Most security technologies only solve one piece of a larger puzzle –Customers are forced to buy and integrate several systems from different providers  Security solutions are constantly changing as new threats evolve –Customers are fed up with buying security hardware and software that could be obsolete as soon as a new type of threat emerges or a regulation is changed –Security system vendors have historically all sold hardware and software as an upfront cost, which is contrary to customers’ needs

5 5 4 Elements of Remote Security  In order to make a remote site secure, customers are buying products from 4 different categories  No single provider integrates all elements  Each customer bears responsibility for integration and management of disparate systems  For most multi-site enterprises, data and Network security is not a core competency, requiring them to hire or contract expensive security experts Security Appliance Firewall IDS / IPS Secure Wireless / IDS Secure Wi-Fi LAN Hotspots Wireless IDS/Scanning VPN / RAS Service Site-to-Site connectivity Client-based RAS SIEM Security Logging / Alerting Event Analysis / Alerting

6 6 The Solution: Cybera offers ONE solution to all 4 Security Categories  ONE integrated solution –Addresses all 4 elements of remote site security –Eliminate costs of integration and management  Reduce remote site security costs by 80% or more  All hardware and software provided as a service –Annual subscription fee -> no upfront capital costs –Protection from obsolescence  Cloud-based systems allow long term scalability –Easy to adapt to new security threats and requirements –Upgrades done centrally, not on remote hardware

7 7 Economics of Cybera ONE 1st YearAdd'l Year Firewall/IDS Appliance$60,000$12,000 Secure Wireless System with IDS/Scanning$120,000$24,000 VPN Concentrators/Data Center$50,000$10,000 SIEM Software/Servers$20,000$10,000 7 X 24 X 365 Security Expertise (2 Staff)$200,000 $450,000$256,000 Cybera ONE Solution (List Price)$79,500 Savings82%69% 100 Site Example  Including total cost for a 100 site enterprise, Cybera ONE is 82% less in year one and 69% less each successive year  More than $700K savings over 3 years

Confidential & Proprietary External Scanning Firewall OSS LDAP SYS LOG PKI CERT RADIUS TACACS IDS/IPS Content Filtering Anti-Virus / Anti-Spam Rogue Wireless Detection HEADQUARTERS Private / Public Wi-Fi Logging and Archiving SIEM Configuration Management Monitoring & Utilization Security Appliance DSL/Cable SSL-VPN Termination  Restaurant  Retail  Convenience Store Cybera Service Delivery Architecture IN-STORE KIOSKS SURVEILLANCE POINT OF SALE PAYMENT PROCESSING Gateway Services REMOTE ACCESS INTERNET REMOTE LOCATIONS Internet 8 Manager’s PC Point of Sale Back- office Secure Wireless VPN / RAS Services Cloud Based SIEM

9 9 A Better Security Appliance  Integrated firewall and intrusion protection –Full-service secure gateway between private and public networks –LAN segmentation to support multiple secure zones  Hardware appliance provided as annual service –No capital cost –No risk of obsolescence  No effort for end users –Simple, plug and play installation –Automated configuration and updates as part of service –Cybera monitors, manages, and troubleshoots any issues 7 X 24 X 365 –Overnight replacement included as part of service Cybera SCA Series Security Appliance

10 Better Wireless Security  Full-service Wi-Fi access point –Supports secure Wi-Fi LAN’s –Secure public Wi-Fi for guest access hotspots  Wireless Intrusion Protection –Scanning for all access points and clients using a/b/g/n across 2.4 & 5Ghz bands –Solves rogue wireless detection for PCI compliance  Integrated cloud-based services included –Wi-Fi includes web-filtering, user access controls, and splash page hosting –Wireless IDS logs analyzed by Cybera’s hosted SIEM  No effort for end users –Simple, plug and play installation –Automated configuration and updates –Fully monitored and managed 7 X 24 X 365 –Overnight replacement included Secure Wireless Rogue Wireless Detection Logging and Archiving Hosted SIEM

11 Cloud-based VPN  Managed VPN service in the cloud –No need to buy concentrators or build complex network infrastructure –SSL-based VPN connectivity with 128 and 256 bit encryption –Built-in multi-factor authentication –7 X 24 X 365 monitoring with automatic notification of outage  3 rd party application gateways –Connect directly to payment processors to save cost –Reduce PCI scope since payment transactions bypass corporate data centers  VPN integration with other cloud based security services –SSL Remote access services for user connectivity –Cloud-based web-filtering, firewall, Intrusion protection, anti-virus, anti-spam VPN and RAS Services Managed VPN Remote Access Headquarters Manager’s PC Point of Sale Back- office IN-STORE KIOSKS SURVEILLANCE POINT OF SALE PAYMENT PROCESSING Gateway Services REMOTE ACCESS INTERNET

12 Cloud-based SIEM  Hosted Security Information and Event Management (SIEM) –No need to buy enterprise software or server / storage infrastructure –Automated correlation with common vulnerability databases –Addresses log review and retention requirements for PCI compliance  Alerting and Reporting –Severity based alerting on threats and rogue devices –Remote logging and archiving –Online reporting for all locations  No effort for end users –No setup or configuration –Eliminates software and hardware maintenance Cloud-based SIEM SIEM Online Portal Logging and Archiving Manager’s PC Point of Sale Back- office MALICIOUS THREATS HACKERS

Getting Started Learn more about Cybera’s Security and Compliance solutions for distributed enterprises and start saving today! Enterprise Sales Paul Melton, VP Sales O: (727) M: (615) E: 13