Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.

Slides:



Advertisements
Similar presentations
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Advertisements

EarthLink Business IT Services. EarthLink Business IT Services Comprehensive IT and network services portfolio −Data center, virtualization, security,
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
LittleOrange Internet Security an Endpoint Security Appliance.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Department Of Computer Engineering
SiteLock Internet Security: Big Threats for Small Business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Securing Information Systems
[Name / Title] [Date] Effective Threat Protection Strategies.
Hacker Zombie Computer Reflectors Target.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Web Application Firewall (WAF) RSA ® Conference 2013.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
1 1 Hosted Network Security EarthLink Complete™ Data.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet regulatory compliance?
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Managed Security Service. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
Santa Clara, CA (408)
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Managed IT Services JND Consulting Group LLC
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
AT&T Premises-Based Firewall Enhanced SBS Solution
Data Center Firewall.
Introduction to Networking
Firewalls.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
G061 - Network Security.
Hosted Security.
AT&T Firewall Battlecard
Presentation transcript:

Managed Premises Firewall

2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances? How do I keep my cloud based servers, IT assets and MPLS network protected from malicious intruders and malware? How do I get my limited IT staff refocused on strategic revenue generating initiatives? How can I lower or eliminate the CAPEX and OPEX of deploying and managing multiple firewall devices at all my locations?

3 Security & Compliance Issues are Critical and Growing Approximately 80 percent of small businesses that experience a data breach go bankrupt or suffer severe financial losses within two years of a security breach. - Small Business Computing Magazine 93% of companies that have lost their data center for 10 days or more have filed for bankruptcy within one year. - U.S. National Archives and Records Administration Number of Breaches by Threat Type Source: Verizon 2014 Data Breach Investigations Report

4 These Headlines Are All-Too-Common

5 Cost of Security Compromises $5.85M - average cost of data breach in US, growing 15% over last year (IBM/Ponemon Institute 2014) – Average US lost business cost: $3.3M in customer turnover, increased customer acquisition activities, reputation losses and diminished goodwill $148M – cost of Target breach and ousted CEO (Forbes) 10 hours of unplanned downtime has potential cost from $125,000 for an SMB to as much as $17M for an enterprise firm (IDC) How much can you afford to lose? $ $

6 Concerned about protecting critical assets? Do you have a firewall? How old is it? Do you have VoIP traffic passing through the firewall? Who monitors your firewall? Do you have the time and expertise to ensure that your firewall policies are tested to ensure effectiveness? How are you protecting against new threats from the Internet? How and when do you implement vulnerability and system patches? Do you know if you any PC’s have unlicensed or unapproved software, and how do you monitor this? What regulatory requirements apply to your company’s handling of data? How do you ensure compliance? Has your company ever experienced any security breaches? What was the impact of the breach? If so, consider these questions: ? ?

7 Managed Security Services Benefits Peace of Mind – Minimize risk and protect your business’ mission-critical information Save Money – Lower operational costs and upfront capital expense associated with managing, monitoring and securing your infrastructure Make Your Life Easier – Comply with government and industry regulations through proactive security monitoring, documented security policies and procedures Save Time – Shift the burden of security management to EarthLink – On-demand reporting provides easy access and visibility to your critical business assets

Provides Unified Threat Management (UTM) Security experts on EarthLink staff support your business EarthLink proactively maintains latest security patches Protects against theft Protects your key business information assets 24/7 Reduces need for security experts on staff Eliminates maintenance and management of customer-owned firewall Improves network performance by blocking data from non-approved sites, applications and content Managed Premises Firewall

Select Managed Premises Firewall Package to Meet Your Needs Managed Premises Firewall Basic Package Premium Package Firewall with Stateful Inspection A firewall blocks attacks by inspecting traffic, keeping track of valid sessions across the network and filtering traffic that looks suspect so that it cannot pass into the network. xx Number of Sites A site can be a company location or it can be services located within a data center. EarthLink MPLS not required. Any number of locations Configuration backup and restore The configuration of your security device is backed up, so that in the event of hardware failure, the original configuration can be restored to a new device. xx URL Filtering URL Filtering uses a method called Whitelist and Blacklist for filtering. A whitelist is a list of URLs that are allowed. Conversely, a blacklist is a list of URLs that are denied. x Content Filtering Allows you to choose categories of websites to block at the firewall. This feature can be used to block or allow access to common Internet categories like Social Networking (e.g., Facebook, Google and MySpace) x Intrusion Detection System (IDS) IDS monitors network and/or system activities for malicious activities or policy violations and reports them, but does not stop them. x Antivirus/Malware/ Spyware Antivirus is used to prevent, detect and remove malware. Malware is software designed to secretly access a computer system without the owner’s consent. Spyware is a type of malware that can be installed on computers to collect small pieces of information about users without their knowledge. x Application Control Uses dynamic application identification engines that recognize applications based on their behavior. By coupling application control policies with sophisticated security features, you can achieve a more granular level of security at the individual application level or by managing categories of applications. x

10 Managed Premises Firewall Basic Package Includes: Firewall with stateful inspection NAT & PAT Benefits: Keeps track of the state of network connections Has the ability to identify legitimate packets for different types of connections Only packets matching a known active connection will be allowed to pass through the firewall Rejects all other packets Can be customized to allow or block ports and protocols

11 Managed Premises Firewall Premium Package Includes : Basic Package plus… URL Filtering (whitelist & blacklist) Web Content Filtering Intrusion Detection Service (IDS) and Intrusion Prevention Service (IPS) Anti-Virus, Anti-Malware, Anti-Spyware via scanning of data streams Benefits : Specify which websites should be accessible (whitelisted) or blocked (blacklisted) at the firewall using URL Filtering Choose categories of websites to block or allow at the firewall such as pornography, racism & hate, and arts & entertainment using Web Content Filtering. May also be set at category/sub-category level allowing for more granular security control Application Control to manage the type of applications that can access data outside the firewall. Permit or block non-approved application categories such as chat or peer-to-peer clients to improve productivity and protect valuable company information. Allow specific applications to operate through the firewall using Application Control even though the application category itself may be blocked The ability to identify malicious content within a data stream to both log and block via IPS The system detects, logs and blocks harmful software (malware, viruses & tracking software) from entering network

12 Why EarthLink? Security experts to help you mitigate risks, achieve and maintain industry compliance requirements while driving down the total cost of securing and managing your IT systems Private MPLS infrastructure and nationwide footprint Advanced features including Application Control, Antivirus/Malware/Spyware, Intrusion Detection System Personalized support from EarthLink’s IT consultants - an extension of your IT staff Online portal will consistently monitor your network and automatically open trouble tickets

13 EarthLink Managed Security Solutions Managed Security provides a comprehensive suite of security services to manage and protect your network assets – Managed Firewall Managed Premises Firewall Data Center Firewall – Secure Remote Access – PCI Solutions PCI Protect PCI Assist PCI Certify – Cloud Disaster Recovery