Solutions Road Show 2014 March’ 2014 | India Protection from Next Gen Threats Pralobh Menon Sales Engineer DELL SonicWALL (South) Pralobh Menon Dell India.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Enabling business beyond the corporate network.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
RSA Media & Analyst Briefing March 2-4, The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger 2 Changing WorldBusiness Priorities.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Dell SonicWALL E-Class Secure Remote Access (SRA) Overview
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Challenges in Network Security 2011 SonicWALL Inc.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
SonicWALL WXA – WAN Acceleration
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Dell SonicWALL Firewall Selling Services & More. 2 SonicWALL Confidential Beyond Firewall – Transform & Extend Firewall appliances “Platform” Firewall.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Fortinet An Introduction
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
Objective  CEO of a small company  Create a small office network  $10,000 and $20,000 Budget  Three servers (workstations)  Firewall device  Switch.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security fundamentals Topic 10 Securing the network perimeter.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Synchronized Security Revolutionizing Advanced Threat Protection
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Security fundamentals
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Network Security Solution
Barracuda Web Security Flex
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
SonicWALL Access Security Legacy & Current Themes
Prevent Costly Data Leaks from Microsoft Office 365
Check Point Connectra NGX R60
Virtual Private Network
AT&T Firewall Battlecard
Presentation transcript:

Solutions Road Show 2014 March’ 2014 | India Protection from Next Gen Threats Pralobh Menon Sales Engineer DELL SonicWALL (South) Pralobh Menon Dell India Pvt Ltd

2 Solutions Road Show 2014 March’ 2014 | India Confidential DELL SonicWALL solutions 1. Next Generation firewalls 2. Secure Remote Access (SSL-VPN) 3. Reporting & Management

3 Solutions Road Show 2014 March’ 2014 | India Confidential Mobile Connect Secure remote access security Policy & management Hosted Mobile Connect Network security Dell SonicWALL Product Portfolio Clean wireless – SonicPoint-N Series WAN acceleration

4 Solutions Road Show 2014 March’ 2014 | India Confidential Dell SonicWALL Firewalls

5 Solutions Road Show 2014 March’ 2014 | India Confidential Dell SonicWALL NGFW lineup SuperMassive E10800 SuperMassive E10400 SuperMassive E10200 SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 SMB/campus/branch Enterprise, data center Dell SonicWALL SuperMassive Series NSA 6600 NSA 5600 NSA 4600 NSA 3600 NSA 2600 NSA 250M/220 Dell SonicWALL NSA Series TZ 215 TZ 205 TZ 105 Dell SonicWALL TZ Series

6 Solutions Road Show 2014 March’ 2014 | India Confidential Looking at the box - Front

7 Solutions Road Show 2014 March’ 2014 | India Confidential Looking at the box - Back

8 Network Traffic Visualization Real-time Traffic Breakdown User Traffic Consumption Identify P2P Traffic Bandwidth Breakdown App Traffic Drilldown

9 Solutions Road Show 2014 March’ 2014 | India Confidential Dell SonicWALL next-generation firewall Unacceptable Apps Acceptable Apps Critical Apps Malware Blocked Application Chaos Ingress Reassembly-Free Deep Packet Inspection Egress Cloud-Based Extra-Firewall Intelligence Users/Groups Policy Identify By Application - Not by Port & Protocol By User/Group -Not by IP By Content Inspection -Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts

10 Solutions Road Show 2014 March’ 2014 | India Confidential Application Intelligence

11 Solutions Road Show 2014 March’ 2014 | India Confidential Advanced App Control Application Library with over 4235 unique Application Uses Granular Control Allow Facebook, Block BitTorrent Allow Chat, Block File Transfer - Group/User Based - Schedule Based - Exceptions

12 Solutions Road Show 2014 March’ 2014 | India Confidential Geo-IP Filter Confidential 12 Block traffic from Hostile Countries

13 Solutions Road Show 2014 March’ 2014 | India Confidential SonicWALL On-Board DPI Security Services Intrusion Prevention Gateway Anti-Virus Gateway Anti-Spyware Cloud-AV Content/URL Filtering DPI SSL (SSL Inspection) Application Intelligence & Control Application Visualization Comprehensive Anti-Spam

14 Solutions Road Show 2014 March’ 2014 | India Confidential NGFW Wire & L2 Bridge Mode Deployment NGFW insertion into a network with an existing gateway firewall Layer 2 Bridge or Wire Mode Deployment Discover application usage & threats leaking through the traditional firewall Before After

15 Solutions Road Show 2014 March’ 2014 | India Confidential Next Generation Firewall (NGFW) Breaks the malware cycle Compromised “Good” Site Malware Hosting Site Page Visit Malware Request Exploit Malware SSL Decryption URL Filtering Intrusion Prevention Network Anti-Virus Cloud Anti-Virus Botnet Filtering

16 Solutions Road Show 2014 March’ 2014 | India Confidential Introducing the SuperMassive 9000 Series Industry leading power, space, and cooling all in an elegant 1 rack unit design. The NGFW specifically engineered for 10Gb+ enterprise networks. Capable of scaling to meet the high DPI performance and low latency demands of the world’s largest data centers and carriers. The NGFW is designed to deliver deep security to your enterprise at multi- gigabit speeds Industry leading performance and PSC in an elegant, 1RU design

17 Solutions Road Show 2014 March’ 2014 | India Confidential Performance 9.7 Gbps IPS & Application Control 20 Gbps Firewall Throughput 5 Gbps Threat Prevention 32x1.2 Ghz, 32 GB Ram 8 Gbps IPS & Application Control 20 Gbps Firewall Throughput 4.5 Gbps Threat Prevention 32x1.2 Ghz, 16 GB Ram 5.0 Gbps IPS & Application Control 10 Gbps Firewall Throughput 3.5 Gbps Threat Prevention 24x1.0 Ghz, 8 GB Ram SuperMassive 9600 SuperMassive 9400 SuperMassive 9200

18 Solutions Road Show 2014 March’ 2014 | India Confidential Performance 4.5 Gbps IPS & Application Control 12 Gbps Firewall Throughput 3 Gbps DPI Throughput 24 x 1Ghz, 4 GB RAM 3 Gbps IPS & Application Control 9 Gbps Firewall Throughput 1.6 Gbps DPI Throughput 10 x 1.3Ghz, 4 GB RAM 2 Gbps IPS & Application Control 6 Gbps Firewall Throughput 800 Mbps DPI Throughput 8 x 1.1Ghz, 2 GB RAM 1.1 Gbps IPS & Application Control 3.4 Gbps Firewall Throughput 500 Mbps DPI Throughput 6 x 800Mhz, 2 GB RAM

19 Solutions Road Show 2014 March’ 2014 | India Confidential Multicore E10200 E10400E Cores 48 Cores 96 Cores

20 Solutions Road Show 2014 March’ 2014 | India Confidential Top Deployments 1. Traditional NAT Gateway with Security & Remote Access 2. High Availability Modes – Active/Passive with State Synchronization – Active/Active DPI with State Synchronization – Active/Active Clustering 3. In-Line Deployments: Wire mode or Layer 2 Bridge Mode, Tap Mode – Easy Network Insertion, no network re-numbering 4. “Clean Wireless” Deployment – Firewall as a wireless controller – DPI on all wireless traffic 5. “CleanVPN” Deployment – Firewall as a VPN Concentrator – DPI on all incoming VPN traffic 6. VPN Concentrator for Distributed Enterprise – Global Management System (GMS) to provision and manage branch offices – Connectivity through central SuperMassive or E-Class NSA firewall – All security done at the central site 7. Network Segmentation (Security Zones) – Network Segmentation via VLAN & Security Zones – Different Security policies for each Security Zone

21 Solutions Road Show 2014 March’ 2014 | India Confidential Flexible Wire Mode Deployment Bypass  Inspect  Secure  Allows for the quick and relatively non interruptive introduction of SuperMassive into a network (ie: between a core switch and a perimeter firewall, in front of a VM server farm, at a transition point between data classification domains).  Inspect Mode provides full visibility & low-risk, zero-latency packet path.  Secure Mode is the progression of Inspect Mode, actively interposing active control into the packet processing path.

22 Solutions Road Show 2014 March’ 2014 | India Confidential Secure Remote Access

23 Solutions Road Show 2014 March’ 2014 | India Confidential E-Class Secure Remote Access Series Secure Remote Access Series Dell SonicWALL Secure Remote Access SRA EX7000SRA EX6000 Virtual Appliance SRA EX9000 Detect – granular end- point control detects identity and security state Protect – unified policy limits user access to authorized applications only Connect – smart access and tunneling ensure easy, secure access to all network resources Secure remote access for all users, devices and applications Connect Mobile Spike License Secure Virtual Assist Advanced Reporting Native Access Modules Mobile Connect End Point Control SRA 1200Virtual ApplianceSRA 4200 Secure Virtual Access Web App Firewall Secure Virtual Assist Spike LicenseMobile Connect End Point Control Secure Virtual Meeting

24 Solutions Road Show 2014 March’ 2014 | India Confidential Internal Users Perimeter is starting to Fade. Mobility trends are putting endpoints Increasingly Out of IT Control Day Extenders Home Office Users Traveling Executives Kiosks/Public Machine Users PDA & Smart Phone Users Wireless LAN Users VOIP Users Business Partners/ Extranet Users Saas, Web 2.0 Real-Time Apps

25 Solutions Road Show 2014 March’ 2014 | India Confidential The Dell SonicWALL Aventail approach to Secure Remote Access Business Partner from any Browser Customer/Supplier Behind a Firewall Extranet Access Internal Users Internal Access Dell SonicWALL SSL VPN Solution Traveling Employee Day Extender Employee at a Kiosk Employee Using a Wireless Hotspot Remote Access Employee Smart Phones/ Tablets Protect applications with granular access control based on user identity and device integrity Detect what is running on the end point device Connect users securely and easily to applications on any device Connect Web Apps Client/Server Apps File Shares Databases VoIP VDI Infrastructure ApplicationsDirectories Corporate Perimeter LDAP AD RADIUS LDAP DetectProtectConnect

26 Solutions Road Show 2014 March’ 2014 | India Confidential WorkPlace access: Access to web-based and client/ server applications from virtually any device. Connect: Smart access to unmanaged devices Welcome to the myCompany Remote Access Portal

27 Solutions Road Show 2014 March’ 2014 | India Confidential Detect: EPC for iOS/Android Devices EPC options for iOS Determine jailbreak status DeviceID (Based on the UDID of the iOS device) Certificate enforcement OS version control EPC options for Android Determine root status DeviceID (Based on the IMEI of the Android device) Certificate enforcement OS version control Enforcement of anti-virus

28 Solutions Road Show 2014 March’ 2014 | India Confidential Connect: Dell SonicWALL Mobile Connect Unified client app supporting SSL VPN connectivity to the E-Class SRA, SRA and Next-Generation Firewall solutions Determine if the device is Jailbroken or rooted (E-Class SRA Only) Unified policy controls to limit access from Android or iOS enabled devices Easily downloadable from Google play or App Store for iOS iOS Android Dell SonicWALL SSL VPN Solution Web Apps Client/Server Apps File Shares Databases VoIP VDI Infrastructure ApplicationsDirectories Corporate Perimeter LDAP AD RADIUS LDAP Internet

29 Solutions Road Show 2014 March’ 2014 | India Confidential Mobile Connect for iOS / Android Dell Aventail E-Class SRA Appliances Dell SonicWALL SRA Appliances Dell SonicWALL Next- Generation Firewalls Step 1: Download Mobile Connect Step 2:Install Mobile Connect Step 3: Configure SSL VPN Connection

30 Solutions Road Show 2014 March’ 2014 | India Confidential Management and Reporting

31 Solutions Road Show 2014 March’ 2014 | India Confidential Management and reporting Scrutinizer Flow Analytics for SonicWALL firewalls, 3 rd party routers, switches, firewalls Analyzer Reporting & Analytics for SonicWALL firewall, CDP, and SRA appliances GMS 7.0 Reporting & Analytics, Policy Management, Monitoring for SonicWALL firewall, CDP, SRA, security appliances

32 Solutions Road Show 2014 March’ 2014 | India Confidential GMS 7.0 & Analyzer – Application traffic analytics Trouble shooting, forensics, app usage reports for customers.

33 Solutions Road Show 2014 March’ 2014 | India Confidential GMS 7.0 & Analyzer – User centric reporting Web sites visited Client VPN sessions Applications Used Bandwidth Usage

34 Solutions Road Show 2014 March’ 2014 | India Confidential 3 rd Party Validation

35 Solutions Road Show 2014 March’ 2014 | India Confidential The NSS Security Value Map Summary of 2013 NGFW testing results from Classification -Recommended -Caution -2xNeutral Final Product Rating near the name of the product Lines signify corrections due to major failures - No line = No Major Failure

36 Solutions Road Show 2014 March’ 2014 | India Confidential UTM Firewall 2012 Magic Quadrant (March 2012) – SonicWALL was positioned in the Leaders Quadrant for 2012 Fast-Forwarding Firewall Face-Off (April 2012) – Best Overall Performance for NGFW – Best Overall Performance for UTM – Best Overall Performance for SSL Decryption

37 Solutions Road Show 2014 March’ 2014 | India Confidential Q&A

38 Solutions Road Show 2014 March’ 2014 | India Confidential Thank You