All-In-One Security Overview The most benefits for your dollar, period.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Introducing Quick Heal Terminator.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
AVG Internet Security 7.5 Product presentation.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Designed By: Technical Training Department
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Norman Endpoint Protection Advanced security made easy.
Astaro Overview – Page 2 © Astaro 2008 Agenda  Internet Security today  Astaro Company Overview  Astaro Product Overview  Summary  Appendix - Astaro.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Small Business Edition 4 C707 – Technical overview.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Simplifying , Web & Network Protection. Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Securing Information Systems
Barracuda Load Balancer Server Availability and Scalability.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
ShareTech 2015 Next-Gen UTM.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Honeypot and Intrusion Detection System
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for Security and Virtual Private Network.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Astaro Security Gateway V7.5 Screenshots. Astaro Overview – Page 2 © Astaro 2009 Dashboard.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Sophos Central for partners and customers: overview and new features
BUILD SECURE PRODUCTS AND SERVICES
Security Unit 1 Business skills for e-commerce
UTM Content Security Gateway
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Real-time protection for web sites and web apps against ATTACKS
Securing the Network Perimeter with ISA 2004
Implementing Client Security on Windows 2000 and Windows XP Level 150
Test 3 review FTP & Cybersecurity
Features Overview.
AT&T Firewall Battlecard
Presentation transcript:

All-In-One Security Overview The most benefits for your dollar, period.

Astaro Overview – Page 2 © Astaro 2008 Agenda Topics for Cover Today  Internet Security Today  What is UTM and Why Do I Need It?  What are UTM solutions capable of today?  Benefits - An Overview of ASG  Reporting options and benefits  Leveraging Best of Breed Applications

Astaro Overview – Page 3 Internet Security today The growing complexity Botnets Spam Phishing Scam Hoax Viruses Spyware Gray ware Intrusions Denial of Service Distributed Denial of Service Malware Ping floods Eavesdropper Script Kiddies Espionage Root kits Adware P2P File sharing Trojans Spit Bots Backdoors Buffer Overflows Hackers Malcode Bugs Key loggers Crime ware Pharming Competitors Identity theft Exploits DNS poisoning Snarf attacks Spam bots Spy bots Trap doors War driving Ransomware ASCII bombs Bluesnarfing Worms Decrypting Reverse engineering Port Scanning… Too many threats …Too many tools … Helpdesk Evaluation Training Deployment Management Updating Too many tasks … Firewall & VPN IPS & IDS SSL VPN Filter Web & IM Filter

Astaro Overview – Page 4 © Astaro 2008 URL Filter Anti Virus VPN Firewall 2000 Internet Security today The growing demand for integration Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2003 Central Mgmnt.. VoIP Antiphishing Antispyware Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2005 Clustering SSL VPN IM/P2P control Encryption Single Sign On Dual AV Central Mgmnt. VoIP Antiphishing Antispyware Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2008 FW/VPNUTMUTM+XTM typical Integrated products

Astaro Overview – Page 5 © Astaro 2008 All-In-One Security Products today What does UTM offer?  One Platform To Learn  One Place to Maintain  Change the role of the solution over time  Licensing Choices  Overall Centralize Security

Astaro Overview – Page 6 © Astaro 2008 All-In-One Security Products today Why use separate products? FirewallAntispam VPNAntivirus URL Filter IDS/IPS …have many different management interfacesMany different tools… Wizards (initial setup) Web GUI (basic configuration) set admin user cfg password set interface ethernet1 manage ssh exec ssh tftp username cfg file-name idnt_cfg.pub ip-addr save CLI (detailed configuration) Launch of 3rd party GUI (for specific applications) Software client (Off-line configuration)

Astaro Overview – Page 7 © Astaro 2008 All-In-One Security Products today Separate GOOD UTM’s from the Pack  At a glance today‘s All-In-One solutions often appear similar in terms of their capabilities and feature set  However many products just implement a bare minimum of functionality in order to justify putting terms on a data sheet  Of critical and most importance is how rich and effective each feature is Examples:  Spam Protection  URL Filtering

Astaro Overview – Page 8 © Astaro 2008 All-In-One Security Products today Adapt while Preserving your Investment  Number and types of threats are growing - New features, tools and technologies are required to protect against these threats - Proprietary, ASIC based hardware is hard to upgrade  Companies are growing - More employees need to be protected by the system - More performance is required Security Products need to be easily expandable with new functions and scalable to offer more performance One-Click Clustering 1..n

Astaro Overview – Page 9 © Astaro 2008 All-In-One Security Products today Licensing Options  Licensing hardware appliances by number of concurrent IP addresses or users is no longer efficient - Most appliances claim to offer unlimited licensing  Certain functionality is often only available on larger units or with advanced OS versions - Mail quarantining - Directory integration - High Availability - User based profiles

Astaro Overview – Page 10 © Astaro 2008 The Astaro All-In-One Approach All-In-One Appliances Browser-based Unified Management of All Applications Automatic Firmware & Pattern Updates Flexible Deployment Localized UserPortal Centralized Management Integration of Complete , Web & Network protection

Astaro Overview – Page 11 The Astaro Difference  Only Astaro appliances are available in three different types  Nobody's more flexible Over 47,000 customers are already protecting more than 100,000 networks with an Astaro appliance 10-Minute-Setup  Nobody's faster  Proven technology One-Click Clustering 1..10

Astaro Overview – Page 12 © Astaro 2008 Astaro Security Gateway The Solution 10-Minute-Setup

Astaro Overview – Page 13 Astaro Security Gateway Easily Managed 10-Minute-Setup

Astaro Overview – Page 14 Astaro Security Gateway Web Security Reporting

Astaro Overview – Page 15 Astaro Report Manager Centralized Logging & Reporting

Astaro Overview – Page 16 Astaro Report Manager Feature Overview Log Management Monitoring & Alerting Reporting Forensic Analysis

Astaro Overview – Page 17 Astaro Report Manager Deployment Stand alone  Single Astaro Report Manager  Integrated or separate Syslog server Distributed  One centralized Astaro Report Manager  Multiple regional Astaro Report Manager and/or Syslog server

Astaro Overview – Page 18 Astaro Report Manager Easy to use  Dashboard for quick overview about network activity  800+ pre-defined reports based on attacks, rules, protocol and web usage, spam, spyware, antivirus, compliance…  Alert Manager Warns whenever a specified event type or attack activity is detected

Astaro Overview – Page 19 Astaro Report Manager Products Software Application Runs on Intel-compatible PCs and servers Requires Windows Platform: - Windows 2000/XP/ MS IE 6.0 or compatible with JAVA runtime - MS IIS or integrated Apache

Astaro Overview – Page 20 Astaro Report Manager Benefits  Protect information assets  Reduce the time to respond to threats  Save administrative time and money  Improve planning and management  Meet compliance requirements

Astaro Overview – Page 21 Astaro Command Center Centralized Management for Astaro All-In-One Gateways

Astaro Overview – Page 22 Astaro Command Center Multi Client Deployment Customer 1 Customer 2 (Admin) Customer 2 (Audit User) Admin Up2Date Read only Customer 1 Customer 2 Browser- based Access Global distributed Astaro Gateways

Astaro Overview – Page 23 Astaro Command Center Easy to use WebAdmin ACC System Management Gateway Manager Device Management for individual customers

Questions? Astaro Web Site Astaro Software & Virtual Appliances Free Download