Access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt.

Slides:



Advertisements
Similar presentations
Whats New in Fireware XTM v New Features in Fireware XTM v Major Changes FireCluster with XTM 330 appliances Mobile VPN with SSL using multiple.
Advertisements

What’s New in Fireware XTM v11.3.4
Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Business Solutions Network Security Solutions Gateway Security
Introducing Quick Heal Terminator.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
(c) 2003, SOHOware, Inc. Proprietary and Confidential Your OEM Partner for Intel XScale based Networking Appliances Targeting Small and Medium Business.
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
True Unified Threat Management
The Most Analytical and Comprehensive Defense Network in a Box.
 Category 6 Ethernet Cable, Single-mode Fiber Cable, and RJ45 Jacks  APC Netshelter SX 48U Racks and NetShelter AV Roof Fan Tray 825mm  Cisco 3800 ISR.
AdvOSS Software Architectures. Target Markets Wimax/4G LTECDMA Broadband Prepaid Voice Residential VoBBSIP Trunking VoIP Peering.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
© 2012 Avaya – Restricted, Confidential & Proprietary. NDA Presentation Avaya Aura ® Virtualized Environment Avaya Aura ® on VMware.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Understanding and Managing WebSphere V5
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Meet the Next Generation Firewall (NGFW)
Barracuda Networks Steve Scheidegger Commercial Account Manager
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
Networking Components Mike Yardley LTEC 4550 Assignment 3
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Barracuda Load Balancer Server Availability and Scalability.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
The Most Analytical and Comprehensive Defense Network in a Box.
What is FORENSICS? Why do we need Network Forensics?
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
What’s New in Fireware v11.9.5
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Synchronized Security Revolutionizing Advanced Threat Protection
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
© 2009 WatchGuard Technologies An Introduction to XTM Devices, Services and Bundles 13 June 2016.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Cisco Routers Cisco Service Provider Core and Edge Routers.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
BTC Network Systems A Division of Becerra Trading Company This Information is confidential and proprietary to BTC Network Systems BTC is an Information.
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
Chapter 6: Securing the Cloud
Network Security Solution
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
The sign of success.
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Threat Management Gateway
Design Unit 26 Design a small or home office network
AT&T Firewall Battlecard
Presentation transcript:

access · management security · performance XTM eXtensible Threat Management eX  ten  si  ble Threat Man  age  ment Ik-sten-si-bĕl thret man-ij-mĕnt Extensible Adjective - Computer Science: Of or relating to a system that can be modified by changing or adding features

access · management security · performance Firewall Evolution Firewall UTM XTM

access · management security · performance IDC Defined XTM in 2008 “XTM Platforms will take security appliances beyond traditional boundaries by vastly expanding security features” Charles Kolodgy

access · management security · performance WatchGuard and XTM Based on this definition, WatchGuard foresees XTM as an extension of the UTM category. XTM will expand on what UTM has delivered, but will include additional substantive developments in three core areas: More security features Greater networking capabilities More management flexibility

access · management security · performance More Security

access · management security · performance More Security Proxy Application firewall – scans all layers of the packet Zero day protection assured across multiple protocols HTTPS content inspection VOIP and Video Conferencing Security IM, P2P control, SPAM, Anti- Malware, Web Content

access · management security · performance More Networking Capabilities

access · management security · performance More Networking Capabilities WAN Optimisation Enhance VPN Failover Traffic shaping and QoS control Active/active fail-over for HA Centralised management Admin role based management Server load balancing SNMP compatible (HP Openview)

access · management security · performance More management flexibility

access · management security · performance More management flexibility Model upgradeable Flexible choice of services Application Blocking – Skype Significant enhanced reporting Customised content reports Multi-box management CLI, Web and Management GUI’s

access · management security · performance The Range 2 Series 5 Series 8 Series 10 Series

access · management security · performance Common Criteria Models are upgradeable Unified O/S Centralised Management GUI Security Suite Live Security Application Blocking 3G Extender

access · management security · performance 2 Series – Unrestricted Edge  3 x Gigabit plus 3 x 10/100 interfaces – separate security zones  Multiple WAN Support*  WAN Failover and Load-Sharing*  VPN Failover*  Policy Based Routing*  Failover to 3G Network (with optional 3G extend)  Quality of Service and Traffic Shaping options*  Comprehensive Logging and Reporting Engines  Sophisticated Wireless Networking options including Wireless N

access · management security · performance 5 Series – Fully scalable Core  7 Interfaces, 6 Gigabit 1 10/100Mb  Multiple WAN Support*  WAN Failover and Load-Sharing*  Policy Based Routing*  Quality of Service and Traffic Shaping options*  VLAN Support*  Server Load-balancing*  High Availability option*  Comprehensive Logging and Reporting Engines

access · management security · performance Check-out the Difference

access · management security · performance In Conclusion More powerful More features More choice More bang for the buck! A true platform for the future