Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.

Slides:



Advertisements
Similar presentations
Cloud Communications Ecosystem Panel Alan Bugos, Vice President of Technology October 15th, 2013.
Advertisements

Enabling business beyond the corporate network.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
RSA Media & Analyst Briefing March 2-4, The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger 2 Changing WorldBusiness Priorities.
Why It’s Time to Upgrade to a Next-Generation Firewall
Solutions Road Show 2014 March’ 2014 | India Protection from Next Gen Threats Pralobh Menon Sales Engineer DELL SonicWALL (South) Pralobh Menon Dell India.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Unified Logs and Reporting for Hybrid Centralized Management
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
LittleOrange Internet Security an Endpoint Security Appliance.
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Challenges in Network Security 2011 SonicWALL Inc.
OPC Alarm.NET.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Meet the Next Generation Firewall (NGFW)
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
The Next Phase of Virtual Infrastructure Kevin Bailey Director - Product Marketing EMEA Symantec Corporation.
ShareTech 2015 Next-Gen UTM.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Dell Connected Security Solutions Simplify & unify.
Exploring the Network.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
DIR-827 HD Media Router 2000 Sales Guide Wireless & Router Product Div. May 2011 D-Link WRPD.
The Way Forward Factors Driving Video Conferencing Dr. Jan Linden, VP of Engineering Global IP Solutions.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network security Product Group 2 McAfee Network Security Platform.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
2015 Security Conference Dave Gill Intel Security.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Cloud Agility with Performance Bridging the Performance Gap for Virtual Network Infrastructure Paul Andersen Sr. Marketing Director.
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Chapter 1: Exploring the Network
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Virtualization & Security real solutions
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Zendos Tecnologia Utilizes the Powerful, Scalable
Presentation transcript:

Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices

How does this compare to your 2010 Priorities? Source: Gartner (March 2010)

Datacenter 1 Datacenter 2 Consolidated and Virtualized Datacenter Server Group 1 Server Group 1 Datacenter N Server Group 2 Server Group 2 Server Group N Server Group N Benefits  Reduces overhead equipment/power/staff  Improves bandwidth between applications Implications  No inter-data center security  Access risk consolidation  Disaster risk consolidation

Cloud Service $X/month HQ User 1 HQ User 1 HQ User 2 HQ User 2 Remote User 1 VM 1 VM 2 VM 3 Benefits  Rapid scalability and redundancy  Decreases cap-ex Implications  Data & applications are beyond your perimeter  Intense utilization & dependency on WAN bandwidth and optimization  Direct access from mobile users to your data  Latency/Bandwidth sensitive applications suffer HQ

Server 1 30% load Server 2 20% load Server 3 15% load Virtualized Server 65% load App 1 App 2 App 3 VM 1 VM 2 VM 3 Benefits  Efficiency  Performance Implications  Hypervisor threats  Inter-application security  MASSIVE Bandwidth concentration per server

User Profile Data Apps Kiosk Coffee Shop Laptop PDA Benefits  Productivity – access from anywhere, anytime  Disaster avoidance Implications  Tying access rules to individuals is much harder  Many of the endpoints are unmanaged  I.T. NOT in control of Mobile devices

Benefits  Cheaper, simpler, more scalable network  Single network vendor Implications  Bandwidth competition, performance  Risk consolidation  Exposure to internet-borne threats All Apps On One Network

Benefits  Collaboration drives productivity  Improved marketing and sales  Insight into customers/prospects Implications  Dramatic increase in bandwidth  New threat vectors – new threats  Traffic is not just Good or Bad Blogs Social Networking Micro-blogs IM Streaming video P2P Online games Wikis

Social Networking = Business Networking When did Facebook become a business application?  Blogging  Facebook  Twitter  IM  Streaming video  Streaming audio  Downloading files  Playing games  Webmail  Wikis Malware, Trojans, BotNets, Intrusions out of control + Business Social Networking out of control = Escalating Demand for Network Bandwidth

The Scalability Problem Trade-off Network Security for Network Performance? First Internet- borne attacks Dot-com boom fuels traffic surge. Internet bogs down New forms of malware (SQL Slammer, Sasser, etc.) make DPI a necessity for everyone Web 2.0, SaaS, rich media, drive bandwidth consumption

Acceptable Business ApplicationsUnacceptable Application Chaos IT Controls Challenged

 Application Intelligence  Requires a new firewall paradigm focused around  Applications  Users  Content

Application Chaos So many on Port 80 Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Walking the Tightrope: New Technology Adoption and Mitigating Risk ? ? ? ? ? ? ?

Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Application Chaos So many on Port 80 Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Walking the Tightrope: New Technology Adoption and Mitigating Risk

Application Chaos So many on Port 80 Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Walking the Tightrope: New Technology Adoption and Mitigating Risk

Application Chaos So many on Port 80 Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Walking the Tightrope: New Technology Adoption and Mitigating Risk

Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Egress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Walking the Tightrope: New Technology Adoption and Mitigating Risk Critical Acceptable Block

Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Egress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Next Generation Firewall Critical Bandwidth Managed Bandwidth Block

Massively Scalable Technology Scan Everything - every bit, every protocol, every user & application 20 Massively Scalable Architecture Multi-core, parallel architecture - up to 1024 cores Clustering technology for high throughput & availability Unlimited data size, formats, or connections High network bandwidth with low latency Real time, Deep Packet Inspection Patented Re-Assembly Free DPI –scaling up to 40Gbps for full malware protection Foundation for all network security technologies Simultaneous, proactive, multi-threat scanning Industry's top percentile for catch rates Best Solution Economics Products in every price band, price/performance leadership Easy to adopt, deploy and manage Interoperable, modular platform

Walking the Tightrope: New Technology Adoption and Mitigating Risk 21

22 Dynamic Security for the Global Network

Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Ingress Egress Control Identify Categorize Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts By Application, Not by Port & Protocol By User/Group, Not by IP By Content Inspection, Not by Filename By Application By Application Category By Destination By Content By User/Group Walking the Tightrope: New Technology Adoption and Mitigating Risk Critical Bandwidth Managed Bandwidth Block

1.Do you have situational awareness of your network? 2.Are you embedding network security into your new technology deployments? 3.Are you able to scan all of your network traffic without degrading your network performance? 4.Is your network security architecture designed to scale 10x? 5.Can your network security provide applications intelligence, control, visualization plus provide maximum security effectiveness? 6.Are your policy & management and threat communications network scalable and real-time? Mitigating your Risks – Top 6 Questions to Ask

Thank You! Questions? Patrick Sweeney VP of Product Management SonicWALL

 Block or allow?  Who has taken on Web 2.0 as a part of their infrastructure?  What if you could allow but degrade the experience?  What happens if you could apply granular policy to Web-based applications?  How would it benefit your business to be able to see every application across the network?  How about matching productivity and security through scanning every packet of data being transmitted through these applications? Questions (verbal)

Executing on our Vision Advanced Technology, Scalable Solutions Re-Assembly Free Deep Packet Inspection

Datacenter 1 Datacenter 2 Consolidated and Virtualized Datacenter Server Group 1 Server Group 1 Datacenter N Server Group 2 Server Group 2 Server Group N Server Group N Benefits  Reduces overhead equipment/power/staff  Improves bandwidth between applications Implications  No inter-data center security  Access risk consolidation  Disaster risk consolidation

User Profile Data Apps Kiosk Coffee Shop Laptop PDA Benefits  Productivity – access from anywhere, anytime  Disaster avoidance Implications  Tying access rules to individuals is much harder  Many of the endpoints are unmanaged

Server 1 30% load Server 2 20% load Server 3 15% load Virtualized Server 65% load App 1 App 2 App 3 VM 1 VM 2 VM 3 Benefits  Efficiency  Performance Implications  Hypervisor threats  Inter-application security