SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Secure Remote Access from Cyber Cafe Timothy Siu SunONE SE Manager
SCSC 455 Computer Security Virtual Private Network (VPN)
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Internet Protocol Security (IPSec)
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Academy Conference 2010 Introduction to SSL-VPNs
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Barracuda Load Balancer Server Availability and Scalability.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Chapter 9: Novell NetWare
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Propalms TSE from Tridex Systems A Cost Effective Alternative to Citrix.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Securing Remote Access With SSL VPNs: A Best Practice Primer Sikhi Gundu and Kartik Kumar, Juniper Networks India Pvt Ltd.
© 2005,2009 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.3 Quick Start Guide.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Securing Access to Data Using IPsec Josh Jones Cosc352.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Introduction to Barracuda IM Firewall
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Goals Introduce the Windows Server 2003 family of operating systems
Check Point Connectra NGX R60
Presentation transcript:

SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia

CONFIDENTIAL All Rights Reserved 2 Remote access today  Most organizations use IPSec VPN clients for remote access  However, IPSec has the following technical limitations  IPSec needs a "fat" software client pre-installed and preconfigured on the remote device  Some IPSec remote user may experience difficulty getting through the firewall protecting the remote network  Resulting use case limitations  IPSec is great when you tightly control the end-point computers but limited in other cases (e.g. home computer)  End-user support burden on the IT administrator

CONFIDENTIAL All Rights Reserved 3 What is SSL VPN Remote Access?  Anytime anywhere access to network resources  All you need is a Web browser  Like IPSec but easier because no need for pre-installed client  Secure connection through SSL encryption

CONFIDENTIAL All Rights Reserved 4 The Need for Easy Secure Remote Access  Over 80% of SMBs use some form of VPN, but the vast majority use IPSec  Over 85% of those who use VPN use IPSec VPN  Only 18% claim to be using SSL VPN  ~80% of both small and medium network customers have heard of SSL VPN but half of them don’t know exactly what it is  However, when explained the benefits of SSL VPN almost ~50% (!) of both small and medium sized business said they were interested in an SSL VPN appliance Source: SonicWALL end-customer survey (~1000 respondents)

CONFIDENTIAL All Rights Reserved 5 Introducing...  SonicWALL SSL-VPN 200 and SSL-VPN 2000  Dedicated SSL-VPN Appliances  Affordable, simple, secure remote access  Compatible with any firewall appliance  Authentication provided by SSL-VPN appliance  Internal data base, Radius, LDAP or Active Directory  When used with SonicWALL appliance  You get all the benefits of activated UTM services

CONFIDENTIAL All Rights Reserved 6 IPSec Versus SSL VPN: Technical CharacteristicSSL VPNIPSec VPN Transport ProtocolSSLIPSec Remote Access versus Site-to-Site Lowest cost support for Remote Access usages Remote Access and Site-to- Site Access ControlHighly granular limiting risk of unauthorized access Limited: network and service level only Proxy or Protocol Conversion Required for “ webified ” view of applications; SSL-VPN 200/2000 also operates at network layer giving IPSec VPN like experience No (operates at network layer) Type of ClientRequires only a browser as a client for web view or seamless “ thin ” client for network access Requires a pre-installed “ fat client ”

CONFIDENTIAL All Rights Reserved 7 SonicWALL SSL-VPN Series: Customer Value Proposition  Secure and easy-to-use remote access  Easy deployment, configuration and ongoing management  Powerful underlying security foundation  Low total cost of ownership

CONFIDENTIAL All Rights Reserved 8 SonicWALL SSL-VPN 200 and 2000 Customer Needs & Key Product Features Customer need  Secure and easy-to-use remote access  Easy deployment, configuration and ongoing management SonicWALL SSL-VPN Feature  Access to , files and applications on the corporate LAN  Personalized portal experience  No NAT traversal issues  No need for a pre-installed “fat” client  Granular policy configuration  Intuitive Web management interface  Granular logging capabilities

CONFIDENTIAL All Rights Reserved 9 SonicWALL SSL-VPN 200 and 2000 Customer Needs & Key Product Features Customer need  Powerful underlying security foundation  Low total cost of ownership SonicWALL SSL-VPN Feature  Transparent end-user authentication (local database, LDAP, RADIUS, AD, Windows NT Domain)  SSL encryption (DES, 3DES, ARC4)  Cryptographic hardware acceleration  Endpoint cache cleaner  UTM protection when deployed alongside a SonicWALL PRO or TZ appliance  No restriction on number of concurrent user tunnels  No need for a pre-installed “fat” client reduces administrative burden

CONFIDENTIAL All Rights Reserved 10 What Resources can End-users Access and How?  Using only a standard Web browser  Files and file systems (Includes support for FTP and Windows Network File Sharing)  Web-based applications  Microsoft Outlook Web Access and other Web-enabled applications  HTTP and HTTPS intranets  Using SonicWALL NetExtender (ActiveX client*)  Any TCP/IP based application including:  access through native clients residing on the user’s laptop (Microsoft Outlook, Lotus Notes, etc.)  Commercial and home-grown applications  Flexible network access as granted by the network administrator  Using a downloadable* ActiveX or Java client  Applications installed on desktop machines or hosted on an application server  Full remote control of remote desktop or server machines  Terminal Services, VNC, Telnet and SSH * Transparently downloaded through the end-user Web browser

CONFIDENTIAL All Rights Reserved 11 SSL-VPN 200 and 2000: Performance and Target Customer Profile SSL-VPN 200 Recommended for organizations with 50 employees or less Recommended Maximum Concurrent Users: Assuming all heavy users*10/15 Assuming most common usage scenarios25/35 SSL-VPN 2000 Recommended for organizations with 1000 employees or less Recommended Maximum Concurrent Users: Assuming all heavy users*50/75 Assuming most common usage scenarios100/150 * Requiring for example continuously downloading of files No restrictions on the number of users connecting in concurrently!

CONFIDENTIAL All Rights Reserved 12 Product Differentiation Affordability:  Both affordable for and widely available to small and medium sized businesses  No restriction on number of concurrent users connecting into the SSL-VPN appliance  Most solutions today are licensed based on the number of supported concurrent users Ease-of-use:  For the administrator:  Very easy to install  Secure easy-to-use Web management interface  Granular policy configuration provides complete control over who can access what network resources  For the end-user:  Personalized portal experience: the user only sees those resources that are allowed based on company policy  Secure remote access from any standard Web browser  No configuration required by the end-user Enhanced Security when integrated with SonicWALL TZ or PRO

CONFIDENTIAL All Rights Reserved 13 Deployment Scenarios SSL VPN Traffic Other Traffic SSL VPN Traffic Other Traffic SSL VPN Traffic SonicWALL environmentNon-SonicWALL environment SSL VPN Traffic With NetExtender enhanced endpoint security: all client traffic can be forced through the SSL tunnel Limited by scanning capabilities of third party firewall Scanned for Gateway Anti-virus, IPS, Anti-Spyware, Content Filtering

CONFIDENTIAL All Rights Reserved 14 Value Proposition to Our Channel Partners  First affordable SSL VPN remote access solution for SMB!  New revenue opportunity  Upsell small and medium sized network customers who already own a firewall (SonicWALL or non-SonicWALL)  Increase deal size when selling a gateway security appliance (SonicWALL or non-SonicWALL)  Reduce burden to support remote access customers  Less administrative burden than IPSec VPN

CONFIDENTIAL All Rights Reserved 15 But I Already Sell SSL VPN Appliances from Another Vendor! Add SSL-VPN 200 and 2000 to your portfolio Very Large (5000+) Large (1000 to 5000) Medium (250 to 1000) Small (50 to 250) Very Small (under 50) Customer Size Market Size SonicWALL SSL-VPN 200 SonicWALL SSL-VPN 2000 Array, Juniper, F5, Netilla, Aventail

Thank you