What Happens At The Edge Of Your Network

Post on 21-Jun-2015

305 views 1 download

Tags:

description

The network edge is where all of the action takes place. From monitoring breaches to other vital tasks, learn about the edge to safeguard your network.

Transcript of What Happens At The Edge Of Your Network

What Happens At The EdgeOf Your Network?

Just like a house has a foundation to hold it up, as well as a roof to keep the rain, sleet, and snow from

damaging your possessions, your network’s core is the “dumb muscle” forwarding packets. But the network

edge is where all of the action takes place.

That action – from next-generation filtering and monitoring to Web applications and beyond – is

also where breaches occur.

14% is the rate at which threat alerts have grown, year over year.

21% of CWE threat categories are attributedto buffer errors – the largest category.

91% of total threats and compromisescome from Java exploits.

100% of business networks(analyzed by Cisco) have traffic to

websites hosting malware.

50,000 network intrusionsare detected every day.

4.5 billion emails are blocked every day.

Statistics provided by the Cisco 2014 Annual Security Report

Protection begins at the edge:Surrounding The Brains Of Your Network

In the LAN, WAN or datacenter, not only do edge devices perform more functions than any other layer, but their jobs also require far more intelligence.

With intrusion detection and prevention as well as other critically important security applications on the network

edge, it’s imperative that these in-line tools do not go down.

Oversubscription and subsequent downtimeis a costly side effect of

running multiple in-line appliances.

From a monetary perspective, an hour of downtime costs the average business $163,674. But from a security

standpoint, without the ability for monitoring tools to do their jobs, the cost of threats on your network is indefinite.

An edge connector is the most formidable way to mitigate the risks.

Strength OfThe EdgeLens™ –the edge connector

The EdgeLens™ device accesses anddirects traffic from one or more

network segments to many in-line andpassive security and monitoring tools.

The filtering and load-balancing capabilitiesswap out tools when needed to ensure that all

monitoring applications are capable of doing theirjob to protect your network and business.

The EdgeLens™ (edge connector)enables confident use of multipletools with no downtime risks or

incomplete data access.

What does the EdgeLens™ do for your network?

Gain intelligent and optimized packet visibility and access to both in-band

and out-of-band tools.

Enable real-time securityPOC evaluations with

no network impact.

Shield monitoring devicesfrom intruders.

Increase efficiency of in-band andout-of-band analytic tools.

Thank you for viewing this visualpresentation about the network edge and

edge connectors.

For more information or answers to yourquestions, contact us now.

Copyright 2014 © Garland Technology LLC. All Rights Reserved.