Azlan Security Offering
-
Upload
gianandrea-daverio -
Category
Technology
-
view
179 -
download
0
Transcript of Azlan Security Offering
![Page 1: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/1.jpg)
www.azlan.com Confidential Solutionsfor your Success1
Azlan Security Portfolio
Gianandrea Daverio
Security Business Unit Manager
E-Mail [email protected]
![Page 2: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/2.jpg)
2
Summary
Network Firewalls
Virtual Private Networking
Network-Based Intrusion Prevention
Network-Based Vulnerability Management
SSL-Based Application Gateways
Application Traffic Management
Application Level Switching
Core & Edge Routing
Authentication, Authorization & Accounting
Network Access Control
E-mail Filtering & Spam Prevention
Web Content Filtering
Enterprise Back-up
End-Point Security & Virus Protection
Host-Based Security & Virus Protection
![Page 3: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/3.jpg)
3
Network Firewalls
![Page 4: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/4.jpg)
4
Virtual Private Networking
![Page 5: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/5.jpg)
5
Network-Based Intrusion Prevention
![Page 6: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/6.jpg)
6
Vulnerability Management
![Page 7: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/7.jpg)
7
SSL-Based Application Gateway
![Page 8: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/8.jpg)
8
Application Traffic Management
![Page 9: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/9.jpg)
9
Application Level Switching
![Page 10: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/10.jpg)
10
Core & Edge Routing
![Page 11: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/11.jpg)
11
Authentication, Authorization, Accounting
![Page 12: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/12.jpg)
12
Network Access Control
![Page 13: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/13.jpg)
13
Mail Filtering & Spam Prevention
![Page 14: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/14.jpg)
14
Web Content Filtering
![Page 15: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/15.jpg)
15
Enterprise Back-up
![Page 16: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/16.jpg)
16
End-Point Security
![Page 17: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/17.jpg)
17
Host-Based Security
![Page 18: Azlan Security Offering](https://reader034.fdocuments.us/reader034/viewer/2022052523/5564dab3d8b42a0a178b56c9/html5/thumbnails/18.jpg)
www.azlan.com Confidential Solutionsfor your Success18
Thank you for your attention