Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile...
-
Upload
evan-douglas -
Category
Documents
-
view
217 -
download
4
Transcript of Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile...
InfrastructureConsolidation
Cloud/SaaS
Web 2.0
ConvergedCommunications
Virtualization
Mobile Devices
Social Networking = Business NetworkingWhen did Facebook become a business application?
Blogging Facebook Twitter IM Streaming video Streaming audio Downloading files Playing games Webmail Wikis
Malware, Trojans, BotNets, Intrusions out of control
+Business Social Networking
out of control =
Escalating Demand for Network Bandwidth
The Scalability ProblemTrade-off Network Security for Network Performance?
First Internet-borne attacks
Dot-com boom fuels traffic surge. Internet bogs down
New forms of malware (SQL Slammer, Sasser, etc.) make DPI a necessity for everyone
Web 2.0, SaaS, rich media, drive bandwidth consumption
Acceptable Business Applications Unacceptable
Application ChaosIT Controls Challenged
Application ChaosSo many on Port 80
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Ingress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk
? ?
??
??
?
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Application ChaosSo many on Port 80
Ingress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk
Application ChaosSo many on Port 80
Malware Blocked
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Ingress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk
Application ChaosSo many on Port 80
Malware Blocked
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Ingress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk
Application ChaosSo many on Port 80
Critical Apps Prioritized Bandwidth
Acceptable Apps Managed Bandwidth
Unacceptable Apps Blocked
Malware Blocked
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Ingress Egress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk
Critical
Acceptable
Block
Application ChaosSo many on Port 80
Critical Apps Prioritized Bandwidth
Acceptable Apps Managed Bandwidth
Unacceptable Apps Blocked
Malware Blocked
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Ingress Egress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Next Generation FirewallNext Generation Firewall
Critical Bandwidth
Managed Bandwidth
Block
Massively Scalable Technology Scan Everything - every bit, every protocol, every user & application
20
• Massively Scalable Architecture
• Multi-core, parallel architecture - up to 1024 cores
• Clustering technology for high throughput & availability
• Unlimited data size, formats, or connections
• High network bandwidth with low latency
• Real time, Deep Packet Inspection
• Patented Re-Assembly Free DPI –scaling up to 40Gbps for full malware protection
• Foundation for all network security technologies
• Simultaneous, proactive, multi-threat scanning
• Industry's top percentile for catch rates
• Best Solution Economics
• Products in every price band, price/performance leadership
• Easy to adopt, deploy and manage
• Interoperable, modular platform
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating RiskNew Technology Adoption and Mitigating Risk
21
Application ChaosSo many on Port 80
Critical Apps Prioritized Bandwidth
Acceptable Apps Managed Bandwidth
Unacceptable Apps Blocked
Malware Blocked
Massively ScalableNext-GenerationSecurity Platform
High Performance Multi-CoreRe-Assembly Free
DPI
Ingress Egress
ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts
By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename
By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group
Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk
Critical Bandwidth
Managed Bandwidth
Block
1. Do you have situational awareness of your network?
2. Are you embedding network security into your new technology deployments?
3. Are you able to scan all of your network traffic without degrading your network performance?
4. Is your network security architecture designed to scale 10x?
5. Can your network security provide applications intelligence, control, visualization plus provide maximum security effectiveness?
6. Are your policy & management and threat communications network scalable and real-time?
Mitigating your Risks – Top 6 Questions to Ask
Block or allow? Who has taken on Web 2.0 as a part of their infrastructure? What if you could allow but degrade the experience? What happens if you could apply granular policy to Web-based
applications? How would it benefit your business to be able to see every
application across the network? How about matching productivity and security through
scanning every packet of data being transmitted through these applications?
Questions (verbal)
Executing on our Vision Advanced Technology, Scalable Solutions
Re-Assembly Free Deep Packet Inspection
Datacenter 1
Datacenter 2
Consolidated and VirtualizedDatacenter
Datacenter N
Benefits Reduces overhead
equipment/power/staff Improves bandwidth between
applicationsImplications No inter-data center security Access risk consolidation Disaster risk consolidation
UserProfile
Kiosk
Coffee Shop
Laptop
PDA Benefits Productivity – access from
anywhere, anytime Disaster avoidance
Implications Tying access rules to
individuals is much harder Many of the endpoints are
unmanaged