Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile...

25

Transcript of Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile...

InfrastructureConsolidation

Cloud/SaaS

Web 2.0

ConvergedCommunications

Virtualization

Mobile Devices

How does this compare to your 2010 Priorities?

Source: Gartner (March 2010)

Social Networking = Business NetworkingWhen did Facebook become a business application?

Blogging Facebook Twitter IM Streaming video Streaming audio Downloading files Playing games Webmail Wikis

Malware, Trojans, BotNets, Intrusions out of control

+Business Social Networking

out of control =

Escalating Demand for Network Bandwidth

The Scalability ProblemTrade-off Network Security for Network Performance?

First Internet-borne attacks

Dot-com boom fuels traffic surge. Internet bogs down

New forms of malware (SQL Slammer, Sasser, etc.) make DPI a necessity for everyone

Web 2.0, SaaS, rich media, drive bandwidth consumption

Application Intelligence Requires a new firewall

paradigm focused around Applications Users Content

Application ChaosSo many on Port 80

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Ingress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk

? ?

??

??

?

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Application ChaosSo many on Port 80

Ingress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk

Application ChaosSo many on Port 80

Malware Blocked

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Ingress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk

Application ChaosSo many on Port 80

Malware Blocked

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Ingress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk

Application ChaosSo many on Port 80

Critical Apps Prioritized Bandwidth

Acceptable Apps Managed Bandwidth

Unacceptable Apps Blocked

Malware Blocked

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Ingress Egress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk

Critical

Acceptable

Block

Application ChaosSo many on Port 80

Critical Apps Prioritized Bandwidth

Acceptable Apps Managed Bandwidth

Unacceptable Apps Blocked

Malware Blocked

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Ingress Egress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Next Generation FirewallNext Generation Firewall

Critical Bandwidth

Managed Bandwidth

Block

Massively Scalable Technology Scan Everything - every bit, every protocol, every user & application

20

• Massively Scalable Architecture

• Multi-core, parallel architecture - up to 1024 cores

• Clustering technology for high throughput & availability

• Unlimited data size, formats, or connections

• High network bandwidth with low latency

• Real time, Deep Packet Inspection

• Patented Re-Assembly Free DPI –scaling up to 40Gbps for full malware protection

• Foundation for all network security technologies

• Simultaneous, proactive, multi-threat scanning

• Industry's top percentile for catch rates

• Best Solution Economics

• Products in every price band, price/performance leadership

• Easy to adopt, deploy and manage

• Interoperable, modular platform

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating RiskNew Technology Adoption and Mitigating Risk

21

22

Dynamic Security for the Global Network

Application ChaosSo many on Port 80

Critical Apps Prioritized Bandwidth

Acceptable Apps Managed Bandwidth

Unacceptable Apps Blocked

Malware Blocked

Massively ScalableNext-GenerationSecurity Platform

High Performance Multi-CoreRe-Assembly Free

DPI

Ingress Egress

ControlIdentify CategorizePrioritize Apps by PolicyManage Apps by PolicyBlock Apps by PolicyDetect and Block MalwareDetect & Prevent Intrusion Attempts

By Application, Not by Port & ProtocolBy User/Group, Not by IPBy Content Inspection, Not by Filename

By ApplicationBy Application CategoryBy DestinationBy ContentBy User/Group

Walking the Tightrope:Walking the Tightrope:New Technology Adoption and Mitigating New Technology Adoption and Mitigating RiskRisk

Critical Bandwidth

Managed Bandwidth

Block

1. Do you have situational awareness of your network?

2. Are you embedding network security into your new technology deployments?

3. Are you able to scan all of your network traffic without degrading your network performance?

4. Is your network security architecture designed to scale 10x?

5. Can your network security provide applications intelligence, control, visualization plus provide maximum security effectiveness?

6. Are your policy & management and threat communications network scalable and real-time?

Mitigating your Risks – Top 6 Questions to Ask

Thank You!

Questions?

Patrick SweeneyVP of Product [email protected]

Block or allow? Who has taken on Web 2.0 as a part of their infrastructure? What if you could allow but degrade the experience? What happens if you could apply granular policy to Web-based

applications? How would it benefit your business to be able to see every

application across the network? How about matching productivity and security through

scanning every packet of data being transmitted through these applications?

Questions (verbal)

Executing on our Vision Advanced Technology, Scalable Solutions

Re-Assembly Free Deep Packet Inspection

Datacenter 1

Datacenter 2

Consolidated and VirtualizedDatacenter

Datacenter N

Benefits Reduces overhead

equipment/power/staff Improves bandwidth between

applicationsImplications No inter-data center security Access risk consolidation Disaster risk consolidation

UserProfile

Kiosk

Coffee Shop

Laptop

PDA Benefits Productivity – access from

anywhere, anytime Disaster avoidance

Implications Tying access rules to

individuals is much harder Many of the endpoints are

unmanaged

Server 130% load

Server 220% load

Server 315% load

Virtualized Server 65% load

Benefits Efficiency Performance

Implications Hypervisor threats Inter-application

security