What Happens At The Edge Of Your Network

25
What Happens At The Edge Of Your Network?

description

The network edge is where all of the action takes place. From monitoring breaches to other vital tasks, learn about the edge to safeguard your network.

Transcript of What Happens At The Edge Of Your Network

Page 1: What Happens At The Edge Of Your Network

What Happens At The EdgeOf Your Network?

Page 2: What Happens At The Edge Of Your Network

Just like a house has a foundation to hold it up, as well as a roof to keep the rain, sleet, and snow from

damaging your possessions, your network’s core is the “dumb muscle” forwarding packets. But the network

edge is where all of the action takes place.

Page 3: What Happens At The Edge Of Your Network

That action – from next-generation filtering and monitoring to Web applications and beyond – is

also where breaches occur.

Page 4: What Happens At The Edge Of Your Network

14% is the rate at which threat alerts have grown, year over year.

Page 5: What Happens At The Edge Of Your Network

21% of CWE threat categories are attributedto buffer errors – the largest category.

Page 6: What Happens At The Edge Of Your Network

91% of total threats and compromisescome from Java exploits.

Page 7: What Happens At The Edge Of Your Network

100% of business networks(analyzed by Cisco) have traffic to

websites hosting malware.

Page 8: What Happens At The Edge Of Your Network

50,000 network intrusionsare detected every day.

Page 9: What Happens At The Edge Of Your Network

4.5 billion emails are blocked every day.

Statistics provided by the Cisco 2014 Annual Security Report

Page 10: What Happens At The Edge Of Your Network

Protection begins at the edge:Surrounding The Brains Of Your Network

Page 11: What Happens At The Edge Of Your Network

In the LAN, WAN or datacenter, not only do edge devices perform more functions than any other layer, but their jobs also require far more intelligence.

Page 12: What Happens At The Edge Of Your Network

With intrusion detection and prevention as well as other critically important security applications on the network

edge, it’s imperative that these in-line tools do not go down.

Page 13: What Happens At The Edge Of Your Network

Oversubscription and subsequent downtimeis a costly side effect of

running multiple in-line appliances.

Page 14: What Happens At The Edge Of Your Network

From a monetary perspective, an hour of downtime costs the average business $163,674. But from a security

standpoint, without the ability for monitoring tools to do their jobs, the cost of threats on your network is indefinite.

Page 15: What Happens At The Edge Of Your Network

An edge connector is the most formidable way to mitigate the risks.

Page 16: What Happens At The Edge Of Your Network

Strength OfThe EdgeLens™ –the edge connector

Page 17: What Happens At The Edge Of Your Network

The EdgeLens™ device accesses anddirects traffic from one or more

network segments to many in-line andpassive security and monitoring tools.

Page 18: What Happens At The Edge Of Your Network

The filtering and load-balancing capabilitiesswap out tools when needed to ensure that all

monitoring applications are capable of doing theirjob to protect your network and business.

Page 19: What Happens At The Edge Of Your Network

The EdgeLens™ (edge connector)enables confident use of multipletools with no downtime risks or

incomplete data access.

Page 20: What Happens At The Edge Of Your Network

What does the EdgeLens™ do for your network?

Page 21: What Happens At The Edge Of Your Network

Gain intelligent and optimized packet visibility and access to both in-band

and out-of-band tools.

Page 22: What Happens At The Edge Of Your Network

Enable real-time securityPOC evaluations with

no network impact.

Page 23: What Happens At The Edge Of Your Network

Shield monitoring devicesfrom intruders.

Page 24: What Happens At The Edge Of Your Network

Increase efficiency of in-band andout-of-band analytic tools.

Page 25: What Happens At The Edge Of Your Network

Thank you for viewing this visualpresentation about the network edge and

edge connectors.

For more information or answers to yourquestions, contact us now.

Copyright 2014 © Garland Technology LLC. All Rights Reserved.