(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistema mobile
1. Le soluzioni tecnologiche per il nuovo
ecosistema Mobile:
Aerohive Networks e ZScaler
Martedì, 28 Maggio 2013
2. Miriade Spa, società di consulenza informatica con sede a Thiene (VI),
pone al centro della propria attività il patrimonio informativo delle
imprese, fornendo soluzioni per la protezione, l'integrazione e l'analisi dei
dati aziendali. L'azienda fondata nel 2000 ha un organico di 35
dipendenti.
La geometria aziendale è articolata in 6 aree tecniche: Architecture,
Intelligence +, Database, Development, Cloud, Mobility. Tra le diverse
realtà con le quali collaboriamo segnaliamo: Diesel, Benetton,
Calzedonia, Tecnica, Lotto.
17. Enabling Business Beyond the Corporate Network.
Secure solutions for mobility, cloud and social media.
18. The Cloud Security Company
3 Trends Transforming IT
90% - Users work from
home or on-the-go
50% - Users who BYOD
Smartphones are now
the world's dominant
computing device.
74% of companies are
using cloud apps
1 in 5 execs have
purchased cloud apps
without IT’s knowledge
SaaS applications
growing 5x faster
than software
75% employees use
Facebook at work
178: average # of social
accounts in the
enterprise
30 billion pieces of
content shared each
month on Facebook.
New IT world requires cloud-based protection
Mobility Cloud Apps Social Media &
streaming
IT transformation has turned traditional security (appliances) upside down.
Mobile users bypasses appliances to access cloud apps and create policy issues.
22. The Cloud Security Company
Global Protection by World’s Largest Security Cloud
Purpose-Built Architecture - Multi-tenant, Distributed
Brain/Nervous system, Policy, Real-time threat updates1
Onramp to Internet,
Executes policy
2
Logs consolidated & correlated in real-time4
Policy follows the user to
the nearest ZEN3
NanoLog Clusters
ZEN (N)ZEN2
Zscaler
Enforcement NodeZEN1
Central Authority
Same policy & protection, near-zero latency for a user anywhere
Multi-tenant
Use any Data Center
ShadowPolicyTM
Policy follows the user
Ultra-fast
Little processing latency
High Availability
Failover across DCs
23. The Cloud Security Company
No HW, no SW, no client-side agent
Traffic forwarding
– from the infrastructure – GRE Tunnels, PBR, Proxy chaining
– from the workstations – explicit proxy or PAC file (hosted in cloud)
– Various ways to enforce Cloud usage
Authentication
– Users & groups have to be known by Zscaler for policies & reporting
– Hosted User Database or Sync. With AD / LDAP
– Registration phase usually requires username & password – only once
» Authentication then is transparent
– SAML / ADFS as an elegant SSO solution for transparent auth.
Deployment considerations
24. The Cloud Security Company
Why Global 2000 Trust Zscaler Security Cloud
Unparalleled Privacy
Guaranteed regional log storage
to meet country or region’s
privacy requirements
Data Obfuscation
SAS 70 II certified DCs
Secure By Design
100% secure and encrypted
communication cloud-wide
55+ Patents Governing Zscaler’s
Developed Cloud Architecture
Data Privacy & Security
Complete Visibility into Cloud
Operations
Public dashboard of real-time status
– trust.zscaler.com
300+ Monitors, Every Node, Every
Second
Service Excellence
Commitments
Real-time Logging, Latency,
Availability Service Level Agreements
Visibility & Transparency
Redundancy at Every Layer
Within Datacenter: Clustered
Between Datacenters: 90+
Datacenters Globally with
Automatic Traffic Re-Routing
Cloud Wide: Multiple World
Class Datacenter and Internet
Service Providers
Massive Scale: 150 billion
transactions per month
Availability & Scale
Purpose-built architecture for 100% Availability, backed by strong SLAs
26. The Cloud Security Company
Pricing Overview: Web Suites
Zscaler Platform
DLP
BW
Web 2.0URL Filtering
Browser
Policy
Adv
Threats
AV/AS
Zscaler Platform
URL Filtering
AV/AS
Policy and
Reporting
Anti-Virus and Anti-Spyware
• Inline ultra-low latency Virus/Spyware protection
• Any file size including multilevel archives
URL Filtering
• User, Group or Location level granularity for Policy
• 6 Classes, 30 Super Categories and 90 Categories
• Dynamic Content Classification of Unknown Sites
• Ability to modify categories or add new categories
Package Features
Advanced
Premium
Benefits Cost
Standard Benefits
• Complete Inbound/Outbound protection
• Enforce Acceptable Usage Policy
• Minimize Productivity and Bandwidth Loss
• Real-Time Reporting of Internet Usage by
Users, Departments or Locations
• Protect all users in office or on the road
Standard Bundle +:
Advanced Threats
• Zero Day Attacks, Browser Vulnerabilities and Bots
• Web 2.0 threats: XSS, Cookie Stealing, Phishing
• Block Anonymizers, P2P, Skype, BitTorrents
Web 2.0 Control
• Granular control of 100 popular Web2.0 apps:
• Facebook, Gmail, YouTube, etc
Benefits
• Protect against latest Web 2.0 threats
• Protect employees’ personal information
• Detect and block proxy-avoidance tools
• Minimize Risk by blocking uncontrolled apps
• Minimize Risk of Infection by enforcing safe
browsers and plugins.
• Limit risk without affecting productivity:
•Allow only HR to post on LinkedIn
•Allow Gmail, but block attachment
Advanced Bundle +:
Data Leakage Prevention
• Scan all web traffic leaving the organization
• Log or Block transactions with confidential data
• Scan Microsoft documents, PDFs and Zipped files
• Predefined dictionaries for:
Credit Cards, SSN, Source Code, Financial or
Medical Statements, Salesforce docs etc.
• Predefined Engines for HIPPA, PCI, etc.
Bandwidth optimization for specific web apps
Web Access Control
• Warn against use of vulnerable browsers/ plugins
Benefits
• Minimize risk due to new Web 2.0 apps
• Scan all webmails, IM attachments, blog posts
• Add another layer towards compliance to
industry or government regulation
• DLP policy at user, department, location level
• Real-Time transaction level reports
•Ensure Webex is not affected by Youtube
Policy and
Reporting
Policy and
Reporting
Zscaler Platform
Web 2.0URL Filtering
Adv
Threats
AV/AS
28. Vi ringraziamo per l’attenzione!
Per domande o informazioni:
commerciale@miriade.it
www.miriade.it
Notes de l'éditeur
Users want to WORK anywhere on any device You want to let them without drowning in complexity or compromising security, reliability and affordability. YesterdayCorp deployed enterprise devices desktop, laptop, handsets, scannersWLAN overlay coverage, convenience, HQ orientatedNetwork centric policy based on rigid, port/VLAN & SSIDMonolithic “Build it and they will come” scalabilityTodayCorp / BYOD enterprise / consumer devices laptop, smart phone, tablet, Apple TVs, “AirPrint” PrintersUbiquitous Wi-Fi Access capacity, performance, mission-critical, extended enterpriseUser Centric Consistent policy based on identity, role, contextElasticPay for what you need - leverage the cloudAerohive gives you the ability to achieve this simpli-fi-ing enterprise networking by delivering a self organizing, service aware, identity based infrastructure.