SlideShare une entreprise Scribd logo
1  sur  28
Le soluzioni tecnologiche per il nuovo
ecosistema Mobile:
Aerohive Networks e ZScaler
Martedì, 28 Maggio 2013
Miriade Spa, società di consulenza informatica con sede a Thiene (VI),
pone al centro della propria attività il patrimonio informativo delle
imprese, fornendo soluzioni per la protezione, l'integrazione e l'analisi dei
dati aziendali. L'azienda fondata nel 2000 ha un organico di 35
dipendenti.
La geometria aziendale è articolata in 6 aree tecniche: Architecture,
Intelligence +, Database, Development, Cloud, Mobility. Tra le diverse
realtà con le quali collaboriamo segnaliamo: Diesel, Benetton,
Calzedonia, Tecnica, Lotto.
Simpli-Fi Enterprise Networking
© 2012 Aerohive Networks CONFIDENTIAL
Introduction to Aerohive:
4
• Visionary Network Infrastructure Company
› Cloud-enabled, Controller-less Wi-Fi,
Routing, VPN, Switching
› 5000+ Customers
› 350+ Employees
› Most Visionary Vendor - Gartner MQ
for Wired & Wireless LAN 2012
Branch & Teleworker
Routers
Enterprise Wi-Fi
Cloud Services Platform
Public Partner Private
(on-premise)
EducationEnterpriseHealthcare Retail Logistics
Switches
© 2012 Aerohive Networks CONFIDENTIAL
New Requirements of the Network Edge
5
Users want to work anywhere, on any device
You need to enable them, without drowning in complexity
$X
Yesterday Today
• Corp deployed enterprise devices
• WLAN overlay
• Network centric
• Monolithic
• Corp / BYOD enterprise / consumer devices
• Ubiquitous Wi-Fi Access
• User Centric
• Elastic
Cloud-enabled, self organizing, service aware, identity-based infrastructure
Aerohive Networks - Simpli-fi Enterprise Networking
© 2012 Aerohive Networks CONFIDENTIAL
Enterprise Deployments
6
HQ Retail
Edu
iPad1:1
Faculty,
Guests
Apple TVs
Branch
Unified Wired, Wi-Fi, VPN, FW
Virtualized Mgmt &
VPN Termination
Wi-Fi Primary Access
Guest, Corp, BYOD Guest, Corp,
BYOD
Teleworker
Work, Home, 4G,
Cloud Security
Credit Cards. PCI,
Inventory, Voice, Kiosks
Logistics
Coverage, Reliability,
Voice Picking, Outdoor
Healthcare
EMR, eMAR, Asset
Tracking, Voice MessagingHigh Density, AD integration, Bonjour, Ease of Use
Cloud-enabled
Data Center
Performance, Receive Sensitivity, MDM enrollment
© 2012 Aerohive Networks CONFIDENTIAL
No data bottlenecks
Service Level Agreements
QoS & Spectrum analysis included
Distributed (Controller-less) Wi-Fi Architecture
Delivering simplicity, reliability and affordability
7
Management
Redundancy
Scalability and future proofing
Performance
Centralized cloud-based or
Local management
Management within the
network only
No single point of failure
Self healing mesh architecture
No controller tax
Requires multiple controllers
Local data forwarding..what
do you lose?
No feature licensing
Start small and grow
Distributed intelligence
Controller capacity?
Feature licenses?
Data bottlenecks
QoS, Spectrum analysis..$$$
(FW, RADIUS, CWP, BYOD, Bonjour GW)
How does it work? Architectural Alternatives Central Vs. Distrib. Control
© 2012 Aerohive Networks CONFIDENTIAL
How does it work?
8
A single HiveAP by itself acts as
a full-featured enterprise class
access point
Identity-based security, including stateful
inspection FW, rogue detection & mitigation
Airtime Scheduling, SLA compliance and local
forwarding implemented at the edge
HiveAPs are discovered,
policy is pushed and the
WLAN is operational
HiveManager is a single mgmt interface
for configuration, OS updates &
monitoring of thousands of devices
With a second HiveAP, fast
stateful roaming,
cooperative RF, station
load balancing and
seamless resiliency are
enabled
Mesh networking and best
path forwarding can be
used for extra resiliency
and reachability
Dynamically reroutes around
failures
As more HiveAPs are
added, coverage,
reliability and backhaul
bandwidth increases
Cooperative RF power
levels minimize
co-channel interference
With Cooperative Control,
clients can securely
and seamlessly roam
across the WLAN
Dynamic best path
forwarding and stateful
roaming provides
resiliency without a single
point of failure
With Cooperative Control,
clients can securely
and seamlessly roam
across the WLAN
Wireless
Network
Wired
Network


HiveManager NMS
Reporting Heat
Maps
SLA
Compliance
Policy
Configuration
© 2012 Aerohive Networks CONFIDENTIAL
Load
Balancing
Layer 3
Roaming
5 GHz
Resilient
Mesh
Layer 2
Roaming
Band
Steering
2.4 GHz
54Mbps
450Mbps
11Mbps
SLA, QoS & Dynamic
Airtime Scheduling
High Powered Radios,
Receive Sensitivity & RRM
Enterprise Wi-Fi Features
Optimization Mobility
9
Distribution
Receive SensitivityLayer 2/3 Roaming
© 2012 Aerohive Networks CONFIDENTIAL
BYO and Corp Deployed Devices
Access defined by ID & Device
RADIUSPPSKCWP
L2-4 Firewall
Corp userCorp user - BYODGuest user
CORP Policy
Corp VLAN
LAN & Web FW
10Mbps per user
24HR Access
BYOD Policy
Restricted VLAN
Email & Web FW
5Mbps per user
M-F 8am-9pm
GUEST Policy
DMZ
Web Only FW
1Mbps per user
M-F 9am-5pm
User Profiles
10
OS Detection
MDM Enrollment
Bonjour Gateway
www Corp
Guest,
BYOD
AppleTV
(AirPlay)
Printer
(AirPrint)
Bonjour
wwwCorp
MDM
Quarantine
Enroll
BYOD & MDM Bonjour GW
© 2012 Aerohive Networks CONFIDENTIAL
Security and Authentication Features
Captive Web Portal
11
Wireless Intrusion Prevention
Remote Site Content Security
WIPS
Directory Integration
Private PSK
Multiple CWPs able
to serve scalably
from every AP
Multiple users, same
SSID - easy but unique
revocable keys
• Authentication support for
common directory servers
• Eliminates standalone
RADIUS server
• Credential caching for
remote/branch survivability
Stateful Inspection FW
• MAC (L2) based firewall
• Stateful TCP/IP firewall (L3/L4)
• ALGs for DNS/FTP/SIP
• Policy Based Client Isolation
© 2012 Aerohive Networks CONFIDENTIAL
Cloud-enabled Networking
Routing, VPN and Wired features
12
PoE
• SIP/SCCP/Spectralnk support
• Auto-sensing of IP phones
• 802.1X/Access control
• Dynamic QoS for voice traffic
Unified Wired & Wireless Mgmt
Wi-Fi
Wired
Routing / FW
VPN
Same
Policy and
Network
Address/L3 Service PoE-PSE, 3G/4G USB
L3 IPSec VPN Robust Voice Support
Branch on Demand
© 2012 Aerohive Networks CONFIDENTIAL
Support
Manage
Monitoring and Reporting Features
13
Cloud
Management
Spectrum
Analysis
Client Monitor &
Packet Capture
Simple
GUI
Topology &
Location Tracking
PCI
Compliance
Monitor
Management Views
© 2012 Aerohive Networks CONFIDENTIAL
Less Operational Costs
Less Infrastructure Costs
Reduced Capex and Opex
14
Client Health Score
Good connection
Highdata rates & high
successfultransmissionrates
Marginal connection
Lowerdata rates / lower
successfultransmissionrates
Poor connection
Low data rates / low successful
transmissionrates
Cloud Management
Zero Touch Provisioning Self Healing
Client Health Score
© 2012 Aerohive Networks CONFIDENTIAL
MANAGEMENT PLAN
• ON PREMISE
• L’azienda cliente acquista gli
apparati Aerohive (siano essi Ap
e/o branch router) e
contestualmente l’Hive Manager
Appliance per la gestione degli
apparati, che può essere fisica o
virtuale.
• Gli apparati sono forniti con un
supporto erogato da Aerohive
(obbligatorio il primo anno) che
garantisce assistenza 8x5
telefonica e tramite mail e
sostituzione dell’hardware return to
factory.
• Gli apparati sono di proprietà del
cliente.
• CO-SOURCING (Gestito Miriade)
• L’azienda cliente acquista il
servizio wi-fi Aerohive da Miriade
per tre anni, che fornisce al cliente
gli apparati e gestisce quest’ultimi
tramite la propria Hivemanager
Appliance sulla base delle
indicazioni, regole e policy fornite
dal cliente.
• Mensilmente Miriade fornirà al
cliente una accurata reportistica
delle attività intervenute tramite la
rete wifi Aerohive.
• Miriade fornirà il supporto al
cliente in modalità 8x5 e la
sostituzione dell’hardware return to
factory. Gli apparati rimangono di
proprietà di Miriade.
15
Per maggiori info: commerciale@miriade.it
© 2012 Aerohive Networks CONFIDENTIAL
Q & A
16
Domande ?
Enabling Business Beyond the Corporate Network.
Secure solutions for mobility, cloud and social media.
The Cloud Security Company
3 Trends Transforming IT
90% - Users work from
home or on-the-go
50% - Users who BYOD
Smartphones are now
the world's dominant
computing device.
74% of companies are
using cloud apps
1 in 5 execs have
purchased cloud apps
without IT’s knowledge
SaaS applications
growing 5x faster
than software
75% employees use
Facebook at work
178: average # of social
accounts in the
enterprise
30 billion pieces of
content shared each
month on Facebook.
New IT world requires cloud-based protection
Mobility Cloud Apps Social Media &
streaming
IT transformation has turned traditional security (appliances) upside down.
Mobile users bypasses appliances to access cloud apps and create policy issues.
The Cloud Security Company
Current Approaches: Lots of Appliances or Backhaul Traffic
©2012Zscaler, Inc. All rights reserved.
Anti-spamEncryption Directory
HQ
Mobile devices and
users are usually
unprotected
To save cost of appliances,
customers backhaul traffic
to HQ
 BW cost on MPLS;
Latency
• Lots of point products at DMZ
• Cost, IT overhead
To get same protection,
need to replicate same
appliances at each
office gateway
Cost & Complexity
Regional Office
On-the-goHome or Hotel
URL
AV
Zero-day Web 2.0
ReportingData Loss
Too Costly: Acquiring, deploying, managing appliances
Regional Office
Internet
The Cloud Security Company
Zscaler: Secure Internet Gateway
©2012Zscaler, Inc. All rights reserved.
One Gateway to protect all of your users - on any device, anywhere
Regional
Office
Home
or Hotspot
World’s largest cloud. Integrated security for Web, Mobile & Email
Business enabler of mobility, cloud and social media safely
Hardware
Software
HQ
On-the-go
Global Security Check Post
Enforce business policy
Nothing good leaks out, nothing bad comes in
Web
SaaS
Services
Email
Services
Mobile
Apps
Internet ServicesMobile & Distributed
Workforce
The Cloud Security Company
How it works
©2012Zscaler, Inc. All rights reserved.
Regional
Office
HQ
Internet
Easy to deploy and manage. Enables IT to focus on strategic/architectural issues
MOBILE EMAIL
WEB
Define Policy at
a central portal
Admin
Forward traffic
(Configure FW or router)
Enforce policy bi-
directionally
Home
or Hotel
Same policy for
mobile users
Real-time Visibility
Admin
We provide global infrastructure. You retain full control
The Cloud Security Company
Global Protection by World’s Largest Security Cloud
Purpose-Built Architecture - Multi-tenant, Distributed
Brain/Nervous system, Policy, Real-time threat updates1
Onramp to Internet,
Executes policy
2
Logs consolidated & correlated in real-time4
Policy follows the user to
the nearest ZEN3
NanoLog Clusters
ZEN (N)ZEN2
Zscaler
Enforcement NodeZEN1
Central Authority
Same policy & protection, near-zero latency for a user anywhere
Multi-tenant
Use any Data Center
ShadowPolicyTM
Policy follows the user
Ultra-fast
Little processing latency
High Availability
Failover across DCs
The Cloud Security Company
 No HW, no SW, no client-side agent
 Traffic forwarding
– from the infrastructure – GRE Tunnels, PBR, Proxy chaining
– from the workstations – explicit proxy or PAC file (hosted in cloud)
– Various ways to enforce Cloud usage
 Authentication
– Users & groups have to be known by Zscaler for policies & reporting
– Hosted User Database or Sync. With AD / LDAP
– Registration phase usually requires username & password – only once
» Authentication then is transparent
– SAML / ADFS as an elegant SSO solution for transparent auth.
Deployment considerations
The Cloud Security Company
Why Global 2000 Trust Zscaler Security Cloud
Unparalleled Privacy
 Guaranteed regional log storage
to meet country or region’s
privacy requirements
 Data Obfuscation
 SAS 70 II certified DCs
Secure By Design
 100% secure and encrypted
communication cloud-wide
 55+ Patents Governing Zscaler’s
Developed Cloud Architecture
Data Privacy & Security
Complete Visibility into Cloud
Operations
 Public dashboard of real-time status
– trust.zscaler.com
 300+ Monitors, Every Node, Every
Second
Service Excellence
Commitments
 Real-time Logging, Latency,
Availability Service Level Agreements
Visibility & Transparency
Redundancy at Every Layer
 Within Datacenter: Clustered
 Between Datacenters: 90+
Datacenters Globally with
Automatic Traffic Re-Routing
 Cloud Wide: Multiple World
Class Datacenter and Internet
Service Providers
 Massive Scale: 150 billion
transactions per month
Availability & Scale
Purpose-built architecture for 100% Availability, backed by strong SLAs
The Cloud Security Company
Most Visionary & Market Leader
©2012Zscaler, Inc. All rights reserved.
…the fastest-growing vendor…
…earned the strongest score in
Completeness of Vision…
…cloud has the largest global
footprint…
…Zscaler is a very good candidate for
most enterprises…
“Zscaler exhibits the qualities of a market penetration leader.”
The Cloud Security Company
Pricing Overview: Web Suites
Zscaler Platform
DLP
BW
Web 2.0URL Filtering
Browser
Policy
Adv
Threats
AV/AS
Zscaler Platform
URL Filtering
AV/AS
Policy and
Reporting
Anti-Virus and Anti-Spyware
• Inline ultra-low latency Virus/Spyware protection
• Any file size including multilevel archives
URL Filtering
• User, Group or Location level granularity for Policy
• 6 Classes, 30 Super Categories and 90 Categories
• Dynamic Content Classification of Unknown Sites
• Ability to modify categories or add new categories
Package Features
Advanced
Premium
Benefits Cost
Standard Benefits
• Complete Inbound/Outbound protection
• Enforce Acceptable Usage Policy
• Minimize Productivity and Bandwidth Loss
• Real-Time Reporting of Internet Usage by
Users, Departments or Locations
• Protect all users in office or on the road
Standard Bundle +:
Advanced Threats
• Zero Day Attacks, Browser Vulnerabilities and Bots
• Web 2.0 threats: XSS, Cookie Stealing, Phishing
• Block Anonymizers, P2P, Skype, BitTorrents
Web 2.0 Control
• Granular control of 100 popular Web2.0 apps:
• Facebook, Gmail, YouTube, etc
Benefits
• Protect against latest Web 2.0 threats
• Protect employees’ personal information
• Detect and block proxy-avoidance tools
• Minimize Risk by blocking uncontrolled apps
• Minimize Risk of Infection by enforcing safe
browsers and plugins.
• Limit risk without affecting productivity:
•Allow only HR to post on LinkedIn
•Allow Gmail, but block attachment
Advanced Bundle +:
Data Leakage Prevention
• Scan all web traffic leaving the organization
• Log or Block transactions with confidential data
• Scan Microsoft documents, PDFs and Zipped files
• Predefined dictionaries for:
Credit Cards, SSN, Source Code, Financial or
Medical Statements, Salesforce docs etc.
• Predefined Engines for HIPPA, PCI, etc.
Bandwidth optimization for specific web apps
Web Access Control
• Warn against use of vulnerable browsers/ plugins
Benefits
• Minimize risk due to new Web 2.0 apps
• Scan all webmails, IM attachments, blog posts
• Add another layer towards compliance to
industry or government regulation
• DLP policy at user, department, location level
• Real-Time transaction level reports
•Ensure Webex is not affected by Youtube
Policy and
Reporting
Policy and
Reporting
Zscaler Platform
Web 2.0URL Filtering
Adv
Threats
AV/AS
The Cloud Security Company
Q&A
Domande ?
Vi ringraziamo per l’attenzione!
Per domande o informazioni:
commerciale@miriade.it
www.miriade.it

Contenu connexe

Tendances

Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it managementCisco Canada
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
Stand Out from the SD-WAN Crowd
Stand Out from the SD-WAN CrowdStand Out from the SD-WAN Crowd
Stand Out from the SD-WAN CrowdQOS Networks
 
SD-WAN overview slides
SD-WAN overview slidesSD-WAN overview slides
SD-WAN overview slidesNetworkWiz
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksAerohive Networks
 
Cisco Virtual Managed Services Solution
Cisco Virtual Managed Services SolutionCisco Virtual Managed Services Solution
Cisco Virtual Managed Services SolutionCisco Service Provider
 
SD WAN Cost Savings Strategies
SD WAN Cost Savings StrategiesSD WAN Cost Savings Strategies
SD WAN Cost Savings StrategiesNick Prosser
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
 
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...Nur Shiqim Chok
 
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018   simplifying cloud adoption with cisco ucsCisco connect winnipeg 2018   simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucsCisco Canada
 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...Cisco Canada
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitiveCisco Canada
 
Intelisys Win Case Study
Intelisys Win Case StudyIntelisys Win Case Study
Intelisys Win Case StudyQOS Networks
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Présentation Matinée SD-WAN Waycom & Citrix
Présentation Matinée SD-WAN Waycom & CitrixPrésentation Matinée SD-WAN Waycom & Citrix
Présentation Matinée SD-WAN Waycom & CitrixWaycom
 

Tendances (20)

Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Stand Out from the SD-WAN Crowd
Stand Out from the SD-WAN CrowdStand Out from the SD-WAN Crowd
Stand Out from the SD-WAN Crowd
 
SD-WAN overview slides
SD-WAN overview slidesSD-WAN overview slides
SD-WAN overview slides
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
Cisco Virtual Managed Services Solution
Cisco Virtual Managed Services SolutionCisco Virtual Managed Services Solution
Cisco Virtual Managed Services Solution
 
SD WAN Cost Savings Strategies
SD WAN Cost Savings StrategiesSD WAN Cost Savings Strategies
SD WAN Cost Savings Strategies
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
 
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018   simplifying cloud adoption with cisco ucsCisco connect winnipeg 2018   simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Intelisys Win Case Study
Intelisys Win Case StudyIntelisys Win Case Study
Intelisys Win Case Study
 
NewStar NIMS Profile
NewStar NIMS ProfileNewStar NIMS Profile
NewStar NIMS Profile
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
Présentation Matinée SD-WAN Waycom & Citrix
Présentation Matinée SD-WAN Waycom & CitrixPrésentation Matinée SD-WAN Waycom & Citrix
Présentation Matinée SD-WAN Waycom & Citrix
 

En vedette

Confio Ignite - webinar by Matteo Durighetto
Confio Ignite - webinar by Matteo DurighettoConfio Ignite - webinar by Matteo Durighetto
Confio Ignite - webinar by Matteo DurighettoMiriade Spa
 
Webinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpA
Webinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpAWebinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpA
Webinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpAMiriade Spa
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCloudIDSummit
 
Big Data - Anomaly Detection
Big Data - Anomaly DetectionBig Data - Anomaly Detection
Big Data - Anomaly DetectionMiriade Spa
 
Webinar: "Conosci la Performance Intelligence?" a cura d A. Szambelan
Webinar: "Conosci la Performance Intelligence?" a cura d A. SzambelanWebinar: "Conosci la Performance Intelligence?" a cura d A. Szambelan
Webinar: "Conosci la Performance Intelligence?" a cura d A. SzambelanMiriade Spa
 
Oracle Apex - Presentazione
Oracle Apex - PresentazioneOracle Apex - Presentazione
Oracle Apex - PresentazioneMiriade Spa
 
Dalla Business Intelligence ai Big Data
Dalla Business Intelligence ai Big DataDalla Business Intelligence ai Big Data
Dalla Business Intelligence ai Big DataMiriade Spa
 
Big Data: Analisi del Sentiment
Big Data: Analisi del SentimentBig Data: Analisi del Sentiment
Big Data: Analisi del SentimentMiriade Spa
 

En vedette (8)

Confio Ignite - webinar by Matteo Durighetto
Confio Ignite - webinar by Matteo DurighettoConfio Ignite - webinar by Matteo Durighetto
Confio Ignite - webinar by Matteo Durighetto
 
Webinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpA
Webinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpAWebinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpA
Webinar | Google I/O e le novità di Google Apps | 27 Giugno 2013 | Miriade SpA
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
 
Big Data - Anomaly Detection
Big Data - Anomaly DetectionBig Data - Anomaly Detection
Big Data - Anomaly Detection
 
Webinar: "Conosci la Performance Intelligence?" a cura d A. Szambelan
Webinar: "Conosci la Performance Intelligence?" a cura d A. SzambelanWebinar: "Conosci la Performance Intelligence?" a cura d A. Szambelan
Webinar: "Conosci la Performance Intelligence?" a cura d A. Szambelan
 
Oracle Apex - Presentazione
Oracle Apex - PresentazioneOracle Apex - Presentazione
Oracle Apex - Presentazione
 
Dalla Business Intelligence ai Big Data
Dalla Business Intelligence ai Big DataDalla Business Intelligence ai Big Data
Dalla Business Intelligence ai Big Data
 
Big Data: Analisi del Sentiment
Big Data: Analisi del SentimentBig Data: Analisi del Sentiment
Big Data: Analisi del Sentiment
 

Similaire à Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistema mobile

cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderErik Ginalick
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeADVA
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvisdickcraigson
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBMWebrazzi
 
SwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptxSwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptxWILFRIEDKOUASSIKAN
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 

Similaire à Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistema mobile (20)

SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvis
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
 
SwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptxSwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptx
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Forecast deploy2 100_eb
Forecast deploy2 100_ebForecast deploy2 100_eb
Forecast deploy2 100_eb
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 

Plus de Miriade Spa

Iperconvergenza: Nutanix e la rivoluzione dei datacenter
Iperconvergenza: Nutanix e la rivoluzione dei datacenterIperconvergenza: Nutanix e la rivoluzione dei datacenter
Iperconvergenza: Nutanix e la rivoluzione dei datacenterMiriade Spa
 
Quanto è digitale la tua azienda?
Quanto è digitale la tua azienda?Quanto è digitale la tua azienda?
Quanto è digitale la tua azienda?Miriade Spa
 
Big Data | Gdo e Social Media
Big Data | Gdo e Social MediaBig Data | Gdo e Social Media
Big Data | Gdo e Social MediaMiriade Spa
 
Big Data e Manifatturiero: gestione del magazzino
Big Data e Manifatturiero: gestione del magazzinoBig Data e Manifatturiero: gestione del magazzino
Big Data e Manifatturiero: gestione del magazzinoMiriade Spa
 
Application Development: come sviluppare un'app user centered
Application Development: come sviluppare un'app user centeredApplication Development: come sviluppare un'app user centered
Application Development: come sviluppare un'app user centeredMiriade Spa
 
System integration - I servizi Miriade
System integration - I servizi MiriadeSystem integration - I servizi Miriade
System integration - I servizi MiriadeMiriade Spa
 
I vantaggi del cloud
I vantaggi del cloudI vantaggi del cloud
I vantaggi del cloudMiriade Spa
 
Come gestire un progetto Big Data
Come gestire un progetto Big DataCome gestire un progetto Big Data
Come gestire un progetto Big DataMiriade Spa
 
PostgreSQL - Hadoop: Why not? - PGDay.IT 2016
PostgreSQL - Hadoop: Why not? - PGDay.IT 2016PostgreSQL - Hadoop: Why not? - PGDay.IT 2016
PostgreSQL - Hadoop: Why not? - PGDay.IT 2016Miriade Spa
 
PostgrSQL 9.3&9.4 - DjangoVillage
PostgrSQL 9.3&9.4 - DjangoVillagePostgrSQL 9.3&9.4 - DjangoVillage
PostgrSQL 9.3&9.4 - DjangoVillageMiriade Spa
 
Full text search | Speech by Matteo Durighetto | PGDay.IT 2013
Full text search | Speech by Matteo Durighetto | PGDay.IT 2013 Full text search | Speech by Matteo Durighetto | PGDay.IT 2013
Full text search | Speech by Matteo Durighetto | PGDay.IT 2013 Miriade Spa
 
PostgreSQL in HA per Healthcare
PostgreSQL in HA per HealthcarePostgreSQL in HA per Healthcare
PostgreSQL in HA per HealthcareMiriade Spa
 

Plus de Miriade Spa (12)

Iperconvergenza: Nutanix e la rivoluzione dei datacenter
Iperconvergenza: Nutanix e la rivoluzione dei datacenterIperconvergenza: Nutanix e la rivoluzione dei datacenter
Iperconvergenza: Nutanix e la rivoluzione dei datacenter
 
Quanto è digitale la tua azienda?
Quanto è digitale la tua azienda?Quanto è digitale la tua azienda?
Quanto è digitale la tua azienda?
 
Big Data | Gdo e Social Media
Big Data | Gdo e Social MediaBig Data | Gdo e Social Media
Big Data | Gdo e Social Media
 
Big Data e Manifatturiero: gestione del magazzino
Big Data e Manifatturiero: gestione del magazzinoBig Data e Manifatturiero: gestione del magazzino
Big Data e Manifatturiero: gestione del magazzino
 
Application Development: come sviluppare un'app user centered
Application Development: come sviluppare un'app user centeredApplication Development: come sviluppare un'app user centered
Application Development: come sviluppare un'app user centered
 
System integration - I servizi Miriade
System integration - I servizi MiriadeSystem integration - I servizi Miriade
System integration - I servizi Miriade
 
I vantaggi del cloud
I vantaggi del cloudI vantaggi del cloud
I vantaggi del cloud
 
Come gestire un progetto Big Data
Come gestire un progetto Big DataCome gestire un progetto Big Data
Come gestire un progetto Big Data
 
PostgreSQL - Hadoop: Why not? - PGDay.IT 2016
PostgreSQL - Hadoop: Why not? - PGDay.IT 2016PostgreSQL - Hadoop: Why not? - PGDay.IT 2016
PostgreSQL - Hadoop: Why not? - PGDay.IT 2016
 
PostgrSQL 9.3&9.4 - DjangoVillage
PostgrSQL 9.3&9.4 - DjangoVillagePostgrSQL 9.3&9.4 - DjangoVillage
PostgrSQL 9.3&9.4 - DjangoVillage
 
Full text search | Speech by Matteo Durighetto | PGDay.IT 2013
Full text search | Speech by Matteo Durighetto | PGDay.IT 2013 Full text search | Speech by Matteo Durighetto | PGDay.IT 2013
Full text search | Speech by Matteo Durighetto | PGDay.IT 2013
 
PostgreSQL in HA per Healthcare
PostgreSQL in HA per HealthcarePostgreSQL in HA per Healthcare
PostgreSQL in HA per Healthcare
 

Dernier

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Dernier (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistema mobile

  • 1. Le soluzioni tecnologiche per il nuovo ecosistema Mobile: Aerohive Networks e ZScaler Martedì, 28 Maggio 2013
  • 2. Miriade Spa, società di consulenza informatica con sede a Thiene (VI), pone al centro della propria attività il patrimonio informativo delle imprese, fornendo soluzioni per la protezione, l'integrazione e l'analisi dei dati aziendali. L'azienda fondata nel 2000 ha un organico di 35 dipendenti. La geometria aziendale è articolata in 6 aree tecniche: Architecture, Intelligence +, Database, Development, Cloud, Mobility. Tra le diverse realtà con le quali collaboriamo segnaliamo: Diesel, Benetton, Calzedonia, Tecnica, Lotto.
  • 4. © 2012 Aerohive Networks CONFIDENTIAL Introduction to Aerohive: 4 • Visionary Network Infrastructure Company › Cloud-enabled, Controller-less Wi-Fi, Routing, VPN, Switching › 5000+ Customers › 350+ Employees › Most Visionary Vendor - Gartner MQ for Wired & Wireless LAN 2012 Branch & Teleworker Routers Enterprise Wi-Fi Cloud Services Platform Public Partner Private (on-premise) EducationEnterpriseHealthcare Retail Logistics Switches
  • 5. © 2012 Aerohive Networks CONFIDENTIAL New Requirements of the Network Edge 5 Users want to work anywhere, on any device You need to enable them, without drowning in complexity $X Yesterday Today • Corp deployed enterprise devices • WLAN overlay • Network centric • Monolithic • Corp / BYOD enterprise / consumer devices • Ubiquitous Wi-Fi Access • User Centric • Elastic Cloud-enabled, self organizing, service aware, identity-based infrastructure Aerohive Networks - Simpli-fi Enterprise Networking
  • 6. © 2012 Aerohive Networks CONFIDENTIAL Enterprise Deployments 6 HQ Retail Edu iPad1:1 Faculty, Guests Apple TVs Branch Unified Wired, Wi-Fi, VPN, FW Virtualized Mgmt & VPN Termination Wi-Fi Primary Access Guest, Corp, BYOD Guest, Corp, BYOD Teleworker Work, Home, 4G, Cloud Security Credit Cards. PCI, Inventory, Voice, Kiosks Logistics Coverage, Reliability, Voice Picking, Outdoor Healthcare EMR, eMAR, Asset Tracking, Voice MessagingHigh Density, AD integration, Bonjour, Ease of Use Cloud-enabled Data Center Performance, Receive Sensitivity, MDM enrollment
  • 7. © 2012 Aerohive Networks CONFIDENTIAL No data bottlenecks Service Level Agreements QoS & Spectrum analysis included Distributed (Controller-less) Wi-Fi Architecture Delivering simplicity, reliability and affordability 7 Management Redundancy Scalability and future proofing Performance Centralized cloud-based or Local management Management within the network only No single point of failure Self healing mesh architecture No controller tax Requires multiple controllers Local data forwarding..what do you lose? No feature licensing Start small and grow Distributed intelligence Controller capacity? Feature licenses? Data bottlenecks QoS, Spectrum analysis..$$$ (FW, RADIUS, CWP, BYOD, Bonjour GW) How does it work? Architectural Alternatives Central Vs. Distrib. Control
  • 8. © 2012 Aerohive Networks CONFIDENTIAL How does it work? 8 A single HiveAP by itself acts as a full-featured enterprise class access point Identity-based security, including stateful inspection FW, rogue detection & mitigation Airtime Scheduling, SLA compliance and local forwarding implemented at the edge HiveAPs are discovered, policy is pushed and the WLAN is operational HiveManager is a single mgmt interface for configuration, OS updates & monitoring of thousands of devices With a second HiveAP, fast stateful roaming, cooperative RF, station load balancing and seamless resiliency are enabled Mesh networking and best path forwarding can be used for extra resiliency and reachability Dynamically reroutes around failures As more HiveAPs are added, coverage, reliability and backhaul bandwidth increases Cooperative RF power levels minimize co-channel interference With Cooperative Control, clients can securely and seamlessly roam across the WLAN Dynamic best path forwarding and stateful roaming provides resiliency without a single point of failure With Cooperative Control, clients can securely and seamlessly roam across the WLAN Wireless Network Wired Network   HiveManager NMS Reporting Heat Maps SLA Compliance Policy Configuration
  • 9. © 2012 Aerohive Networks CONFIDENTIAL Load Balancing Layer 3 Roaming 5 GHz Resilient Mesh Layer 2 Roaming Band Steering 2.4 GHz 54Mbps 450Mbps 11Mbps SLA, QoS & Dynamic Airtime Scheduling High Powered Radios, Receive Sensitivity & RRM Enterprise Wi-Fi Features Optimization Mobility 9 Distribution Receive SensitivityLayer 2/3 Roaming
  • 10. © 2012 Aerohive Networks CONFIDENTIAL BYO and Corp Deployed Devices Access defined by ID & Device RADIUSPPSKCWP L2-4 Firewall Corp userCorp user - BYODGuest user CORP Policy Corp VLAN LAN & Web FW 10Mbps per user 24HR Access BYOD Policy Restricted VLAN Email & Web FW 5Mbps per user M-F 8am-9pm GUEST Policy DMZ Web Only FW 1Mbps per user M-F 9am-5pm User Profiles 10 OS Detection MDM Enrollment Bonjour Gateway www Corp Guest, BYOD AppleTV (AirPlay) Printer (AirPrint) Bonjour wwwCorp MDM Quarantine Enroll BYOD & MDM Bonjour GW
  • 11. © 2012 Aerohive Networks CONFIDENTIAL Security and Authentication Features Captive Web Portal 11 Wireless Intrusion Prevention Remote Site Content Security WIPS Directory Integration Private PSK Multiple CWPs able to serve scalably from every AP Multiple users, same SSID - easy but unique revocable keys • Authentication support for common directory servers • Eliminates standalone RADIUS server • Credential caching for remote/branch survivability Stateful Inspection FW • MAC (L2) based firewall • Stateful TCP/IP firewall (L3/L4) • ALGs for DNS/FTP/SIP • Policy Based Client Isolation
  • 12. © 2012 Aerohive Networks CONFIDENTIAL Cloud-enabled Networking Routing, VPN and Wired features 12 PoE • SIP/SCCP/Spectralnk support • Auto-sensing of IP phones • 802.1X/Access control • Dynamic QoS for voice traffic Unified Wired & Wireless Mgmt Wi-Fi Wired Routing / FW VPN Same Policy and Network Address/L3 Service PoE-PSE, 3G/4G USB L3 IPSec VPN Robust Voice Support Branch on Demand
  • 13. © 2012 Aerohive Networks CONFIDENTIAL Support Manage Monitoring and Reporting Features 13 Cloud Management Spectrum Analysis Client Monitor & Packet Capture Simple GUI Topology & Location Tracking PCI Compliance Monitor Management Views
  • 14. © 2012 Aerohive Networks CONFIDENTIAL Less Operational Costs Less Infrastructure Costs Reduced Capex and Opex 14 Client Health Score Good connection Highdata rates & high successfultransmissionrates Marginal connection Lowerdata rates / lower successfultransmissionrates Poor connection Low data rates / low successful transmissionrates Cloud Management Zero Touch Provisioning Self Healing Client Health Score
  • 15. © 2012 Aerohive Networks CONFIDENTIAL MANAGEMENT PLAN • ON PREMISE • L’azienda cliente acquista gli apparati Aerohive (siano essi Ap e/o branch router) e contestualmente l’Hive Manager Appliance per la gestione degli apparati, che può essere fisica o virtuale. • Gli apparati sono forniti con un supporto erogato da Aerohive (obbligatorio il primo anno) che garantisce assistenza 8x5 telefonica e tramite mail e sostituzione dell’hardware return to factory. • Gli apparati sono di proprietà del cliente. • CO-SOURCING (Gestito Miriade) • L’azienda cliente acquista il servizio wi-fi Aerohive da Miriade per tre anni, che fornisce al cliente gli apparati e gestisce quest’ultimi tramite la propria Hivemanager Appliance sulla base delle indicazioni, regole e policy fornite dal cliente. • Mensilmente Miriade fornirà al cliente una accurata reportistica delle attività intervenute tramite la rete wifi Aerohive. • Miriade fornirà il supporto al cliente in modalità 8x5 e la sostituzione dell’hardware return to factory. Gli apparati rimangono di proprietà di Miriade. 15 Per maggiori info: commerciale@miriade.it
  • 16. © 2012 Aerohive Networks CONFIDENTIAL Q & A 16 Domande ?
  • 17. Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media.
  • 18. The Cloud Security Company 3 Trends Transforming IT 90% - Users work from home or on-the-go 50% - Users who BYOD Smartphones are now the world's dominant computing device. 74% of companies are using cloud apps 1 in 5 execs have purchased cloud apps without IT’s knowledge SaaS applications growing 5x faster than software 75% employees use Facebook at work 178: average # of social accounts in the enterprise 30 billion pieces of content shared each month on Facebook. New IT world requires cloud-based protection Mobility Cloud Apps Social Media & streaming IT transformation has turned traditional security (appliances) upside down. Mobile users bypasses appliances to access cloud apps and create policy issues.
  • 19. The Cloud Security Company Current Approaches: Lots of Appliances or Backhaul Traffic ©2012Zscaler, Inc. All rights reserved. Anti-spamEncryption Directory HQ Mobile devices and users are usually unprotected To save cost of appliances, customers backhaul traffic to HQ  BW cost on MPLS; Latency • Lots of point products at DMZ • Cost, IT overhead To get same protection, need to replicate same appliances at each office gateway Cost & Complexity Regional Office On-the-goHome or Hotel URL AV Zero-day Web 2.0 ReportingData Loss Too Costly: Acquiring, deploying, managing appliances Regional Office Internet
  • 20. The Cloud Security Company Zscaler: Secure Internet Gateway ©2012Zscaler, Inc. All rights reserved. One Gateway to protect all of your users - on any device, anywhere Regional Office Home or Hotspot World’s largest cloud. Integrated security for Web, Mobile & Email Business enabler of mobility, cloud and social media safely Hardware Software HQ On-the-go Global Security Check Post Enforce business policy Nothing good leaks out, nothing bad comes in Web SaaS Services Email Services Mobile Apps Internet ServicesMobile & Distributed Workforce
  • 21. The Cloud Security Company How it works ©2012Zscaler, Inc. All rights reserved. Regional Office HQ Internet Easy to deploy and manage. Enables IT to focus on strategic/architectural issues MOBILE EMAIL WEB Define Policy at a central portal Admin Forward traffic (Configure FW or router) Enforce policy bi- directionally Home or Hotel Same policy for mobile users Real-time Visibility Admin We provide global infrastructure. You retain full control
  • 22. The Cloud Security Company Global Protection by World’s Largest Security Cloud Purpose-Built Architecture - Multi-tenant, Distributed Brain/Nervous system, Policy, Real-time threat updates1 Onramp to Internet, Executes policy 2 Logs consolidated & correlated in real-time4 Policy follows the user to the nearest ZEN3 NanoLog Clusters ZEN (N)ZEN2 Zscaler Enforcement NodeZEN1 Central Authority Same policy & protection, near-zero latency for a user anywhere Multi-tenant Use any Data Center ShadowPolicyTM Policy follows the user Ultra-fast Little processing latency High Availability Failover across DCs
  • 23. The Cloud Security Company  No HW, no SW, no client-side agent  Traffic forwarding – from the infrastructure – GRE Tunnels, PBR, Proxy chaining – from the workstations – explicit proxy or PAC file (hosted in cloud) – Various ways to enforce Cloud usage  Authentication – Users & groups have to be known by Zscaler for policies & reporting – Hosted User Database or Sync. With AD / LDAP – Registration phase usually requires username & password – only once » Authentication then is transparent – SAML / ADFS as an elegant SSO solution for transparent auth. Deployment considerations
  • 24. The Cloud Security Company Why Global 2000 Trust Zscaler Security Cloud Unparalleled Privacy  Guaranteed regional log storage to meet country or region’s privacy requirements  Data Obfuscation  SAS 70 II certified DCs Secure By Design  100% secure and encrypted communication cloud-wide  55+ Patents Governing Zscaler’s Developed Cloud Architecture Data Privacy & Security Complete Visibility into Cloud Operations  Public dashboard of real-time status – trust.zscaler.com  300+ Monitors, Every Node, Every Second Service Excellence Commitments  Real-time Logging, Latency, Availability Service Level Agreements Visibility & Transparency Redundancy at Every Layer  Within Datacenter: Clustered  Between Datacenters: 90+ Datacenters Globally with Automatic Traffic Re-Routing  Cloud Wide: Multiple World Class Datacenter and Internet Service Providers  Massive Scale: 150 billion transactions per month Availability & Scale Purpose-built architecture for 100% Availability, backed by strong SLAs
  • 25. The Cloud Security Company Most Visionary & Market Leader ©2012Zscaler, Inc. All rights reserved. …the fastest-growing vendor… …earned the strongest score in Completeness of Vision… …cloud has the largest global footprint… …Zscaler is a very good candidate for most enterprises… “Zscaler exhibits the qualities of a market penetration leader.”
  • 26. The Cloud Security Company Pricing Overview: Web Suites Zscaler Platform DLP BW Web 2.0URL Filtering Browser Policy Adv Threats AV/AS Zscaler Platform URL Filtering AV/AS Policy and Reporting Anti-Virus and Anti-Spyware • Inline ultra-low latency Virus/Spyware protection • Any file size including multilevel archives URL Filtering • User, Group or Location level granularity for Policy • 6 Classes, 30 Super Categories and 90 Categories • Dynamic Content Classification of Unknown Sites • Ability to modify categories or add new categories Package Features Advanced Premium Benefits Cost Standard Benefits • Complete Inbound/Outbound protection • Enforce Acceptable Usage Policy • Minimize Productivity and Bandwidth Loss • Real-Time Reporting of Internet Usage by Users, Departments or Locations • Protect all users in office or on the road Standard Bundle +: Advanced Threats • Zero Day Attacks, Browser Vulnerabilities and Bots • Web 2.0 threats: XSS, Cookie Stealing, Phishing • Block Anonymizers, P2P, Skype, BitTorrents Web 2.0 Control • Granular control of 100 popular Web2.0 apps: • Facebook, Gmail, YouTube, etc Benefits • Protect against latest Web 2.0 threats • Protect employees’ personal information • Detect and block proxy-avoidance tools • Minimize Risk by blocking uncontrolled apps • Minimize Risk of Infection by enforcing safe browsers and plugins. • Limit risk without affecting productivity: •Allow only HR to post on LinkedIn •Allow Gmail, but block attachment Advanced Bundle +: Data Leakage Prevention • Scan all web traffic leaving the organization • Log or Block transactions with confidential data • Scan Microsoft documents, PDFs and Zipped files • Predefined dictionaries for: Credit Cards, SSN, Source Code, Financial or Medical Statements, Salesforce docs etc. • Predefined Engines for HIPPA, PCI, etc. Bandwidth optimization for specific web apps Web Access Control • Warn against use of vulnerable browsers/ plugins Benefits • Minimize risk due to new Web 2.0 apps • Scan all webmails, IM attachments, blog posts • Add another layer towards compliance to industry or government regulation • DLP policy at user, department, location level • Real-Time transaction level reports •Ensure Webex is not affected by Youtube Policy and Reporting Policy and Reporting Zscaler Platform Web 2.0URL Filtering Adv Threats AV/AS
  • 27. The Cloud Security Company Q&A Domande ?
  • 28. Vi ringraziamo per l’attenzione! Per domande o informazioni: commerciale@miriade.it www.miriade.it

Notes de l'éditeur

  1. Users want to WORK anywhere on any device You want to let them without drowning in complexity or compromising security, reliability and affordability. YesterdayCorp deployed enterprise devices desktop, laptop, handsets, scannersWLAN overlay coverage, convenience, HQ orientatedNetwork centric policy based on rigid, port/VLAN & SSIDMonolithic “Build it and they will come” scalabilityTodayCorp / BYOD enterprise / consumer devices laptop, smart phone, tablet, Apple TVs, “AirPrint” PrintersUbiquitous Wi-Fi Access capacity, performance, mission-critical, extended enterpriseUser Centric Consistent policy based on identity, role, contextElasticPay for what you need - leverage the cloudAerohive gives you the ability to achieve this simpli-fi-ing enterprise networking by delivering a self organizing, service aware, identity based infrastructure.