SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Security Proposal
for your network
Index
•Why we need Watch Guard?
•Network diagram
•Security Solution
•Logs and report
Companies Increasingly “Like” Social Media




                        Robert Half Technology. “SOCIAL WORK? More Companies Permit Social Networking on the
                        Job”. May 26, 2011. Retrieved from: http://rht.mediaroom.com/2011SocialMediaPolicies
Users and Applications are Out
of Control!




                1. Retrieved from: http://www.allfacebook.com/facebook-games-statistics-2010-09
                2. Retrieved from http://www.freemusictodownload.eu/p2p-statistics.html
                3. Sources: X-Force, Websense, Whitehat Security, Imperva, 7Scan
Social Networks Threaten
Productivity
You Can’t Control What You Can’t See
   • Traditional port-based firewalls lack the ability to
     see, let alone control, many apps
   • Productivity Loss
       •   Bandwidth-hungry apps slow networks
   • Data Loss / Attack Vector
      • Social networks breed a culture of trust
      • Rife with technical vulnerabilities
WatchGuard Solves Your Problem




      See the                              Restrict
                      Enable secure
   applications in                     unproductive,
                      & productive
    use on your                          insecure &
                     business use of
      network                            bandwidth
                       applications
                                       draining usage
How WatchGuard Solves Your Problem

   Identification, control, and reporting on
   1800+ applications and sub-functions


   Applications easy to find – organized by
   category and searchable by query



   Broad and granular control of applications




   Integration with firewall policy table
Network Visibility is Essential
• Rich reporting on App usage, users, categories, blocked
  applications, top clients, and more!
Intuitive Organization Simplifies
Your Workflow
• Find applications by category (e.g. Social Network) OR
• Query search by application name (e.g. Facebook)
Security Your Way – Broad
Control
• Establish policy broadly across application category
Security Your Way – Granular
Control
 • Exercise control by user, category, application, &
   application sub-function
Why WatchGuard Wins with
        Application Control
                                                                                   vs. Palo Alto
   vs. Fortinet                   vs. Cisco             vs. SonicWall               Networks

• 1800 applications vs.    • WatchGuard has         • Application rules      • Part of UTM bundle
  1200 for Fortinet          Application Control;     integrated with main     (AV, spamBlocker, etc.)
• Ease of configuration      Cisco ASA does not!      policy table           • 1800 applications vs.
  (search; rules for                                • Application Control      1300 for PaloAlto
  multiple applications)                              ease of use (e.g.      • Application Control in
• Integrated application                              search)                  appliance line,
  reporting                                                                    including tabletops




                       Watch Application Control Video
             http://www.watchguard.com/latest/appcontrol-demo.asp
XTM Defense-In-Depth In
Action
WatchGuard vs. Web 2.0 Security Issues

                    • Snags malware, scareware, spyware and
        GAV           malicious scripts



        IPS         • Prevents drive-by-download attacks



                    • Cloud-based service protects you from
        RED           legitimate sites infected with malware

                    • Enables granular control by user, group, or
    Application
                      IP; and separate control over actions for
     Control          view, post, chat, apps, games, and video
Cornerstone – The Application
Proxy
Packet Reassembly – since 1996


 An Application Proxy checks Source IP, Destination IP, Port, Protocol
 If a matching rule (or service) is found:
 The proxy then performs deep inspection on the content of the
 packet, including application layer data.




This is the key to finding threats that OTHER FIREWALLS MISS!
Fireware XTM: Making the Most of
Your Network
        QoS and Traffic Shaping
        • High-priority traffic gets bandwidth
        • Low-priority traffic gets available bandwidth

        Multi-WAN Support
        • Up to 4 WAN connections supported
        • Traffic can use multiple WAN connections
          simultaneously or on a failover

        VPN Failover
        • Mission-critical VPN traffic keeps flowing if a remote
          site becomes unavailable
        • Traffic automatically fails-over to another gateway

        IPv6 Readiness
        • IPv6 Ready Gold Logo validates IPv6 routing
        • All XTM appliances will support IPv6
Managing XTM Solutions:
Flexibility
Choose from three user interface options: Administer your way

                                             Command Line Interface




       WatchGuard Systems
       Manager Interface
                                                 Web Interface
Suite of tabbed tools deliver
Managing XTM Solutions: Real-
                           information needed to monitor
                             and react to network status     Take instant remediative

Time Visibility                                              action, such as adding a
                                                             site to a blocked sites list


 Real-time monitoring lets you take instant action to
 protect your network.
XTM Multi-Box Management
Saves Time
 Simultaneously manage from 2 to 100’s of boxes.

                                                    Implementing the
                                                    WatchGuard solution
                                                    was a breeze. The policy
                                                    setting and system
                                                    configuration is easy
                   Align security policies across   because it is all very
                    an organization – or apply      logical and
                   modifications between boxes      straightforward.
                                                    Francis Lim, IT
                                                    Manager, Eurokars
                                                    Group
Securely Connecting Users:
VPN
• Create VPN by simple drag and drop
• Connect any location with Internet access
• Select from IPSec, SSL, PPTP
• Choose your device: laptop, smartphone, tablet
• Define flexible rules to restrict data access to
  authorized individuals only
• Use client or clientless options



    I can’t remember the last time I had to call
    someone with a security problem. With
    WatchGuard, we are always connected.
    Lucas Goh, Head of IT Operations for
    Asia, Berg Propulsion
What is “Next-
    Generation”?
                               “Firewalls need to evolve to be more proactive in
                               blocking new threats, such as botnets and targeted
                               attacks. Enterprises need to update their network
                               firewall and intrusion prevention capabilities to
                               protect business systems as attacks get more
                               sophisticated.”


(XTM = Next-Generation UTM) “XTM platforms will take
security appliances beyond traditional boundaries by
vastly expanding security features, networking capabilities
and management flexibility.”
Next-Generation
Security Solutions                   Next-
LiveSecurity®                      Generation
                                    Firewall
Application Control                  Bundle

Intrusion Prevention Service

Gateway AntiVirus                  Security
                                   Bundle
Reputation Enabled Defense (RED)

WebBlocker

spamBlocker
Best-In-Class Security
XTM Performance & Value =
 Market Leadership
                                                         Market Share Q3 2011

       WatchGuard



        Check Point



          SonicWall



            McAfee



            Fortinet



               Cisco


                       $0      $2,000,000   $4,000,000    $6,000,000   $8,000,000   $10,000,000   $12,000,000   $14,000,000   $16,000,000   $18,000,000   $20,000,000

                               Cisco                Fortinet               McAfee                  SonicWall             Check Point             WatchGuard
Market Share Q3 2011        $8,332,580            $10,575,907            $11,366,568              $13,537,362            $12,743,382             $17,306,073

 Source: 2011 Infonetics, 3Q11 Network Security Appliance and Software Worldwide and Regional Market Share.
Industry-Leading Value
                                                                                               “The company is
                                                                                               strong, the products
                                                                                               able, and the
                                                                                               pricing can’t be
                                                                                               beat.”




 Source: Info-Tech Research Group. Vendor Landscape: Unified Threat Management. August 2011.
Why WatchGuard Wins
                                                                                  vs. Palo Alto
   vs. Fortinet                    vs. Cisco             vs. SonicWall
                                                                                   Networks

• General purpose CPU       • Application Control   • Simpler admin. task    • Gateway AntiVirus
  beats ASIC for security   • HTTPS inspection        flows                    detects malware in all
• Real-time visibility      • Tightly integrated    • Application Control      compressed file
  tools                       security services       ease of use (e.g.        formats
• 65 bundled reports        • UTM performance         search)                • Email security and anti-
  vs. only 2                                        • 2.5 million AV           spam capabilities
                            • Simple VPN setup
• Multi-WAN                                           signatures vs 25,000   • Comprehensive
                                                    • Model upgrades by        appliance line,
• Traffic shaping
                                                      license key              including tabletops
• VPN setup wizard



                            Watch Video Comparisons
                http://www.watchguard.com/latest/us-vs-them.asp
Moving Security Forward with
Watchguard XTM
 • “Best-in-class” security for comprehensive protection
 • Recognized security “Trend Setter”, industry “Champion”,
   and “Leader”
 • 65 reports included at no extra cost
 • Real-time monitoring
 • Intuitive set-up wizards
 • Multi-WAN support
 • Market-leading value
Why we need Watch guard
•Manage users to access internet.
•Filtering content and url of the website.
•Filtering by keyword
•Filtering and inspect HTTPS.
•Web blocker has over 54 categories for IT manager to manage the
internet access.
•Report and logs all content accessed by users.
•Secure e-mail and web access.
•Can be integrated to the Domain controller to apply the policy to manage
users.

  Watchguard is not only a simple firewall but also
  it is a good tools for IT Manager to manage their
  network.
Network and user
                  management.
E-mail security
Watchguard XTM features




              Application control
Watchguard – integated solutions.


  Protects networks by integrating best-in-class security
   technologies that enable businesses to manage risks,
        empower people and improve efficiencies.
Watchguard XTM features
WatchGuard: Industry Leader
Gartner
Named “Leader” in Magic Quadrant
Multifunction Firewalls
IDC
“WatchGuard, one of the first security
appliance vendors, will remain a
leader in this market going forward.”
Frost & Sullivan
“WatchGuard is on its track of
becoming a major participant in the
enterprise-UTM market.”
“Measurements have indicated that
WatchGuard has chipped away the market
share formally held by Fortinet, Cisco, and
Juniper.”
Defense-in-Depth — XTM
           WatchGuard Extensible Threat Management


              VPN          Stateful       Content
                           Firewall       Security

                 Layered Security                    
              SSL            Deep       Reputation
             IPSEC          Packet       Enabled
                          Inspection     Defense
                                         Gateway
                                         Antivirus
                                          Intrusion
             Centralized                 Prevention
                                           Spam
             Management                  Protection
            Rich Reporting                  URL
              Real-Time                   Filtering
             Monitoring                 Application
                                         Control
WatchGuard XTM Series: Unified Threat Management



 Sized for small businesses to the enterprise
 All-in-one network security
 Firewall Integrated with Advance networking features
 SSL and IPSec VPN (MUVPN/BOVPN)
 Reputation Enabled Defense (Cloud Security Services)
 WebBlocker (including full HTTPS inspection)
 SpamBlocker
 Gateway Anti-Virus/Intrusion Prevention Services
 Application Control (More than 1800 signatures!)
 Three management interfaces–console, web UI, CLI
 Reporting and real-time monitoring–at no extra cost
 Model-upgradeable within each series
WatchGuard XTM 5 Series
 Recommended for main offices/
 headquarters with up to 1,500
 users
 Performance driven security for
 growing mid-size businesses
 Up to 2.3 Gbps firewall
 throughput
 Full HTTPS inspection and VoIP
 support.
 Model-upgradeable
Logs and reports
• Watchguard does not keep the logs and reports in the same
box.
•Watchguard recommends customer to use another computer
running Win XP to install logs and report management
software to run as Report and Logs server.
• This idea is really good for customer to manage and backup
the logs and report information.
• Log information could be stored for many years.
Gain Visibility.

               Gain Insight.

                        Gain Control.


WatchGuard Application Control


                Thank You!

Contenu connexe

Tendances

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-enLee Dalton
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityEC-Council
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2EC-Council
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningSymantec
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture InnoTech
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 

Tendances (20)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 

Similaire à Watchguard security proposal 2012

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 

Similaire à Watchguard security proposal 2012 (20)

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 

Plus de Jimmy Saigon

Invite god comes to your boat
Invite god comes to your boatInvite god comes to your boat
Invite god comes to your boatJimmy Saigon
 
F5 link controller
F5  link controllerF5  link controller
F5 link controllerJimmy Saigon
 
Christie Digital Display solution.
Christie Digital Display solution.Christie Digital Display solution.
Christie Digital Display solution.Jimmy Saigon
 
F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction Jimmy Saigon
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Polycom introduction vietnamese
Polycom introduction   vietnamesePolycom introduction   vietnamese
Polycom introduction vietnameseJimmy Saigon
 

Plus de Jimmy Saigon (7)

God ‘s love
God ‘s loveGod ‘s love
God ‘s love
 
Invite god comes to your boat
Invite god comes to your boatInvite god comes to your boat
Invite god comes to your boat
 
F5 link controller
F5  link controllerF5  link controller
F5 link controller
 
Christie Digital Display solution.
Christie Digital Display solution.Christie Digital Display solution.
Christie Digital Display solution.
 
F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Polycom introduction vietnamese
Polycom introduction   vietnamesePolycom introduction   vietnamese
Polycom introduction vietnamese
 

Dernier

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Watchguard security proposal 2012

  • 2. Index •Why we need Watch Guard? •Network diagram •Security Solution •Logs and report
  • 3. Companies Increasingly “Like” Social Media Robert Half Technology. “SOCIAL WORK? More Companies Permit Social Networking on the Job”. May 26, 2011. Retrieved from: http://rht.mediaroom.com/2011SocialMediaPolicies
  • 4. Users and Applications are Out of Control! 1. Retrieved from: http://www.allfacebook.com/facebook-games-statistics-2010-09 2. Retrieved from http://www.freemusictodownload.eu/p2p-statistics.html 3. Sources: X-Force, Websense, Whitehat Security, Imperva, 7Scan
  • 6. You Can’t Control What You Can’t See • Traditional port-based firewalls lack the ability to see, let alone control, many apps • Productivity Loss • Bandwidth-hungry apps slow networks • Data Loss / Attack Vector • Social networks breed a culture of trust • Rife with technical vulnerabilities
  • 7. WatchGuard Solves Your Problem See the Restrict Enable secure applications in unproductive, & productive use on your insecure & business use of network bandwidth applications draining usage
  • 8. How WatchGuard Solves Your Problem Identification, control, and reporting on 1800+ applications and sub-functions Applications easy to find – organized by category and searchable by query Broad and granular control of applications Integration with firewall policy table
  • 9. Network Visibility is Essential • Rich reporting on App usage, users, categories, blocked applications, top clients, and more!
  • 10. Intuitive Organization Simplifies Your Workflow • Find applications by category (e.g. Social Network) OR • Query search by application name (e.g. Facebook)
  • 11. Security Your Way – Broad Control • Establish policy broadly across application category
  • 12. Security Your Way – Granular Control • Exercise control by user, category, application, & application sub-function
  • 13. Why WatchGuard Wins with Application Control vs. Palo Alto vs. Fortinet vs. Cisco vs. SonicWall Networks • 1800 applications vs. • WatchGuard has • Application rules • Part of UTM bundle 1200 for Fortinet Application Control; integrated with main (AV, spamBlocker, etc.) • Ease of configuration Cisco ASA does not! policy table • 1800 applications vs. (search; rules for • Application Control 1300 for PaloAlto multiple applications) ease of use (e.g. • Application Control in • Integrated application search) appliance line, reporting including tabletops Watch Application Control Video http://www.watchguard.com/latest/appcontrol-demo.asp
  • 14. XTM Defense-In-Depth In Action WatchGuard vs. Web 2.0 Security Issues • Snags malware, scareware, spyware and GAV malicious scripts IPS • Prevents drive-by-download attacks • Cloud-based service protects you from RED legitimate sites infected with malware • Enables granular control by user, group, or Application IP; and separate control over actions for Control view, post, chat, apps, games, and video
  • 15. Cornerstone – The Application Proxy Packet Reassembly – since 1996 An Application Proxy checks Source IP, Destination IP, Port, Protocol If a matching rule (or service) is found: The proxy then performs deep inspection on the content of the packet, including application layer data. This is the key to finding threats that OTHER FIREWALLS MISS!
  • 16. Fireware XTM: Making the Most of Your Network QoS and Traffic Shaping • High-priority traffic gets bandwidth • Low-priority traffic gets available bandwidth Multi-WAN Support • Up to 4 WAN connections supported • Traffic can use multiple WAN connections simultaneously or on a failover VPN Failover • Mission-critical VPN traffic keeps flowing if a remote site becomes unavailable • Traffic automatically fails-over to another gateway IPv6 Readiness • IPv6 Ready Gold Logo validates IPv6 routing • All XTM appliances will support IPv6
  • 17. Managing XTM Solutions: Flexibility Choose from three user interface options: Administer your way Command Line Interface WatchGuard Systems Manager Interface Web Interface
  • 18. Suite of tabbed tools deliver Managing XTM Solutions: Real- information needed to monitor and react to network status Take instant remediative Time Visibility action, such as adding a site to a blocked sites list Real-time monitoring lets you take instant action to protect your network.
  • 19. XTM Multi-Box Management Saves Time Simultaneously manage from 2 to 100’s of boxes. Implementing the WatchGuard solution was a breeze. The policy setting and system configuration is easy Align security policies across because it is all very an organization – or apply logical and modifications between boxes straightforward. Francis Lim, IT Manager, Eurokars Group
  • 20. Securely Connecting Users: VPN • Create VPN by simple drag and drop • Connect any location with Internet access • Select from IPSec, SSL, PPTP • Choose your device: laptop, smartphone, tablet • Define flexible rules to restrict data access to authorized individuals only • Use client or clientless options I can’t remember the last time I had to call someone with a security problem. With WatchGuard, we are always connected. Lucas Goh, Head of IT Operations for Asia, Berg Propulsion
  • 21. What is “Next- Generation”? “Firewalls need to evolve to be more proactive in blocking new threats, such as botnets and targeted attacks. Enterprises need to update their network firewall and intrusion prevention capabilities to protect business systems as attacks get more sophisticated.” (XTM = Next-Generation UTM) “XTM platforms will take security appliances beyond traditional boundaries by vastly expanding security features, networking capabilities and management flexibility.”
  • 22. Next-Generation Security Solutions Next- LiveSecurity® Generation Firewall Application Control Bundle Intrusion Prevention Service Gateway AntiVirus Security Bundle Reputation Enabled Defense (RED) WebBlocker spamBlocker
  • 24. XTM Performance & Value = Market Leadership Market Share Q3 2011 WatchGuard Check Point SonicWall McAfee Fortinet Cisco $0 $2,000,000 $4,000,000 $6,000,000 $8,000,000 $10,000,000 $12,000,000 $14,000,000 $16,000,000 $18,000,000 $20,000,000 Cisco Fortinet McAfee SonicWall Check Point WatchGuard Market Share Q3 2011 $8,332,580 $10,575,907 $11,366,568 $13,537,362 $12,743,382 $17,306,073 Source: 2011 Infonetics, 3Q11 Network Security Appliance and Software Worldwide and Regional Market Share.
  • 25. Industry-Leading Value “The company is strong, the products able, and the pricing can’t be beat.” Source: Info-Tech Research Group. Vendor Landscape: Unified Threat Management. August 2011.
  • 26. Why WatchGuard Wins vs. Palo Alto vs. Fortinet vs. Cisco vs. SonicWall Networks • General purpose CPU • Application Control • Simpler admin. task • Gateway AntiVirus beats ASIC for security • HTTPS inspection flows detects malware in all • Real-time visibility • Tightly integrated • Application Control compressed file tools security services ease of use (e.g. formats • 65 bundled reports • UTM performance search) • Email security and anti- vs. only 2 • 2.5 million AV spam capabilities • Simple VPN setup • Multi-WAN signatures vs 25,000 • Comprehensive • Model upgrades by appliance line, • Traffic shaping license key including tabletops • VPN setup wizard Watch Video Comparisons http://www.watchguard.com/latest/us-vs-them.asp
  • 27. Moving Security Forward with Watchguard XTM • “Best-in-class” security for comprehensive protection • Recognized security “Trend Setter”, industry “Champion”, and “Leader” • 65 reports included at no extra cost • Real-time monitoring • Intuitive set-up wizards • Multi-WAN support • Market-leading value
  • 28. Why we need Watch guard •Manage users to access internet. •Filtering content and url of the website. •Filtering by keyword •Filtering and inspect HTTPS. •Web blocker has over 54 categories for IT manager to manage the internet access. •Report and logs all content accessed by users. •Secure e-mail and web access. •Can be integrated to the Domain controller to apply the policy to manage users. Watchguard is not only a simple firewall but also it is a good tools for IT Manager to manage their network.
  • 29. Network and user management. E-mail security
  • 30. Watchguard XTM features Application control
  • 31. Watchguard – integated solutions. Protects networks by integrating best-in-class security technologies that enable businesses to manage risks, empower people and improve efficiencies.
  • 33. WatchGuard: Industry Leader Gartner Named “Leader” in Magic Quadrant Multifunction Firewalls IDC “WatchGuard, one of the first security appliance vendors, will remain a leader in this market going forward.” Frost & Sullivan “WatchGuard is on its track of becoming a major participant in the enterprise-UTM market.” “Measurements have indicated that WatchGuard has chipped away the market share formally held by Fortinet, Cisco, and Juniper.”
  • 34. Defense-in-Depth — XTM WatchGuard Extensible Threat Management VPN Stateful Content Firewall Security  Layered Security  SSL Deep Reputation IPSEC Packet Enabled Inspection Defense Gateway Antivirus Intrusion Centralized Prevention Spam Management Protection Rich Reporting URL Real-Time Filtering Monitoring Application Control
  • 35. WatchGuard XTM Series: Unified Threat Management Sized for small businesses to the enterprise All-in-one network security Firewall Integrated with Advance networking features SSL and IPSec VPN (MUVPN/BOVPN) Reputation Enabled Defense (Cloud Security Services) WebBlocker (including full HTTPS inspection) SpamBlocker Gateway Anti-Virus/Intrusion Prevention Services Application Control (More than 1800 signatures!) Three management interfaces–console, web UI, CLI Reporting and real-time monitoring–at no extra cost Model-upgradeable within each series
  • 36. WatchGuard XTM 5 Series Recommended for main offices/ headquarters with up to 1,500 users Performance driven security for growing mid-size businesses Up to 2.3 Gbps firewall throughput Full HTTPS inspection and VoIP support. Model-upgradeable
  • 37. Logs and reports • Watchguard does not keep the logs and reports in the same box. •Watchguard recommends customer to use another computer running Win XP to install logs and report management software to run as Report and Logs server. • This idea is really good for customer to manage and backup the logs and report information. • Log information could be stored for many years.
  • 38. Gain Visibility. Gain Insight. Gain Control. WatchGuard Application Control Thank You!