SlideShare une entreprise Scribd logo
1  sur  14
Security Proposal
  for your network
Nguyen Dang Quang Huy
Technical consultant.
Index
• Network diagram
• Security Solution
• Logs and report
Network diagram
            Watchguard could
            manage and enable
            routing between 3
            networks

            We don’t have to
            purchase the layer 3
            switch.

            More than that, Watch
            guard will provide
            content security for
            your network.
Why we need Watchguard
• Manage users to access internet.
• Filtering content and url of the website.
• Filtering by keyword
• Filtering and inspect HTTPS.
• Web blocker has over 54 categories for IT manager to manage the
  internet access.
• Report and logs all content accessed by users.
• Secure e-mail and web access.
• Can be integrated to the Domain controller to apply the policy to
  manage users.

    Watchguard is not only a simple firewall but also
    it is a good tools for IT Manager to manage their
    network.
Network and user
                  management.
E-mail security
Watchguard XTM features




         Application control
Watchguard – integated
       solutions.

Protects networks by integrating best-in-class security
   technologies that enable businesses to manage
  risks, empower people and improve efficiencies.
Watchguard XTM features
WatchGuard: Industry Leader
Gartner
   Named “Leader” in Magic Quadrant
   Multifunction Firewalls
IDC
   “WatchGuard, one of the first security
   appliance vendors, will remain a
   leader in this market going forward.”
Frost & Sullivan
   “WatchGuard is on its track of
   becoming a major participant in the
   enterprise-UTM market.”
   “Measurements have indicated that
   WatchGuard has chipped away the market
   share formally held by Fortinet, Cisco, and
   Juniper.”
Defense-in-Depth — XTM
          WatchGuard Extensible Threat
          Management

             VPN         Stateful         Content
                         Firewall         Security

                                                       
              Layered Security
             SSL           Deep          Reputation
            IPSEC         Packet          Enabled
                        Inspection        Defense
                                          Gateway
                                          Antivirus
                                          Intrusion
           Centralized                   Prevention
           Management                      Spam
                                         Protection
          Rich Reporting                    URL
            Real-Time                     Filtering
            Monitoring                   Application
                                          Control
WatchGuard XTM Series: Unified Threat Management
 Sized for small businesses to the enterprise
    All-in-one network security
       Firewall Integrated with Advance networking features
       SSL and IPSec VPN (MUVPN/BOVPN)
      Reputation Enabled Defense (Cloud Security Services)
       WebBlocker (including full HTTPS inspection)
       SpamBlocker
       Gateway Anti-Virus/Intrusion Prevention Services
       Application Control (More than 1500 signatures!)
    Three management interfaces–console, web UI, CLI
    Reporting and real-time monitoring–at no extra cost
    Model-upgradeable within each series
WatchGuard XTM 5
Series
 Recommended for main
  offices/ headquarters with up
  to 1,500 users
 Performance driven security
  for growing mid-size
  businesses
 Up to 2.3 Gbps firewall
  throughput
 Full HTTPS inspection and VoIP
  support.
 Model-upgradeable
Logs and reports
• Watchguard does not keep the logs and reports in the same
  box. Watchguard recommends customer to use another
  computer running Win XP to install logs and report
  management software to run as Report and Logs server.
• This idea is really good for customer to manage and backup
  the logs and report information.
• Information could be stored for many years.
Thank you very much.

Contenu connexe

Tendances

CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21
CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21
CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21MysoreMuleSoftMeetup
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise Colt Technology Services
 
Implementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR CodeImplementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR Codeijtsrd
 
Firewall PPT
Firewall PPTFirewall PPT
Firewall PPTMytec1
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityMighty Guides, Inc.
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
Alphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentielAlphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentielAlphorm
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptxEmanHashem6
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 

Tendances (20)

SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21
CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21
CloudHub Load Balancers (SLB & DLB) | MuleSoft Mysore Meetup #21
 
cn-series-se-presentation.pptx
cn-series-se-presentation.pptxcn-series-se-presentation.pptx
cn-series-se-presentation.pptx
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise
 
Implementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR CodeImplementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR Code
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Firewall PPT
Firewall PPTFirewall PPT
Firewall PPT
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT Cybersecurity
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Alphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentielAlphorm.com Formation Hacking et Sécurité, l'essentiel
Alphorm.com Formation Hacking et Sécurité, l'essentiel
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptx
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 

En vedette

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Network Design
Network DesignNetwork Design
Network Designcornimar
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardMarketing Team
 
Data Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS SolutionsData Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS SolutionsJone Smith
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Fajar Isnanto
 
Gelato-go franchising proposal 2016
Gelato-go franchising proposal 2016Gelato-go franchising proposal 2016
Gelato-go franchising proposal 2016Alex Florida
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionDavid Lapsley
 
WatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own DangerWatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own DangerRoeing Corporation
 
Whats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedWhats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedgroberts52
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 
Proposal for Business Associate
Proposal for Business AssociateProposal for Business Associate
Proposal for Business Associateparitosh89
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...Oleg Zhuravlev
 
Global staffing (rpo) business proposal
Global staffing (rpo) business proposalGlobal staffing (rpo) business proposal
Global staffing (rpo) business proposalAjay Tripathi
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 

En vedette (20)

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Network Design
Network DesignNetwork Design
Network Design
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuard
 
Data Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS SolutionsData Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS Solutions
 
Afcomsat Profile 20101214
Afcomsat Profile 20101214Afcomsat Profile 20101214
Afcomsat Profile 20101214
 
Firewall
FirewallFirewall
Firewall
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
Gelato-go franchising proposal 2016
Gelato-go franchising proposal 2016Gelato-go franchising proposal 2016
Gelato-go franchising proposal 2016
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups Session
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
WatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own DangerWatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own Danger
 
Whats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedWhats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressed
 
Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Proposal for Business Associate
Proposal for Business AssociateProposal for Business Associate
Proposal for Business Associate
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
Software proposal sample_project_1-_web_site_development_by_zx_7_of_november_...
 
Global staffing (rpo) business proposal
Global staffing (rpo) business proposalGlobal staffing (rpo) business proposal
Global staffing (rpo) business proposal
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 

Similaire à Watchguard short introduction

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270BAKOTECH
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionKerry Desberg
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsTom Kopko
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
The Cyber Crime Guide for Small and Midsize Businesses
The Cyber Crime Guide for Small and Midsize BusinessesThe Cyber Crime Guide for Small and Midsize Businesses
The Cyber Crime Guide for Small and Midsize BusinessesNE-INC
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Seqrite
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 

Similaire à Watchguard short introduction (20)

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
MMPL Watchguard overview
MMPL Watchguard overviewMMPL Watchguard overview
MMPL Watchguard overview
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
1. introduzione a TMG
1. introduzione a TMG1. introduzione a TMG
1. introduzione a TMG
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
The Cyber Crime Guide for Small and Midsize Businesses
The Cyber Crime Guide for Small and Midsize BusinessesThe Cyber Crime Guide for Small and Midsize Businesses
The Cyber Crime Guide for Small and Midsize Businesses
 
Websense2015ThreatAnalysis
Websense2015ThreatAnalysisWebsense2015ThreatAnalysis
Websense2015ThreatAnalysis
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 

Plus de Jimmy Saigon

Invite god comes to your boat
Invite god comes to your boatInvite god comes to your boat
Invite god comes to your boatJimmy Saigon
 
F5 link controller
F5  link controllerF5  link controller
F5 link controllerJimmy Saigon
 
Christie Digital Display solution.
Christie Digital Display solution.Christie Digital Display solution.
Christie Digital Display solution.Jimmy Saigon
 
F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction Jimmy Saigon
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Polycom introduction vietnamese
Polycom introduction   vietnamesePolycom introduction   vietnamese
Polycom introduction vietnameseJimmy Saigon
 

Plus de Jimmy Saigon (7)

God ‘s love
God ‘s loveGod ‘s love
God ‘s love
 
Invite god comes to your boat
Invite god comes to your boatInvite god comes to your boat
Invite god comes to your boat
 
F5 link controller
F5  link controllerF5  link controller
F5 link controller
 
Christie Digital Display solution.
Christie Digital Display solution.Christie Digital Display solution.
Christie Digital Display solution.
 
F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction F5-BigIP Edge gateway introduction
F5-BigIP Edge gateway introduction
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Polycom introduction vietnamese
Polycom introduction   vietnamesePolycom introduction   vietnamese
Polycom introduction vietnamese
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Watchguard short introduction

  • 1. Security Proposal for your network Nguyen Dang Quang Huy Technical consultant.
  • 2. Index • Network diagram • Security Solution • Logs and report
  • 3. Network diagram Watchguard could manage and enable routing between 3 networks We don’t have to purchase the layer 3 switch. More than that, Watch guard will provide content security for your network.
  • 4. Why we need Watchguard • Manage users to access internet. • Filtering content and url of the website. • Filtering by keyword • Filtering and inspect HTTPS. • Web blocker has over 54 categories for IT manager to manage the internet access. • Report and logs all content accessed by users. • Secure e-mail and web access. • Can be integrated to the Domain controller to apply the policy to manage users. Watchguard is not only a simple firewall but also it is a good tools for IT Manager to manage their network.
  • 5. Network and user management. E-mail security
  • 6. Watchguard XTM features Application control
  • 7. Watchguard – integated solutions. Protects networks by integrating best-in-class security technologies that enable businesses to manage risks, empower people and improve efficiencies.
  • 9. WatchGuard: Industry Leader Gartner Named “Leader” in Magic Quadrant Multifunction Firewalls IDC “WatchGuard, one of the first security appliance vendors, will remain a leader in this market going forward.” Frost & Sullivan “WatchGuard is on its track of becoming a major participant in the enterprise-UTM market.” “Measurements have indicated that WatchGuard has chipped away the market share formally held by Fortinet, Cisco, and Juniper.”
  • 10. Defense-in-Depth — XTM WatchGuard Extensible Threat Management VPN Stateful Content Firewall Security   Layered Security SSL Deep Reputation IPSEC Packet Enabled Inspection Defense Gateway Antivirus Intrusion Centralized Prevention Management Spam Protection Rich Reporting URL Real-Time Filtering Monitoring Application Control
  • 11. WatchGuard XTM Series: Unified Threat Management  Sized for small businesses to the enterprise  All-in-one network security  Firewall Integrated with Advance networking features  SSL and IPSec VPN (MUVPN/BOVPN) Reputation Enabled Defense (Cloud Security Services)  WebBlocker (including full HTTPS inspection)  SpamBlocker  Gateway Anti-Virus/Intrusion Prevention Services  Application Control (More than 1500 signatures!)  Three management interfaces–console, web UI, CLI  Reporting and real-time monitoring–at no extra cost  Model-upgradeable within each series
  • 12. WatchGuard XTM 5 Series  Recommended for main offices/ headquarters with up to 1,500 users  Performance driven security for growing mid-size businesses  Up to 2.3 Gbps firewall throughput  Full HTTPS inspection and VoIP support.  Model-upgradeable
  • 13. Logs and reports • Watchguard does not keep the logs and reports in the same box. Watchguard recommends customer to use another computer running Win XP to install logs and report management software to run as Report and Logs server. • This idea is really good for customer to manage and backup the logs and report information. • Information could be stored for many years.
  • 14. Thank you very much.