SlideShare ist ein Scribd-Unternehmen logo
1 von 63
Cornerstone Networking & Security is an authorized Astaro Reseller.
We provide design, implementation, and deployment services.
Please contact us for more information or a quote on the products in
this presentation.


Thanks,
The Cornerstone Team
http://www.cornerstonens.com
 Astaro Overview
     Astaro Products
            -   Astaro Security Gateway
            -   Astaro Web Gateway
            -   Astaro Mail Gateway
            -   Astaro Command Center
            -   Astaro Report Manager
     Astaro Gateway Software Applications
            -   Network Security
            -   Web Security
            -   Mail Security
            -   Networking Functions

© Astaro 2009                                Astaro Overview – Page 3
IT-Security Challenges of Today


                                              Costs   Time to manage

                        Router
                        Firewall
                        IPS
                        SSL VPN Gateway
                        E-Mail/Spam Filter
                        GW Antivirus-Filter
                        Web-Filter

                        WAN Link Balancer
                        Load Balancer
                        Total:




        © Astaro 2009
© Astaro 2009                                               Astaro Overview – Page 4
Integration is Key
                                               Clustering
                                               SSL VPN
                                               IM/P2P control
                                               Email Encryption
 Astaro                                        Single Sign On
                                               Dual AV
 Market
                             Central Mgmnt..   Central Mgmnt.
                             VoIP              VoIP
                             Antiphishing      Antiphishing
                             Antispyware       Antispyware
                Antispam     Antispam          Antispam
                URL Filter   URL Filter        URL Filter
 URL Filter     IDS/IPS      IDS/IPS           IDS/IPS
 Anti Virus     Anti Virus   Anti Virus        Anti Virus
   VPN          VPN          VPN               VPN
   Firewall     Firewall     Firewall          Firewall

   2000         2003         2005              2008

  FW/VPN        UTM          UTM+              XTM


© Astaro 2009                                    Astaro Overview – Page 5
The Astaro All-In-One Approach

                            Flexible Deployment




                                                       Browser-based
   Integration of                                  Unified Management of
Complete Email, Web
                                                      All Applications
& Network protection


                            All-In-One Appliance




           Automatic                                Networking-Features
       Firmware & Pattern                           for High Avaliability
            Updates               Centralized       and Load Balancing
                                 Management &
                                   Reporting
© Astaro 2009                                             Astaro Overview – Page 6
Astaro Company Profile



 Founded 2000
 170 employees
 Headquarters in:
         -   Karlsruhe (Germany)
         -   Boston (USA)
 Worldwide Offices
 > 2500 partners &
  resellers worldwide
 24/7 Service
 Astaro protects more than 100.000 networks for 47.000
  customers in over 60 countries

© Astaro 2009                                       Astaro Overview – Page 7
Our Business


                Astaro is a leading supplier of All-In-One Internet Security
                           Appliances
                       for small to medium sized companies and
                           organizations
                requiring integrated products for Email, Web and Network
                           Security that are cost efficient and easy-to-use.



         In contrast to suppliers of single- or other multi-function
                        products for internet security

Only Astaro offers easy-to-use All-In-One security gateways with
                   complete enterprise-class functionality
                   specifically designed for SMEs


© Astaro 2009                                                  Astaro Overview – Page 8
Successful Customers




© Astaro 2009          Astaro Overview – Page 9
Awards


Technology Innovation of    2008 Editor’s Best Award
the Year Award 2008         „competitive advantages,
„superior performance”      value to the customer“
(Frost & Sullivan)          (Windows IT Pro)




Top 100 Innovator 2008      3x Best of the Year Award
„exceeding creative and     2x Editor‘s Choice
innovative research and     „To call Astaro„s Appliance
development”                just a UTM would be a major
(Compamedia)
                            understatement.“
                            (SC Magazine)



PC Praxis Testsieger
„technically outstanding“
(PC Praxis)                 2x Product of the Year
                            „Among the array of
                            contenders, one product
                            managed to stand out.”
                            CRN Magazine



  © Astaro 2009                                  Astaro Overview – Page 10
Certifications


          ICSA Labs Firewall Certification
          security industry's central authority for research,
          intelligence, and certification testing of products
          (ICSA Labs)




                                     Common Criteria
                                     First UTM appliance to receive the Common
                                     Criteria certification from the German
                                     Federal Office for Information Security
                                     (Bundesamt für Sicherheit in der Informationstechnik)




          TOLLY Up-to-Spec Certified
          independent test lab
          (Tolly Enterprises, LLC)




© Astaro 2009                                                                          Astaro Overview – Page 11
Astaro All-In-One-Appliances

                            Astaro Security Gateway




   Mail Security            Network Security          Web Security
   Anti Spam & Phishing     Firewall                  URL Filter
   Dual Virus Protection    VPN                       Antivirus & Antispyware
   Email Encryption         Intrusion Prevention      IM & P2P Control




      Astaro Mail Gateway                               Astaro Web Gateway



© Astaro 2009                                                  Astaro Overview – Page 12
Unified Management made easy




                     10-Minute-Setup



© Astaro 2009                          Astaro Overview – Page 13
Deployment Models



                        Hardware    Software          Virtual
                        Appliance   Appliance        Appliance

          Application


           Operating
            System


           Hardware




         First UTM Appliance that passed VMware validation program

© Astaro 2009                                               Astaro Overview – Page 14
Astaro Management & VPN Products


Astaro Command Center
Provides Centralized management and real-time
monitoring for multiple Astaro appliances



Astaro Report Manager
Collects, correlates and analyzes security data and
provides a huge portfolio of graphical reports


Astaro Secure Client
Advanced IPsec VPN client with personal
firewall and integrated dialer




© Astaro 2009                                         Astaro Overview – Page 15
The Astaro Difference

 Only Astaro appliances are            Nobody's more flexible
  available in three different types




                                                                        1..10
                                        One-Click Clustering



 Nobody's faster                       Proven technology

                                          Over 47,000 customers
                                          are already protecting
                                          more than 100,000
                                          networks with an
                                          Astaro appliance

 10-Minute-Setup


© Astaro 2009                                                  Astaro Overview – Page 16
Business Benefits with Astaro

 Comprehensive Protection
         -   Integrated appliances for email, web and network security
         -   New layers of protection are added as quickly as new threats arrive
         -   All applications compete with best point solutions available
 Easy to manage
         -   Single browser-based GUI for simple management of all applications
         -   Real-time automatic update of firmware and attack patterns keep
             system always up-to-date
         -   scales seamlessly from small offices to large headquarter installations
 Cost efficient
         -   Flexible deployment options
         -   Minimal administration and operating costs




© Astaro 2009                                                         Astaro Overview – Page 17
Astaro Products
Astaro Security Gateway
                 Unified Threat Management Appliances




         All you need for comprehensive Email, Web and Network security




© Astaro 2009                                               Astaro Overview – Page 19
Astaro Security Gateway
Layered Security
                                Astaro Security Gateway


                          Firewall
                          and VPN




                          Intrusion
                          Prevention




                          Content Filtering–
                          Virus/Spam/URL/
                          Spyware/Phishing




© Astaro 2009                                       Astaro Overview – Page 20
Astaro Security Gateway
Deployment scenarios




© Astaro 2009             Astaro Overview – Page 21
Astaro Security Gateway
Products
Hardware Appliances
                   ASG 110/120   ASG 220    ASG 320    ASG 425      ASG 525         ASG 625




                     Small       Medium     Medium      Large        Large            Large
Environment
                    networks     networks   networks   networks     networks         networks
10/100 Mbps
Network Ports          4            8          4           -            -                -

Gigabit Network
Ports                   -           -          4       6 & 2 SFP   10 & 4 SFP      10 & 8 SFP

Max. recommended
FW Users              10/50        150        350        1000         2500             4000

Max. recommended
UTM Users             10/25        70         200        600          1300             2000



Software Appliance*
Runs on Intel-compatible PCs and servers

Virtual Appliance*
Runs in any VMware environment                                     *Pricing based #IPs/Users

 © Astaro 2009                                                         Astaro Overview – Page 22
Astaro Security Gateway
Key Differentiators




                 IPsec, SSL, PPTP and L2TP VPN support on all appliances
     Net         One-Click Full IP SSL VPN with unlimited free clients
                 Deep Inspection Packet Filtering with >7,500 rules


                 Dual independent Antivirus Engines scan all SMTP & POP3-Mails
    Mail         Extensive set of enterprise-class spam detection capabilities
                 Clientless Email Encryption (TLS, S/MIME, OpenPGP)


                 Dual independent Antivirus Engines scan all HTTP/S and FTP data
    Web          Granular URL Access Control Policies supporting SSO
                 User-based IM/P2P control, including skype blocking


© Astaro 2009                                                     Astaro Overview – Page 23
Astaro Security Gateway
Key Differentiators




                   7th Generation AJAX-featured GUI in 6 local languages
                   Automatic pattern and system software updates
                   Localized UserPortal in 15 languages
    GUI
                   One-Click-Clustering with integrated load balancing
                   Automatic Configuration Backup via email
                   Easy integration with Active Directory and Exchange




© Astaro 2009                                                        Astaro Overview – Page 24
Astaro Security Gateway
                 Unified Threat Management Appliances




         All you need for comprehensive Email, Web and Network security




© Astaro 2009                                               Astaro Overview – Page 25
Astaro Command Center




          Centralized Management for Astaro All-In-One Gateways


© Astaro 2009                                          Astaro Overview – Page 26
Astaro Managed Security
Centralized Management for all Astaro Gateways


                                   Astaro Command Center




         Astaro Security Gateway       Astaro Mail Gateway   Astaro Web Gateway




© Astaro 2009                                                   Astaro Overview – Page 27
Astaro Command Center
Feature Overview




© Astaro 2009           Astaro Overview – Page 28
Astaro Command Center
Multi Client Deployment



                                                       Customer 1
                Browser-
                based
 Customer 1     Access




                                       Global distributed Astaro Gateways



 Customer 2
  (Admin)

                                                       Customer 2

                           Admin
                           Up2Date
                           Read only

Customer 2
(Audit User)



© Astaro 2009                                   Astaro Overview – Page 29
Astaro Command Center
Easy to use




 WebAdmin
 ACC System Management




                         Gateway Manager
                         Device Management for individual customers

© Astaro 2009                                                    Astaro Overview – Page 30
Astaro Command Center
Products

Hardware Appliances

                        ACC 1000   ACC 2000   ACC 3000        ACC 4000




Max. managed Gateways      20         50        100              200

Administrators             1          2          3                 4

Clients                    4          10         20               40




Software Appliance*
Runs on Intel-compatible PCs and servers

                                                         *Free of charge
Virtual Appliance*                                       (Unlike competitors who
Runs in any VMware environment                            charge for management
                                                          software)


© Astaro 2009                                            Astaro Overview – Page 32
Astaro Command Center
Benefits



 Save administrative time and money when managing multiple
  globally distributed security devices
 Easily define and deploy company wide security policies
 Keep an overview about the overall security status of your
  network
 Track critical device parameters in real-time
 Simple Site-to-Site VPN Configuration




© Astaro 2009                                       Astaro Overview – Page 33
Astaro Report Manager
                Centralized Logging & Reporting




© Astaro 2009                                     Astaro Overview – Page 34
Astaro Report Manager
Feature Overview




© Astaro 2009           Astaro Overview – Page 35
Astaro Report Manager
Deployment




Stand alone                              Distributed
 Single Astaro Report Manager            One centralized Astaro Report Manager
 Integrated or separate Syslog server    Multiple regional Astaro Report Manager
                                           and/or Syslog server


© Astaro 2009                                                 Astaro Overview – Page 36
Astaro Report Manager
Easy to use




 Dashboard for quick overview about network activity
 800+ pre-defined reports based on attacks, rules, protocol and web
  usage, spam, spyware, antivirus, compliance…
 Alert Manager Warns whenever a specified event type or attack activity
  is detected
© Astaro 2009                                              Astaro Overview – Page 37
Astaro Report Manager
Products



Software Application
Runs on Intel-compatible PCs and servers

Requires Windows Platform:
- Windows 2000/XP/2003
- MS IE 6.0 or compatible with JAVA runtime
- MS IIS or integrated Apache




© Astaro 2009                                 Astaro Overview – Page 38
Astaro Report Manager
Benefits



 Protect information assets
 Reduce the time to respond to threats
 Save administrative time and money
 Improve planning and management
 Meet compliance requirements




© Astaro 2009                             Astaro Overview – Page 39
Astaro Gateway Products
    Software Features
Astaro Security Applications
                 Enterprise-class security technology
                   for Astaro All-In-One Appliances




© Astaro 2009                                           Astaro Overview – Page 41
Astaro Network Security




© Astaro 2009             Astaro Overview – Page 42
Astaro Network Security
Firewall

 Stateful Packet Inspection
 All Packets are inspected twice:
         -   When entering the gateway
         -   When leaving the gateway
 Flexible rules management
         -   Can include hosts, networks, groups or vpn users
         -   Automatic rule generation for application proxies and internal services
         -   Time-based activation
         -   Policy-based routing
         -   Interface based rules
 Network Address Translation
         -   SNAT/DNAT
         -   masquerading



© Astaro 2009                                                         Astaro Overview – Page 43
Astaro Network Security
Application Proxies

 Security proxies to simplify management
         -   HTTP/S, FTP, FTP-over-HTTP, POP3, SMTP, DNS, Socks, Ident ,
             NTP, generic
 Application-Level Deep Packet Filtering
         -   Scans packet payloads to enforce protocol-specific rules
 Transparent mode eases administration




© Astaro 2009                                                           Astaro Overview – Page 44
Astaro Network Security
Virtual Private Network (VPN) Gateway


 Site-to-Site VPN for secure communication between two offices
         -   Supports IPsec and SSL protocols
         -   Star, hub-and-spoke and fully meshed configurations
 Remote access for home and mobile users (road warriors)
         -   Supports IPsec, SSL, L2TP, and PPTP VPNs
                •   Astaro Secure Client (IPSec) with integrated desktop firewall
                •   Astaro SSL Client : free download without user limitation
         -   Also supports Cisco IPSec and Apple iPhone client
 Supports all major encryption and many authentication methods
         -   IPSec offers high interoperability with other devices
         -   XAUTH allows for integration of One-Time-Passwort systems
 Internal certificate authority
         -   Full Public Key Infrastructure (PKI) support

© Astaro 2009                                                           Astaro Overview – Page 45
Astaro Network Security
Intrusion Prevention


 Identifies and blocks application- and protocol- related probes
  and attacks through deep packet inspection
 Database of over 8,000 patterns and rules
         -   Probing, port scans, interrogations, host sweeps
         -   Attacks on application vulnerabilities
         -   Protocol exploitations
 Intrusion detection and prevention
         -   Notify administrator, or block traffic immediately
 Powerful management interface
         -   One click to enable or disable complete
             rule sets e.g. for email- or webservers
 DoS (Denial of Service Attack) and portscan protection


© Astaro 2009                                                     Astaro Overview – Page 46
Astaro Mail Security




© Astaro 2009          Astaro Overview – Page 47
Astaro Mail Security
Email Antivirus

 Dual virus scanners with multiple detection methods
       -   Virus signatures, heuristic analysis
 Blocks viruses, worms, trojans, and other “malware” before
  they reach email servers or desktops
 Scans SMTP and POP3 traffic
 Database of more than 800,000 virus signatures
       -   Frequent automatic updates
 Flexible management
       -   Can specify file formats and text strings to block
       -   Emails and attachments can be dropped, rejected with message to
           sender, passed with a warning, or quarantined
 MIME-Type filter
 Extension Blocking
© Astaro 2009                                                    Astaro Overview – Page 48
Astaro Mail Security
Antispam

 Identifies and disposes unsolicited SMTP and POP3 emails
 Highest detection rate through combination of multiple methods
  to identify spam
         -   Reputation service with spam outbreak detection (format and language
             agnostic) using patented Recurrent-Pattern DetectionTM technology
         -   Realtime Blackhole Lists (RBLs)*
         -   Dialup network blocking*
         -   Greylisting*
         -   BATV (Bounce Address Tag Verification)*
         -   SPF (Sender Policy Framework) record checking*
         -   Expression filter
         -   Recipient verification*
         -   Reverse-DNS & HELO syntax checks…*
 Flexible management
         -   Emails and attachments can be rejected with message to sender, passed
             with a warning or quarantined
      *Can reject emails even before body is transferred
© Astaro 2009                                                      Astaro Overview – Page 49
Astaro Mail Security
Antiphishing

 “Phishing” –
         -   Criminals imitate emails from banks, credit card companies, eBay and
             other sources to obtain confidential user information
 Astaro identifies and blocks phishing emails through several
  techniques:
         -   Virus scanner identifies phishing signatures
         -   URL filtering database captures phishing servers in the “suspicious”
             category
         -   Content downloaded from web sites will be blocked if it matches
             patterns of phishing content




© Astaro 2009                                                         Astaro Overview – Page 50
Astaro Mail Security
Email Encryption

 En-/Decryption and Digital Signatures for SMTP Emails
         -   supports OpenPGP and S/MIME
 Completely transparent
         -   No additional Software on Client required
 Easy Setup
         -   Only three configuration steps to start
 Central Management of all keys and certificates
         -   No key or certificate distribution required
 Allows Content/Virus scanning even for encrypted SMTP
  emails




© Astaro 2009                                              Astaro Overview – Page 51
Astaro Web Security




© Astaro 2009         Astaro Overview – Page 52
Astaro Web Security
Spyware Protection

 Blocks (unintentional) downloads of spyware, adware, and
  other malicious software
 Prevents infected systems from sending information back to
  the spyware server
 Checks against a database of known spyware URLs
 Gateway spyware blocking complements desktop anti-
  spyware tools




© Astaro 2009                                     Astaro Overview – Page 53
Astaro Web Security
Web Antivirus/Malware

 Block viruses, worms, trojans, and other “malware” before they
  reach desktops
 Scans HTTP, HTTPS and FTP traffic
         -   Web & ftp downloads
         -   Web-based email (MSN Hotmail, Yahoo! Mail)
 Dual virus scanners with multiple detection methods
         -   Virus signatures, heuristic analysis
 Database of more than 800,000 virus signatures
         -   Frequent automatic updates
 Flexible management
         -   Can specify file formats (endings) and content (MIME) types to block




© Astaro 2009                                                        Astaro Overview – Page 54
Astaro Web Security
URL Filtering

  Controls employees web usage
          -     Increases productivity
          -     Allows enforcement of company wide web surfing policy to comply with
                internal or legal regulations
  Administrators can allow or block web use based on 96 pre-
   defined categories of web sites
          -     Nudity, gambling, criminal activities, shopping, drugs, job search,
                sports, entertainment, etc.
          -     Additional categories can be created for individual customization
  Filter might also consider global reputation
  Whitelists and blacklists to tailor access for groups of users
  Many user authentication options
          -     IP Address, user- and group-based , Active Directory SSO, eDirectory
                SSO, LDAP, RADIUS/TACACS+
          -     Time based access
© Astaro 2009                                                            Astaro Overview – Page 55
Astaro Web Security
IM & P2P Control


 Manage the use of Instant Messaging Clients and Skype
         -   AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google
             Talk/Jabber, Tencent QQ, Skype
 Manage the use of Peer-to-Peer applications
         -   Applejuice, Ares, Bittorrent, Direct Connect, Edonkey, Gnutella,
             IMesh, MUTE, Manolito, Pando, Share, WinMX, Winny
 Flexible control
         -   Depending on application the administrator can decide to either allow
             or block it completely, block file transfers only or just log its usage
         -   Specific users/IP addresses can be excluded from general rules
         -   Specific hosts and networks can be excluded from IM/P2P control
 Bandwidth control
         -   Define max. allowed bandwidth per application


© Astaro 2009                                                          Astaro Overview – Page 56
Astaro Networking Features
                     Enterprise-class Networking Technology
                         for Astaro All-In-One Appliances



                Key capabilities for eXtensible Threat Management (XTM)




© Astaro 2009                                                    Astaro Overview – Page 57
Astaro Active-Passive HA (Standby)




                                 deactivated
                                 Master


                      State & config
                      synchronization                          Tunnel
                                                             Internet

Internal
                               New Master
                                Slave
                     Synchronization of:
                     - IPSec tunnels
                     - FW connections
                     - spooled & quarantined mails
                     - logfiles
                     - config settings
                     Stateful Failover < 2sec


     © Astaro 2009                                   Astaro Overview – Page 58
Astaro Active-Active HA (Cluster)

                                        High Availability
                                             (Active/Active)
                                     Master (loadbalancing)



                                     Slave


                             1 Gigabit/sec VPN, IPS, AV, AS
                                    Cluster Nodes

LAN                                          Scalability
                                                                             Internet


                 Full mesh                                     Full mesh




 © Astaro 2009                                                     Astaro Overview – Page 59
Astaro Auto-Configuration HA

 All units are set to “automatic
  configuration“ mode, as per default
 By connecting two units via their HA                            Master
  ports, they will auto-configure for
  active-passive HA mode
                                                         HA port (eth3)
 To setup active-active cluster mode,
  just change HA-mode at master to
  “cluster“
                                                                  Slave
         -   All units connected to the master HA-port
             will autojoin the cluster, as per default
         -   No extra configuration on slave/cluster
             node required




© Astaro 2009                                                       Astaro Overview – Page 60
WAN Link Balancing
Example Scenario 1

 Dual lines, a Cable and a DSL.
 Goals:
               All traffic from and to Mail/Webserver use the Cable.
               User surfing and other traffic out the DSL




© Astaro 2009                                                       Astaro Overview – Page 61
WAN Link Balancing
Example Scenario 2

 Four Lines, 2 Cable and 2 DSL
 Goal:
        Balance all user activity automatically across multiple lines with failover, in
        order to save money using residential connections versus buying a more
        expensive, business-class circuit.




© Astaro 2009                                                            Astaro Overview – Page 62
Server Load Balancing

     Dynamic load balancing of incoming traffic to group of similar servers
     Dead Peer Detection via customizable health-checks




© Astaro 2009                                                 Astaro Overview – Page 63
Astaro
    All-in-One Internet Security
         For additional information:
   Cornerstone Networking & Security Web Site
           www.cornerstonens.com
Astaro Software & Virtual Appliances Free Download
           www.astaro.com/download

          Astaro Feature Request Portal
           http://feature.astaro.com

Weitere ähnliche Inhalte

Was ist angesagt?

FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheetdemoteam
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la NubeMundo Contact
 
Fg80 series
Fg80 seriesFg80 series
Fg80 seriespatchs
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Huawei Network Security Newsletter
Huawei Network Security NewsletterHuawei Network Security Newsletter
Huawei Network Security Newsletterhuaweisweden
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00Bố Su
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 

Was ist angesagt? (20)

FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheet
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la Nube
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Fg80 series
Fg80 seriesFg80 series
Fg80 series
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Mcafee 3
Mcafee 3Mcafee 3
Mcafee 3
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Huawei Network Security Newsletter
Huawei Network Security NewsletterHuawei Network Security Newsletter
Huawei Network Security Newsletter
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
Forti gate 5101c
Forti gate 5101cForti gate 5101c
Forti gate 5101c
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00
 
Microsoft Forefront - Protection Suite
Microsoft Forefront - Protection SuiteMicrosoft Forefront - Protection Suite
Microsoft Forefront - Protection Suite
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
 

Ähnlich wie Cornerstone Networking & Security- Astaro Product Line

Astaro Customer presentation
Astaro Customer presentationAstaro Customer presentation
Astaro Customer presentationronhashjr
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product familyxKinAnx
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
Flash card Module 9- Manage Security Operation in Azure
Flash card  Module 9- Manage Security Operation in AzureFlash card  Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in AzureYoong Seng Lai
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIARobb Boyd
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksCisco Service Provider
 

Ähnlich wie Cornerstone Networking & Security- Astaro Product Line (20)

Astaro Customer presentation
Astaro Customer presentationAstaro Customer presentation
Astaro Customer presentation
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Flash card Module 9- Manage Security Operation in Azure
Flash card  Module 9- Manage Security Operation in AzureFlash card  Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
 
Gate protect presentation
Gate protect presentationGate protect presentation
Gate protect presentation
 
Bss
BssBss
Bss
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 

Kürzlich hochgeladen

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Kürzlich hochgeladen (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Cornerstone Networking & Security- Astaro Product Line

  • 1. Cornerstone Networking & Security is an authorized Astaro Reseller. We provide design, implementation, and deployment services. Please contact us for more information or a quote on the products in this presentation. Thanks, The Cornerstone Team http://www.cornerstonens.com
  • 2.
  • 3.  Astaro Overview  Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager  Astaro Gateway Software Applications - Network Security - Web Security - Mail Security - Networking Functions © Astaro 2009 Astaro Overview – Page 3
  • 4. IT-Security Challenges of Today Costs Time to manage Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antivirus-Filter Web-Filter WAN Link Balancer Load Balancer Total: © Astaro 2009 © Astaro 2009 Astaro Overview – Page 4
  • 5. Integration is Key Clustering SSL VPN IM/P2P control Email Encryption Astaro Single Sign On Dual AV Market Central Mgmnt.. Central Mgmnt. VoIP VoIP Antiphishing Antiphishing Antispyware Antispyware Antispam Antispam Antispam URL Filter URL Filter URL Filter URL Filter IDS/IPS IDS/IPS IDS/IPS Anti Virus Anti Virus Anti Virus Anti Virus VPN VPN VPN VPN Firewall Firewall Firewall Firewall 2000 2003 2005 2008 FW/VPN UTM UTM+ XTM © Astaro 2009 Astaro Overview – Page 5
  • 6. The Astaro All-In-One Approach Flexible Deployment Browser-based Integration of Unified Management of Complete Email, Web All Applications & Network protection All-In-One Appliance Automatic Networking-Features Firmware & Pattern for High Avaliability Updates Centralized and Load Balancing Management & Reporting © Astaro 2009 Astaro Overview – Page 6
  • 7. Astaro Company Profile  Founded 2000  170 employees  Headquarters in: - Karlsruhe (Germany) - Boston (USA)  Worldwide Offices  > 2500 partners & resellers worldwide  24/7 Service  Astaro protects more than 100.000 networks for 47.000 customers in over 60 countries © Astaro 2009 Astaro Overview – Page 7
  • 8. Our Business Astaro is a leading supplier of All-In-One Internet Security Appliances for small to medium sized companies and organizations requiring integrated products for Email, Web and Network Security that are cost efficient and easy-to-use. In contrast to suppliers of single- or other multi-function products for internet security Only Astaro offers easy-to-use All-In-One security gateways with complete enterprise-class functionality specifically designed for SMEs © Astaro 2009 Astaro Overview – Page 8
  • 9. Successful Customers © Astaro 2009 Astaro Overview – Page 9
  • 10. Awards Technology Innovation of 2008 Editor’s Best Award the Year Award 2008 „competitive advantages, „superior performance” value to the customer“ (Frost & Sullivan) (Windows IT Pro) Top 100 Innovator 2008 3x Best of the Year Award „exceeding creative and 2x Editor‘s Choice innovative research and „To call Astaro„s Appliance development” just a UTM would be a major (Compamedia) understatement.“ (SC Magazine) PC Praxis Testsieger „technically outstanding“ (PC Praxis) 2x Product of the Year „Among the array of contenders, one product managed to stand out.” CRN Magazine © Astaro 2009 Astaro Overview – Page 10
  • 11. Certifications ICSA Labs Firewall Certification security industry's central authority for research, intelligence, and certification testing of products (ICSA Labs) Common Criteria First UTM appliance to receive the Common Criteria certification from the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik) TOLLY Up-to-Spec Certified independent test lab (Tolly Enterprises, LLC) © Astaro 2009 Astaro Overview – Page 11
  • 12. Astaro All-In-One-Appliances Astaro Security Gateway Mail Security Network Security Web Security Anti Spam & Phishing Firewall URL Filter Dual Virus Protection VPN Antivirus & Antispyware Email Encryption Intrusion Prevention IM & P2P Control Astaro Mail Gateway Astaro Web Gateway © Astaro 2009 Astaro Overview – Page 12
  • 13. Unified Management made easy 10-Minute-Setup © Astaro 2009 Astaro Overview – Page 13
  • 14. Deployment Models Hardware Software Virtual Appliance Appliance Appliance Application Operating System Hardware First UTM Appliance that passed VMware validation program © Astaro 2009 Astaro Overview – Page 14
  • 15. Astaro Management & VPN Products Astaro Command Center Provides Centralized management and real-time monitoring for multiple Astaro appliances Astaro Report Manager Collects, correlates and analyzes security data and provides a huge portfolio of graphical reports Astaro Secure Client Advanced IPsec VPN client with personal firewall and integrated dialer © Astaro 2009 Astaro Overview – Page 15
  • 16. The Astaro Difference  Only Astaro appliances are  Nobody's more flexible available in three different types 1..10 One-Click Clustering  Nobody's faster  Proven technology Over 47,000 customers are already protecting more than 100,000 networks with an Astaro appliance 10-Minute-Setup © Astaro 2009 Astaro Overview – Page 16
  • 17. Business Benefits with Astaro  Comprehensive Protection - Integrated appliances for email, web and network security - New layers of protection are added as quickly as new threats arrive - All applications compete with best point solutions available  Easy to manage - Single browser-based GUI for simple management of all applications - Real-time automatic update of firmware and attack patterns keep system always up-to-date - scales seamlessly from small offices to large headquarter installations  Cost efficient - Flexible deployment options - Minimal administration and operating costs © Astaro 2009 Astaro Overview – Page 17
  • 19. Astaro Security Gateway Unified Threat Management Appliances All you need for comprehensive Email, Web and Network security © Astaro 2009 Astaro Overview – Page 19
  • 20. Astaro Security Gateway Layered Security Astaro Security Gateway Firewall and VPN Intrusion Prevention Content Filtering– Virus/Spam/URL/ Spyware/Phishing © Astaro 2009 Astaro Overview – Page 20
  • 21. Astaro Security Gateway Deployment scenarios © Astaro 2009 Astaro Overview – Page 21
  • 22. Astaro Security Gateway Products Hardware Appliances ASG 110/120 ASG 220 ASG 320 ASG 425 ASG 525 ASG 625 Small Medium Medium Large Large Large Environment networks networks networks networks networks networks 10/100 Mbps Network Ports 4 8 4 - - - Gigabit Network Ports - - 4 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Max. recommended FW Users 10/50 150 350 1000 2500 4000 Max. recommended UTM Users 10/25 70 200 600 1300 2000 Software Appliance* Runs on Intel-compatible PCs and servers Virtual Appliance* Runs in any VMware environment *Pricing based #IPs/Users © Astaro 2009 Astaro Overview – Page 22
  • 23. Astaro Security Gateway Key Differentiators  IPsec, SSL, PPTP and L2TP VPN support on all appliances Net  One-Click Full IP SSL VPN with unlimited free clients  Deep Inspection Packet Filtering with >7,500 rules  Dual independent Antivirus Engines scan all SMTP & POP3-Mails Mail  Extensive set of enterprise-class spam detection capabilities  Clientless Email Encryption (TLS, S/MIME, OpenPGP)  Dual independent Antivirus Engines scan all HTTP/S and FTP data Web  Granular URL Access Control Policies supporting SSO  User-based IM/P2P control, including skype blocking © Astaro 2009 Astaro Overview – Page 23
  • 24. Astaro Security Gateway Key Differentiators  7th Generation AJAX-featured GUI in 6 local languages  Automatic pattern and system software updates  Localized UserPortal in 15 languages GUI  One-Click-Clustering with integrated load balancing  Automatic Configuration Backup via email  Easy integration with Active Directory and Exchange © Astaro 2009 Astaro Overview – Page 24
  • 25. Astaro Security Gateway Unified Threat Management Appliances All you need for comprehensive Email, Web and Network security © Astaro 2009 Astaro Overview – Page 25
  • 26. Astaro Command Center Centralized Management for Astaro All-In-One Gateways © Astaro 2009 Astaro Overview – Page 26
  • 27. Astaro Managed Security Centralized Management for all Astaro Gateways Astaro Command Center Astaro Security Gateway Astaro Mail Gateway Astaro Web Gateway © Astaro 2009 Astaro Overview – Page 27
  • 28. Astaro Command Center Feature Overview © Astaro 2009 Astaro Overview – Page 28
  • 29. Astaro Command Center Multi Client Deployment Customer 1 Browser- based Customer 1 Access Global distributed Astaro Gateways Customer 2 (Admin) Customer 2 Admin Up2Date Read only Customer 2 (Audit User) © Astaro 2009 Astaro Overview – Page 29
  • 30. Astaro Command Center Easy to use WebAdmin ACC System Management Gateway Manager Device Management for individual customers © Astaro 2009 Astaro Overview – Page 30
  • 31. Astaro Command Center Products Hardware Appliances ACC 1000 ACC 2000 ACC 3000 ACC 4000 Max. managed Gateways 20 50 100 200 Administrators 1 2 3 4 Clients 4 10 20 40 Software Appliance* Runs on Intel-compatible PCs and servers *Free of charge Virtual Appliance* (Unlike competitors who Runs in any VMware environment charge for management software) © Astaro 2009 Astaro Overview – Page 32
  • 32. Astaro Command Center Benefits  Save administrative time and money when managing multiple globally distributed security devices  Easily define and deploy company wide security policies  Keep an overview about the overall security status of your network  Track critical device parameters in real-time  Simple Site-to-Site VPN Configuration © Astaro 2009 Astaro Overview – Page 33
  • 33. Astaro Report Manager Centralized Logging & Reporting © Astaro 2009 Astaro Overview – Page 34
  • 34. Astaro Report Manager Feature Overview © Astaro 2009 Astaro Overview – Page 35
  • 35. Astaro Report Manager Deployment Stand alone Distributed  Single Astaro Report Manager  One centralized Astaro Report Manager  Integrated or separate Syslog server  Multiple regional Astaro Report Manager and/or Syslog server © Astaro 2009 Astaro Overview – Page 36
  • 36. Astaro Report Manager Easy to use  Dashboard for quick overview about network activity  800+ pre-defined reports based on attacks, rules, protocol and web usage, spam, spyware, antivirus, compliance…  Alert Manager Warns whenever a specified event type or attack activity is detected © Astaro 2009 Astaro Overview – Page 37
  • 37. Astaro Report Manager Products Software Application Runs on Intel-compatible PCs and servers Requires Windows Platform: - Windows 2000/XP/2003 - MS IE 6.0 or compatible with JAVA runtime - MS IIS or integrated Apache © Astaro 2009 Astaro Overview – Page 38
  • 38. Astaro Report Manager Benefits  Protect information assets  Reduce the time to respond to threats  Save administrative time and money  Improve planning and management  Meet compliance requirements © Astaro 2009 Astaro Overview – Page 39
  • 39. Astaro Gateway Products Software Features
  • 40. Astaro Security Applications Enterprise-class security technology for Astaro All-In-One Appliances © Astaro 2009 Astaro Overview – Page 41
  • 41. Astaro Network Security © Astaro 2009 Astaro Overview – Page 42
  • 42. Astaro Network Security Firewall  Stateful Packet Inspection  All Packets are inspected twice: - When entering the gateway - When leaving the gateway  Flexible rules management - Can include hosts, networks, groups or vpn users - Automatic rule generation for application proxies and internal services - Time-based activation - Policy-based routing - Interface based rules  Network Address Translation - SNAT/DNAT - masquerading © Astaro 2009 Astaro Overview – Page 43
  • 43. Astaro Network Security Application Proxies  Security proxies to simplify management - HTTP/S, FTP, FTP-over-HTTP, POP3, SMTP, DNS, Socks, Ident , NTP, generic  Application-Level Deep Packet Filtering - Scans packet payloads to enforce protocol-specific rules  Transparent mode eases administration © Astaro 2009 Astaro Overview – Page 44
  • 44. Astaro Network Security Virtual Private Network (VPN) Gateway  Site-to-Site VPN for secure communication between two offices - Supports IPsec and SSL protocols - Star, hub-and-spoke and fully meshed configurations  Remote access for home and mobile users (road warriors) - Supports IPsec, SSL, L2TP, and PPTP VPNs • Astaro Secure Client (IPSec) with integrated desktop firewall • Astaro SSL Client : free download without user limitation - Also supports Cisco IPSec and Apple iPhone client  Supports all major encryption and many authentication methods - IPSec offers high interoperability with other devices - XAUTH allows for integration of One-Time-Passwort systems  Internal certificate authority - Full Public Key Infrastructure (PKI) support © Astaro 2009 Astaro Overview – Page 45
  • 45. Astaro Network Security Intrusion Prevention  Identifies and blocks application- and protocol- related probes and attacks through deep packet inspection  Database of over 8,000 patterns and rules - Probing, port scans, interrogations, host sweeps - Attacks on application vulnerabilities - Protocol exploitations  Intrusion detection and prevention - Notify administrator, or block traffic immediately  Powerful management interface - One click to enable or disable complete rule sets e.g. for email- or webservers  DoS (Denial of Service Attack) and portscan protection © Astaro 2009 Astaro Overview – Page 46
  • 46. Astaro Mail Security © Astaro 2009 Astaro Overview – Page 47
  • 47. Astaro Mail Security Email Antivirus  Dual virus scanners with multiple detection methods - Virus signatures, heuristic analysis  Blocks viruses, worms, trojans, and other “malware” before they reach email servers or desktops  Scans SMTP and POP3 traffic  Database of more than 800,000 virus signatures - Frequent automatic updates  Flexible management - Can specify file formats and text strings to block - Emails and attachments can be dropped, rejected with message to sender, passed with a warning, or quarantined  MIME-Type filter  Extension Blocking © Astaro 2009 Astaro Overview – Page 48
  • 48. Astaro Mail Security Antispam  Identifies and disposes unsolicited SMTP and POP3 emails  Highest detection rate through combination of multiple methods to identify spam - Reputation service with spam outbreak detection (format and language agnostic) using patented Recurrent-Pattern DetectionTM technology - Realtime Blackhole Lists (RBLs)* - Dialup network blocking* - Greylisting* - BATV (Bounce Address Tag Verification)* - SPF (Sender Policy Framework) record checking* - Expression filter - Recipient verification* - Reverse-DNS & HELO syntax checks…*  Flexible management - Emails and attachments can be rejected with message to sender, passed with a warning or quarantined *Can reject emails even before body is transferred © Astaro 2009 Astaro Overview – Page 49
  • 49. Astaro Mail Security Antiphishing  “Phishing” – - Criminals imitate emails from banks, credit card companies, eBay and other sources to obtain confidential user information  Astaro identifies and blocks phishing emails through several techniques: - Virus scanner identifies phishing signatures - URL filtering database captures phishing servers in the “suspicious” category - Content downloaded from web sites will be blocked if it matches patterns of phishing content © Astaro 2009 Astaro Overview – Page 50
  • 50. Astaro Mail Security Email Encryption  En-/Decryption and Digital Signatures for SMTP Emails - supports OpenPGP and S/MIME  Completely transparent - No additional Software on Client required  Easy Setup - Only three configuration steps to start  Central Management of all keys and certificates - No key or certificate distribution required  Allows Content/Virus scanning even for encrypted SMTP emails © Astaro 2009 Astaro Overview – Page 51
  • 51. Astaro Web Security © Astaro 2009 Astaro Overview – Page 52
  • 52. Astaro Web Security Spyware Protection  Blocks (unintentional) downloads of spyware, adware, and other malicious software  Prevents infected systems from sending information back to the spyware server  Checks against a database of known spyware URLs  Gateway spyware blocking complements desktop anti- spyware tools © Astaro 2009 Astaro Overview – Page 53
  • 53. Astaro Web Security Web Antivirus/Malware  Block viruses, worms, trojans, and other “malware” before they reach desktops  Scans HTTP, HTTPS and FTP traffic - Web & ftp downloads - Web-based email (MSN Hotmail, Yahoo! Mail)  Dual virus scanners with multiple detection methods - Virus signatures, heuristic analysis  Database of more than 800,000 virus signatures - Frequent automatic updates  Flexible management - Can specify file formats (endings) and content (MIME) types to block © Astaro 2009 Astaro Overview – Page 54
  • 54. Astaro Web Security URL Filtering  Controls employees web usage - Increases productivity - Allows enforcement of company wide web surfing policy to comply with internal or legal regulations  Administrators can allow or block web use based on 96 pre- defined categories of web sites - Nudity, gambling, criminal activities, shopping, drugs, job search, sports, entertainment, etc. - Additional categories can be created for individual customization  Filter might also consider global reputation  Whitelists and blacklists to tailor access for groups of users  Many user authentication options - IP Address, user- and group-based , Active Directory SSO, eDirectory SSO, LDAP, RADIUS/TACACS+ - Time based access © Astaro 2009 Astaro Overview – Page 55
  • 55. Astaro Web Security IM & P2P Control  Manage the use of Instant Messaging Clients and Skype - AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google Talk/Jabber, Tencent QQ, Skype  Manage the use of Peer-to-Peer applications - Applejuice, Ares, Bittorrent, Direct Connect, Edonkey, Gnutella, IMesh, MUTE, Manolito, Pando, Share, WinMX, Winny  Flexible control - Depending on application the administrator can decide to either allow or block it completely, block file transfers only or just log its usage - Specific users/IP addresses can be excluded from general rules - Specific hosts and networks can be excluded from IM/P2P control  Bandwidth control - Define max. allowed bandwidth per application © Astaro 2009 Astaro Overview – Page 56
  • 56. Astaro Networking Features Enterprise-class Networking Technology for Astaro All-In-One Appliances Key capabilities for eXtensible Threat Management (XTM) © Astaro 2009 Astaro Overview – Page 57
  • 57. Astaro Active-Passive HA (Standby) deactivated Master State & config synchronization Tunnel Internet Internal New Master Slave Synchronization of: - IPSec tunnels - FW connections - spooled & quarantined mails - logfiles - config settings Stateful Failover < 2sec © Astaro 2009 Astaro Overview – Page 58
  • 58. Astaro Active-Active HA (Cluster) High Availability (Active/Active) Master (loadbalancing) Slave 1 Gigabit/sec VPN, IPS, AV, AS Cluster Nodes LAN Scalability Internet Full mesh Full mesh © Astaro 2009 Astaro Overview – Page 59
  • 59. Astaro Auto-Configuration HA  All units are set to “automatic configuration“ mode, as per default  By connecting two units via their HA Master ports, they will auto-configure for active-passive HA mode HA port (eth3)  To setup active-active cluster mode, just change HA-mode at master to “cluster“ Slave - All units connected to the master HA-port will autojoin the cluster, as per default - No extra configuration on slave/cluster node required © Astaro 2009 Astaro Overview – Page 60
  • 60. WAN Link Balancing Example Scenario 1 Dual lines, a Cable and a DSL. Goals:  All traffic from and to Mail/Webserver use the Cable.  User surfing and other traffic out the DSL © Astaro 2009 Astaro Overview – Page 61
  • 61. WAN Link Balancing Example Scenario 2 Four Lines, 2 Cable and 2 DSL Goal: Balance all user activity automatically across multiple lines with failover, in order to save money using residential connections versus buying a more expensive, business-class circuit. © Astaro 2009 Astaro Overview – Page 62
  • 62. Server Load Balancing  Dynamic load balancing of incoming traffic to group of similar servers  Dead Peer Detection via customizable health-checks © Astaro 2009 Astaro Overview – Page 63
  • 63. Astaro All-in-One Internet Security For additional information: Cornerstone Networking & Security Web Site www.cornerstonens.com Astaro Software & Virtual Appliances Free Download www.astaro.com/download Astaro Feature Request Portal http://feature.astaro.com

Hinweis der Redaktion

  1. There are 3 deployment options for all of Astaro’s appliancesSoftware applianceSince the operating system and all featured applications are bundled within a single ISO image, Astaro software appliances are much easier and faster to install than software applications that require a separate, pre-installed operating system.By supporting a broad range of Intel-compatible server systems, software appliances allow for maximum deployment flexibility on your hardware of choice.The Astaro software appliances are available on CD with a printed manual or can be downloaded directly from Astaro servers and independently burned onto a CD. There is no need for client based software installation. Specific licensing packages are available, varying by the number of users/IP addresses.Hardware applianceAstaro hardware appliances are based on high quality Intel-compatible server systems with each model offering an identical feature set. Small businesses do not have to surrender important security features due to scaled-down hardware performance. All models offer an integrated hard disk drive in order to locally store quarantined emails and log data, avoiding the need for additional servers.Astaro hardware appliances can be easily deployed at the perimeter of your network to protect all email, web and network user traffic. Since all hardware appliances feature a pre-installed operating system and software, the initial setup will be fast and without complication. There is no further need for client based software installation.With a complete range of models available, Astaro hardware appliances effectively protect networks from 10 to more than 2000 users.Virtual applianceAstaro virtual appliances allow for easy deployment in virtualized environments. Optimized hardware allocation and reduced hardware expenditure is available since physical computers are able to run multiple virtual servers/appliances in parallel by using the underlying virtualization infrastructure. As a result, it is ideally suited for both managed security services as well as companies of all sizes consolidating physical servers onto fewer virtual systems.The Astaro virtual appliances can be downloaded from Astaro servers and burned independently onto a CD. It can then be installed on any Vmware system running either a VMware server or VMware ESX server. Specific licensing packages are available, varying by the number of users/IP addresses.Astaro is one of the few security vendors offering a virtual appliance and we have been partners with VMware for over 5 years.