SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Medley Marketing Pvt Ltd Akshay Kumar Sharma Director-TSG Group
Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
WatchGuard XTM Series  Network Security Appliances WatchGuard XTM 2 Series WatchGuard XTM 5 Series WatchGuard XTM 8 Series WatchGuard XTM 1050
/ Scalable Technology Backbone Intelligent Layered Security Unified Threat Management Comprehensive protection against multi-faceted security threats INTELLIGENT LAYERED SECURITY ENGINE EXTERNAL SECURITY (VULNERABILITY ASSESSMENT) DATA INTEGRITY VPN STATEFUL FIREWALL DEEP APPLICATION INSPECTION ZERO DAY PROTECTION Content Security GATEWAY ANTIVIRUS INTRUSION PREVENTION SPYWARE PROTECTION SPAM PROTECTION URL FILTERING
What is “Next-Generation” ? (XTM = Next-Generation UTM)  “XTM platforms will take security appliances beyond traditional boundaries by vastly expanding security features, networking capabilities and management flexibility.” “ Firewalls need to evolve to be more proactive in blocking new threats, such as botnets and targeted attacks. Enterprises need to update their network firewall and intrusion prevention capabilities to protect business systems as attacks get more sophisticated.”
Next-Generation Security Solutions
EFFICIENT SECURITY VPN SSL IPSEC Stateful Firewall Deep Packet Inspection Layered Security Content Security Reputation Enabled Defense Gateway Antivirus Intrusion Prevention Spam Protection URL Filtering Application Control Centralized Management Rich Reporting Real-Time Monitoring WatchGuard Extensible Threat Management  
[object Object],WatchGuard: Best-in-Class security
Best-in-Class Security: XTM
Fireware XTM Operating System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],You Can’t Control What You Can’t See
XTM Defense-In-Depth In Action WatchGuard vs. Web 2.0 Security Issues
Choose from three user interface options: Administer  your  way Managing XTM Solutions: Flexibility Command Line Interface WatchGuard Systems Manager Interface Web Interface
Managing XTM Solutions: Real-Time Visibility Real-time monitoring lets you take instant action to  protect your network.  Take instant remediative action, such as adding a site to a blocked sites list Suite of tabbed tools deliver information needed to monitor and react to network status
Managing XTM Solutions: Satisfy Auditors 65 pre-defined reports included. Drill-down for the data you need — when you need it.
XTM Multi-Box Management Saves Time Simultaneously manage from 2 to 100’s of boxes.  Implementing the WatchGuard solution was a breeze. The policy setting and system configuration is easy because it is all very logical and straightforward. Francis Lim, IT Manager, Eurokars Group Align security policies across an organization – or apply modifications between boxes
I can’t remember the last time I had to call someone with a security problem. With WatchGuard, we are always connected. Lucas Goh, Head of IT Operations for Asia, Berg Propulsion Securely Connecting Users: VPN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For further information; Pl contact: Akshay Kumar Sharma – Director –TSG Group 9810387393/9312932966 [email_address] Pl see our latest technology offerings @  http://medleyindia.com/

Weitere ähnliche Inhalte

Was ist angesagt?

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
Mark Curphey
 
Microset Security Presentation
Microset Security PresentationMicroset Security Presentation
Microset Security Presentation
alpereira
 

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it business
 
Simple and-smart-security-tips-for-website -design-orange949
Simple and-smart-security-tips-for-website -design-orange949Simple and-smart-security-tips-for-website -design-orange949
Simple and-smart-security-tips-for-website -design-orange949
 
Network security
Network securityNetwork security
Network security
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Fire walls
Fire wallsFire walls
Fire walls
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
10 Essential Digital Security Processes
10 Essential Digital Security Processes10 Essential Digital Security Processes
10 Essential Digital Security Processes
 
Microset Security Presentation
Microset Security PresentationMicroset Security Presentation
Microset Security Presentation
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation Firewalls
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 

Andere mochten auch

培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
9810916
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
9810916
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
9810916
 

Andere mochten auch (15)

Gawn 21 dec 11
Gawn 21 dec 11Gawn 21 dec 11
Gawn 21 dec 11
 
7982 overview
7982 overview7982 overview
7982 overview
 
Mmpl education overview_ver1
Mmpl education overview_ver1Mmpl education overview_ver1
Mmpl education overview_ver1
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
 
The Mindful Saint
The Mindful SaintThe Mindful Saint
The Mindful Saint
 
培養運動活出健康
培養運動活出健康培養運動活出健康
培養運動活出健康
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
#54
#54#54
#54
 
Swiftpage empowering E marketing
Swiftpage empowering E marketingSwiftpage empowering E marketing
Swiftpage empowering E marketing
 
Propalms network case studies
Propalms network case studiesPropalms network case studies
Propalms network case studies
 
Ruckus Corporate Overview
Ruckus Corporate OverviewRuckus Corporate Overview
Ruckus Corporate Overview
 
Secure Wireless for Higher education
Secure Wireless for Higher educationSecure Wireless for Higher education
Secure Wireless for Higher education
 
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-TestingJava Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
Java Hurdling: Obstacles and Techniques in Java Client Penetration-Testing
 

Ähnlich wie MMPL Watchguard overview

Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
Kerry Desberg
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
Soap MacTavish
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 

Ähnlich wie MMPL Watchguard overview (20)

Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Websense2015ThreatAnalysis
Websense2015ThreatAnalysisWebsense2015ThreatAnalysis
Websense2015ThreatAnalysis
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
CONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200INGCONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200ING
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
The Cyber Crime Guide for Small and Midsize Businesses
The Cyber Crime Guide for Small and Midsize BusinessesThe Cyber Crime Guide for Small and Midsize Businesses
The Cyber Crime Guide for Small and Midsize Businesses
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 

Mehr von Medley India Infosolution Pvt Ltd (9)

Cashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environmentCashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environment
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Mmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overviewMmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overview
 
Education slides_MMPL
Education slides_MMPLEducation slides_MMPL
Education slides_MMPL
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
LG LED Projector
LG LED ProjectorLG LED Projector
LG LED Projector
 
LG display soltuion for retail segment
LG display soltuion for retail segmentLG display soltuion for retail segment
LG display soltuion for retail segment
 
Swiftpage for ACT presentation
Swiftpage for ACT presentationSwiftpage for ACT presentation
Swiftpage for ACT presentation
 
MMPL Education overview
MMPL Education overviewMMPL Education overview
MMPL Education overview
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

MMPL Watchguard overview

  • 1. Medley Marketing Pvt Ltd Akshay Kumar Sharma Director-TSG Group
  • 2.
  • 3. WatchGuard XTM Series Network Security Appliances WatchGuard XTM 2 Series WatchGuard XTM 5 Series WatchGuard XTM 8 Series WatchGuard XTM 1050
  • 4. / Scalable Technology Backbone Intelligent Layered Security Unified Threat Management Comprehensive protection against multi-faceted security threats INTELLIGENT LAYERED SECURITY ENGINE EXTERNAL SECURITY (VULNERABILITY ASSESSMENT) DATA INTEGRITY VPN STATEFUL FIREWALL DEEP APPLICATION INSPECTION ZERO DAY PROTECTION Content Security GATEWAY ANTIVIRUS INTRUSION PREVENTION SPYWARE PROTECTION SPAM PROTECTION URL FILTERING
  • 5. What is “Next-Generation” ? (XTM = Next-Generation UTM) “XTM platforms will take security appliances beyond traditional boundaries by vastly expanding security features, networking capabilities and management flexibility.” “ Firewalls need to evolve to be more proactive in blocking new threats, such as botnets and targeted attacks. Enterprises need to update their network firewall and intrusion prevention capabilities to protect business systems as attacks get more sophisticated.”
  • 7. EFFICIENT SECURITY VPN SSL IPSEC Stateful Firewall Deep Packet Inspection Layered Security Content Security Reputation Enabled Defense Gateway Antivirus Intrusion Prevention Spam Protection URL Filtering Application Control Centralized Management Rich Reporting Real-Time Monitoring WatchGuard Extensible Threat Management  
  • 8.
  • 10.
  • 11.
  • 12. XTM Defense-In-Depth In Action WatchGuard vs. Web 2.0 Security Issues
  • 13. Choose from three user interface options: Administer your way Managing XTM Solutions: Flexibility Command Line Interface WatchGuard Systems Manager Interface Web Interface
  • 14. Managing XTM Solutions: Real-Time Visibility Real-time monitoring lets you take instant action to protect your network. Take instant remediative action, such as adding a site to a blocked sites list Suite of tabbed tools deliver information needed to monitor and react to network status
  • 15. Managing XTM Solutions: Satisfy Auditors 65 pre-defined reports included. Drill-down for the data you need — when you need it.
  • 16. XTM Multi-Box Management Saves Time Simultaneously manage from 2 to 100’s of boxes. Implementing the WatchGuard solution was a breeze. The policy setting and system configuration is easy because it is all very logical and straightforward. Francis Lim, IT Manager, Eurokars Group Align security policies across an organization – or apply modifications between boxes
  • 17.
  • 18. For further information; Pl contact: Akshay Kumar Sharma – Director –TSG Group 9810387393/9312932966 [email_address] Pl see our latest technology offerings @ http://medleyindia.com/