SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Moving Security Forward
with WatchGuard XTM
Akshay Kumar Sharma
akshay@medley.co.in
9810387393
New Technologies & Threats Shape Security Needs



                         IP network growth
                          (VoIP, WLAN, etc.)


      Compliance &
                                               Demand for SaaS /
      accountability
                                                 Cloud services
                        Evolving Business
                         Security Needs



            Emerging threats          New applications
            and attack vectors
Businesses Have Complex Security Needs




                                                     Secure Wireless &
Enforce Policy    Simplify Security   Protect Data        Remote
                                                        Networking


        Broad Security Needs - Varying Budgets & Facilities
Hackers Steal Headlines in 2010 - 2011
Hackers Shake the Web




September 28, 2011
Source: http://www.usatoday.com/NEWS/usaedition/2011-
09-28-Webpage-hackers-PR INT0_ST_U.htm
Smaller-sized Companies Increasingly Under Attack




 ….”Cyber security is not just for big businesses. "That's one of the
 myths we come across — 'I am too small,'" said Stan Stahl, head of
 a Los Angeles cyber-security company Citadel Information Group
 Inc. and president of the Los Angeles chapter of the Information
 Systems Security Assn., a trade group”

 Source: http://www.latimes.com/business/la-fi-smallbiz-security-20110523,0,5494792.story
Data Breach Costs Continue to Plague Organizations

             Organizational Cost of a                          Average Cost Per Record
                  Data Breach                                         Breached
                                                        $225
$7,500,000


$7,000,000                                              $200

$6,500,000
                                                        $175
$6,000,000


$5,500,000                                              $150

$5,000,000
                                                        $125
$4,500,000


$4,000,000
                                                        $100
              2005   2006   2007   2008   2009   2010
                                                                2005   2006   2007   2008     2009        2010

                                                                                       Source: Ponemon Institute
You Can’t Control What You Can’t See
• Traditional port-based firewalls lack the
    ability to see, let alone control, many apps
•   Productivity Loss
    • Bandwidth-hungry apps slow networks
• Data Loss / Attack Vector
       Social networks breed a culture of trust
       Rife with technical vulnerabilities
XTM Defense-In-Depth In Action
WatchGuard vs. Web 2.0 Security Issues

                  • Snags malware, scareware, spyware and
      GAV           malicious scripts



       IPS        • Prevents drive-by-download attacks



                  • Cloud-based service protects you from
       RED          legitimate sites infected with malware

                  • Enables granular control by user, group, or
   Application
                    IP; and separate control over actions for
    Control         view, post, chat, apps, games, and video
Cornerstone – The Application Proxy
Packet Reassembly – since 1996



 An Application Proxy checks Source IP, Destination IP, Port, Protocol
 If a matching rule (or service) is found:
 The proxy then performs deep inspection on the content of the
 packet, including application layer data.




This is the key to finding threats that OTHER FIREWALLS MISS!
Fireware XTM: Making the Most of Your Network
          QoS and Traffic Shaping
          • High-priority traffic gets bandwidth
          • Low-priority traffic gets available bandwidth

          Multi-WAN Support
          • Up to 4 WAN connections supported
          • Traffic can use multiple WAN connections
            simultaneously or on a failover

          VPN Failover
          • Mission-critical VPN traffic keeps flowing if a remote
            site becomes unavailable
          • Traffic automatically fails-over to another gateway

          IPv6 Readiness
          • IPv6 Ready Gold Logo validates IPv6 routing
          • All XTM appliances will support IPv6
Managing XTM Solutions: Flexibility
Choose from three user interface options: Administer your way

                                             Command Line Interface




       WatchGuard Systems
       Manager Interface
                                                 Web Interface
Suite of tabbed tools deliver
                       information needed to monitor
                         and react to network status     Take instant remediative
                                                         action, such as adding a
Managing XTM Solutions: Real-Time                    Visibility blocked sites list
                                                         site to a

Real-time monitoring lets you take instant action to
protect your network.
Managing XTM Solutions: Satisfy Auditors
65 pre-defined reports included. Drill-down for
the data you need — when you need it.
XTM Multi-Box Management Saves Time
Simultaneously manage from 2 to 100’s of boxes.

                                                   Implementing the WatchGuard
                                                   solution was a breeze. The policy
                                                   setting and system configuration
                                                   is easy because it is all very
                                                   logical and straightforward.
                  Align security policies across   Francis Lim, IT
                   an organization – or apply      Manager, Eurokars Group
                  modifications between boxes
Securely Connecting Users: VPN
• Create VPN by simple drag and drop
• Connect any location with Internet access
• Select from IPSec, SSL, PPTP
• Choose your device: laptop, smartphone, tablet
• Define flexible rules to restrict data access to
  authorized individuals only
• Use client or clientless options

    I can’t remember the last time I had to call
    someone with a security problem. With
    WatchGuard, we are always connected.
    Lucas Goh, Head of IT Operations for
    Asia, Berg Propulsion
XTM 33                   XTM 33-W           XTM 330
              Industry-Leading Performance at Each Price Point
Firewall Throughput                           850 Mb/s                 850 Mb/s           850 Mb/s

                                                                                             XTM 2050
XTM Throughput                                45 Mb/s                  45 Mb/s            70 Mb/s
                                                                              XTM 1050

Concurrent Connections                        40,000    XTM 8 Series
                                                                       40,000             40,000
(bi-directional)
                                        XTM 5 Series
Performance




BOVPN                                         50                       50                 50
                     XTM XTM 3 Series
                         3 Series

MUVPN (IPSec)                                 5/50                     5/50               5/55
               XTM 2 Series
MUVPN (SSL)                                   55                       55                 55

Local User Database                  500                      500                         500
            Small Business                            Midsize Business           Service Providers / Headquarters
Max. 1- 50 Users      50 - 250 Users     250 – 500 Users          500 – 1,000 Users         1,000+ Users

Model Upgrade                                 No                       No                 No
What is “Next-Generation”?

                           “Firewalls need to evolve to be more proactive in
                           blocking new threats, such as botnets and targeted
                           attacks. Enterprises need to update their network
                           firewall and intrusion prevention capabilities to
                           protect business systems as attacks get more
                           sophisticated.”



(XTM = Next-Generation UTM) “XTM platforms will take
security appliances beyond traditional boundaries by
vastly expanding security features, networking capabilities
and management flexibility.”
Next-Generation Security Solutions

 LiveSecurity®                         Next-
                                     Generation
 Application Control                  Firewall
                                       Bundle
 Intrusion Prevention Service
                                     Security
 Gateway AntiVirus                   Bundle
 Reputation Enabled Defense (RED)

 WebBlocker

 spamBlocker
Industry-Leading Value

                                                                                               “The company is
                                                                                               strong, the products
                                                                                               able, and the pricing can’t
                                                                                               be beat.”




 Source: Info-Tech Research Group. Vendor Landscape: Unified Threat Management. August 2011.
Best-In-Class Security
XTM Performance & Value = Market Leadership

                                                               Market Share Q3 2011

             WatchGuard



              Check Point



                SonicWall



                  McAfee



                  Fortinet



                     Cisco


                             $0      $2,000,000   $4,000,000    $6,000,000   $8,000,000   $10,000,000   $12,000,000   $14,000,000   $16,000,000   $18,000,000   $20,000,000
  Price Range:
  $1,500 - $4,999
                                      Cisco                Fortinet               McAfee                 SonicWall             Check Point             WatchGuard
    Market Share Q3 2011          $8,332,580             $10,575,907           $11,366,568              $13,537,362            $12,743,382             $17,306,073

Source: 2011 Infonetics, 3Q11 Network Security Appliance and Software Worldwide and Regional Market Share.
Why WatchGuard Wins

                                                                                   vs. Palo Alto
   vs. Fortinet                    vs. Cisco             vs. SonicWall
                                                                                    Networks

• General purpose CPU       • Application Control   • Simpler admin. task    • Gateway AntiVirus
  beats ASIC for security   • HTTPS inspection        flows                    detects malware in all
• Real-time visibility      • Tightly integrated    • Application Control      compressed file
  tools                       security services       ease of use (e.g.        formats
• 65 bundled reports        • UTM performance         search)                • Email security and anti-
  vs. only 2                                        • 2.5 million AV           spam capabilities
                            • Simple VPN setup
• Multi-WAN                                           signatures vs 25,000   • Comprehensive
                                                    • Model upgrades by        appliance
• Traffic shaping
                                                      license key              line, including
• VPN setup wizard                                                             tabletops



                            Watch Video Comparisons
                http://www.watchguard.com/latest/us-vs-them.asp
Moving Security Forward with Watchguard XTM
• “Best-in-class” security for comprehensive protection
• Recognized security “Trend Setter”, industry “Champion”,
    and “Leader”
•   65 reports included at no extra cost
•   Real-time monitoring
•   Intuitive set-up wizards
•   Multi-WAN support
•   ICSA Firewall & IPSec certification
•   Market-leading value
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentationSoftechms
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks OverviewAEC Networks
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8Irsandi Hasan
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewallKappa Data
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 

Was ist angesagt? (18)

Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewall
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 

Andere mochten auch

Direitos humanos ou privilégios de bandidos
Direitos humanos ou privilégios de bandidosDireitos humanos ou privilégios de bandidos
Direitos humanos ou privilégios de bandidosvania morales sierra
 
Digital Tools Session I
Digital Tools Session IDigital Tools Session I
Digital Tools Session Imbamom
 
Presentacion de josé luis contreras wonca 2016 larga
Presentacion de josé luis contreras wonca 2016 largaPresentacion de josé luis contreras wonca 2016 larga
Presentacion de josé luis contreras wonca 2016 largaJosé Luis Contreras Muñoz
 
Webinar poll results
Webinar poll resultsWebinar poll results
Webinar poll resultsLara Carson
 
DP Horáček
DP HoráčekDP Horáček
DP HoráčekJi? Hor
 
NFLOL HOF Closeout Report
NFLOL HOF Closeout ReportNFLOL HOF Closeout Report
NFLOL HOF Closeout ReportLara Carson
 
Data driven cx story book the metia perspective
Data driven cx story book   the metia perspectiveData driven cx story book   the metia perspective
Data driven cx story book the metia perspectiveIntrepid Consultants
 
Tuvalet kağıdı etkinliği
Tuvalet kağıdı etkinliğiTuvalet kağıdı etkinliği
Tuvalet kağıdı etkinliğiserkan yesilbağ
 
037 quadrcula enllaços
037 quadrcula enllaços037 quadrcula enllaços
037 quadrcula enllaçosslegna3
 
Indicadores comunales de salud. Talcahuano, 2016.
Indicadores comunales de salud. Talcahuano, 2016.Indicadores comunales de salud. Talcahuano, 2016.
Indicadores comunales de salud. Talcahuano, 2016.Jorge Pacheco
 
Customer experience - how your brand lives or dies
Customer experience - how your brand lives or diesCustomer experience - how your brand lives or dies
Customer experience - how your brand lives or diesTom Voirol
 
Ejemplo práctico-del-diagrama-de-causa
Ejemplo práctico-del-diagrama-de-causaEjemplo práctico-del-diagrama-de-causa
Ejemplo práctico-del-diagrama-de-causaMoizez Morgan
 
El juicio moral y el dilema moral
El juicio moral y el dilema moralEl juicio moral y el dilema moral
El juicio moral y el dilema moralAriMaya900
 

Andere mochten auch (20)

Direitos humanos ou privilégios de bandidos
Direitos humanos ou privilégios de bandidosDireitos humanos ou privilégios de bandidos
Direitos humanos ou privilégios de bandidos
 
Digital Tools Session I
Digital Tools Session IDigital Tools Session I
Digital Tools Session I
 
Presentacion de josé luis contreras wonca 2016 larga
Presentacion de josé luis contreras wonca 2016 largaPresentacion de josé luis contreras wonca 2016 larga
Presentacion de josé luis contreras wonca 2016 larga
 
Hiperfrecuentacion resp2009 863
Hiperfrecuentacion resp2009 863Hiperfrecuentacion resp2009 863
Hiperfrecuentacion resp2009 863
 
J. F. Kennedy
J. F. KennedyJ. F. Kennedy
J. F. Kennedy
 
Webinar poll results
Webinar poll resultsWebinar poll results
Webinar poll results
 
Thüringen
ThüringenThüringen
Thüringen
 
DP Horáček
DP HoráčekDP Horáček
DP Horáček
 
NFLOL HOF Closeout Report
NFLOL HOF Closeout ReportNFLOL HOF Closeout Report
NFLOL HOF Closeout Report
 
Data driven cx story book the metia perspective
Data driven cx story book   the metia perspectiveData driven cx story book   the metia perspective
Data driven cx story book the metia perspective
 
Z3 f protocoloaepnaaseaicseicapdos
Z3 f protocoloaepnaaseaicseicapdosZ3 f protocoloaepnaaseaicseicapdos
Z3 f protocoloaepnaaseaicseicapdos
 
Violencia de género
Violencia de géneroViolencia de género
Violencia de género
 
Mother Teresa
Mother TeresaMother Teresa
Mother Teresa
 
Santa cristina san_roman
Santa cristina san_romanSanta cristina san_roman
Santa cristina san_roman
 
Tuvalet kağıdı etkinliği
Tuvalet kağıdı etkinliğiTuvalet kağıdı etkinliği
Tuvalet kağıdı etkinliği
 
037 quadrcula enllaços
037 quadrcula enllaços037 quadrcula enllaços
037 quadrcula enllaços
 
Indicadores comunales de salud. Talcahuano, 2016.
Indicadores comunales de salud. Talcahuano, 2016.Indicadores comunales de salud. Talcahuano, 2016.
Indicadores comunales de salud. Talcahuano, 2016.
 
Customer experience - how your brand lives or dies
Customer experience - how your brand lives or diesCustomer experience - how your brand lives or dies
Customer experience - how your brand lives or dies
 
Ejemplo práctico-del-diagrama-de-causa
Ejemplo práctico-del-diagrama-de-causaEjemplo práctico-del-diagrama-de-causa
Ejemplo práctico-del-diagrama-de-causa
 
El juicio moral y el dilema moral
El juicio moral y el dilema moralEl juicio moral y el dilema moral
El juicio moral y el dilema moral
 

Ähnlich wie XTM moving security forward

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270BAKOTECH
 
Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2Jeff Green
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 

Ähnlich wie XTM moving security forward (20)

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
MMPL Watchguard overview
MMPL Watchguard overviewMMPL Watchguard overview
MMPL Watchguard overview
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Gate protect presentation
Gate protect presentationGate protect presentation
Gate protect presentation
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Mehr von Medley India Infosolution Pvt Ltd

Mehr von Medley India Infosolution Pvt Ltd (17)

Cashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environmentCashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environment
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Mmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overviewMmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overview
 
Education slides_MMPL
Education slides_MMPLEducation slides_MMPL
Education slides_MMPL
 
7982 overview
7982 overview7982 overview
7982 overview
 
Propalms network case studies
Propalms network case studiesPropalms network case studies
Propalms network case studies
 
Mmpl education overview_ver1
Mmpl education overview_ver1Mmpl education overview_ver1
Mmpl education overview_ver1
 
Ruckus Corporate Overview
Ruckus Corporate OverviewRuckus Corporate Overview
Ruckus Corporate Overview
 
Secure Wireless for Higher education
Secure Wireless for Higher educationSecure Wireless for Higher education
Secure Wireless for Higher education
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
LG LED Projector
LG LED ProjectorLG LED Projector
LG LED Projector
 
LG display soltuion for retail segment
LG display soltuion for retail segmentLG display soltuion for retail segment
LG display soltuion for retail segment
 
Swiftpage for ACT presentation
Swiftpage for ACT presentationSwiftpage for ACT presentation
Swiftpage for ACT presentation
 
Swiftpage empowering E marketing
Swiftpage empowering E marketingSwiftpage empowering E marketing
Swiftpage empowering E marketing
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
MMPL Education overview
MMPL Education overviewMMPL Education overview
MMPL Education overview
 

Kürzlich hochgeladen

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Kürzlich hochgeladen (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

XTM moving security forward

  • 1. Moving Security Forward with WatchGuard XTM Akshay Kumar Sharma akshay@medley.co.in 9810387393
  • 2. New Technologies & Threats Shape Security Needs IP network growth (VoIP, WLAN, etc.) Compliance & Demand for SaaS / accountability Cloud services Evolving Business Security Needs Emerging threats New applications and attack vectors
  • 3. Businesses Have Complex Security Needs Secure Wireless & Enforce Policy Simplify Security Protect Data Remote Networking Broad Security Needs - Varying Budgets & Facilities
  • 4. Hackers Steal Headlines in 2010 - 2011
  • 5. Hackers Shake the Web September 28, 2011 Source: http://www.usatoday.com/NEWS/usaedition/2011- 09-28-Webpage-hackers-PR INT0_ST_U.htm
  • 6. Smaller-sized Companies Increasingly Under Attack ….”Cyber security is not just for big businesses. "That's one of the myths we come across — 'I am too small,'" said Stan Stahl, head of a Los Angeles cyber-security company Citadel Information Group Inc. and president of the Los Angeles chapter of the Information Systems Security Assn., a trade group” Source: http://www.latimes.com/business/la-fi-smallbiz-security-20110523,0,5494792.story
  • 7. Data Breach Costs Continue to Plague Organizations Organizational Cost of a Average Cost Per Record Data Breach Breached $225 $7,500,000 $7,000,000 $200 $6,500,000 $175 $6,000,000 $5,500,000 $150 $5,000,000 $125 $4,500,000 $4,000,000 $100 2005 2006 2007 2008 2009 2010 2005 2006 2007 2008 2009 2010 Source: Ponemon Institute
  • 8. You Can’t Control What You Can’t See • Traditional port-based firewalls lack the ability to see, let alone control, many apps • Productivity Loss • Bandwidth-hungry apps slow networks • Data Loss / Attack Vector Social networks breed a culture of trust Rife with technical vulnerabilities
  • 9. XTM Defense-In-Depth In Action WatchGuard vs. Web 2.0 Security Issues • Snags malware, scareware, spyware and GAV malicious scripts IPS • Prevents drive-by-download attacks • Cloud-based service protects you from RED legitimate sites infected with malware • Enables granular control by user, group, or Application IP; and separate control over actions for Control view, post, chat, apps, games, and video
  • 10. Cornerstone – The Application Proxy Packet Reassembly – since 1996 An Application Proxy checks Source IP, Destination IP, Port, Protocol If a matching rule (or service) is found: The proxy then performs deep inspection on the content of the packet, including application layer data. This is the key to finding threats that OTHER FIREWALLS MISS!
  • 11. Fireware XTM: Making the Most of Your Network QoS and Traffic Shaping • High-priority traffic gets bandwidth • Low-priority traffic gets available bandwidth Multi-WAN Support • Up to 4 WAN connections supported • Traffic can use multiple WAN connections simultaneously or on a failover VPN Failover • Mission-critical VPN traffic keeps flowing if a remote site becomes unavailable • Traffic automatically fails-over to another gateway IPv6 Readiness • IPv6 Ready Gold Logo validates IPv6 routing • All XTM appliances will support IPv6
  • 12. Managing XTM Solutions: Flexibility Choose from three user interface options: Administer your way Command Line Interface WatchGuard Systems Manager Interface Web Interface
  • 13. Suite of tabbed tools deliver information needed to monitor and react to network status Take instant remediative action, such as adding a Managing XTM Solutions: Real-Time Visibility blocked sites list site to a Real-time monitoring lets you take instant action to protect your network.
  • 14. Managing XTM Solutions: Satisfy Auditors 65 pre-defined reports included. Drill-down for the data you need — when you need it.
  • 15. XTM Multi-Box Management Saves Time Simultaneously manage from 2 to 100’s of boxes. Implementing the WatchGuard solution was a breeze. The policy setting and system configuration is easy because it is all very logical and straightforward. Align security policies across Francis Lim, IT an organization – or apply Manager, Eurokars Group modifications between boxes
  • 16. Securely Connecting Users: VPN • Create VPN by simple drag and drop • Connect any location with Internet access • Select from IPSec, SSL, PPTP • Choose your device: laptop, smartphone, tablet • Define flexible rules to restrict data access to authorized individuals only • Use client or clientless options I can’t remember the last time I had to call someone with a security problem. With WatchGuard, we are always connected. Lucas Goh, Head of IT Operations for Asia, Berg Propulsion
  • 17. XTM 33 XTM 33-W XTM 330 Industry-Leading Performance at Each Price Point Firewall Throughput 850 Mb/s 850 Mb/s 850 Mb/s XTM 2050 XTM Throughput 45 Mb/s 45 Mb/s 70 Mb/s XTM 1050 Concurrent Connections 40,000 XTM 8 Series 40,000 40,000 (bi-directional) XTM 5 Series Performance BOVPN 50 50 50 XTM XTM 3 Series 3 Series MUVPN (IPSec) 5/50 5/50 5/55 XTM 2 Series MUVPN (SSL) 55 55 55 Local User Database 500 500 500 Small Business Midsize Business Service Providers / Headquarters Max. 1- 50 Users 50 - 250 Users 250 – 500 Users 500 – 1,000 Users 1,000+ Users Model Upgrade No No No
  • 18. What is “Next-Generation”? “Firewalls need to evolve to be more proactive in blocking new threats, such as botnets and targeted attacks. Enterprises need to update their network firewall and intrusion prevention capabilities to protect business systems as attacks get more sophisticated.” (XTM = Next-Generation UTM) “XTM platforms will take security appliances beyond traditional boundaries by vastly expanding security features, networking capabilities and management flexibility.”
  • 19. Next-Generation Security Solutions LiveSecurity® Next- Generation Application Control Firewall Bundle Intrusion Prevention Service Security Gateway AntiVirus Bundle Reputation Enabled Defense (RED) WebBlocker spamBlocker
  • 20. Industry-Leading Value “The company is strong, the products able, and the pricing can’t be beat.” Source: Info-Tech Research Group. Vendor Landscape: Unified Threat Management. August 2011.
  • 22. XTM Performance & Value = Market Leadership Market Share Q3 2011 WatchGuard Check Point SonicWall McAfee Fortinet Cisco $0 $2,000,000 $4,000,000 $6,000,000 $8,000,000 $10,000,000 $12,000,000 $14,000,000 $16,000,000 $18,000,000 $20,000,000 Price Range: $1,500 - $4,999 Cisco Fortinet McAfee SonicWall Check Point WatchGuard Market Share Q3 2011 $8,332,580 $10,575,907 $11,366,568 $13,537,362 $12,743,382 $17,306,073 Source: 2011 Infonetics, 3Q11 Network Security Appliance and Software Worldwide and Regional Market Share.
  • 23. Why WatchGuard Wins vs. Palo Alto vs. Fortinet vs. Cisco vs. SonicWall Networks • General purpose CPU • Application Control • Simpler admin. task • Gateway AntiVirus beats ASIC for security • HTTPS inspection flows detects malware in all • Real-time visibility • Tightly integrated • Application Control compressed file tools security services ease of use (e.g. formats • 65 bundled reports • UTM performance search) • Email security and anti- vs. only 2 • 2.5 million AV spam capabilities • Simple VPN setup • Multi-WAN signatures vs 25,000 • Comprehensive • Model upgrades by appliance • Traffic shaping license key line, including • VPN setup wizard tabletops Watch Video Comparisons http://www.watchguard.com/latest/us-vs-them.asp
  • 24. Moving Security Forward with Watchguard XTM • “Best-in-class” security for comprehensive protection • Recognized security “Trend Setter”, industry “Champion”, and “Leader” • 65 reports included at no extra cost • Real-time monitoring • Intuitive set-up wizards • Multi-WAN support • ICSA Firewall & IPSec certification • Market-leading value