SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Get the Most From Your Firewall
How your firewall can do more to meet today’s security needs
Agenda

    Changes in the security environment
      Technology
      Threats
      The way we work
      Tools

    Introducing Sophos UTM

    Real life case studies




2
Remember the ’90s?
Think back to the time before the mobile revolution


    You didn’t have to worry about all of these:




3
The history of firewalls
First generation to next generation




       1st generation:          2nd generation:       3rd generation:
       Packet filters           “Stateful” filters   Application level




4
What’s changed: Technology

     Wireless         IPv6




     VPN              BYOD




     Private cloud


5
Security implications:
A lot to think about




6
What’s changed: Threats
     SQL injection
     Phishing
     Spam
     Malware




7
Security implications: Data loss




8
What’s changed:
The way we work



    Road warriors   Remote offices   Consumer devices




9
Security implications:
Protecting data everywhere




10
What’s changed: Tools
 Point Products vs. Unified Threat Management (UTM)

          Back in the ’90s: Best of breed individual solutions
                            or
                            Compromise on protection for convenience

          Sophos today:   Best of breed individual solutions
                          or
                          Best of breed unified solution




                              vs.

11
UTM: Firewall


                 Application Awareness


                 User Awareness


                 Visibility




12
UTM: Wireless protection


                   Guests


                   BYOD


                   Remote Offices




13
UTM: Endpoint protection


                 Global Visibility


                 Latest Protection


                 Removable media control




14
UTM: Network protection


                  Intrusion Prevention


                  VPN


                  Remote Offices




15
UTM: Web protection


                 Web security


                 Content filtering


                 Application control




16
UTM: Email protection

                  Anti-virus


                  Encryption


                  POP3/IMAP filtering


                  Anti-spam/anti-phishing


17
UTM: Web server protection

                  SQLi/XSS protection


                  Anti-virus


                  Form hardening


                  Cookie protection


18
Sophos UTM
                                               UTM Endpoint Protection
                                               • Antivirus
                                               • HIPS
                                               • Device Control
      UTM Wireless Protection                                                             UTM Network Protection
      •Wireless controller for                           optional                         • Intrusion prevention
       Sophos access points                                                               • IPSec/SSL VPN
      •Multi-zone (SSID) support                                                          • Branch office security
                                               Essential Network Firewall
                                               • Stateful firewall
                                   optional    • Network address translation   optional
                                               • PPTP/L2TP remote access




     UTM Webserver Protection                                                             UTM Web Protection
     • Reverse proxy                                           optional                   • URL Filter
                                    optional                                   optional
     • Web application firewall                                                           • Antivirus & antispyware
     • Antivirus                               UTM Email Protection                       • Application control
                                               • Anti-spam & -phishing
                                               • Dual virus protection
                                               • Email encryption




19
Protection for today’s needs




20
Complete security
    Everything you need to stay protected



              Endpoint               Web                 Email             Data             Mobile           Network




          Anti-malware              Anti-malware       Anti-malware     Disk Encryption   Anti-malware
                                                                                                           Unified Threat Management



   Firewall        Intrusion         Malicious          Anti-spam                         Mobile Control
                                                                                                           Secure branch offices
                   prevention       URL Filtering                     File encryption




                                                                                                              WiFi security
                   Application       Producttivity                                         Mobile app
Device Control                                         Data Control   Key management
                    Control            Filtering                                            security




                                                                                                            Web Application
                  Endpoint Web     Anonymising Proxy      Email       Device Control                           Firewall
Access control
                   Protection          blocking         encryption




                                                                       Data Control
  Encryption      Patch Manager
                                   Content control                                                            Email archiving


                                                                       Encryption
                  Virtualization                                        for cloud
Data Control                       HTTPS Scanning
Staying ahead of the curve
Staying ahead of the curve
                                         US and Canada
      facebook.com/securitybysophos     1-866-866-2802
                                      NASales@sophos.com

      Sophos on Google+


                                       UK and Worldwide
      linkedin.com/company/sophos
                                        + 44 1235 55 9933
                                       Sales@sophos.com

      twitter.com/Sophos_News


      nakedsecurity.sophos.com


                                                    22

Weitere ähnliche Inhalte

Was ist angesagt?

Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterBrian Gleeson
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 

Was ist angesagt? (20)

Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 

Andere mochten auch

2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat ReportSophos
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareSophos
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementMilan Petrásek
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 

Andere mochten auch (6)

2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 

Ähnlich wie Get the Most From Your Firewall

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENVladyslav Radetsky
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Netpluz Asia Pte Ltd
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Cyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptxCyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptxZalamSudisno
 

Ähnlich wie Get the Most From Your Firewall (20)

Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
1. introduzione a TMG
1. introduzione a TMG1. introduzione a TMG
1. introduzione a TMG
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptxCyber Security Ingram 2022.pptx
Cyber Security Ingram 2022.pptx
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Get the Most From Your Firewall

  • 1. Get the Most From Your Firewall How your firewall can do more to meet today’s security needs
  • 2. Agenda Changes in the security environment  Technology  Threats  The way we work  Tools Introducing Sophos UTM Real life case studies 2
  • 3. Remember the ’90s? Think back to the time before the mobile revolution You didn’t have to worry about all of these: 3
  • 4. The history of firewalls First generation to next generation 1st generation: 2nd generation: 3rd generation: Packet filters “Stateful” filters Application level 4
  • 5. What’s changed: Technology  Wireless  IPv6  VPN  BYOD  Private cloud 5
  • 6. Security implications: A lot to think about 6
  • 7. What’s changed: Threats  SQL injection  Phishing  Spam  Malware 7
  • 9. What’s changed: The way we work Road warriors Remote offices Consumer devices 9
  • 11. What’s changed: Tools Point Products vs. Unified Threat Management (UTM) Back in the ’90s: Best of breed individual solutions or Compromise on protection for convenience Sophos today: Best of breed individual solutions or Best of breed unified solution vs. 11
  • 12. UTM: Firewall  Application Awareness  User Awareness  Visibility 12
  • 13. UTM: Wireless protection  Guests  BYOD  Remote Offices 13
  • 14. UTM: Endpoint protection  Global Visibility  Latest Protection  Removable media control 14
  • 15. UTM: Network protection  Intrusion Prevention  VPN  Remote Offices 15
  • 16. UTM: Web protection  Web security  Content filtering  Application control 16
  • 17. UTM: Email protection  Anti-virus  Encryption  POP3/IMAP filtering  Anti-spam/anti-phishing 17
  • 18. UTM: Web server protection  SQLi/XSS protection  Anti-virus  Form hardening  Cookie protection 18
  • 19. Sophos UTM UTM Endpoint Protection • Antivirus • HIPS • Device Control UTM Wireless Protection UTM Network Protection •Wireless controller for optional • Intrusion prevention Sophos access points • IPSec/SSL VPN •Multi-zone (SSID) support • Branch office security Essential Network Firewall • Stateful firewall optional • Network address translation optional • PPTP/L2TP remote access UTM Webserver Protection UTM Web Protection • Reverse proxy optional • URL Filter optional optional • Web application firewall • Antivirus & antispyware • Antivirus UTM Email Protection • Application control • Anti-spam & -phishing • Dual virus protection • Email encryption 19
  • 21. Complete security Everything you need to stay protected Endpoint Web Email Data Mobile Network Anti-malware Anti-malware Anti-malware Disk Encryption Anti-malware Unified Threat Management Firewall Intrusion Malicious Anti-spam Mobile Control Secure branch offices prevention URL Filtering File encryption WiFi security Application Producttivity Mobile app Device Control Data Control Key management Control Filtering security Web Application Endpoint Web Anonymising Proxy Email Device Control Firewall Access control Protection blocking encryption Data Control Encryption Patch Manager Content control Email archiving Encryption Virtualization for cloud Data Control HTTPS Scanning
  • 22. Staying ahead of the curve Staying ahead of the curve US and Canada facebook.com/securitybysophos 1-866-866-2802 NASales@sophos.com Sophos on Google+ UK and Worldwide linkedin.com/company/sophos + 44 1235 55 9933 Sales@sophos.com twitter.com/Sophos_News nakedsecurity.sophos.com 22

Hinweis der Redaktion

  1. This presentation explores they key network security changes that have implications for your firewall. It will focus on the four Ts: - Technology - Threats - The way we work - Tools
  2. Network security implementation has changed a lot in the last few years, but often the way we approach network security in general hasn’t changed much. It’s time to take a fresh look at network security and make sure you’re getting the most out of your firewall.In a recent Sophos survey over one third (34%) of all respondents said they’ve had their firewall for five years or more. If you haven’t reviewed your firewall for a while, there’s a good chance it could be working harder for you.
  3. Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity.We began with packet filterswhich delivered the simplest instructions (rules) for inspecting Internet traffic and deciding what to allow through. But soon we realized that more control was necessary. Which led to the creation of second generation firewalls, called stateful filters. These allowed us to create more detailed rules, but were still focused on the type of Internet traffic.Today understanding traffic flow isn’t enough. It’s also important to know what’s inside that traffic. Which brings us to application level firewalls, also known as next generation firewalls. So as you can see, firewalls are not a static commodity. And if you haven’t updated yours for a while, there’s a good chance it could be doing a lot more for you.
  4. Some of the key technology developments that have implications for network security include: - Wireless: Wireless enables users to connect to your network from roaming locations and from a wide range of devices. Great for productivity, but a threat to the security of your network and data. Both in terms of what might get on and what might come off. - VPN: Remote access: Users increasingly want – and often need – to have full access to the corporate network when working remotely. Virtual private networks have existed for many years but recently VPNs have become more prevalent due to significant cost reductions, increased bandwidth, and security. It’s likely that these IP based VPNs will ultimately find their way into almost every network based communications activity, including inside corporate local area networks - Private cloud: This is where cloud-based infrastructure is operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. - IPv6: IPv6 presents new challenges for both monitoring and traffic management. Tools are immature, and lack feature parity. You can’t depend on NAT, and firewall rules must take all traffic into consideration. BYOD: And the seismic change in consumer technology, with Smartphones and tablets, means users increasingly want to use their own shiny devices for work, devices that you can’t control or that lack standard corporate security features.Adopting new technologies such as these is fast becoming a must-do, not to gain competitive advantage but rather to stay in the game. If you don’t open your arms to them, you’ll get left behind.
  5. What do these technology changes mean for security? Essentially they mean a whole load more for Network Administrators and IT Security Managers to consider. Not only do you need to keep up with security for traditional in-office computers, but you also need to enable users to take advantage of these new technologies without adversely impacting your network or your data.
  6. Todaynearly all modern threats are web-based.SQL injection, phishing, spam and malware distribution have all migrated to the web. The web is available to everyone and cyber criminals prey upon unpatched users, programming flaws and poor human judgment to deliver their attacks.Considering that 21% of organizations we surveyed have had an outage due to a malware infection in the last year it is no wonder that two in five have concerns about the increasing sophistication of threats for their network security.
  7. While traditional methods provide some protection against worms and automated protocol attacks, the reality is that trying to use 20th century tools against 21st century threats compromises your ability to defend your networks, and, more importantly, your data.When it comes to network security, it’s no longer just about the direction of traffic or which port numbers it is traversing. Rather it’s about the intent of the payload. The device you use to connect and the medium you connect over matter just as much as any other factor. The threat landscape has changed, but there’s no reason to panic. We just need to make sure we have the right security solutions for today’s and tomorrow’s threats.
  8. Over the last 20 years they way we work has changed significantly. Road warriors in the cafe, car or customer site need the same IT functionality and access to data as in the office. Over recent years the boundaries between personal and professional have become ever more blurred. And it’s different from generation to generation. For those who are new to the workforce, stopping access to personal devices and social media sites in the workplace seems outrageous. For them multi-tasking between work and social activities is as natural as breathing. And of course consumer devices – smartphones, tablet PCs – are now commonplace in the workplace.
  9. Users expect to securely access any necessary data from anywhere, on every device. This demands a shift in thinking. Protection of sensitive information must be done based upon the need to secure that data, not on where it is located.Breaches will happen, so no matter where information resides it must be protected. We need to find a way to allow authorized access to information anywhere it might be needed in a world fraught with threats.
  10. Network security tools have changed significantly over the last 20 years. Back then the choice was between best of breed point products, which gave the best protection but required more management. Or a UTM solution that required customers to compromise on protection in return for the easier management.Things have changed with Sophos UTM, the first unified product on the market that doesn’t require compromise. It gives you an all-in-one easy to manage solution utilizing the latest technologies backed by SophosLabs.However you want to manage your network security, point solutions or unified protection, we can help.
  11. Let’s take a quick look at the UTM and the optional modules you can add to enhance your security.Firewall: At the heart of the solution is the firewall.The duties of a firewall include more than just being a traffic cop. Sophos UTM not only analyzes traffic, but provides secure VPN functionality and audit logging to keep a close eye on what’s transiting your network.Network Security: Network security is an important component in a comprehensive defense. Sophos Network Security providessecure access while watching for known malicious behavior which is an essential starting point to limiting the risks to your traffic. While the Branch Office functionality enables you to securely connect remote sites to headquarters simply, quickly and cheaply.Web Security: The vast majority of threats enter modern networks through web exploits and social engineering. Sophos Web Security lets you filter websites by category or by only looking for malicious content. This limits access to dangerous content and is one of the most effective techniques at reducing risk.Mail Security: Email security is considered old hat to many IT professionals, but it’s a lot more sophisticated than one might think. Sophos Mail Security gives you the best protection against phishing, targeted attacks while making it simple to encrypt and send secure emails.Web Application Security: This module filters the inputs and attacks targeting your websites can help defend against some of the most public data leakage incidents making the news. Web filtering is a two-way street – both keeping what should stay in, in, and what needs to stay out, out.Wireless Security: the Wireless Security module lets you consistently configure your wireless networks across the enterprise with the ability to segregate guests, mobile devices and managed PCs control access to sensitive informationEndpoint Management: use the Sophos UTM as the one place to manage and report on all your security tools with integrated management of your Sophos Anti-Virus clients.
  12. SophosUTM is a 21st century solution, designed to enable you to take advantage of today’s – and tomorrow’s – technologies and working practices. You can add modules as and when you need them – whether you need to enable secure wireless networks, securely connect branch offices, or enable road warriors to connect in securely.With regards the changing threat landscape, the truth is there is no silver bullet to stopping modern threats. Different techniques like anti-virus, web filtering, application control and web application firewalls are all effective at combating different attack vectors. A comprehensive solution is necessary to provide an effective defense. And Sophos UTM gives you just that, all managed through one easy-to-use console.And our threat protection is backed up by SophosLabs. Our global threat centers research threats from their origin and deploy protection from those threats based upon the most successful methods available to prevent exploitation. Working as a single unit, SophosLabs are able to inform our products to identify malicious content, regardless of technology or origin.Of course, you may not want to take advantage of every security option initially, but the Sophos UTM is designed to grow with your needs. The next generation of technologies to shore up our defenses is unknown, but the design of the Sophos UTM allows you to add functionality to your existing investment without the need for additional hardware or complicated rip and replace projects.