SlideShare a Scribd company logo
1 of 42
Download to read offline
Dell SonicWALL
Next Generation Firewall
Workshop
2 SonicWALLConfidential
Dell SonicWALL’s legacy
1991 1996 2005 2007 2010 2011 2012
Founded
Became
leading
provider of
subscription
services on
optimized
appliances
Became the
leader in unit
share for
Unified Threat
Management
Firewall
appliances
Shipped one
million
appliances
worldwide
Named to
Visionaries
Quadrant,
Gartner Magic
Quadrant for
SSL VPN
Thoma Bravo and
SonicWall entered
into a partnership
Positioned as
“Leader” in
Gartner UTM
Magic Quadrant
Positioned as
“Visionary” in
Gartner SSL VPN
Magic Quadrant
Announced
SuperMassive™
E10000 Series
SNWL Earns
NNSLabs
Recommended
Rating for
NGFW SVM
Shipped two
million
appliances
worldwide
5/9: Joined the
Dell family
3 SonicWALLConfidential
Magic Quadrant Unified Threat Management
Dell SonicWALL in Leaders Quadrant
By John Pescatore, Greg Young
challengers leaders
niche players visionaries
abilitytoexecute
completeness of vision
as of March 5, 2012
Dell SonicWALL
Fortinet
Check Point Software Technologies
WatchGuard
Sophos (Astaro)
Cyberoam
Netasq
Cisco
Juniper Networks
Netgear
Trustwave
gateProtect
Clavister
Kerio Technologies
Dell Vendor Profile
Excerpted from
MQ:
Strengths
•Dell has strong global partner and MSSP support.
•Dell SonicWALL is well-known in the UTM space and
appears frequently on Gartner client shortlists.
•The graphical elements of SonicWALL's management
interface are consistently highly rated.
•SonicWALL's release of new features has kept up with
midmarket needs, and has been matched by usability
enhancements.
Cautions
•SonicWALL's push into the high end with
SuperMassive may divert resources and focus from the
UTM market.
•SonicWALL does not offer a virtual appliance for the
UTM space.
4 SonicWALLConfidential
2013 The NSSSecurity Value Map
5 SonicWALLConfidential
Dell Connected Security
38B security
events analyzed
daily
1m devices WW
reporting on 40m
users
638B intrusions
prevented in 2011
$14 trillion in
assets protected
daily
40,000 new
malware samples
analyzed every
day
4.2B malware
attacks blocked in
2011
Data encrypted
and protected on
7m devices
Dell SonicWALL
Dell Dell Secureworks
Dell Credant
Dell KaceDell Quest
Dell is firmly
committed to
providing end-to-end
IT solutions that
enable customers to
grow and thrive. This
includes continuous
protection of
customers data,
applications,
systems and
networks.
Secure remote access
Email security
Policy & management
Hosted
Network security
Dell SonicWALL product portfolio
Clean wireless – SonicPoint-N Series
WAN acceleration
Application
Intelligence
and Control
GAV/ Anti- Spyware
Intrusion
Prevention
Comprehensive
Anti- Spam
Service
Enforced
Client
Anti- Virus
Content
Filtering
Service
Global
VPN
Client
SSL VPN
For Network
Security
Secure
Virtual Assist
Mobile
Connect
End Point
Control
Connect
Mobile
Spike License
Pack
Advanced
Reporting
Native Access
Module
Secure
Virtual Assist
Secure
Virtual Access
Secure
Virtual Meeting
Mobile
Connect
Web Application
Firewall
Email
Protection
Email
Anti- Virus
Email
Compliance
Global
Management System
Analyzer Scrutinizer
7 SonicWALLConfidential
Dell SonicWALL Next-Gen Firewalls
SuperMassive
E10000 & 9000
Series
Data centers, ISPs
E-Class NSA Series
Medium to large
organizations
NSA Series
Branch offices and
medium sized
organizations
TZ Series
Small and
remote offices
E10200E10400E10800
NSA E8500 NSA E6500 NSA E5500NSA E8510
NSA 4600 NSA 3600 NSA 2400 NSA 250M NSA 220
TZ 205 TZ 105TZ 215
9600 9400 9200
NSA 5600 NSA 6600
Dell SonicWALL Next Generation Firewalls
SuperMassive E10800
SuperMassive E10400
SMB/Campus/Branch
Enterprise, Data Center
SuperMassive Series
TZ 215/W
TZ 205/W
TZ 105/W
SuperMassive 9600
SuperMassive 9400
SuperMassive 9200
TZ Series
NSA 4600
NSA 3600
NSA 2600
NSA 220/250M
NSA 6600
NSA 5600
NSA Series
9 SonicWALLConfidential
E-Class Series Certifications
FIPS140-2
Common Criteria EAL4+
ICSA Firewall ICSA Enterprise Firewall
(IPv6, High Availability, VoIP)
IPv6 Phase 1
IPv6 Phase 2
NSSRecommended NGFW
(E10800 based on the same security engine)
10 SonicWALLConfidential
Dell SonicWALL Next Generation Firewall Architecture
Scan Everything – Every bit, every protocol, every user & application
11 SonicWALLConfidential
NGFW Orientation – SPI vs. DPI
Stateful Packet Inspection
12 SonicWALLConfidential
NGFW Orientation – SPI vs. DPI
Deep Packet Inspection
13 SonicWALLConfidential
Next Generation Firewall Technology
1. Stateful Packet Inspection
2. Intrusion Prevention
– The front- line network defense against application attacks
3. Application Identification & Visualization
– Can’t control what you can’t see
4. User Identification through Single Sign On (SSO)
– Correlate network traffic with users
5. Application Control
– Granular control (Allow Facebook, Block Social Gaming)
6. SSL Decryption
– Don’t allow threats to tunnel through encrypted channels
7. Threat Prevention
– Anti- X (Virus/Trojan/Malware)
DeepPacketInspection
14 SonicWALLConfidential
Application Intelligence, Control and Visualization
Application Chaos
So many on Port 80
Critical Apps Prioritized Bandwidth
Acceptable Apps Managed Bandwidth
Unacceptable Apps Blocked
Identify
By Application
- Not by Port & Protocol
By User/Group
-Not by IP
By Content Inspection
-Not by Filename
Categorize
By Application
By Application Category
By Destination
By Content
By User/Group
Users/Groups
Ingress
Control
Prioritize Apps by Policy
Manage Apps by Policy
Block Apps by Policy
Detect and Block Malware
Detect & Prevent Intrusion Attempts
Policy
Visualize &
Manage Policy
Cloud-Based
Extra-Firewall
Intelligence
Egress
Malware Blocked
Massively Scalable
Next-Generation
Security Platform
High Performance Multi-Core
Re-Assembly Free
DPI
Visualization
Policy
Application intelligence, control and visualization
Identify Categorize Control
??
??
??
?
Process Visualization
16 SonicWALLConfidential
Network Traffic Visualization
Real-time Traffic Breakdown
User Traffic Consumption
Identify P2P Traffic
Bandwidth BreakdownApp Traffic Drilldown
17 SonicWALLConfidential
Identify and Control Applications
Application
Library with over
3800 unique
Application Uses
Granular Control
Allow Facebook, Block
Farmville
Allow Chat, Block File Transfer
- Group/User Based
- Schedule Based
- Exceptions
18 SonicWALLConfidential
Dashboard->Real-Time monitor
19 SonicWALLConfidential
(SonicOS5.9)
Enhaned Logging
 New to view, categorize and filter
20 SonicWALLConfidential
Application Control
21 SonicWALLConfidential
NGFW
Features -
DPI-SSL
22 SonicWALLConfidential
RFDPI Engine with DPI-SSL
RFDPI Engine
Incoming SSL
Session
Handling
Ultra-Scalable TCP Stack
Decryption
Re-Encryption
Outgoing SSL
Session
Handling
SSL Stream out
SSL Stream in
23 SonicWALLConfidential
SSL Decryption (DPI SSL) Details
• Does not rely on a proxy configuration
• Can inspect all SSL sessions on all ports independently of the
protocol (HTTPS, IM SSL, POP3 over SSL, etc…)
• Scans both SSL encrypted and decrypted data
• Can inject content such as block pages
• Client Side DPI-SSL Security Services
– Gateway Anti- Virus, Gateway Anti- Spyware, Intrusion Prevention,
Application Firewall, Content Filtering
• Server Side DPI-SSL Security Services
– Gateway Anti- Virus, Gateway Anti- Spyware, Intrusion Prevention,
Application Firewall
• Optional: decrypted traffic can be sent directly to the server after DPI
inspection. Benefit: SSL Offloading
24 SonicWALLConfidential
NGFW
Features -
SSO
2
25 SonicWALLConfidential
Single Sign-On Overview
• SSO is a transparent user authentication that provides access to
network resources with a single login.
User Workstation
Authorized
passwrd123
No need for additional authentication!
Access Rules
Security Services
26 SonicWALLConfidential
SonicWALL SSO Agent
27 SonicWALLConfidential
Security Services
2
28 SonicWALLConfidential
SonicWALL On-Board DPI Security Services
Intrusion Prevention
Gateway Anti-Virus
Gateway Anti-Spyware
Cloud-AV
Content/URL Filtering
DPI SSL (SSL Inspection)
Application Intelligence & Control
Application Visualization
Comprehensive Anti-Spam
29 SonicWALLConfidential
RFDPI based Gateway Anti-Virus
HTTP
SMTP
TCP
Stream
Reassembly-
free Base64
decoding
Reassembly-free
deflate
decompression
Reassembly-free
ZIP
decompression
Reassembly-free
GZIP
decompression
Reassembly-
free Gateway
Anti-Virus
scanning
based on
Deep Packet
Inspection
technology
Anti-Virus
Prevention
Response
POP3
IMAP
FTP
Packet
Start
stage
Protocol
State
Machine
E-Mail
Format
Decoding
Decompression Scanning Prevention
Copyright 2010 SonicWALL Inc. All Rights Reserved
29
30 SonicWALLConfidential
Content Filtering Service Overview
• Database in the cloud (millions of URLs rated)
• Hardware- and OS-independent
• Simple implementation
• Granular control: 64 categories
• GMSand Analyzer integration (reporting)
31 SonicWALLConfidential
VPN
3
32 SonicWALLConfidential
Route Based IPSec VPN
• Tunnel Interface: A Tunnel Interface can be defined between the two
end- points of the tunnel. Static routes will be used to route traffic
through the tunnel interface.
• Note: The Tunnel Interface must be bound to a physical interface
and the IP address of that physical interface is used as the source
address of the tunneled packet.
33 SonicWALLConfidential
SSL VPN
34 SonicWALLConfidential
Using All The cores
Increase SSL-VPN Sessions
Model Old New
NSA E8510 n/a 1,500/5000*
NSA E8500 50 1,500/5000*
NSA E7500 50 1,000/5000*
NSA E6500 50 750
NSA E5500 50 500
NSA 5000 30 350
NSA 4500 30 350
NSA 3500 30 250
NSA 2400 25 125
NSA 250 15 50
NSA 220 15 50
TZ 215 10 25
TZ 210 / 210W 10 25
TZ 200 / 200W 10 10
TZ 100 / 100W 5 5
35 SonicWALLConfidential
Mobile Connect for iOS/ Android
Dell Aventail E- Class
SRA Appliances
Dell SonicWALL
SRA Appliances
Dell SonicWALL Next-
Generation Firewalls
Step 1:
Download
Mobile Connect
Step 2:Install
Mobile Connect
Step 3: Configure SSL
VPN Connection
36 SonicWALLConfidential
Deployment
Scenarios
3
37 SonicWALLConfidential
Top Deployments
1. Traditional NAT Gateway with Security & Remote Access
2. High Availability Modes
– Active/Passive with State Synchronization
– Active/Active DPI with State Synchronization
– Active/Active Clustering
3. In-Line Deployments: Wire mode or Layer 2 Bridge Mode, Tap Mode
– Easy Network Insertion, no network re- numbering
4. “Clean Wireless” Deployment
– Firewall as a wireless controller
– DPI on all wireless traffic
5. “CleanVPN” Deployment
– Firewall as a VPN Concentrator
– DPI on all incoming VPN traffic
6. VPN Concentrator for Distributed Enterprise
– Global Management System (GMS) to provision and manage branch offices
– Connectivity through central SuperMassive or E- Class NSA firewall
– All security done at the central site
7. Network Segmentation (Security Zones)
– Network Segmentation via VLAN & Security Zones
– Different Security policies for each Security Zone
38 SonicWALLConfidential
Medium/Large Network Deployment with DPI Security
• Requirements
– Layered security
– Levels of trust created via defining
zones.
– Gateway Firewalls between zones.
– Context- aware security
– Enforce global Policy based on
context (user, location, access
method, Device, etc)
– Application- aware Security
– Mitigate Advance persistent threats
– Orchestrated Security management
– Workload Virtualization introduces
Virtual Access Layer
– Need security functions like physical
layer
• Security Functions
– ACLs, Firewalls, IDS/IPS
– host- based security (HIPS,
Vulnerability Scanning)
– Email Security
– Anti- Spyware
– Secure Remote Access
– SIEM/Log Monitoring
Virtual Access
Core
WAN
Aggregation
Access
Firewall,
IDS/IPS,
Gateway
services, …
• Security required at each layer to achieve global protection
• Virtual Access layer requires security enforcement within virtual environment
NSA Series
38
39 SonicWALLConfidential
NGFW Wire & L2 Bridge Mode Deployment
NGFW insertion into a network with an existing gateway firewall
Layer 2 Bridge or Wire Mode Deployment
Discover application usage & threats leaking through the
traditional firewall
Before After
40 SonicWALLConfidential
Flexible Wire Mode Deployment
Bypass  Inspect  Secure
 Allows for the quick and relatively non interruptive introduction of
SuperMassive into a network (ie: between a core switch and a perimeter
firewall, in front of a VM server farm, at a transition point between data
classification domains).
 Inspect Mode provides full visibility & low- risk, zero- latency packet path.
 Secure Mode is the progression of Inspect Mode, actively interposing active
control into the packet processing path.
41 SonicWALLConfidential
42 SonicWALLConfidential
Application Visualization Report
 Detailed application report for offline report generation
 Visualization database uploaded to www.mysonicwall.com
 Report provides risk assessment, applications, bandwidth,
vulnerabilities, URLs, etc

More Related Content

What's hot

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sraMotty Ben Atia
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsVertexMon VertexMon
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetIxia
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 

What's hot (20)

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM Datasheet
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 

Viewers also liked

Analyst Report for Next Generation Firewall
Analyst Report for Next Generation FirewallAnalyst Report for Next Generation Firewall
Analyst Report for Next Generation FirewallIla Group
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 
Microsoft azure platforms
Microsoft azure platformsMicrosoft azure platforms
Microsoft azure platformsMotty Ben Atia
 
Információbiztonság: IT biztonságtechnikai közbeszerzések
Információbiztonság: IT biztonságtechnikai közbeszerzésekInformációbiztonság: IT biztonságtechnikai közbeszerzések
Információbiztonság: IT biztonságtechnikai közbeszerzésekS&T Consulting Hungary
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Fajar Isnanto
 
Belsoegesű motorok általános
Belsoegesű motorok általánosBelsoegesű motorok általános
Belsoegesű motorok általánosCsongor Kiss
 
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfalYoung Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfalYoung BTS Kommunikációs rendszerek
 
ePlus Next-Generation Firewalls
ePlus Next-Generation FirewallsePlus Next-Generation Firewalls
ePlus Next-Generation FirewallsePlus
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
Avaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityAvaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityMotty Ben Atia
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aqMotty Ben Atia
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesElsa Cariello
 
Adobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowAdobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowMotty Ben Atia
 

Viewers also liked (18)

Analyst Report for Next Generation Firewall
Analyst Report for Next Generation FirewallAnalyst Report for Next Generation Firewall
Analyst Report for Next Generation Firewall
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Microsoft azure platforms
Microsoft azure platformsMicrosoft azure platforms
Microsoft azure platforms
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Információbiztonság: IT biztonságtechnikai közbeszerzések
Információbiztonság: IT biztonságtechnikai közbeszerzésekInformációbiztonság: IT biztonságtechnikai közbeszerzések
Információbiztonság: IT biztonságtechnikai közbeszerzések
 
Análisis
AnálisisAnálisis
Análisis
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
Belsoegesű motorok általános
Belsoegesű motorok általánosBelsoegesű motorok általános
Belsoegesű motorok általános
 
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfalYoung Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
 
ePlus Next-Generation Firewalls
ePlus Next-Generation FirewallsePlus Next-Generation Firewalls
ePlus Next-Generation Firewalls
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Avaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityAvaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & Mobility
 
Hogyan méretezzünk tűzfalat?
Hogyan méretezzünk tűzfalat?Hogyan méretezzünk tűzfalat?
Hogyan méretezzünk tűzfalat?
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
Adobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowAdobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller Workflow
 

Similar to Ngfw overview

Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?S&T Consulting Hungary
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Balázs Antók
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowNetFlow Analyzer
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 

Similar to Ngfw overview (20)

SonicWall
SonicWallSonicWall
SonicWall
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Sonicwall tz series new
Sonicwall tz series newSonicwall tz series new
Sonicwall tz series new
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
Ds e class-nsa_e8500_us
Ds e class-nsa_e8500_usDs e class-nsa_e8500_us
Ds e class-nsa_e8500_us
 

More from Motty Ben Atia

CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution OverviewMotty Ben Atia
 
CA ARCserve Replication
CA ARCserve ReplicationCA ARCserve Replication
CA ARCserve ReplicationMotty Ben Atia
 
CA ARCserve High Availability
CA ARCserve High Availability CA ARCserve High Availability
CA ARCserve High Availability Motty Ben Atia
 
CA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedCA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedMotty Ben Atia
 
Adobe Acrobat XI Overview
Adobe Acrobat XI OverviewAdobe Acrobat XI Overview
Adobe Acrobat XI OverviewMotty Ben Atia
 
Adobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsAdobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsMotty Ben Atia
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management SolutionsMotty Ben Atia
 
Scopia Infrastructure Guide
Scopia Infrastructure GuideScopia Infrastructure Guide
Scopia Infrastructure GuideMotty Ben Atia
 
Avaya Scopia Series Overview
Avaya Scopia Series OverviewAvaya Scopia Series Overview
Avaya Scopia Series OverviewMotty Ben Atia
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management OverviewMotty Ben Atia
 
Avaya identity engines overview
Avaya identity engines overviewAvaya identity engines overview
Avaya identity engines overviewMotty Ben Atia
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architectureMotty Ben Atia
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Motty Ben Atia
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution OverviewMotty Ben Atia
 
Avaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioAvaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioMotty Ben Atia
 
Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2Motty Ben Atia
 
Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Motty Ben Atia
 

More from Motty Ben Atia (20)

Windows Azure for IT
Windows Azure for ITWindows Azure for IT
Windows Azure for IT
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
 
CA ARCserve D2D
CA ARCserve D2DCA ARCserve D2D
CA ARCserve D2D
 
CA ARCserve Replication
CA ARCserve ReplicationCA ARCserve Replication
CA ARCserve Replication
 
CA ARCserve High Availability
CA ARCserve High Availability CA ARCserve High Availability
CA ARCserve High Availability
 
CA ARCserve Backup
CA ARCserve BackupCA ARCserve Backup
CA ARCserve Backup
 
CA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedCA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updated
 
Adobe Acrobat XI Overview
Adobe Acrobat XI OverviewAdobe Acrobat XI Overview
Adobe Acrobat XI Overview
 
Adobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsAdobe Creative Cloud For Teams
Adobe Creative Cloud For Teams
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management Solutions
 
Scopia Infrastructure Guide
Scopia Infrastructure GuideScopia Infrastructure Guide
Scopia Infrastructure Guide
 
Avaya Scopia Series Overview
Avaya Scopia Series OverviewAvaya Scopia Series Overview
Avaya Scopia Series Overview
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
 
Avaya identity engines overview
Avaya identity engines overviewAvaya identity engines overview
Avaya identity engines overview
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architecture
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution Overview
 
Avaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioAvaya Aura Messaging Portfolio
Avaya Aura Messaging Portfolio
 
Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2
 
Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)
 

Recently uploaded

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Recently uploaded (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Ngfw overview

  • 1. Dell SonicWALL Next Generation Firewall Workshop
  • 2. 2 SonicWALLConfidential Dell SonicWALL’s legacy 1991 1996 2005 2007 2010 2011 2012 Founded Became leading provider of subscription services on optimized appliances Became the leader in unit share for Unified Threat Management Firewall appliances Shipped one million appliances worldwide Named to Visionaries Quadrant, Gartner Magic Quadrant for SSL VPN Thoma Bravo and SonicWall entered into a partnership Positioned as “Leader” in Gartner UTM Magic Quadrant Positioned as “Visionary” in Gartner SSL VPN Magic Quadrant Announced SuperMassive™ E10000 Series SNWL Earns NNSLabs Recommended Rating for NGFW SVM Shipped two million appliances worldwide 5/9: Joined the Dell family
  • 3. 3 SonicWALLConfidential Magic Quadrant Unified Threat Management Dell SonicWALL in Leaders Quadrant By John Pescatore, Greg Young challengers leaders niche players visionaries abilitytoexecute completeness of vision as of March 5, 2012 Dell SonicWALL Fortinet Check Point Software Technologies WatchGuard Sophos (Astaro) Cyberoam Netasq Cisco Juniper Networks Netgear Trustwave gateProtect Clavister Kerio Technologies Dell Vendor Profile Excerpted from MQ: Strengths •Dell has strong global partner and MSSP support. •Dell SonicWALL is well-known in the UTM space and appears frequently on Gartner client shortlists. •The graphical elements of SonicWALL's management interface are consistently highly rated. •SonicWALL's release of new features has kept up with midmarket needs, and has been matched by usability enhancements. Cautions •SonicWALL's push into the high end with SuperMassive may divert resources and focus from the UTM market. •SonicWALL does not offer a virtual appliance for the UTM space.
  • 4. 4 SonicWALLConfidential 2013 The NSSSecurity Value Map
  • 5. 5 SonicWALLConfidential Dell Connected Security 38B security events analyzed daily 1m devices WW reporting on 40m users 638B intrusions prevented in 2011 $14 trillion in assets protected daily 40,000 new malware samples analyzed every day 4.2B malware attacks blocked in 2011 Data encrypted and protected on 7m devices Dell SonicWALL Dell Dell Secureworks Dell Credant Dell KaceDell Quest Dell is firmly committed to providing end-to-end IT solutions that enable customers to grow and thrive. This includes continuous protection of customers data, applications, systems and networks.
  • 6. Secure remote access Email security Policy & management Hosted Network security Dell SonicWALL product portfolio Clean wireless – SonicPoint-N Series WAN acceleration Application Intelligence and Control GAV/ Anti- Spyware Intrusion Prevention Comprehensive Anti- Spam Service Enforced Client Anti- Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect End Point Control Connect Mobile Spike License Pack Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Mobile Connect Web Application Firewall Email Protection Email Anti- Virus Email Compliance Global Management System Analyzer Scrutinizer
  • 7. 7 SonicWALLConfidential Dell SonicWALL Next-Gen Firewalls SuperMassive E10000 & 9000 Series Data centers, ISPs E-Class NSA Series Medium to large organizations NSA Series Branch offices and medium sized organizations TZ Series Small and remote offices E10200E10400E10800 NSA E8500 NSA E6500 NSA E5500NSA E8510 NSA 4600 NSA 3600 NSA 2400 NSA 250M NSA 220 TZ 205 TZ 105TZ 215 9600 9400 9200 NSA 5600 NSA 6600
  • 8. Dell SonicWALL Next Generation Firewalls SuperMassive E10800 SuperMassive E10400 SMB/Campus/Branch Enterprise, Data Center SuperMassive Series TZ 215/W TZ 205/W TZ 105/W SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 TZ Series NSA 4600 NSA 3600 NSA 2600 NSA 220/250M NSA 6600 NSA 5600 NSA Series
  • 9. 9 SonicWALLConfidential E-Class Series Certifications FIPS140-2 Common Criteria EAL4+ ICSA Firewall ICSA Enterprise Firewall (IPv6, High Availability, VoIP) IPv6 Phase 1 IPv6 Phase 2 NSSRecommended NGFW (E10800 based on the same security engine)
  • 10. 10 SonicWALLConfidential Dell SonicWALL Next Generation Firewall Architecture Scan Everything – Every bit, every protocol, every user & application
  • 11. 11 SonicWALLConfidential NGFW Orientation – SPI vs. DPI Stateful Packet Inspection
  • 12. 12 SonicWALLConfidential NGFW Orientation – SPI vs. DPI Deep Packet Inspection
  • 13. 13 SonicWALLConfidential Next Generation Firewall Technology 1. Stateful Packet Inspection 2. Intrusion Prevention – The front- line network defense against application attacks 3. Application Identification & Visualization – Can’t control what you can’t see 4. User Identification through Single Sign On (SSO) – Correlate network traffic with users 5. Application Control – Granular control (Allow Facebook, Block Social Gaming) 6. SSL Decryption – Don’t allow threats to tunnel through encrypted channels 7. Threat Prevention – Anti- X (Virus/Trojan/Malware) DeepPacketInspection
  • 14. 14 SonicWALLConfidential Application Intelligence, Control and Visualization Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Identify By Application - Not by Port & Protocol By User/Group -Not by IP By Content Inspection -Not by Filename Categorize By Application By Application Category By Destination By Content By User/Group Users/Groups Ingress Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Policy Visualize & Manage Policy Cloud-Based Extra-Firewall Intelligence Egress Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Visualization
  • 15. Policy Application intelligence, control and visualization Identify Categorize Control ?? ?? ?? ? Process Visualization
  • 16. 16 SonicWALLConfidential Network Traffic Visualization Real-time Traffic Breakdown User Traffic Consumption Identify P2P Traffic Bandwidth BreakdownApp Traffic Drilldown
  • 17. 17 SonicWALLConfidential Identify and Control Applications Application Library with over 3800 unique Application Uses Granular Control Allow Facebook, Block Farmville Allow Chat, Block File Transfer - Group/User Based - Schedule Based - Exceptions
  • 19. 19 SonicWALLConfidential (SonicOS5.9) Enhaned Logging  New to view, categorize and filter
  • 22. 22 SonicWALLConfidential RFDPI Engine with DPI-SSL RFDPI Engine Incoming SSL Session Handling Ultra-Scalable TCP Stack Decryption Re-Encryption Outgoing SSL Session Handling SSL Stream out SSL Stream in
  • 23. 23 SonicWALLConfidential SSL Decryption (DPI SSL) Details • Does not rely on a proxy configuration • Can inspect all SSL sessions on all ports independently of the protocol (HTTPS, IM SSL, POP3 over SSL, etc…) • Scans both SSL encrypted and decrypted data • Can inject content such as block pages • Client Side DPI-SSL Security Services – Gateway Anti- Virus, Gateway Anti- Spyware, Intrusion Prevention, Application Firewall, Content Filtering • Server Side DPI-SSL Security Services – Gateway Anti- Virus, Gateway Anti- Spyware, Intrusion Prevention, Application Firewall • Optional: decrypted traffic can be sent directly to the server after DPI inspection. Benefit: SSL Offloading
  • 25. 25 SonicWALLConfidential Single Sign-On Overview • SSO is a transparent user authentication that provides access to network resources with a single login. User Workstation Authorized passwrd123 No need for additional authentication! Access Rules Security Services
  • 28. 28 SonicWALLConfidential SonicWALL On-Board DPI Security Services Intrusion Prevention Gateway Anti-Virus Gateway Anti-Spyware Cloud-AV Content/URL Filtering DPI SSL (SSL Inspection) Application Intelligence & Control Application Visualization Comprehensive Anti-Spam
  • 29. 29 SonicWALLConfidential RFDPI based Gateway Anti-Virus HTTP SMTP TCP Stream Reassembly- free Base64 decoding Reassembly-free deflate decompression Reassembly-free ZIP decompression Reassembly-free GZIP decompression Reassembly- free Gateway Anti-Virus scanning based on Deep Packet Inspection technology Anti-Virus Prevention Response POP3 IMAP FTP Packet Start stage Protocol State Machine E-Mail Format Decoding Decompression Scanning Prevention Copyright 2010 SonicWALL Inc. All Rights Reserved 29
  • 30. 30 SonicWALLConfidential Content Filtering Service Overview • Database in the cloud (millions of URLs rated) • Hardware- and OS-independent • Simple implementation • Granular control: 64 categories • GMSand Analyzer integration (reporting)
  • 32. 32 SonicWALLConfidential Route Based IPSec VPN • Tunnel Interface: A Tunnel Interface can be defined between the two end- points of the tunnel. Static routes will be used to route traffic through the tunnel interface. • Note: The Tunnel Interface must be bound to a physical interface and the IP address of that physical interface is used as the source address of the tunneled packet.
  • 34. 34 SonicWALLConfidential Using All The cores Increase SSL-VPN Sessions Model Old New NSA E8510 n/a 1,500/5000* NSA E8500 50 1,500/5000* NSA E7500 50 1,000/5000* NSA E6500 50 750 NSA E5500 50 500 NSA 5000 30 350 NSA 4500 30 350 NSA 3500 30 250 NSA 2400 25 125 NSA 250 15 50 NSA 220 15 50 TZ 215 10 25 TZ 210 / 210W 10 25 TZ 200 / 200W 10 10 TZ 100 / 100W 5 5
  • 35. 35 SonicWALLConfidential Mobile Connect for iOS/ Android Dell Aventail E- Class SRA Appliances Dell SonicWALL SRA Appliances Dell SonicWALL Next- Generation Firewalls Step 1: Download Mobile Connect Step 2:Install Mobile Connect Step 3: Configure SSL VPN Connection
  • 37. 37 SonicWALLConfidential Top Deployments 1. Traditional NAT Gateway with Security & Remote Access 2. High Availability Modes – Active/Passive with State Synchronization – Active/Active DPI with State Synchronization – Active/Active Clustering 3. In-Line Deployments: Wire mode or Layer 2 Bridge Mode, Tap Mode – Easy Network Insertion, no network re- numbering 4. “Clean Wireless” Deployment – Firewall as a wireless controller – DPI on all wireless traffic 5. “CleanVPN” Deployment – Firewall as a VPN Concentrator – DPI on all incoming VPN traffic 6. VPN Concentrator for Distributed Enterprise – Global Management System (GMS) to provision and manage branch offices – Connectivity through central SuperMassive or E- Class NSA firewall – All security done at the central site 7. Network Segmentation (Security Zones) – Network Segmentation via VLAN & Security Zones – Different Security policies for each Security Zone
  • 38. 38 SonicWALLConfidential Medium/Large Network Deployment with DPI Security • Requirements – Layered security – Levels of trust created via defining zones. – Gateway Firewalls between zones. – Context- aware security – Enforce global Policy based on context (user, location, access method, Device, etc) – Application- aware Security – Mitigate Advance persistent threats – Orchestrated Security management – Workload Virtualization introduces Virtual Access Layer – Need security functions like physical layer • Security Functions – ACLs, Firewalls, IDS/IPS – host- based security (HIPS, Vulnerability Scanning) – Email Security – Anti- Spyware – Secure Remote Access – SIEM/Log Monitoring Virtual Access Core WAN Aggregation Access Firewall, IDS/IPS, Gateway services, … • Security required at each layer to achieve global protection • Virtual Access layer requires security enforcement within virtual environment NSA Series 38
  • 39. 39 SonicWALLConfidential NGFW Wire & L2 Bridge Mode Deployment NGFW insertion into a network with an existing gateway firewall Layer 2 Bridge or Wire Mode Deployment Discover application usage & threats leaking through the traditional firewall Before After
  • 40. 40 SonicWALLConfidential Flexible Wire Mode Deployment Bypass  Inspect  Secure  Allows for the quick and relatively non interruptive introduction of SuperMassive into a network (ie: between a core switch and a perimeter firewall, in front of a VM server farm, at a transition point between data classification domains).  Inspect Mode provides full visibility & low- risk, zero- latency packet path.  Secure Mode is the progression of Inspect Mode, actively interposing active control into the packet processing path.
  • 42. 42 SonicWALLConfidential Application Visualization Report  Detailed application report for offline report generation  Visualization database uploaded to www.mysonicwall.com  Report provides risk assessment, applications, bandwidth, vulnerabilities, URLs, etc