SlideShare a Scribd company logo
1 of 25
Download to read offline
May 2013
SonicPoint Wireless Solution &
Secure Remote Access solutions
2 SonicWALLConfidential
Dell SonicWALL product line-up
services via appliance
Network security
Secure Virtual
Access
Web App
Firewall
Connect
Mobile
Spike
Access
Secure Virtual
Assist
Advanced
Reporting
Native Access
Modules
Clean wireless – SonicPoint-N Series
App Intell &
C ontrol
GAV/ASW/
IPS
C ASS Enforced
Anti- Virus
C ontent
Filtering
Global VPN
C lient
SSL VPN
C lient
Virtual
Assist
Email
Protection
Email
Anti- Virus
Email
C ompliance
Site- to- Site
Backup
Offsite
Backup
Universal System
Recovery
GMS Analyzer Scrutinizer
Mobile
C onnect
Mobile
C onnect
EPC
Local
Archiving
Recovery Manager
for Exchange
WAN acceleration
Secure remote access
Email security
Backup and recovery
Policy & management
Secure Virtual
Meeting
Hosted
3 SonicWALLConfidential
Clean wireless key requirements
• Legacy WiFi (b/g)
• Pure- N WiFi
Expanded use of
wireless- N
networks
• Manage user bandwidth
• Prioritize productive applications
• PCI rogue access requirements
• Application identification and control for wireless traffic
• Deployment and ongoing access point management
Bandwidth
management
Building air- tight
wireless access
Centralized
management of
the wireless
network
Handling of new
applications • Examples include VoIP and video
4 SonicWALLConfidential
The solution
• High performance “N” connectivity
– Act as a replacement for wired connectivity, offers a secure,
mobile work environment
– Extended range for greater wireless coverage
• Fully integrated “C lean Wireless”
– NGFW - application identification, bandwidth, and policy enforcement
– Provides threat detection and prevention scanning for all wireless traffic
– FairNet
• Simplified deployment and lowered TC O
– Centralized management and auto- provision to remove the
complexity of high speed secure wireless
– Guest Service
• Flexible wireless client support
– Support for 802.11 a/b/g/n wireless clients (2.4/5GHz)
5 SonicWALLConfidential
Dell SonicWALL wireless solution
SonicPoint-N
Series
“n”
“n”
“n”
“n”
“n”
“n”“g”
“n”
“n”
“g”
“n”
“g”
“g”
Comprehensive
Gateway
Security Suite
PoE
Switches
Clean Wireless Clients (WPA2)
Internet
6 SonicWALLConfidential
Rouge access point detection
IDP / Malware scanning
WPA2 encryption
Application control
Auto provision
Dell SonicWALL Clean Wireless
• Clean wireless
– Beyond encryption,
provides threat detection
and prevention scanning
for all wireless traffic
• High performance “N”
connectivity
– Acts as a replacement for
wired connectivity, with
speed and extended range
• Simplified deployment
and lowered TCO
– Centralized management
and auto- provisioning to
remove the complexity of
high speed secure wireless
Policy
management
Clean wireless delivers breakthrough threat inspection technology, is auto provisioned
and managed, and integrates security policy across wired and wireless networks
7 SonicWALLConfidential
Clean wireless protection
• Deep packet inspection scanning of wireless traffic
– Combat the latest threats and vulnerabilities
– Application identification and policy enforcement
• Centralized policy and management over wireless
– Centralized policy enforcement
– User management
• Centralized access point management
– Ease of initial deployment and ongoing management
• Performance and predictability
– Greater wireless performance
– Better predictability using 802.11n technology
8 SonicWALLConfidential
Dell SonicWALL Clean Wireless
SonicPoint- N Series
SonicPoint-N Dual-Radio
6 External Antennas
POE+ & AC Adapter
8 SSID (VAP)
SonicPoint-Ne
Dual-Band
3 External Antennas
POE & AC Adapter
8 SSID (VAP)
SonicPoint- Ni
Dual- Band
Internal Antennas
POE Only
8 SSID (VAP)
9 SonicWALLConfidential
Dell SonicWALL Clean Wireless
Appliance Model Max. SonicPoints Supported
TZ 105 / TZ 105w 1
TZ 205 / TZ 205w 2
TZ 215 / TZ 215w 16
NSA 220 16
NSA 250M 16
NSA 2400 32
NSA 2600 32
NSA 3600 48
NSA 4600 64
NSA 5600 96
NSA 6600 96
NSA E5500 96
NSA E6500 128
NSA E8500 128
SuperMassive 9200 128
SuperMassive 9400 128
SuperMassive 9600 128
10 SonicWALLConfidential
Secure Remote
Access
11 SonicWALLConfidential
Key drivers
• Remote access
– Give all employees access solution that is easy to use and deploy
• Extranet access
– Open access to increase collaboration, yet do it in such a way that
access control and security is not compromised
• Mobility (BYOD)
– Mobile devices are increasingly functional for both data and voice,
leading to a rise of IT managed (non- managed) mobile devices
• Securing wireless networks Many organizations treat users on the
wireless network as remote users because of concerns over access to the
wireless network
• Disaster recovery
– During a business disruption, demand for remote access could spike to
include the majority of the workforce
12 SonicWALLConfidential
• Identify the user
• Interrogate the endpoint device
• Control and limit access to application resources
• Web- based access from any web- enabled device
• Email for smartphones and tablets through ActiveSync
• Network level access for Windows, Mac, Linux, Android and iOS
• Native access modules for RDP, Citrix and VMware View
• Unified policy interface to decrease ongoing access management
• Spike licensing for temporary license needs
• Broad OS support
Granular access
control
Flexible
connectivity
Manageability
Secure Remote Access requirements
13 SonicWALLConfidential
The need for Secure Remote Access
• Who is the user?
– Proof as to who the user is without question, based on a strong
authentication method
• What’s happening on the endpoint?
– A clear understanding of what is happening on the user’s end point to
make a policy decision, then classify that device accordingly
• What are the resources the user is seeking?
– Knowledge of what applications the user wants access to, and then grant
access according to policy
14 SonicWALLConfidential
The Dell SonicWALL approach to Secure
Remote Access
Business Partner
from any Browser
Customer/Supplier
Behind a Firewall
Extranet Access
Internal Users
Internal Access
Dell SonicWALL SSL
VPN SolutionTraveling
Employee
Day
Extender
Employee
at a
Kiosk
Employee
Using a
Wireless
Hotspot
Remote Access
Employee
Smart
Phones/
Tablets
Protect applications with
granular access control based
on user identity and device
integrity
Detect what is running on
the end point device
Connect users securely and
easily to applications on any
device
Connect
Web Apps
Client/Server Apps
File Shares
Databases
VoIP
VDI Infrastructure
ApplicationsDirectories
Corporate Perimeter
LDAP
AD
RADIUS
LDAP
Detect Protect Connect
15 SonicWALLConfidential
Detect: Endpoint control device
interrogation
Connect access
(Client- installed access)
Traditional
client/server
applications
File
shares
VoIP
applications
End point control
2 1
33
WorkPlace access
(Clientless web access)
3
Device identity
• Mapped directory
• Domain membership
• Watermark/certificate
• Any resident file
• Device ID
Device integrity
• Anti- virus
• Registry key
• Windows O/S level
• Personal firewall
• Anti- spyware
• J ailbroken/rooted
Device profile
• Android
• iOS
• Windows
• Windows mobile
• Macintosh
• Linux
With data security
• Cache control
• Secure desktop
16 SonicWALLConfidential
Protect: Unified policy
Admission control
• Define trust level for users
• Define trust level for devices
Create allow, deny and quarantine
rules easily that govern access for all
users and devices based on device
identity and device integrity.
Deny
AllowQuarantineDeny Allow
Employee
community
Groups: Sales,
marketing, executive
Partner
community
Groups: Partners
Access control
J ust one rule set enforces access to all
resources across all access methods
based on who the user is and the trust
level for the device.
• Define what applications
users/devices can access
CRM app.
Allowed groups:
Sales, marketing Deny
Order entry
Allowed groups:
Sales, partners Deny
17
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
WorkPlace access: Access to web- based and client/
server applications from virtually any device.
WorkPlace Portal
Easy-to-use clientless browser based access
19
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Simple, policy-enforced mobile access to
mission-critical data and applications
Mobile Connect app
• Intuitive app for iOS, Android, and Windows 8.1
• Download for free from the Apple app store
and Google play, embedded with Windows 8.1
devices
• Easy access to allowed web, client/server,
hosted, virtual desktop resources via one- click
bookmarks
• Complete “in- office” experience, layer 3 tunnel
enables network access to resources including
terminal services, Citrix, custom/advanced web
apps, VoIP
20
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Device interrogation for iOS/Android devices
For iOS
• Determine jailbreak status
• DeviceID (Based on the UDID of the
iOS device)
• Certificate enforcement
• OS version control
For Android
• Determine root status
• DeviceID (Based on the IMEI of the
Android device)
• Certificate enforcement
• OS version control
• Enforcement of anti- virus
21
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Protect from mobile threats
• Protect in- flight data from interception with encrypted SSL VPN connections
• Allow access by only authenticated users and trusted devices and only to
permitted resources with granular network access control policies
• Block malware and threats from entering your network when deployed with a
Dell next- gen firewall to scan mobile traffic
Dell SonicWALL SSL
VPN Solution
Web Apps
C lient/Server Apps
File Shares
Databases
VoIP
VDI Infrastructure
ApplicationsDirectories
Corporate Perimeter
LDAP
AD
RADIUS
LDAP
22
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Enable efficient administration with centralized
access policy management
Object- based policy management enables application control via easy to setup and
manage access rules, covering all device types and users.
Define Trust Level for
Users
Your Company
Employee
Community
Define Trust Level for
Devices
Groups: Sales,
Marketing, Executive
Partner
Community
Groups: Partners
Allow
Quarantine
Deny
Allow
Quarantine
Deny
• Create allow, deny and
quarantine rules easily
that govern access for all
users and devices based
on device identity and
device integrity
• J ust one rule set
enforces access to all
resources across all
access methods based
on who the user is and
the trust level for the
device
Application:
User Trust:
Device Trust:
Sales,
Executive
Define What
Applications
Users/Devices
can Access
Access Control List
CRM App
All in Empl.
Community
OWA
Sales,
Partners
Order Entry
AdmissionControl
23 SonicWALLConfidential
E- Class
Secure
Remote
Access
Series
Secure
Remote
Access
Series
Dell SonicWALL Secure Remote Access
SRA EX7000 SRA EX6000 Virtual ApplianceSRA EX9000
Detect –
granular end-
point control
detects identity
and security
state
Protect –
unified policy
limits user
access to
authorized
applications
only
Connect –
smart access
and tunneling
ensure easy,
secure access
to all network
resources
Secure remote access for all users, devices and applications
Spike
License
Secure Virtual
Assist
Advanced
Reporting
Native Access
Modules
Mobile
Connect
End Point
Control
SRA 1200 Virtual ApplianceSRA 4200
Secure Virtual
Access
Web App
Firewall
Secure Virtual
Assist
Spike LicenseMobile
Connect
End Point
Control
Secure Virtual
Meeting
24
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Dell SonicWALL SMB SRA Series Appliances
SRA 1600 SRA 4600 SRA VMA
Target Customer
SMB companies with up to 50
employees
Mid- enterprise companies with up
to 500 employees
SMB companies with up to
50 employees
Concurrent Users
Stackable user license options
include 5 or 10 concurrent users
Stackable user license options
include 10, 25 and 100 concurrent
users
Stackable user license
options include 5, 10 and 25
concurrent users
Additional Features Application Offload, Bookmarks
Bookmarks, Application Offload,
High Availability
Application Offload,
Bookmarks, Easy to deploy
NetExtender &
Mobile Connect
Windows, Mac OS, Linux, Android, iOS
Add-on (Paid)
Services
(Remote Support, Web
Application Security, etc.)
• Secure Virtual Assist – Remote desktop help and support tool
• Secure Virtual Access – Provides remote PC management and control
• Secure Virtual Meeting – For instant, cost- effective collaboration
• Web Application Firewall – Detects and protects web applications from web- based threats. Helps in
achieving PCI compliance (section 6.6 of PCI DSS 1.2).
• Spike Licensing – Increase the licensed user count for short usage spikes
• Dynamic Support – Options include 8x5 or 24x7 for one, two or three years
Single
Bundle
25
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Dell SonicWALL Product Overview
E-Class SRA EX7000 E-Class SRA EX9000
Target Customer Large Enterprise with over 1,000 employees Large Enterprise with over 1,000 employees
Concurrent Users Can be licensed with a 50, 100, 250, 500, 1,000,
2,000 and 5,000 concurrent user license
Can be licensed with a 100, 250, 500, 1,000,
2,000 and 5,000, 7,500, 10,000, 12,500, 15,000,
20,000 concurrent user license
Add-On Features • Spike License- Allows for the immediate
increase of the remote user count in the event
of a business disruption
• Virtual Assist- Remote desktop help and
support tool
• SonicWALL Aventail Advanced Reporting-
robust hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class
solutions
• Spike License- Allows for the immediate
increase of the remote user count in the event
of a business disruption
• Virtual Assist- Remote desktop help and
support tool
• FIPSSupport- License required for FIPS mode
• SonicWALL Aventail Advanced Reporting-
robust hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class
solutions
26
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Dell SonicWALL Product Overview
E-Class Virtual Appliance E-Class SRA EX6000
Target Customer Mid-size Enterprise with up to 5,000 employees Midsize Enterprise with 500 to 1,000 employees
Concurrent Users Can be licensed with a 25, 50, 100, 250, 500, 1,000,
2,000 or 5,000 concurrent user license
Can be licensed with a 25, 50, 100 or 250 concurrent
user license
Add-On Features • Spike License- Allows for the immediate increase of
the remote user count in the event of a business
disruption
• Native Access Modules- Optimized access for WTS,
VMware View and Citrix applications
• Advanced EPC- Granular control with easy
configuration for trusting end point devices
• Virtual Assist- Remote desktop help and support tool
• SonicWALL Aventail Advanced Reporting- robust
hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class solutions
• Spike License- Allows for the immediate increase of
the remote user count in the event of a business
disruption
• Native Access Modules- Optimized access for WTS,
VMware View and Citrix applications
• Advanced EPC- Granular control with easy
configuration for trusting end point devices
• Virtual Assist- Remote desktop help and support tool
• FIPSSupport- License required for FIPS mode
• SonicWALL Aventail Advanced Reporting- robust
hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class solutions

More Related Content

What's hot

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetIxia
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact centerCisco Canada
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmatCisco Canada
 
LTE Testing
LTE TestingLTE Testing
LTE TestingIxia
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 

What's hot (20)

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM Datasheet
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmat
 
LTE Testing
LTE TestingLTE Testing
LTE Testing
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 

Viewers also liked

Microsoft azure platforms
Microsoft azure platformsMicrosoft azure platforms
Microsoft azure platformsMotty Ben Atia
 
Dell efficiency through convergence - Dell Active Infrastructure
Dell efficiency through convergence - Dell Active InfrastructureDell efficiency through convergence - Dell Active Infrastructure
Dell efficiency through convergence - Dell Active InfrastructureKenneth de Brucq
 
Avaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityAvaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityMotty Ben Atia
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aqMotty Ben Atia
 
Adobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowAdobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowMotty Ben Atia
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2Motty Ben Atia
 
Microsoft Exchange 2013 deployment and coexistence
Microsoft Exchange 2013 deployment and coexistenceMicrosoft Exchange 2013 deployment and coexistence
Microsoft Exchange 2013 deployment and coexistenceMotty Ben Atia
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principlesMotty Ben Atia
 
IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...
IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...
IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...Evergreen Systems
 
Office 365 service management
Office 365 service managementOffice 365 service management
Office 365 service managementMotty Ben Atia
 
It Services And Service Catalog(ITIL V3)
It Services And Service Catalog(ITIL V3)It Services And Service Catalog(ITIL V3)
It Services And Service Catalog(ITIL V3)IT Service and Support
 
Office 365 deployment fast track
Office 365 deployment fast trackOffice 365 deployment fast track
Office 365 deployment fast trackMotty Ben Atia
 
Introduction To Windows Power Shell
Introduction To Windows Power ShellIntroduction To Windows Power Shell
Introduction To Windows Power ShellMicrosoft TechNet
 
Avaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioAvaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioMotty Ben Atia
 
Drilling deeper with Veil's PowerTools
Drilling deeper with Veil's PowerToolsDrilling deeper with Veil's PowerTools
Drilling deeper with Veil's PowerToolsWill Schroeder
 

Viewers also liked (20)

Microsoft azure platforms
Microsoft azure platformsMicrosoft azure platforms
Microsoft azure platforms
 
Dell Networking Overview
Dell Networking OverviewDell Networking Overview
Dell Networking Overview
 
Dell efficiency through convergence - Dell Active Infrastructure
Dell efficiency through convergence - Dell Active InfrastructureDell efficiency through convergence - Dell Active Infrastructure
Dell efficiency through convergence - Dell Active Infrastructure
 
2016 dell-networking
2016 dell-networking2016 dell-networking
2016 dell-networking
 
Avaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityAvaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & Mobility
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
Adobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowAdobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller Workflow
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2Avaya Aura Conferencing 7.2
Avaya Aura Conferencing 7.2
 
Windows Azure for IT
Windows Azure for ITWindows Azure for IT
Windows Azure for IT
 
Microsoft Exchange 2013 deployment and coexistence
Microsoft Exchange 2013 deployment and coexistenceMicrosoft Exchange 2013 deployment and coexistence
Microsoft Exchange 2013 deployment and coexistence
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principles
 
IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...
IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...
IT Service Catalog: 5 Steps to Prepare Your Organization for Successful Servi...
 
Office 365 service management
Office 365 service managementOffice 365 service management
Office 365 service management
 
Office 365 identity
Office 365 identityOffice 365 identity
Office 365 identity
 
It Services And Service Catalog(ITIL V3)
It Services And Service Catalog(ITIL V3)It Services And Service Catalog(ITIL V3)
It Services And Service Catalog(ITIL V3)
 
Office 365 deployment fast track
Office 365 deployment fast trackOffice 365 deployment fast track
Office 365 deployment fast track
 
Introduction To Windows Power Shell
Introduction To Windows Power ShellIntroduction To Windows Power Shell
Introduction To Windows Power Shell
 
Avaya Aura Messaging Portfolio
Avaya Aura Messaging PortfolioAvaya Aura Messaging Portfolio
Avaya Aura Messaging Portfolio
 
Drilling deeper with Veil's PowerTools
Drilling deeper with Veil's PowerToolsDrilling deeper with Veil's PowerTools
Drilling deeper with Veil's PowerTools
 

Similar to Sonicwall wireless & sra

The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PROIDEA
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
Achieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityAchieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityDell World
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelesssierradeveloper
 

Similar to Sonicwall wireless & sra (20)

The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
2012 ah apj keynote - technology update
2012 ah apj   keynote - technology update2012 ah apj   keynote - technology update
2012 ah apj keynote - technology update
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
Achieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityAchieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email Security
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 

More from Motty Ben Atia

CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution OverviewMotty Ben Atia
 
CA ARCserve Replication
CA ARCserve ReplicationCA ARCserve Replication
CA ARCserve ReplicationMotty Ben Atia
 
CA ARCserve High Availability
CA ARCserve High Availability CA ARCserve High Availability
CA ARCserve High Availability Motty Ben Atia
 
CA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedCA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedMotty Ben Atia
 
Adobe Acrobat XI Overview
Adobe Acrobat XI OverviewAdobe Acrobat XI Overview
Adobe Acrobat XI OverviewMotty Ben Atia
 
Adobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsAdobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsMotty Ben Atia
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management SolutionsMotty Ben Atia
 
Scopia Infrastructure Guide
Scopia Infrastructure GuideScopia Infrastructure Guide
Scopia Infrastructure GuideMotty Ben Atia
 
Avaya Scopia Series Overview
Avaya Scopia Series OverviewAvaya Scopia Series Overview
Avaya Scopia Series OverviewMotty Ben Atia
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management OverviewMotty Ben Atia
 
Avaya identity engines overview
Avaya identity engines overviewAvaya identity engines overview
Avaya identity engines overviewMotty Ben Atia
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architectureMotty Ben Atia
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Motty Ben Atia
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution OverviewMotty Ben Atia
 
Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Motty Ben Atia
 
Avaya Aura Contact Center Elite
Avaya Aura Contact Center EliteAvaya Aura Contact Center Elite
Avaya Aura Contact Center EliteMotty Ben Atia
 
Avaya Aura Application Enablement Services (AES)
Avaya Aura Application Enablement Services (AES)Avaya Aura Application Enablement Services (AES)
Avaya Aura Application Enablement Services (AES)Motty Ben Atia
 
Avaya Aura System Manager
Avaya Aura System ManagerAvaya Aura System Manager
Avaya Aura System ManagerMotty Ben Atia
 

More from Motty Ben Atia (20)

CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
 
CA ARCserve D2D
CA ARCserve D2DCA ARCserve D2D
CA ARCserve D2D
 
CA ARCserve Replication
CA ARCserve ReplicationCA ARCserve Replication
CA ARCserve Replication
 
CA ARCserve High Availability
CA ARCserve High Availability CA ARCserve High Availability
CA ARCserve High Availability
 
CA ARCserve Backup
CA ARCserve BackupCA ARCserve Backup
CA ARCserve Backup
 
CA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedCA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updated
 
Adobe Acrobat XI Overview
Adobe Acrobat XI OverviewAdobe Acrobat XI Overview
Adobe Acrobat XI Overview
 
Adobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsAdobe Creative Cloud For Teams
Adobe Creative Cloud For Teams
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management Solutions
 
Scopia Infrastructure Guide
Scopia Infrastructure GuideScopia Infrastructure Guide
Scopia Infrastructure Guide
 
Avaya Scopia Series Overview
Avaya Scopia Series OverviewAvaya Scopia Series Overview
Avaya Scopia Series Overview
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
 
Avaya identity engines overview
Avaya identity engines overviewAvaya identity engines overview
Avaya identity engines overview
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architecture
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution Overview
 
Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)
 
Avaya Aura Contact Center Elite
Avaya Aura Contact Center EliteAvaya Aura Contact Center Elite
Avaya Aura Contact Center Elite
 
Avaya Aura Application Enablement Services (AES)
Avaya Aura Application Enablement Services (AES)Avaya Aura Application Enablement Services (AES)
Avaya Aura Application Enablement Services (AES)
 
Avaya Aura System Manager
Avaya Aura System ManagerAvaya Aura System Manager
Avaya Aura System Manager
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Sonicwall wireless & sra

  • 1. May 2013 SonicPoint Wireless Solution & Secure Remote Access solutions
  • 2. 2 SonicWALLConfidential Dell SonicWALL product line-up services via appliance Network security Secure Virtual Access Web App Firewall Connect Mobile Spike Access Secure Virtual Assist Advanced Reporting Native Access Modules Clean wireless – SonicPoint-N Series App Intell & C ontrol GAV/ASW/ IPS C ASS Enforced Anti- Virus C ontent Filtering Global VPN C lient SSL VPN C lient Virtual Assist Email Protection Email Anti- Virus Email C ompliance Site- to- Site Backup Offsite Backup Universal System Recovery GMS Analyzer Scrutinizer Mobile C onnect Mobile C onnect EPC Local Archiving Recovery Manager for Exchange WAN acceleration Secure remote access Email security Backup and recovery Policy & management Secure Virtual Meeting Hosted
  • 3. 3 SonicWALLConfidential Clean wireless key requirements • Legacy WiFi (b/g) • Pure- N WiFi Expanded use of wireless- N networks • Manage user bandwidth • Prioritize productive applications • PCI rogue access requirements • Application identification and control for wireless traffic • Deployment and ongoing access point management Bandwidth management Building air- tight wireless access Centralized management of the wireless network Handling of new applications • Examples include VoIP and video
  • 4. 4 SonicWALLConfidential The solution • High performance “N” connectivity – Act as a replacement for wired connectivity, offers a secure, mobile work environment – Extended range for greater wireless coverage • Fully integrated “C lean Wireless” – NGFW - application identification, bandwidth, and policy enforcement – Provides threat detection and prevention scanning for all wireless traffic – FairNet • Simplified deployment and lowered TC O – Centralized management and auto- provision to remove the complexity of high speed secure wireless – Guest Service • Flexible wireless client support – Support for 802.11 a/b/g/n wireless clients (2.4/5GHz)
  • 5. 5 SonicWALLConfidential Dell SonicWALL wireless solution SonicPoint-N Series “n” “n” “n” “n” “n” “n”“g” “n” “n” “g” “n” “g” “g” Comprehensive Gateway Security Suite PoE Switches Clean Wireless Clients (WPA2) Internet
  • 6. 6 SonicWALLConfidential Rouge access point detection IDP / Malware scanning WPA2 encryption Application control Auto provision Dell SonicWALL Clean Wireless • Clean wireless – Beyond encryption, provides threat detection and prevention scanning for all wireless traffic • High performance “N” connectivity – Acts as a replacement for wired connectivity, with speed and extended range • Simplified deployment and lowered TCO – Centralized management and auto- provisioning to remove the complexity of high speed secure wireless Policy management Clean wireless delivers breakthrough threat inspection technology, is auto provisioned and managed, and integrates security policy across wired and wireless networks
  • 7. 7 SonicWALLConfidential Clean wireless protection • Deep packet inspection scanning of wireless traffic – Combat the latest threats and vulnerabilities – Application identification and policy enforcement • Centralized policy and management over wireless – Centralized policy enforcement – User management • Centralized access point management – Ease of initial deployment and ongoing management • Performance and predictability – Greater wireless performance – Better predictability using 802.11n technology
  • 8. 8 SonicWALLConfidential Dell SonicWALL Clean Wireless SonicPoint- N Series SonicPoint-N Dual-Radio 6 External Antennas POE+ & AC Adapter 8 SSID (VAP) SonicPoint-Ne Dual-Band 3 External Antennas POE & AC Adapter 8 SSID (VAP) SonicPoint- Ni Dual- Band Internal Antennas POE Only 8 SSID (VAP)
  • 9. 9 SonicWALLConfidential Dell SonicWALL Clean Wireless Appliance Model Max. SonicPoints Supported TZ 105 / TZ 105w 1 TZ 205 / TZ 205w 2 TZ 215 / TZ 215w 16 NSA 220 16 NSA 250M 16 NSA 2400 32 NSA 2600 32 NSA 3600 48 NSA 4600 64 NSA 5600 96 NSA 6600 96 NSA E5500 96 NSA E6500 128 NSA E8500 128 SuperMassive 9200 128 SuperMassive 9400 128 SuperMassive 9600 128
  • 11. 11 SonicWALLConfidential Key drivers • Remote access – Give all employees access solution that is easy to use and deploy • Extranet access – Open access to increase collaboration, yet do it in such a way that access control and security is not compromised • Mobility (BYOD) – Mobile devices are increasingly functional for both data and voice, leading to a rise of IT managed (non- managed) mobile devices • Securing wireless networks Many organizations treat users on the wireless network as remote users because of concerns over access to the wireless network • Disaster recovery – During a business disruption, demand for remote access could spike to include the majority of the workforce
  • 12. 12 SonicWALLConfidential • Identify the user • Interrogate the endpoint device • Control and limit access to application resources • Web- based access from any web- enabled device • Email for smartphones and tablets through ActiveSync • Network level access for Windows, Mac, Linux, Android and iOS • Native access modules for RDP, Citrix and VMware View • Unified policy interface to decrease ongoing access management • Spike licensing for temporary license needs • Broad OS support Granular access control Flexible connectivity Manageability Secure Remote Access requirements
  • 13. 13 SonicWALLConfidential The need for Secure Remote Access • Who is the user? – Proof as to who the user is without question, based on a strong authentication method • What’s happening on the endpoint? – A clear understanding of what is happening on the user’s end point to make a policy decision, then classify that device accordingly • What are the resources the user is seeking? – Knowledge of what applications the user wants access to, and then grant access according to policy
  • 14. 14 SonicWALLConfidential The Dell SonicWALL approach to Secure Remote Access Business Partner from any Browser Customer/Supplier Behind a Firewall Extranet Access Internal Users Internal Access Dell SonicWALL SSL VPN SolutionTraveling Employee Day Extender Employee at a Kiosk Employee Using a Wireless Hotspot Remote Access Employee Smart Phones/ Tablets Protect applications with granular access control based on user identity and device integrity Detect what is running on the end point device Connect users securely and easily to applications on any device Connect Web Apps Client/Server Apps File Shares Databases VoIP VDI Infrastructure ApplicationsDirectories Corporate Perimeter LDAP AD RADIUS LDAP Detect Protect Connect
  • 15. 15 SonicWALLConfidential Detect: Endpoint control device interrogation Connect access (Client- installed access) Traditional client/server applications File shares VoIP applications End point control 2 1 33 WorkPlace access (Clientless web access) 3 Device identity • Mapped directory • Domain membership • Watermark/certificate • Any resident file • Device ID Device integrity • Anti- virus • Registry key • Windows O/S level • Personal firewall • Anti- spyware • J ailbroken/rooted Device profile • Android • iOS • Windows • Windows mobile • Macintosh • Linux With data security • Cache control • Secure desktop
  • 16. 16 SonicWALLConfidential Protect: Unified policy Admission control • Define trust level for users • Define trust level for devices Create allow, deny and quarantine rules easily that govern access for all users and devices based on device identity and device integrity. Deny AllowQuarantineDeny Allow Employee community Groups: Sales, marketing, executive Partner community Groups: Partners Access control J ust one rule set enforces access to all resources across all access methods based on who the user is and the trust level for the device. • Define what applications users/devices can access CRM app. Allowed groups: Sales, marketing Deny Order entry Allowed groups: Sales, partners Deny
  • 17. 17 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged WorkPlace access: Access to web- based and client/ server applications from virtually any device. WorkPlace Portal Easy-to-use clientless browser based access
  • 18. 19 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Simple, policy-enforced mobile access to mission-critical data and applications Mobile Connect app • Intuitive app for iOS, Android, and Windows 8.1 • Download for free from the Apple app store and Google play, embedded with Windows 8.1 devices • Easy access to allowed web, client/server, hosted, virtual desktop resources via one- click bookmarks • Complete “in- office” experience, layer 3 tunnel enables network access to resources including terminal services, Citrix, custom/advanced web apps, VoIP
  • 19. 20 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Device interrogation for iOS/Android devices For iOS • Determine jailbreak status • DeviceID (Based on the UDID of the iOS device) • Certificate enforcement • OS version control For Android • Determine root status • DeviceID (Based on the IMEI of the Android device) • Certificate enforcement • OS version control • Enforcement of anti- virus
  • 20. 21 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Protect from mobile threats • Protect in- flight data from interception with encrypted SSL VPN connections • Allow access by only authenticated users and trusted devices and only to permitted resources with granular network access control policies • Block malware and threats from entering your network when deployed with a Dell next- gen firewall to scan mobile traffic Dell SonicWALL SSL VPN Solution Web Apps C lient/Server Apps File Shares Databases VoIP VDI Infrastructure ApplicationsDirectories Corporate Perimeter LDAP AD RADIUS LDAP
  • 21. 22 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Enable efficient administration with centralized access policy management Object- based policy management enables application control via easy to setup and manage access rules, covering all device types and users. Define Trust Level for Users Your Company Employee Community Define Trust Level for Devices Groups: Sales, Marketing, Executive Partner Community Groups: Partners Allow Quarantine Deny Allow Quarantine Deny • Create allow, deny and quarantine rules easily that govern access for all users and devices based on device identity and device integrity • J ust one rule set enforces access to all resources across all access methods based on who the user is and the trust level for the device Application: User Trust: Device Trust: Sales, Executive Define What Applications Users/Devices can Access Access Control List CRM App All in Empl. Community OWA Sales, Partners Order Entry AdmissionControl
  • 22. 23 SonicWALLConfidential E- Class Secure Remote Access Series Secure Remote Access Series Dell SonicWALL Secure Remote Access SRA EX7000 SRA EX6000 Virtual ApplianceSRA EX9000 Detect – granular end- point control detects identity and security state Protect – unified policy limits user access to authorized applications only Connect – smart access and tunneling ensure easy, secure access to all network resources Secure remote access for all users, devices and applications Spike License Secure Virtual Assist Advanced Reporting Native Access Modules Mobile Connect End Point Control SRA 1200 Virtual ApplianceSRA 4200 Secure Virtual Access Web App Firewall Secure Virtual Assist Spike LicenseMobile Connect End Point Control Secure Virtual Meeting
  • 23. 24 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Dell SonicWALL SMB SRA Series Appliances SRA 1600 SRA 4600 SRA VMA Target Customer SMB companies with up to 50 employees Mid- enterprise companies with up to 500 employees SMB companies with up to 50 employees Concurrent Users Stackable user license options include 5 or 10 concurrent users Stackable user license options include 10, 25 and 100 concurrent users Stackable user license options include 5, 10 and 25 concurrent users Additional Features Application Offload, Bookmarks Bookmarks, Application Offload, High Availability Application Offload, Bookmarks, Easy to deploy NetExtender & Mobile Connect Windows, Mac OS, Linux, Android, iOS Add-on (Paid) Services (Remote Support, Web Application Security, etc.) • Secure Virtual Assist – Remote desktop help and support tool • Secure Virtual Access – Provides remote PC management and control • Secure Virtual Meeting – For instant, cost- effective collaboration • Web Application Firewall – Detects and protects web applications from web- based threats. Helps in achieving PCI compliance (section 6.6 of PCI DSS 1.2). • Spike Licensing – Increase the licensed user count for short usage spikes • Dynamic Support – Options include 8x5 or 24x7 for one, two or three years Single Bundle
  • 24. 25 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Dell SonicWALL Product Overview E-Class SRA EX7000 E-Class SRA EX9000 Target Customer Large Enterprise with over 1,000 employees Large Enterprise with over 1,000 employees Concurrent Users Can be licensed with a 50, 100, 250, 500, 1,000, 2,000 and 5,000 concurrent user license Can be licensed with a 100, 250, 500, 1,000, 2,000 and 5,000, 7,500, 10,000, 12,500, 15,000, 20,000 concurrent user license Add-On Features • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Virtual Assist- Remote desktop help and support tool • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Virtual Assist- Remote desktop help and support tool • FIPSSupport- License required for FIPS mode • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions
  • 25. 26 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Dell SonicWALL Product Overview E-Class Virtual Appliance E-Class SRA EX6000 Target Customer Mid-size Enterprise with up to 5,000 employees Midsize Enterprise with 500 to 1,000 employees Concurrent Users Can be licensed with a 25, 50, 100, 250, 500, 1,000, 2,000 or 5,000 concurrent user license Can be licensed with a 25, 50, 100 or 250 concurrent user license Add-On Features • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Native Access Modules- Optimized access for WTS, VMware View and Citrix applications • Advanced EPC- Granular control with easy configuration for trusting end point devices • Virtual Assist- Remote desktop help and support tool • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Native Access Modules- Optimized access for WTS, VMware View and Citrix applications • Advanced EPC- Granular control with easy configuration for trusting end point devices • Virtual Assist- Remote desktop help and support tool • FIPSSupport- License required for FIPS mode • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions