Dell presentation template Standard 4:3 layout

Download Report

Transcript Dell presentation template Standard 4:3 layout

Dell SonicWALL
Enterprise Solutions
Sijesh Sreedhar
Mumbai
Dell SonicWALL’s legacy
Shipped one
million
appliances
worldwide
Became
leading
provider of
subscription
services on
optimized
appliances
1991
Founded
2
Confidential
1996
Announced
SuperMassive™
E10000 Series
Named to
Visionaries
Quadrant,
Gartner
Magic
Quadrant for
SSL VPN
2005
Became the
leader in unit
share for
Unified Threat
Management
Firewall
appliances
2007
2010
Thoma Bravo and
SonicWALL
entered into a
partnership
Positioned as
“Leader” in
Gartner UTM
Magic Quadrant
Positioned as
“Visionary” in
Gartner SSL VPN
Magic Quadrant
2011
5/9: Joined the
Dell family
2012
SNWL Earns
NSS Labs
Recommended
Rating for
NGFW SVM
Shipped two
million
appliances
worldwide
SonicWALL
Security Trends
in IT.
3
Confidential
SonicWALL
Malware through Social Media
• 40 % of Social Network users
attacked by Malware.
• Social Media, the best platform to
propagate malwares owing to the
“TRUST FACTOR””
• Malwares use enticing texts like
“”Hey, Check this out “” or “”I don’t
believe you did this””.
• Use of Social Media at work only
elevates the risk.
4
Confidential
SonicWALL
Mobile devices in Enterprise
• With the Mobile workforce increasing, the
corporate perimeter is starting to fade.
• Organizations realizing that their systems
are moving outside ITs control owing to
mobility of employees.
• Android and IOS based malwares on the
rise.
• Smartphones and tablets don’t get
frequent patches/hotfixes.
• Organizations allowing employees to
bring personal devices to work. BYOD
5
Confidential
SonicWALL
Wide range of OSes brought into the
workplace on personal devices
No single personal device dominates the consumerization of IT.
72%
iPhone
Android-based smartphone
Blackberry
32%
Other smart phone
Windows laptop or desktop
37%
Macintosh laptop or desktop
30%
Netbook
14%
Linux laptop or desktop
iPad
23%
Android-based tablet
Other tablet 10%
Blackberry Playbook 7%
34%
Regular mobile phone
15%
iTouch
2%
Other
13%
No personal devices
0%
6
Confidential
20%
63%
52%
63%
• All of these devices
need to be included
in a comprehensive
management
solution
60%
40%
60%
80%
SonicWALL
The Mobile Web Explosion
In 2012, worldwide smartphone shipments
surpassed worldwide PC sales
PC & Smartphone Shipments (Millions)
• The mobile Internet ramp
is the fastest technology
adoption curve in modern
history (Source: Morgan Stanley)
• 33% of employees report
using mobile devices
while at work to access
sites such as Facebook
(Source: Gartner)
Source: Morgan Stanley. Note: Notebook PCs include Netbooks. Source: Katy Huberty, Ehud
Gelblum, Morgan Stanley Research. Data and Estimates as of 11/10
7
Confidential
• Information workers
report using an average of
four consumer devices
and multiple 3rd party
applications in the course
of their day (Source: Unysis / IDC Study)
SonicWALL
Crimewares and Ransomwares
8
Confidential
SonicWALL
Crimewares and Ransomwares
• Lightweight Purpose built crime
wares for Financial threats are on
the rise. Zeus, Tinba etc.
• Average size could be from 20KB to
50 KB
• Inexpensive crimeware toolkits for
sale in the cybercrime underground,
transform script kiddies into master
professionals.
• Ransomware, they either lock your
machine or encrypt the data on you
harddrive.
9
Confidential
SonicWALL
Spear Phishing
• Targeted phishing attack aimed at an
organization or any individual in high
ranks.
• Spear phishing is the most popular way to
get into a corporate network.
• Spear phishers can easily obtain
information about employees on social
networking sites.
• 94% of targeted emails use malicious file
attachments while the rest use alternative
methods like luring victims to click
malicious links and to download
malicious files
10
Confidential
SonicWALL
Dell Security
Network security
Protect:
Secure remote access
 Protect your network perimeter with
powerful threat detection and content
filtering
Identity and access management
 Control access to enterprise
applications and information, including
privileged user accounts
Email security
 Provide secure remote access,
including email and web application
protection, from any device and any
location
Enterprise Wireless
Endpoint security
Managed Security Services
Security Products
Dell security portfolio
Network security
Secure remote
access
Email security
Policy and
management
Products (appliances)
Products (appliance,
virtual appliance)
Products (appliance,
virtual appliance,
hosted, software)
Products (appliance,
virtual appliance,
software)
WAN Acceleration
Virtual appliance
Identity
and access
management
Products (software)
Virtual appliance
Virtual appliance
Clean Wireless –
SonicPoint N Series
Add-on security services
Software
Add-on security services
Hosted
Software
Add-on security services
Add-on application
Add-on application
12
Confidential
SonicWALL
Dell Sonicwall Architecture
Deep Packet Firewall
Application Firewall
Intrusion Prevention
Anti-Malware
Content Filtering
Multi-Tiered Protection Technology
Clean VPN
Bandwidth Management
Patented Re-Assembly Free DPI (RFDPI)
Multi-Core High Perf. Architecture
13
Confidential
SonicWALL
Dell SonicWALL next-generation firewall
Identify
By Application
- Not by Port & Protocol
By User/Group
-Not by IP
By Content Inspection
-Not by Filename
Categorize
Control
Prioritize Apps by Policy
Manage Apps by Policy
Block Apps by Policy
Detect and Block Malware
Detect & Prevent Intrusion Attempts
By Application
By Application Category
By Destination
By Content
By User/Group
Policy
Users/Groups
Critical Apps
Application Chaos
Reassembly-Free
Deep Packet Inspection
Ingress
Acceptable Apps
Egress
Unacceptable Apps
Cloud-Based
Extra-Firewall
Intelligence
14
Confidential
Malware Blocked
SonicWALL
Visualization
for better Network Intelligence
15
Confidential
SonicWALL
Geo-IP Filter
Block traffic from
Hostile Countries
16
Confidential
1 Confidential
SonicWALL
Advanced App Control
Application
Library with over
4235 unique
Application Uses
Granular Control
Allow Facebook, Block
BitTorrent
Allow Chat, Block File
Transfer
- Group/User Based
- Schedule Based
- Exceptions
17
Confidential
SonicWALL
What next generation firewall can do?
Granular control by application example #1 (facebook)
Category
App
(138)
Sub-application (a.k.a. signature)
(62)
SocialNetworkin
g
facebook
Apps
HTTP Proxy Activity
3
Message Activity 5
Twitter
Apps 2
HTTP Proxy Activity
4
Message Activity 6
Linkedin
Apps HTTP Proxy 1
IM Chat Settings
Message Activity 7
Google+
Apps Settings
IM Chat SSL
Channel
Message Activity 8
RenRen
Browsing Activity 1
Like 1
News Feed Post Menu
Orkut
Browsing Activity 2
Like 2
MySpace
Browsing Activity 3
Like 3
Bebo
Browsing Activity 4
Like 4
18
Confidential
Badoo
DNS Query
facebook
Message Activity 1
MyLife
External Like Button
Message Activity 2
2
3
News Feed Post Question
News Feed Post Share
Action
News Feed Post Status
Update
SSL Connect
SonicWALL
SSL Login 1
SonicWALL On-Board DPI Security Services
Intrusion Prevention
Gateway Anti-Virus
Gateway Anti-Spyware
Cloud-AV
Content/URL Filtering
DPI SSL (SSL Inspection)
Application Intelligence & Control
Application Visualization
Comprehensive Anti-Spam
19
Confidential
SonicWALL
Dell SonicWALL GRID Network
threat network covers the globe
North America
3,396,435 attacks
Europe
424,075 attacks
Asia
437,610 attacks
South America
61,246 attacks
Africa
6,405 attacks
Oceania
21,990 attacks
20
Confidential
12-month Snapshot: Jan – Dec 2011
SonicWALL
SonicWALL Research Labs & GRID Network
• World-wide Monitoring
• Advanced Tracking & Detection
• Industry Leading Responsiveness
• Preventative Protection
• Experienced in-house security research team
• Active participant in leading research organizations
(WildList, AVIEN, PIRT, APWG and more)
• Member of the Microsoft Active Protections Program (MAPP)


8,000,000+ Individual Threat Coverage
25,000 On-Board Threat Family Signatures

3800+ Application Signatures
100% Intellectual Property ownership of security engine
100% Intellectual Property ownership All signature content
21
Confidential
SonicWALL
NGFW bred for
Enterprise.
22
Confidential
SonicWALL
Dell SonicWALL NGFW Lineup
Enterprise, Data Center
Dell SonicWALL SuperMassive Series
NSA E3600
NSA E4600
NSA E5600 (ENT)
NSA E6600 (ENT)
SMB/Campus/Branch
Dell SonicWALL NSA
Series
E-Class
SuperMassive E10800
SuperMassive E10400
SuperMassive E10200
SuperMassive 9600
SuperMassive 9400
SuperMassive 9200
Dell SonicWALL TZ
Series
TZ 215
TZ 205
TZ 105
23
Confidential
NSA 4500
NSA 3500
NSA 2400
NSA 250M/220
NSA E5500
NSA E6500
NSA E8500
NSA E8510
SonicWALL
Model lineup - Review
24
Confidential
SuperMassive 9600
•
•
•
•
10 Gbps IPS & Application Control
20 Gbps Firewall Throughput
5 Gbps Threat Prevention
32x1.2 Ghz, 32 GB Ram
SuperMassive 9400
•
•
•
•
10 Gbps IPS & Application Control
20 Gbps Firewall Throughput
4.5 Gbps Threat Prevention
32x1.2 Ghz, 32 GB Ram
SuperMassive 9200
•
•
•
•
7.5 Gbps IPS & Application Control
10 Gbps Firewall Throughput
3.5 Gbps Threat Prevention
24x1.0 Ghz, 16 GB Ram
SonicWALL
Supermassive 10000 Series.
E10100
24 Cores (A/A Config)
E10400
48 Cores
25
Confidential
E10200
24 Cores
E10800
96 Cores
SonicWALL
Scalability
E10800
E10400
Stateful: 40 Gbps
UTM:
12 Gbps
GAV:
12 Gbps
IPS:
30 Gbps
VPN:
20 Gbps
Conn/sec: 640k/sec
Conn
8,000,000
Stateful: 20 Gbps
UTM:
6.0 Gbps
GAV:
6.0 Gbps
IPS:
15 Gbps
VPN:
10 Gbps
Conn/sec: 320k/sec
Conn
4,000,000
Interfaces - 10Gbps
Interfaces - 1Gbps
Interfaces - Other
Routing
Services
IPv6
HA
26
Confidential
E10200
Stateful: 10 Gbps
UTM:
3 Gbps
GAV:
3 Gbps
IPS:
7.5 Gbps
VPN:
5.0 Gbps
Conn/sec: 160k/sec
Conn
2,000,000
E10100
Stateful: 6 Gbps
UTM:
1.5 Gbps
GAV:
1.5 Gbps
IPS:
3.75 Gbps
VPN:
2.5 Gbps
Conn/sec: 80k/sec
Conn
1,000,000
6 (SFP+)
16 (SFP)
2 USB, 2 Expansion
RIP v1/v2, OSPV, BGP
GAV, IPS, Application Intelligence &
Control
Yes
A/P (+ State Sync)
A/A UTM (+ State Sync)
A/A Clustering (+ State Sync)
SonicWALL
Secure Remote
Access
28
Confidential
SonicWALL
Secure Remote Access Drivers
Remote Access
Extranet Access
Give all employees remote access solution that is easy to use
and deploy.
Open access to partners to increase collaboration, yet do it in such
a way that access control and security is not compromised.
Mobility
The Bring Your Own Device (BYOD) movement has been fueled
by the dramatic growth and adoption of mobile platforms.
Securing Wireless
Networks
Many organizations treat users on the wireless network as
remote users due to concerns over who has wireless access.
Disaster Recovery
During a business disruption, demand for remote access
could spike to include the majority of your workforce.
Working ‘Green’
Rising transportation costs and environmental concerns are
leading an increase in flexibility regarding working from home.
29
Confidential
SonicWALL
Sonicwall Aventail EX series
• Who is the user?
– Proof as to who the user is without question, based on a strong
authentication method
• Where is the user accessing from ?
– Identify if the user is accessing from an IT managed appliance or a NONIT managed appliance.
• What’s happening on the endpoint?
– A clear understanding of what is happening on the user’s end point to
make a policy decision, then classify that device accordingly
• What are the resources the user is seeking?
– Knowledge of what applications the user wants access to, and then grant
access according to policy
30
Confidential
SonicWALL
Detect: Endpoint control device interrogation
Device identity
Device profile
• IT Managed/Non-managed
WorkPlace access
• Windows
(Clientless
web access)
• Windows mobile
• Macintosh
• Linux
2 1
• iOS/Android
•
•
•
•
•
Device integrity
•
•
•
•
•
•
Anti-virus
Registry key
Windows O/S level
Personal firewall
Anti-spyware 3
Jailbroken/rooted
VoIP
applications
31
Confidential
Mapped directory
Connect access
Domain(Client-installed
membership access)
Watermark/certificate
Any resident file
Device ID
With data security
End point control
• Cache control
• Secure desktop
3
3
File
shares
Traditional
client/server
applications
SonicWALL
Connect: Dell SonicWALL Mobile Connect
• Unified client app supporting SSL VPN connectivity to the E-Class SRA, SRA
and Next-Generation Firewall solutions
• Determine if the device is Jailbroken or rooted (E-Class SRA Only)
• Unified policy controls to limit access from Android or iOS enabled devices
• Easily downloadable from Google play or App Store for iOS
iOS
Dell SonicWALL SSL
VPN Solution
Internet
Android
Corporate Perimeter
Directories
Applications
LDAP
Web Apps
LDAP
AD
RADIUS
32
Confidential
Client/Server Apps
File Shares
Databases
VoIP
VDI Infrastructure
SonicWALL
Dell SonicWALL Secure Remote Access
E-Class
Secure
Remote
Access
Series
SRA EX9000
Mobile
Connect
Secure
Remote
Access
Series
Connect
Mobile
SRA EX7000
Spike
License
SRA 4200
Mobile
Connect
Secure Virtual
Access
End Point
Control
SRA EX6000
Secure Virtual
Assist
SRA 1200
Secure Virtual
Assist
Secure Virtual
Meeting
Virtual Appliance
Advanced
Reporting
Native Access
Modules
Virtual Appliance
Web App
Firewall
Spike License
End Point
Control
Detect –
granular endpoint control
detects identity
and security
state
Protect –
unified policy
limits user
access to
authorized
applications
only
Connect –
smart access
and tunneling
ensure easy,
secure access
to all network
resources
Secure remote access for all users, devices and applications
33
Confidential
SonicWALL
SonicPoints
39
Confidential
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
SonicWALL Clean Wireless
SonicPoint-N Series
SonicPoint-Ni
SonicPoint-Ne
SonicPoint-N Dual-Radio
42
GMS
Dell SonicWALL Global Management System
Centralized Management and Reporting
Network
security
solution
Secure
remote
access solution
Application intelligence
and bandwidth
management. Real time
malware protection
for your network
Granular endpoint
control to manage
access to missioncritical resources from
virtually and endpoint
Dell SonicWALL
intelligent solutions
44
Confidential
Email security
solution
Wireless Security
solution
Prevents web-based
and email-based
malware from
entering your
network
Seamless integration of
wireless access points
with best-in-class
Next-Generation
Firewall
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
GMS 7.0 & Analyzer –
User centric reporting
• Web sites visited
• Client VPN sessions
• Applications Used
• Bandwidth Usage
45
Confidential
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
3rd Party
Validation
46
4
Confidential
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
The NSS Security Value Map
Summary of 2013 NGFW
testing results from
www.nsslabs.com
Classification
- Recommended
- Caution
- 2xNeutral
Final Product Rating near
the name of the product
Lines signify corrections due
to major failures
- No line = No Major Failure
47
Confidential
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
UTM Firewall 2012 Magic
Quadrant (March 2012)
–SonicWALL was positioned in
the Leaders Quadrant for
2012
Fast-Forwarding Firewall Face-Off
(April 2012)
–Best Overall Performance for NGFW
–Best Overall Performance for UTM
–Best Overall Performance for SSL Decryption
48
Confidential
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
Leadership: Dell security solutions in
Gartner Magic Quadrants (2011-2012)
challengers
leaders
LEADERS
2: Managed Security Service Providers (SecureWorks)
2
12
12: Unified Threat Management (SonicWALL)
ability to execute
18: User Administration & Provisioning
22
(Quest One IAM)
CHALLENGERS, VISIONARIES, NICHE PLAYERS
18
13: Secure Sockets Layer (SSL) & VPN (SonicWALL)
13
14
19
14: Enterprise Network Firewalls (SonicWALL)
23
15: Secure Email Gateway (SonicWALL)
19: User Authentication (Quest One IAM)
15
22: Identity and Access Governance (Quest One IAM)
niche players
visionaries
23: Mobile Data Protection (Dell)
completeness of vision
49
Confidential
Solutions Road Show 2013
27 Feb – 6 March 2013 | India
Thank You
50
Confidential
7/17/2015