SlideShare a Scribd company logo
1 of 28
New Product Introduction ProSecure- STM & UTM Series Oscar Castro.18. 09
Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Balance of Network Security ,[object Object],[object Object],[object Object],[object Object],The security minded strategy: Closed systems with incremental services as needed The access minded strategy: Open systems with incremental security as needed
Definition of Threat  ,[object Object],[object Object],[object Object],[object Object],Threat  Definition Attack from  Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.  e-mail/ web Worm  A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other program web/network  Trojan Trojan horse (computing),  木馬程式 web
Definition of Threat - Continue Threat  Definition Attack from  Phishing  The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only  to steal the user information e-mail  Spam Electronic junk mail or junk newsgroup postings e-mail  Keylogger  Monitor keyboard, and  take your information with out notice.  web Malware Short for malicious( 惡意 )  software, software designed specifically  to damage or disrupt a system , such as a virus or a Trojan horse web/ E-mail  Spyware  Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Nuisance spyware, which does not cause harm; while Malicious spyware will harm the PC or system. web Rootkit  A rootkit is  a type of malicious software  that is  activated each time your system boots up . Rootkits are difficult to detect because they are activated before your system's Operating System has completely booted up. A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Rootkits are able to intercept data from terminals, network connections, and the keyboard.  network / Web  Zombies A zombie is a computer that has been infected by a malicious software application, called a "bot". Once the bot is installed, the zombie computer can be controlled by a remote malicious user without the knowledge or permission of the computer's rightful owner web/network
Layered Defense Virus / Malware Scanning (Blended Threats, Productivity Loss, Spyware, worms, rootkits)‏ (File base)‏ Intrusion Prevention ( Protecting Webservers, Application exploits)  (packet/stream of packet base. )‏ Email – SPAM Prevention (Nefarious Email, Phishing, Viruses, Malware)‏ Firewall / Connection Screening (Hacking, Intruders, Pings of Death …), (packet base, speed)  Content Filtering (Inappropriate websites, Fraud, Phishing)‏ URL. content Application Control  (IM, P2P, Network Misuse)‏ Reference: Prosecure sales training Mod4 Layered defence v1.pptx
Example of Layered Defense  ,[object Object],[object Object],[object Object],[object Object]
Layered Defense in Netgear Virus / Malware Scanning (Blended Threats, Productivity Loss, Spyware, worms, rootkits)‏ (File base)‏ Intrusion Prevention ( Protecting Webservers, Application exploits)  (packet/stream of packet base. )‏ Email – SPAM Prevention (Nefarious Email, Phishing, Viruses, Malware)‏ Firewall / Connection Screening (Hacking, Intruders, Pings of Death …), (packet base, speed)  Content Filtering (Inappropriate websites, Fraud, Phishing)‏ URL. content Application Control  (IM, P2P, Network Misuse)‏ Reference: Security Webinar -May09.pptx UTM STM
Netgear Technology ,[object Object],[object Object],[object Object],[object Object]
Netgear Technology - Web Security  ,[object Object],[object Object],[object Object]
Netgear Technology - Web Security  ,[object Object],[object Object],Real time In the cloud service
Netgear Technology - Email Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Netgear Technology - Network Security  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Netgear Technology - Network Security  ,[object Object],[object Object]
Netgear Technology – Remote Access  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Netgear STM series  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Netgear STM series
STM150, STM300, STM600 STM150 STM300 STM600 Customer type Small  to Medium Networks Medium-sized Networks Medium-sized Networks Recommended Number of Concurrent Users 20 - 150 Up to 300 Up to 600 Concurrently Scanned HTTP Connections 1,000 2,000 4,000 HTTP Throughput (Mb/s)‏ 43 148 239 SMTP Throughput (emails/hour)‏ 139,000 420,000 960,000
List of Skus Bundle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STM150, STM300, STM600- Skus Take EU sku as example Model SKU Description List Price STM150EW STM150EW-100EUS Bundle ProSecure™ Web and Email Threat Management Appliance STM150  (Hardware including 1-year Web, 1-year Email, and 1-year Software Maintenance & Upgrades)‏ STM150 STM150-100EUS Hardware ProSecure™ Web and Email Threat Management Appliance STM150 (Additional Web and/or Email Subscription Required)  STM150E STM150E-10000S 1 Year Email Threat Management Subscription for STM150   STM150E3 STM150E3-10000S 3 Year Email Threat Management Subscription for STM150  STM150M STM150M-10000S 1 Year Support & Maintenance Subscription for STM150  STM150M3 STM150M3-10000S 3 Year Support & Maintenance Subscriptions  for STM150  STM150W STM150W-10000S 1 Year Web Threat Management Subscription for STM150  STM150W3 STM150W3-10000S 3 Year Web Threat Management Subscription for STM150
Netgear UTM series  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Netgear UTM series  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UTM10, UTM25 UTM10 UTM25 Customer type Small Networks Small Networks Recommended Number of Concurrent Users 1 - 15 10 - 30 AV Throughput 31 Mbps  45 Mbps Stateful Packet Inspection Firewall Throughput 133 Mbps 153 Mbps WAN Ports / LAN Ports  (Gigabit)‏ WAN 1 / LAN 4 WAN 2 / LAN 4 Concurrent Sessions 8,000 20,000 Web (HTTP, HTTPS, FTP)‏ ● ● Email (SMTP, POP3, IMAP)‏ ● ● Site to Site VPN Tunnel 10 25 SSL VPN for Remote  Access 5 13
UTM10, UTM25- Skus Model SKU Description List Price UTM10 EW UTM10 EW-100EUS Bundle ProSecure™ Web and Email Threat Management Appliance  UTM10   (Hardware including 1-year Web, 1-year Email, and 1-year Software Maintenance & Upgrades)‏ UTM10 UTM10 -100EUS Hardware ProSecure™ Web and Email Threat Management Appliance UTM10 (Additional Web and/or Email Subscription Required)  UTM10 E UTM10 E-10000S 1 Year Email Threat Management Subscription for UTM10   S UTM10 E3 UTM10 E3-10000S 3 Year Email Threat Management Subscription for UTM10  UTM10 M UTM10 M-10000S 1 Year Support & Maintenance Subscription for UTM10  UTM10 M3 UTM10 M3-10000S 3 Year Support & Maintenance Subscriptions  for UTM10  UTM10 W UTM10 W-10000S 1 Year Web Threat Management Subscription for UTM10  UTM10 W3 UTM10 W3-10000S 3 Year Web Threat Management Subscription for UTM10
More information  ,[object Object]
Partners  – Best of breed Technology Partners brings Enterprise Grade Security to SMB Technology NETGEAR  STM NETGEAR  UTM Competition Anti-Virus  Malware Trojans Phishing Full 1.6 Million  Signatures Full 600K  Signatures Fortinet : Clam AV open source + their own  60K AV signatures. Watchguard :  AVG    40K AV signatures. Sonicwall :  Clam AV open source + their own  3.2K (TZ180/190)  27K (TZ210/NSA)‏ Checkpoint :  Kaspersky Lite  SafeStream     11K  Barracuda : Clam AV open source + their own    100K AV signatures. ZyXEL :  Kaspersky  Lite SafeStream + their own    15K Anti-SPAM Hybrid in-the-cloud 50 Millions sources Hybrid in-the-cloud Fortinet : RBL approach (Public Black  Lists)‏ Watchguard : Commtouch Sonicwall  : RBL approach (Public Black  Lists)‏ Checkpoint : SpamAssassin (Open source)‏ Barracuda : SpamAssassin (Open source)‏ ZyXEL : Mailshell Web Content- Filtering 100 M URLs  64 categories 100 M URLs  64 categories Fortinet : Self + unknown Watchguard : SurfControl (Websense)‏ Sonicwall  : Self + unknown Checkpoint : SurfControl (Websense)‏ Barracuda : SpamAssassin (Open source)‏ ZyXEL : Blue Coat
Reference: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research PaperPankaj Jha
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 

What's hot (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Computer security
Computer securityComputer security
Computer security
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Computer security
Computer securityComputer security
Computer security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network Security
Network SecurityNetwork Security
Network Security
 

Viewers also liked

How to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement toolHow to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement toolCommetric
 
Verizon taking over yahoo
Verizon taking over yahooVerizon taking over yahoo
Verizon taking over yahooAvneet Singh
 
Chapter5 creating customer value, satisfaction, and loyalty sept23
Chapter5 creating customer value, satisfaction, and loyalty sept23Chapter5 creating customer value, satisfaction, and loyalty sept23
Chapter5 creating customer value, satisfaction, and loyalty sept23situmobe
 
Telco 2.0 Transformation Index - Methodology and Approach
Telco 2.0 Transformation Index - Methodology and ApproachTelco 2.0 Transformation Index - Methodology and Approach
Telco 2.0 Transformation Index - Methodology and ApproachSimon Torrance
 
Human capital management
Human capital managementHuman capital management
Human capital managementMia Rarasputri
 
March 2014 DMCA Presentation
March 2014 DMCA PresentationMarch 2014 DMCA Presentation
March 2014 DMCA PresentationTheodore Mak
 
Data analysis – qualitative data presentation 2
Data analysis – qualitative data   presentation 2Data analysis – qualitative data   presentation 2
Data analysis – qualitative data presentation 2Azura Zaki
 

Viewers also liked (10)

VERIZON - CASE ANALYSIS
VERIZON - CASE ANALYSISVERIZON - CASE ANALYSIS
VERIZON - CASE ANALYSIS
 
How to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement toolHow to build bulletproof communication strategy with measurement tool
How to build bulletproof communication strategy with measurement tool
 
Verizon taking over yahoo
Verizon taking over yahooVerizon taking over yahoo
Verizon taking over yahoo
 
Verizon-Yahoo!
Verizon-Yahoo!Verizon-Yahoo!
Verizon-Yahoo!
 
Yahoo analysis-
Yahoo analysis-Yahoo analysis-
Yahoo analysis-
 
Chapter5 creating customer value, satisfaction, and loyalty sept23
Chapter5 creating customer value, satisfaction, and loyalty sept23Chapter5 creating customer value, satisfaction, and loyalty sept23
Chapter5 creating customer value, satisfaction, and loyalty sept23
 
Telco 2.0 Transformation Index - Methodology and Approach
Telco 2.0 Transformation Index - Methodology and ApproachTelco 2.0 Transformation Index - Methodology and Approach
Telco 2.0 Transformation Index - Methodology and Approach
 
Human capital management
Human capital managementHuman capital management
Human capital management
 
March 2014 DMCA Presentation
March 2014 DMCA PresentationMarch 2014 DMCA Presentation
March 2014 DMCA Presentation
 
Data analysis – qualitative data presentation 2
Data analysis – qualitative data   presentation 2Data analysis – qualitative data   presentation 2
Data analysis – qualitative data presentation 2
 

Similar to S T M U T M

Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network securitySreerag Gopinath
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurityehsangha
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 

Similar to S T M U T M (20)

Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Mitppt
MitpptMitppt
Mitppt
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

S T M U T M

  • 1. New Product Introduction ProSecure- STM & UTM Series Oscar Castro.18. 09
  • 2.
  • 3.
  • 4.
  • 5. Definition of Threat - Continue Threat Definition Attack from Phishing The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user information e-mail Spam Electronic junk mail or junk newsgroup postings e-mail Keylogger Monitor keyboard, and take your information with out notice. web Malware Short for malicious( 惡意 ) software, software designed specifically to damage or disrupt a system , such as a virus or a Trojan horse web/ E-mail Spyware Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Nuisance spyware, which does not cause harm; while Malicious spyware will harm the PC or system. web Rootkit A rootkit is a type of malicious software that is activated each time your system boots up . Rootkits are difficult to detect because they are activated before your system's Operating System has completely booted up. A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Rootkits are able to intercept data from terminals, network connections, and the keyboard. network / Web Zombies A zombie is a computer that has been infected by a malicious software application, called a "bot". Once the bot is installed, the zombie computer can be controlled by a remote malicious user without the knowledge or permission of the computer's rightful owner web/network
  • 6. Layered Defense Virus / Malware Scanning (Blended Threats, Productivity Loss, Spyware, worms, rootkits)‏ (File base)‏ Intrusion Prevention ( Protecting Webservers, Application exploits) (packet/stream of packet base. )‏ Email – SPAM Prevention (Nefarious Email, Phishing, Viruses, Malware)‏ Firewall / Connection Screening (Hacking, Intruders, Pings of Death …), (packet base, speed) Content Filtering (Inappropriate websites, Fraud, Phishing)‏ URL. content Application Control (IM, P2P, Network Misuse)‏ Reference: Prosecure sales training Mod4 Layered defence v1.pptx
  • 7.
  • 8. Layered Defense in Netgear Virus / Malware Scanning (Blended Threats, Productivity Loss, Spyware, worms, rootkits)‏ (File base)‏ Intrusion Prevention ( Protecting Webservers, Application exploits) (packet/stream of packet base. )‏ Email – SPAM Prevention (Nefarious Email, Phishing, Viruses, Malware)‏ Firewall / Connection Screening (Hacking, Intruders, Pings of Death …), (packet base, speed) Content Filtering (Inappropriate websites, Fraud, Phishing)‏ URL. content Application Control (IM, P2P, Network Misuse)‏ Reference: Security Webinar -May09.pptx UTM STM
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. STM150, STM300, STM600 STM150 STM300 STM600 Customer type Small to Medium Networks Medium-sized Networks Medium-sized Networks Recommended Number of Concurrent Users 20 - 150 Up to 300 Up to 600 Concurrently Scanned HTTP Connections 1,000 2,000 4,000 HTTP Throughput (Mb/s)‏ 43 148 239 SMTP Throughput (emails/hour)‏ 139,000 420,000 960,000
  • 20.
  • 21. STM150, STM300, STM600- Skus Take EU sku as example Model SKU Description List Price STM150EW STM150EW-100EUS Bundle ProSecure™ Web and Email Threat Management Appliance STM150  (Hardware including 1-year Web, 1-year Email, and 1-year Software Maintenance & Upgrades)‏ STM150 STM150-100EUS Hardware ProSecure™ Web and Email Threat Management Appliance STM150 (Additional Web and/or Email Subscription Required) STM150E STM150E-10000S 1 Year Email Threat Management Subscription for STM150   STM150E3 STM150E3-10000S 3 Year Email Threat Management Subscription for STM150 STM150M STM150M-10000S 1 Year Support & Maintenance Subscription for STM150 STM150M3 STM150M3-10000S 3 Year Support & Maintenance Subscriptions for STM150 STM150W STM150W-10000S 1 Year Web Threat Management Subscription for STM150 STM150W3 STM150W3-10000S 3 Year Web Threat Management Subscription for STM150
  • 22.
  • 23.
  • 24. UTM10, UTM25 UTM10 UTM25 Customer type Small Networks Small Networks Recommended Number of Concurrent Users 1 - 15 10 - 30 AV Throughput 31 Mbps 45 Mbps Stateful Packet Inspection Firewall Throughput 133 Mbps 153 Mbps WAN Ports / LAN Ports (Gigabit)‏ WAN 1 / LAN 4 WAN 2 / LAN 4 Concurrent Sessions 8,000 20,000 Web (HTTP, HTTPS, FTP)‏ ● ● Email (SMTP, POP3, IMAP)‏ ● ● Site to Site VPN Tunnel 10 25 SSL VPN for Remote Access 5 13
  • 25. UTM10, UTM25- Skus Model SKU Description List Price UTM10 EW UTM10 EW-100EUS Bundle ProSecure™ Web and Email Threat Management Appliance  UTM10  (Hardware including 1-year Web, 1-year Email, and 1-year Software Maintenance & Upgrades)‏ UTM10 UTM10 -100EUS Hardware ProSecure™ Web and Email Threat Management Appliance UTM10 (Additional Web and/or Email Subscription Required) UTM10 E UTM10 E-10000S 1 Year Email Threat Management Subscription for UTM10   S UTM10 E3 UTM10 E3-10000S 3 Year Email Threat Management Subscription for UTM10 UTM10 M UTM10 M-10000S 1 Year Support & Maintenance Subscription for UTM10 UTM10 M3 UTM10 M3-10000S 3 Year Support & Maintenance Subscriptions for UTM10 UTM10 W UTM10 W-10000S 1 Year Web Threat Management Subscription for UTM10 UTM10 W3 UTM10 W3-10000S 3 Year Web Threat Management Subscription for UTM10
  • 26.
  • 27. Partners – Best of breed Technology Partners brings Enterprise Grade Security to SMB Technology NETGEAR STM NETGEAR UTM Competition Anti-Virus Malware Trojans Phishing Full 1.6 Million Signatures Full 600K Signatures Fortinet : Clam AV open source + their own  60K AV signatures. Watchguard : AVG  40K AV signatures. Sonicwall : Clam AV open source + their own  3.2K (TZ180/190) 27K (TZ210/NSA)‏ Checkpoint : Kaspersky Lite SafeStream  11K Barracuda : Clam AV open source + their own  100K AV signatures. ZyXEL : Kaspersky Lite SafeStream + their own  15K Anti-SPAM Hybrid in-the-cloud 50 Millions sources Hybrid in-the-cloud Fortinet : RBL approach (Public Black Lists)‏ Watchguard : Commtouch Sonicwall : RBL approach (Public Black Lists)‏ Checkpoint : SpamAssassin (Open source)‏ Barracuda : SpamAssassin (Open source)‏ ZyXEL : Mailshell Web Content- Filtering 100 M URLs 64 categories 100 M URLs 64 categories Fortinet : Self + unknown Watchguard : SurfControl (Websense)‏ Sonicwall : Self + unknown Checkpoint : SurfControl (Websense)‏ Barracuda : SpamAssassin (Open source)‏ ZyXEL : Blue Coat
  • 28.

Editor's Notes

  1. Web & e-mail security is the 80% important of threat
  2. HTTP: H yper T ext T ransfer P rotocol, is a protocol used to transfer files from a Web server onto a browser in order to view a Web page that is on the Internet FTP: File Transfer Protocol , is a protocol used to upload files from a workstation to a FTP server or download files from a FTP server to a workstation HTTPS: URLs that require an SSL connection start with https: instead of http :. SSL: S ecure S ockets L ayer
  3. Benefit of in the cloud service: no need to save code in HD, real time detecting.
  4. So that no limit in languages. / Better performance/ effectively stopping an outbreak before it becomes widespread.
  5. SPI/IPS/DoS stateful packet inspection (SPI)‏ a stateful firewall (any firewall that performs stateful packet inspection ( SPI ) or stateful inspection ) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected. Intrusion prevention (IPS), IDS It provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted DoS Attack : Short for d enial- o f- s ervice attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic . Anomaly : 異常
  6. Probe: 探針
  7. VPN: Short for v irtual p rivate n etwork, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. SSL: Short for S ecure S ockets L ayer , a protocol developed by Netscape for transmitting private documents via the Internet . IPsec : Short for IP Sec urity, a set of protocols developed by the IETF ( I nternet E ngineering T ask F orce ) to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs) .
  8. IM control: Noon time can use MSN, but not during other time.
  9. Ref: http://www.prosecure.netgear.com/resources/threat-monitor.php
  10. http://www.prosecure.netgear.com/resources/threat-monitor.php