SlideShare una empresa de Scribd logo
1 de 54
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Security today The growing complexity Botnets Spam Phishing Scam Hoax Viruses Spyware Gray ware  Intrusions Denial of Service  Distributed   Denial of Service Malware Ping floods Eavesdropper Script Kiddies Espionage Root kits Adware P2P File sharing Trojans Spit Bots Backdoors Buffer Overflows  Hackers  Malcode Bugs Key loggers Crime ware Pharming Competitors Identity theft Exploits  DNS poisoning  Snarf attacks Spam bots Spy bots Trap doors War driving Ransomware ASCII bombs Bluesnarfing Worms Decrypting Reverse engineering  Port Scanning… Too many threats … Too many tools … Helpdesk Evaluation Training Deployment Management Updating Too many tasks … Firewall & VPN IPS & IDS SSL VPN Email Filter Web & IM Filter
Internet Security today The growing demand for integration   URL Filter Anti Virus VPN  Firewall 2000 Antispam  URL Filter IDS/IPS Anti Virus VPN  Firewall 2003 Central Mgmnt.. VoIP Antiphishing Antispyware Antispam  URL Filter IDS/IPS  Anti Virus VPN  Firewall 2005 Clustering SSL VPN IM/P2P control Email Encryption Single Sign On Dual AV Central Mgmnt. VoIP Antiphishing Antispyware Antispam  URL Filter IDS/IPS  Anti Virus VPN  Firewall 2008 FW/VPN UTM UTM+ XTM typical Integrated  products
Internet Security today The growing d emand for unified management Firewall Antispam VPN Antivirus URL Filter IDS/IPS … have many different management interfaces Many different tools…  Wizards  (initial setup) Web GUI (basic configuration) set admin user cfg password  set interface ethernet1  manage ssh exec ssh tftp username cfg file-name idnt_cfg.pub ip-addr 10.1.1.5 save CLI  (detailed configuration) Launch of 3rd party GUI  (for specific applications) Software client  (Off-line configuration)
Internet Security today   The Astaro All-In-One  Approach Browser-based Unified Management of  All Applications  Automatic Firmware & Pattern  Updates Integration of  Complete Email, Web & Network protection Centralized Management & Reporting Flexible  Deployment All-In-One Appliance Networking-Features  for High Avaliability  and Load Balancing
Astaro Company Overview Company Profile ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Company Overview Our Business Astaro is a leading supplier of All-In-One Internet Security Appliances for small to medium sized companies and organizations requiring integrated products for Email, Web and Network Security that are cost efficient and easy-to-use. In contrast to suppliers of single- or other multi-function products for internet security Only Astaro offers easy-to-use All-In-One security gateways with complete enterprise-class functionality.
Astaro Company Overview Successful customers
Astaro Company Overview Frequently awarded 2 × Product of the Year Recommendation Best of the Year Editor's Choice 3 × Best of the Year 2 × Editor's Choice “  The most polished and easy to use management system we’ve seen. ” InfoWorld “ An astonishingly rich set of security features.”  SC Magazine “ This is a real winner.”  SC Magazine “ Covers all the bases” “Excellent ” InfoWorld "knallharte Firewall"   PC Pr@xis
Astaro Product Overview All-In-One-Appliances extended UTM  Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
Astaro Product Overview Deployment models Hardware Operating  System Application Software  Appliance Hardware Appliance Virtual Appliance
Astaro Product Overview Management & VPN   Products Advanced IPsec VPN client with personal firewall and integrated dialer Provides Centralized management and real-time monitoring for multiple Astaro appliances Collects, correlates and analyzes security data and provides a huge portfolio of graphical reports
The Astaro Difference ,[object Object],[object Object],[object Object],[object Object],Over 47,000 customers are already protecting more than 100,000 networks  with an Astaro appliance 10-Minute-Setup One-Click Clustering 1..10
Summary Astaro Business Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Appendix Astaro Products
[object Object],[object Object],All you need for comprehensive  Email, Web and  Network security
Astaro Security Gateway Comprehensive Email, Web & Network Security extended UTM  Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
Astaro Security Gateway Deployment scenarios Internet Internal Users and Resources Mail Server DMZ
Astaro Security Gateway   Easily Managed 10-Minute-Setup
Astaro Security Gateway  Products Hardware Appliances *Pricing based #IPs/Users ASG 110/120 ASG 220 ASG 320 ASG 425 ASG 525 ASG 625 Environment Small networks Medium networks Medium networks Large networks Large networks Large networks 10/100 Mbps Network Ports 4 8 4 - - - Gigabit Network Ports - - 4 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Max. recommended FW Users 10/50 150 350 1000 2500 4000 Max. recommended UTM Users 10/25 70 200 600 1300 2000 Software Appliance*   Runs on Intel-compatible PCs and servers Virtual Appliance * Runs in any VMware environment
Astaro Security Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Security Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],All you need for comprehensive  Web security
Astaro Web Gateway Comprehensive Web Security functionality
Astaro Web Gateway Deployment scenarios Internet AWG Internal users and resources Firewall and IPS Inspect  all traffic Inspect  HTTP traffic  only HTTP
Astaro Web Gateway   Easily Managed
Astaro Web Gateway   Web Security Reporting
Astaro Web Gateway  Products Hardware Appliances *Pricing based #IPs/Users AWG 1000 AWG 2000 AWG 3000 AWG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 1 – 100 50 - 250 150 - 750 500 – 2000 Web Throughput 50 Mbit/s 80 Mbit/s 150 Mbit/s 250 Mbit/s Virtual Appliance* Runs in any VMware environment Software Appliance*   Runs on Intel-compatible PCs and servers
Astaro Web Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],All you need for comprehensive  Mail security
Astaro Mail Gateway Comprehensive Mail Security functionality Antispam Antivirus Encryption Email  Remote  Exchange  Access
Astaro Mail Gateway Deployment scenarios Internet Internal users and resources Firewall and IPS Inspect  Email traffic  only SMTP POP3 SMTP servers AMG SMTP POP3 Inspect  all traffic
Astaro Mail Gateway Easily Managed: The browser-based GUI 10-Minute-Setup
Astaro Mail Gateway The UserPortal ,[object Object]
Astaro Mail Gateway  Products Hardware Appliances *Pricing based #IPs/Users AMG 1000 AMG 2000 AMG 3000 AMG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 50-300 200-800 700-3000 2000-5000 Email Throughput  (scaned Emails/h) 50,000 100,000 150,000 200,000 Virtual Appliance Runs in any VMware environment Software Appliance*   Runs on Intel-compatible PCs and servers
Astaro Mail Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Already 19,000 customers are protecting more than 20 million email addresses with an Astaro appliance
[object Object],[object Object],[object Object]
Astaro Network Security
Astaro Mail Security
Astaro Web Security
[object Object],[object Object]
Astaro Command Center  Feature Overview
Astaro Command Center  Multi Client Deployment ,[object Object],[object Object],[object Object],Customer 1 Customer 2 Browser-based Access Global distributed Astaro Gateways ,[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Command Center  Easy to use ,[object Object],[object Object],Gateway Manager Device Management for individual customers
Astaro Command Center  Products Hardware Appliances Virtual Appliance   Runs in any VMware environment Software Appliance   Runs on Intel-compatible PCs and servers ACC 1000 ACC 2000 ACC 3000 ACC 4000 Max. managed Gateways 20 50 100 200 Administrators 1 2 3 4 Clients 4 10 20 40
Astaro Command Center Benefits ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Astaro Report Manager Feature  Overview
Astaro Report Manager  Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Report Manager  Easy to use ,[object Object],[object Object],[object Object]
Astaro Report Manager  Products Software Application  Runs on Intel-compatible PCs and servers Requires Windows Platform: - Windows 2000/XP/2003 - MS IE 6.0 or compatible with JAVA runtime - MS IIS or integrated Apache
Astaro Report Manager Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object]
  Astaro All-in-One Internet Security  For more information: [email_address] Astaro Software & Virtual Appliances  Free Download www.astaro.com/download Mobile: 01225555288

Más contenido relacionado

La actualidad más candente

Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product familyxKinAnx
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 

La actualidad más candente (20)

FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Forti web
Forti webForti web
Forti web
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 
Firewall
FirewallFirewall
Firewall
 
Vpn
VpnVpn
Vpn
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 

Destacado

amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapalibuildersreviews
 
OSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinOSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinEC-Council
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationOpposing Force S.r.l.
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTSudhanshu Chauhan
 
OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with pythonJose Manuel Ortega Candel
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINTJerod Brennen
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Securitydpd
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 

Destacado (20)

amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdf
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
OSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinOSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc Newlin
 
Resume Ramdas P
Resume Ramdas PResume Ramdas P
Resume Ramdas P
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINT
 
OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with python
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 

Similar a Astaro Customer Presentation

Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Fajar Isnanto
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 RadwareINFOTIME
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Balázs Antók
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 

Similar a Astaro Customer Presentation (20)

Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Information Security
Information SecurityInformation Security
Information Security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Bitrix Software Security
Bitrix Software SecurityBitrix Software Security
Bitrix Software Security
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product LineCornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 

Último

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Astaro Customer Presentation

  • 1.  
  • 2.
  • 3. Internet Security today The growing complexity Botnets Spam Phishing Scam Hoax Viruses Spyware Gray ware Intrusions Denial of Service Distributed Denial of Service Malware Ping floods Eavesdropper Script Kiddies Espionage Root kits Adware P2P File sharing Trojans Spit Bots Backdoors Buffer Overflows Hackers Malcode Bugs Key loggers Crime ware Pharming Competitors Identity theft Exploits DNS poisoning Snarf attacks Spam bots Spy bots Trap doors War driving Ransomware ASCII bombs Bluesnarfing Worms Decrypting Reverse engineering Port Scanning… Too many threats … Too many tools … Helpdesk Evaluation Training Deployment Management Updating Too many tasks … Firewall & VPN IPS & IDS SSL VPN Email Filter Web & IM Filter
  • 4. Internet Security today The growing demand for integration URL Filter Anti Virus VPN Firewall 2000 Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2003 Central Mgmnt.. VoIP Antiphishing Antispyware Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2005 Clustering SSL VPN IM/P2P control Email Encryption Single Sign On Dual AV Central Mgmnt. VoIP Antiphishing Antispyware Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2008 FW/VPN UTM UTM+ XTM typical Integrated products
  • 5. Internet Security today The growing d emand for unified management Firewall Antispam VPN Antivirus URL Filter IDS/IPS … have many different management interfaces Many different tools… Wizards (initial setup) Web GUI (basic configuration) set admin user cfg password set interface ethernet1 manage ssh exec ssh tftp username cfg file-name idnt_cfg.pub ip-addr 10.1.1.5 save CLI (detailed configuration) Launch of 3rd party GUI (for specific applications) Software client (Off-line configuration)
  • 6. Internet Security today The Astaro All-In-One Approach Browser-based Unified Management of All Applications Automatic Firmware & Pattern Updates Integration of Complete Email, Web & Network protection Centralized Management & Reporting Flexible Deployment All-In-One Appliance Networking-Features for High Avaliability and Load Balancing
  • 7.
  • 8. Astaro Company Overview Our Business Astaro is a leading supplier of All-In-One Internet Security Appliances for small to medium sized companies and organizations requiring integrated products for Email, Web and Network Security that are cost efficient and easy-to-use. In contrast to suppliers of single- or other multi-function products for internet security Only Astaro offers easy-to-use All-In-One security gateways with complete enterprise-class functionality.
  • 9. Astaro Company Overview Successful customers
  • 10. Astaro Company Overview Frequently awarded 2 × Product of the Year Recommendation Best of the Year Editor's Choice 3 × Best of the Year 2 × Editor's Choice “ The most polished and easy to use management system we’ve seen. ” InfoWorld “ An astonishingly rich set of security features.” SC Magazine “ This is a real winner.” SC Magazine “ Covers all the bases” “Excellent ” InfoWorld "knallharte Firewall" PC Pr@xis
  • 11. Astaro Product Overview All-In-One-Appliances extended UTM Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
  • 12. Astaro Product Overview Deployment models Hardware Operating System Application Software Appliance Hardware Appliance Virtual Appliance
  • 13. Astaro Product Overview Management & VPN Products Advanced IPsec VPN client with personal firewall and integrated dialer Provides Centralized management and real-time monitoring for multiple Astaro appliances Collects, correlates and analyzes security data and provides a huge portfolio of graphical reports
  • 14.
  • 15.
  • 17.
  • 18. Astaro Security Gateway Comprehensive Email, Web & Network Security extended UTM Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
  • 19. Astaro Security Gateway Deployment scenarios Internet Internal Users and Resources Mail Server DMZ
  • 20. Astaro Security Gateway Easily Managed 10-Minute-Setup
  • 21. Astaro Security Gateway Products Hardware Appliances *Pricing based #IPs/Users ASG 110/120 ASG 220 ASG 320 ASG 425 ASG 525 ASG 625 Environment Small networks Medium networks Medium networks Large networks Large networks Large networks 10/100 Mbps Network Ports 4 8 4 - - - Gigabit Network Ports - - 4 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Max. recommended FW Users 10/50 150 350 1000 2500 4000 Max. recommended UTM Users 10/25 70 200 600 1300 2000 Software Appliance* Runs on Intel-compatible PCs and servers Virtual Appliance * Runs in any VMware environment
  • 22.
  • 23.
  • 24.
  • 25. Astaro Web Gateway Comprehensive Web Security functionality
  • 26. Astaro Web Gateway Deployment scenarios Internet AWG Internal users and resources Firewall and IPS Inspect all traffic Inspect HTTP traffic only HTTP
  • 27. Astaro Web Gateway Easily Managed
  • 28. Astaro Web Gateway Web Security Reporting
  • 29. Astaro Web Gateway Products Hardware Appliances *Pricing based #IPs/Users AWG 1000 AWG 2000 AWG 3000 AWG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 1 – 100 50 - 250 150 - 750 500 – 2000 Web Throughput 50 Mbit/s 80 Mbit/s 150 Mbit/s 250 Mbit/s Virtual Appliance* Runs in any VMware environment Software Appliance* Runs on Intel-compatible PCs and servers
  • 30.
  • 31.
  • 32. Astaro Mail Gateway Comprehensive Mail Security functionality Antispam Antivirus Encryption Email Remote Exchange Access
  • 33. Astaro Mail Gateway Deployment scenarios Internet Internal users and resources Firewall and IPS Inspect Email traffic only SMTP POP3 SMTP servers AMG SMTP POP3 Inspect all traffic
  • 34. Astaro Mail Gateway Easily Managed: The browser-based GUI 10-Minute-Setup
  • 35.
  • 36. Astaro Mail Gateway Products Hardware Appliances *Pricing based #IPs/Users AMG 1000 AMG 2000 AMG 3000 AMG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 50-300 200-800 700-3000 2000-5000 Email Throughput (scaned Emails/h) 50,000 100,000 150,000 200,000 Virtual Appliance Runs in any VMware environment Software Appliance* Runs on Intel-compatible PCs and servers
  • 37.
  • 38.
  • 42.
  • 43. Astaro Command Center Feature Overview
  • 44.
  • 45.
  • 46. Astaro Command Center Products Hardware Appliances Virtual Appliance Runs in any VMware environment Software Appliance Runs on Intel-compatible PCs and servers ACC 1000 ACC 2000 ACC 3000 ACC 4000 Max. managed Gateways 20 50 100 200 Administrators 1 2 3 4 Clients 4 10 20 40
  • 47.
  • 48.
  • 49. Astaro Report Manager Feature Overview
  • 50.
  • 51.
  • 52. Astaro Report Manager Products Software Application Runs on Intel-compatible PCs and servers Requires Windows Platform: - Windows 2000/XP/2003 - MS IE 6.0 or compatible with JAVA runtime - MS IIS or integrated Apache
  • 53.
  • 54. Astaro All-in-One Internet Security For more information: [email_address] Astaro Software & Virtual Appliances Free Download www.astaro.com/download Mobile: 01225555288

Notas del editor

  1. © Astaro 2008 Astaro Overview – Page