SlideShare una empresa de Scribd logo
1 de 15
Building integrated and
secure networks with
limited IT support
Sean Michaud
<title>
SessionMT17
2
Safety, Security, and Privacy
What’s motivating your need for a more secure network?
I worry that a
network hack
is inevitable
I wonder if my
current security
solution is still
effective in
stopping a cyber
attack
It’s only a matter
of time until I
discover our
networks have
been breached
for some time
3
Security across multiple solutions
Small and medium business oftenrely on several tools to manage a single site
Firewalls WirelessSwitches
Security +
Wireless +
Networking
All in a single
management console
6
End to end solutions from a single vendor
Firewall Wireless Switching
Global Management System (GMS)
Management & Reporting
Traffic acceleration
Dell EMC networking and SonicWALL securityfor a unified networking solution
7
Secured retail network with centralized management console
Dell SonicWALL
WAN
Acceleration
Dell
SonicWALL
SonicPoint
The Dell Solution
1. Global Management System (GMS)
• Manages Firewalls
2. Firewalls control
• Wireless Access Points
• Switches
• Enforced Endpoints
• WAN Acceleration
Dell X-Series
Switch with
PoE
Dell Advantage
Single Management
Console
Lower Operating
Costs
Converged
Infrastructure
Port Expansion
Scalability
GMS
Dell SonicWALL
TZ Firewall
8
SonicWALL and X-Series switch integration
Extended Switch
Management via GMS
TZ300/W TZ400/W
TZ500/W TZ600
X1008/P X1018/P
X1026/P X1052/P
X4012
VLANs SupportProvision X-Series switch
as “Extended Switch”
PortShield & Protection
for Extended Switch
High Availability &
PortShield
Diagnostics Supportfor
Extended Switch
Configure Extended
Switch settings
Manage Extended
Switch Global Params
9
Threat prevention solution
App Intelligence, Control and Visualization
Content Filtering Service and Content
Filtering Client
Blocks inappropriate, illegal and dangerous Web content
Real-time gateway anti-virus scanning and dynamic
spyware protection
Provides granular control & real-time visualization of
applications for maximum security and productivity
Gateway Anti-Virus and Anti-Spyware
Comprehensive Anti-Spam Service Stops spam, phishing & malware at the gateway
Enforced Client Anti-Virus & Anti-Spyware
Automated client anti-virus and anti-spyware deployment
and management
DPI SSL (SSL Decryption) Scan for threats inside of SSL encrypted traffic on the
network
Multi-engine sandbox to prevent unknown threats such
as zero-day attacks.
Capture Advanced Threat Protection (ATP)
SecurityEssentialDefense-in-Depth
Intrusion Prevention Protects against a comprehensive array of network-
based threats and vulnerabilities
10
By Jeremy Kirk, IDG News Service, Jul 27, 2015
You can’t protect what you can’t see
must inspect SSL encrypted traffic to detect under the radar attacks
“…redirection code planted in the
malicious advertisements uses
SSL/TLS (Secure Sockets
Layer/Transport Layer,…”
HTTPS
11
SuperMassive 9200-9600
Dell SonicWALL - Advanced Threat Protection Service
Cloud service detects and blocks zero-day threats at the gateway
Multi-engine advanced threat analysis
detects more threats, can’t be evaded
– Virtualized sandbox
– Full system emulation
– Hypervisor level analysis
Broad file type and OS environment
analysis, no file size limitation
– PE, MS Office, PDF, archives, JAR,
APK
– Windows, Android and Mac OS
Automated and manual file submission
Blocks until verdict at the gateway
TZ SOHO – TZ600 NSA 2600 – 6600
12
Application Intelligence, Control and Visualization
Application Chaos
So many on Port 80 Critical Apps Prioritized Bandwidth
Acceptable Apps Managed Bandwidth
Unacceptable Apps Blocked
Identify
By Application
By User/Group
By Content Inspection
Categorize
By Application
By Application Category
By Destination
By Content
By User/Group
Users/Groups
Ingress
Control
Prioritize Apps by Policy
Manage Apps by Policy
Block Apps by Policy
Detect and Block Malware
Detect & Prevent Intrusion Attempts
Policy
Visualize &
Manage Policy
Cloud-Based
Extra-Firewall
Intelligence
Egres
s
Malware Blocked
Massively Scalable
Next-Generation
Security Platform
High Performance Multi-Core
Re-Assembly Free
DPI
Visualization
13
Specialguest
Cam
Lawler
IT Director
Movement Mortgage
14
Building integrated and secure networks
Achieve rapid deployment,mobility, and room to grow
Branch and DC refresh featuring
DellEMC Networking switches,
SonicWALL firewalls, Aerohive
wireless access points and
centralized management for
wired and wireless infrastructure “Anytime you’re running a
lean IT department with
limited time and resources,
you want to standardize
things as much as possible
and bring everything onto
one network. We get that
standardization with the
DellEMC, Aerohive, and
SonicWALL technologies
we’ve deployed.”
Cam Lawler, IT Director
• Small IT staff supporting extremely rapid growth
• Disparate networks across multiple locations
• Security for a multi-location mobile workforce
and customers’ financial data
• Support for mobile workforce with secure, profile-based access
• Branch-in-a-box pods allow for rapid infrastructure deployment for new offices
• Unified security policy to protects against advanced security threats
• Vastly improved network performance and availability supports faster loan processing
• Centralized management with fast deployment of new applications
• Easily supports 75 percent annual employee growth
Challenges
Solutions
Results
16
Q & A
MT17_Building Integrated and Secure Networks with limited IT Support

Más contenido relacionado

La actualidad más candente

Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
Mike Kavis
 

La actualidad más candente (20)

Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
 
MT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of viewMT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of view
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platform
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
MT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch OfficeMT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch Office
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Dell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeDell emc - The Changing IT Landscape
Dell emc - The Changing IT Landscape
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplified
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 

Destacado

Employee satisfaction
Employee satisfactionEmployee satisfaction
Employee satisfaction
Ashish Sharma
 
Https set up
Https set upHttps set up
Https set up
<svg> \">
 

Destacado (20)

MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
Employee satisfaction
Employee satisfactionEmployee satisfaction
Employee satisfaction
 
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
MT99Dell OCIO:  How we're integrating IT for the largest merger in tech historyMT99Dell OCIO:  How we're integrating IT for the largest merger in tech history
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
 
K+p seminar MAN
K+p seminar MANK+p seminar MAN
K+p seminar MAN
 
Certified Scrum Developer brochure
Certified Scrum Developer brochureCertified Scrum Developer brochure
Certified Scrum Developer brochure
 
8° encontro
8° encontro8° encontro
8° encontro
 
You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)
 
Entornos naturales protegidos (y accesibles).
Entornos naturales protegidos (y accesibles).Entornos naturales protegidos (y accesibles).
Entornos naturales protegidos (y accesibles).
 
Bunty bhagat
Bunty bhagatBunty bhagat
Bunty bhagat
 
Content Jam 2015: How to Start (and maintain!) a Blog That Doesn't Stink by K...
Content Jam 2015: How to Start (and maintain!) a Blog That Doesn't Stink by K...Content Jam 2015: How to Start (and maintain!) a Blog That Doesn't Stink by K...
Content Jam 2015: How to Start (and maintain!) a Blog That Doesn't Stink by K...
 
Https set up
Https set upHttps set up
Https set up
 
Double Offset High Performance Butterfly Valves
Double Offset High Performance Butterfly ValvesDouble Offset High Performance Butterfly Valves
Double Offset High Performance Butterfly Valves
 
Sign of a bad leader by crowdinvest
Sign of a bad leader by crowdinvestSign of a bad leader by crowdinvest
Sign of a bad leader by crowdinvest
 
120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides120112 socmed-whitehall-for-blog-slides
120112 socmed-whitehall-for-blog-slides
 
Marketing de afiliación
Marketing de afiliaciónMarketing de afiliación
Marketing de afiliación
 
Final versions august 11
Final versions august 11Final versions august 11
Final versions august 11
 

Similar a MT17_Building Integrated and Secure Networks with limited IT Support

Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 

Similar a MT17_Building Integrated and Secure Networks with limited IT Support (20)

Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Information Security
Information SecurityInformation Security
Information Security
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 

Más de Dell EMC World

Más de Dell EMC World (18)

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of View
 
MT129 Isilon Data Lake Overview
MT129 Isilon Data Lake OverviewMT129 Isilon Data Lake Overview
MT129 Isilon Data Lake Overview
 
MT46 Virtualization Integration with Unity
MT46 Virtualization Integration with UnityMT46 Virtualization Integration with Unity
MT46 Virtualization Integration with Unity
 
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
 
MT42 The impact of high performance Oracle workloads on the evolution of the ...
MT42 The impact of high performance Oracle workloads on the evolution of the ...MT42 The impact of high performance Oracle workloads on the evolution of the ...
MT42 The impact of high performance Oracle workloads on the evolution of the ...
 

MT17_Building Integrated and Secure Networks with limited IT Support

  • 1. Building integrated and secure networks with limited IT support Sean Michaud <title> SessionMT17
  • 2. 2 Safety, Security, and Privacy What’s motivating your need for a more secure network? I worry that a network hack is inevitable I wonder if my current security solution is still effective in stopping a cyber attack It’s only a matter of time until I discover our networks have been breached for some time
  • 3. 3 Security across multiple solutions Small and medium business oftenrely on several tools to manage a single site Firewalls WirelessSwitches
  • 4. Security + Wireless + Networking All in a single management console
  • 5. 6 End to end solutions from a single vendor Firewall Wireless Switching Global Management System (GMS) Management & Reporting Traffic acceleration Dell EMC networking and SonicWALL securityfor a unified networking solution
  • 6. 7 Secured retail network with centralized management console Dell SonicWALL WAN Acceleration Dell SonicWALL SonicPoint The Dell Solution 1. Global Management System (GMS) • Manages Firewalls 2. Firewalls control • Wireless Access Points • Switches • Enforced Endpoints • WAN Acceleration Dell X-Series Switch with PoE Dell Advantage Single Management Console Lower Operating Costs Converged Infrastructure Port Expansion Scalability GMS Dell SonicWALL TZ Firewall
  • 7. 8 SonicWALL and X-Series switch integration Extended Switch Management via GMS TZ300/W TZ400/W TZ500/W TZ600 X1008/P X1018/P X1026/P X1052/P X4012 VLANs SupportProvision X-Series switch as “Extended Switch” PortShield & Protection for Extended Switch High Availability & PortShield Diagnostics Supportfor Extended Switch Configure Extended Switch settings Manage Extended Switch Global Params
  • 8. 9 Threat prevention solution App Intelligence, Control and Visualization Content Filtering Service and Content Filtering Client Blocks inappropriate, illegal and dangerous Web content Real-time gateway anti-virus scanning and dynamic spyware protection Provides granular control & real-time visualization of applications for maximum security and productivity Gateway Anti-Virus and Anti-Spyware Comprehensive Anti-Spam Service Stops spam, phishing & malware at the gateway Enforced Client Anti-Virus & Anti-Spyware Automated client anti-virus and anti-spyware deployment and management DPI SSL (SSL Decryption) Scan for threats inside of SSL encrypted traffic on the network Multi-engine sandbox to prevent unknown threats such as zero-day attacks. Capture Advanced Threat Protection (ATP) SecurityEssentialDefense-in-Depth Intrusion Prevention Protects against a comprehensive array of network- based threats and vulnerabilities
  • 9. 10 By Jeremy Kirk, IDG News Service, Jul 27, 2015 You can’t protect what you can’t see must inspect SSL encrypted traffic to detect under the radar attacks “…redirection code planted in the malicious advertisements uses SSL/TLS (Secure Sockets Layer/Transport Layer,…” HTTPS
  • 10. 11 SuperMassive 9200-9600 Dell SonicWALL - Advanced Threat Protection Service Cloud service detects and blocks zero-day threats at the gateway Multi-engine advanced threat analysis detects more threats, can’t be evaded – Virtualized sandbox – Full system emulation – Hypervisor level analysis Broad file type and OS environment analysis, no file size limitation – PE, MS Office, PDF, archives, JAR, APK – Windows, Android and Mac OS Automated and manual file submission Blocks until verdict at the gateway TZ SOHO – TZ600 NSA 2600 – 6600
  • 11. 12 Application Intelligence, Control and Visualization Application Chaos So many on Port 80 Critical Apps Prioritized Bandwidth Acceptable Apps Managed Bandwidth Unacceptable Apps Blocked Identify By Application By User/Group By Content Inspection Categorize By Application By Application Category By Destination By Content By User/Group Users/Groups Ingress Control Prioritize Apps by Policy Manage Apps by Policy Block Apps by Policy Detect and Block Malware Detect & Prevent Intrusion Attempts Policy Visualize & Manage Policy Cloud-Based Extra-Firewall Intelligence Egres s Malware Blocked Massively Scalable Next-Generation Security Platform High Performance Multi-Core Re-Assembly Free DPI Visualization
  • 13. 14 Building integrated and secure networks Achieve rapid deployment,mobility, and room to grow Branch and DC refresh featuring DellEMC Networking switches, SonicWALL firewalls, Aerohive wireless access points and centralized management for wired and wireless infrastructure “Anytime you’re running a lean IT department with limited time and resources, you want to standardize things as much as possible and bring everything onto one network. We get that standardization with the DellEMC, Aerohive, and SonicWALL technologies we’ve deployed.” Cam Lawler, IT Director • Small IT staff supporting extremely rapid growth • Disparate networks across multiple locations • Security for a multi-location mobile workforce and customers’ financial data • Support for mobile workforce with secure, profile-based access • Branch-in-a-box pods allow for rapid infrastructure deployment for new offices • Unified security policy to protects against advanced security threats • Vastly improved network performance and availability supports faster loan processing • Centralized management with fast deployment of new applications • Easily supports 75 percent annual employee growth Challenges Solutions Results