SlideShare una empresa de Scribd logo
1 de 27
Lo que debe hacer cuando llegue a su
oficina para que su red opere mas
eficiente.
18 October 2015 2
Next Generation Firewall: Capacidad Limitada
AppControl
Intrusion
Prevention
VPN/Network
AntiVirus
URLFiltering
18 October 2015 3
UTM: Seguridad CompletaAntiVirus
URLFiltering
VPN/Network
Reputation
Enabled
Defense
AntiSPAM
AppControl
DataLoss
Prevention
APTBlocker
…
Intrusion
Prevention
18 October 2015 4
UTM combina múltiples servicios de seguridad
Unified Threat
Management
Application
Control
URL
Filtering
Anti
SPAM
Gateway
AntiVirus
Intrusion
Prevention
Service
Firewall
18 October 2015 5
Antivirus
URL
Filtering
AntiSpam
IPS
App
Control
Platform
WatchGuard Architecture
3 Year Effort
Delivered the most flexible
architecture / platform for UTM
Highest Performance
Leading UTM performance at
each price point
Management Console
“Single Pane of Glass” policy-
driven console
UTM Firmware
Spanning across all hardware
platforms
Modular Structure
To support “vendor agnostic”
strategy
Hardware:
Multiple CPU partners for best
fit to specific product line
Software:
Always Best-of-Breed software
components, with speedy
integration APT
18 October 2015 6
Linea Completa de Firewalls NGFW y UTM
XTMv
Four virtual software license versions
with full UTM features
XTM 2 & 3 Series:
Small offices, branch
offices and wireless hotspots
XTM 5 & 800 Series:
Mid-sized businesses and
distributed enterprises
Escalabilidad de
Software:
Único Sistema Operativo
en todos los equipos,
incluidos los virtuales
XTM 15 Series: Large
distributed enterprises
Wireless Access Points
AP100/200 & AP102
Businesses can harness the
power of mobile devices
without putting network
assets at risk.
XTM 2520: Large
enterprises and corporate
data centers
Firebox T10:
SoHo, Kiosks
Firebox M440: Mid-sized
Port density, PoE
*Subject to cancellation or change
Info-Tech: “WatchGuard’s XTM Series is
the best bang for any organization’s buck”
Methodology:
tation – Vendor Awards
presents awards to exceptional solutions in
is discretionary; not all awards are
cape and it is entirely possible, though
se solutions, and only those solutions, that
ech Vendor Landscape (see Vendor
esentation - Vendor Landscape, above). If
no Champion Awards are presented.
Champion zone, multiple Champion Awards
Vendor Awards
Info-Tech’s Champion
Award is presented to
solutions in the Champion
zone of the Vendor
Landscape.
Landscape Methodology:
ation Presentation – Vendor Awards
n of all analyses, Info-Tech presents awards to exceptional solutions in
egories. Award presentation is discretionary; not all awards are
quent to each Vendor Landscape and it is entirely possible, though
awards may be presented.
es are as follows:
wards are presented to those solutions, and only those solutions, that
hampion zone of the Info-Tech Vendor Landscape (see Vendor
Methodology: Information Presentation - Vendor Landscape, above). If
and in the Champion zone, no Champion Awards are presented.
multiple solutions land in the Champion zone, multiple Champion Awards
d.
r Awards are presented to those solutions, and only those solutions,
med to include the most original/inventive product/service, or the most
ntive feature/capability of a product/service. If no solution is deemed to
or sufficiently original/inventive, either as a product/service on the
eature/capability specifically, no Trend Setter Award is presented. Only
etter Award is available for each Vendor Landscape.
Value Awards are presented to those solutions, and only those
at are ranked highest on the Info-Tech Value Index (see Vendor
Vendor A
Info
Aw
solu
zon
Lan
Info
Aw
mo
solu
ws:
esented to those solutions, and only those solutions, that
e of the Info-Tech Vendor Landscape (see Vendor
nformation Presentation - Vendor Landscape, above). If
ampion zone, no Champion Awards are presented.
ns land in the Champion zone, multiple Champion Awards
presented to those solutions, and only those solutions,
the most original/inventive product/service, or the most
apability of a product/service. If no solution is deemed to
original/inventive, either as a product/service on the
lity specifically, no Trend Setter Award is presented. Only
available for each Vendor Landscape.
ds are presented to those solutions, and only those
highest on the Info-Tech Value Index (see Vendor
nformation Presentation – Value Index, above). If
ion is made available for the evaluated solutions, such
be calculated, no Best Overall Value Award will be
Overall Value Award is available for each Vendor
Info-Tech’s Cham
Award is presen
solutions in the C
zone of the Vend
Landscape.
Info-Tech’s Tren
Award is presen
most original/inve
solution evaluate
Info-Tech’s Best
Value Award is
presented to the
with the highest V
Index score.
Source: Info-Tech Vendor Landscape: Next Generation Firewall 2014
18 October 2015 8
Info-Tech: WatchGuard wins “Champion,
Value Award, and Trend Setter”
18 October 2015 9
Value Score?
-Tech NGFW Value Index
40
50
60
70
80
90
30
20
10
e indexes each
t offering and 
h relative to its
oes not indicate
ore high offer more
uck (e.g. features,
y, etc.) than the
while the inverse is
at score lower.
enterprises may
Value Score more
an those who are
n specific
attributes.
On a relative basis, WatchGuard
maintained the highest Info-Tech Value
ScoreTM of the vendor group. Vendors
were indexed against WatchGuard’s 
performance to provide a complete,
relative view of their product offerings.
Champion
100
92
85
42
26
11 10 0 0 0
ed to provide pricing and
icing could not be found.
Average Score: 52
Info-Tech: “WatchGuard maintained the highest
‘Value Score’ of the vendor group”
18 October 2015 10
NSS Labs 2014: “Recommended” … “Leader”
 Evasions = 100%
block
 IPS Block Rate =
97.8%
 Test Group average
block rate = 91.5%
 Low TCO:
$11.87/Protected
Mbps
 Test Group average
TCO = $21.80
 The only products
with higher efficacy
cost 9x our price!
18 October 2015 11
#1 Desempeño UTM en
todos los precios
El MEJOR
desempeño
#1 Módulos Líderes de
la Industria
Best-of-Breed
Technology
#1 Más Altos
Reconocimientos
Gestión y
Monitoreo
Beneficios de WatchGuard como Lider en la Industria
18 October 2015 12
18 October 2015 13
Por qué WatchGuard?
18 October 2015 14
Mediana Empresa (100 – 2,000 empleados)
 No existe personal dedicado a seguridadad
– Cómo protegerse de las amenazas avanzadas?
– Cuántos dispositivos de Seguridad?
– Qué servicios de seguridad perimetral?
– Cómo ver lo que pasa en la red?
– Sabe si la Seguridad fue vulnerada?
– Están habilitados todos los servicios de
Seguridad que tiene?
Complicado Manejo de la Seguridad
18 October 2015 15
Explosión Digital
 El promedio de velocidad de conexión
aumentó 21% en 2.014.
 Aumento annual del 23% en el total de tráfico
en internet.
 Las aplicaciones exigen mayor ancho de
banda
 Video / Audio
– Streaming
– Video UltraHD en 4K require entre 10–20
Mbps libres
La Demanda por Ancho de Banda Aumenta
1: Akamai state of the internet report 2014
2: Cisco Global IP network forecast: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html
3: Sandvine Global Internet Phenomena: https://www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf
18 October 2015 16
Cifrado HTTPS
 La cantidad de tráfico SSL se duplicó el año
pasado
 Aplicaciones communes que utilizan SSL por
defecto
 La inspección es un proceso con alto consumo
de CPU
 El tráfico SSL debe ser descifrado para poderlo
inspeccionar
– Advanced Malware
– Command and Control
– Data Loss Prevention
Cerrando el Punto Ciego
1: Akamai state of the internet report 2014
18 October 2015 17
*Malwise - An Effective and Efficient Classification System for
Packed and Polymorphic Malware, Deakin University, Victoria, June
2013
Cerca del 88% del malware
muta para evadir las soluciones
de antivirus basadas en firmas*
18 October 2015 18
(R)evolución del Malware
Simple Threats
OpportunisticAttacks
APT
Solutions
Antivirus
Solutions
TargetedAttacks
Packing
Sophisticated Threats
Plain
Virus
Poly-
morphic
C&C
Command & control
Fluxing
Persistent
Threats
Evasive
Threats
18 October 2015 19
APTBlocker
Local
Cache
Remote
“Cache”
File
uploaded
APT Blocker
18 October 2015 20
Recomendaciones
18 October 2015 21
No utizar el bloqueo por patrón o por PIN.
18 October 2015 22
No permitir descarga de ejecutables y menos en HTTPS.
18 October 2015 23
VI-SI-BI-LI-DAD !!!
18 October 2015 24
WatchGuard Dimension
18 October 2015 25
Policy Map: Flujo de Información
18 October 2015 26
18 October 2015 27
GRACIAS

Más contenido relacionado

Similar a Watchguard presentation tech day el salvador

brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015Martin Thompson
 
Tech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini Summit
Tech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini SummitTech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini Summit
Tech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini Summitkimw001
 
Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...
Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...
Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...Bitmovin Inc
 
Software supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing controlSoftware supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing controlmatthewabq
 
Introducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - WebcastIntroducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - WebcastCA Nimsoft
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10Usman Arif
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Product Launch Example
Product Launch ExampleProduct Launch Example
Product Launch ExampleZoe Yates
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...CA Technologies
 
P9000 p-017o (argon general presentation - june 2014)
P9000 p-017o (argon general presentation - june 2014)P9000 p-017o (argon general presentation - june 2014)
P9000 p-017o (argon general presentation - june 2014)Clifford Dive
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...VMware Tanzu
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 
Huawei Partner Program 2010 V1.0 Mexico Jun 2010
Huawei Partner Program 2010 V1.0 Mexico Jun 2010Huawei Partner Program 2010 V1.0 Mexico Jun 2010
Huawei Partner Program 2010 V1.0 Mexico Jun 2010hubfer
 
TIAD 2016 : Continuous Integration mesured and controlled
TIAD 2016 : Continuous Integration mesured and controlledTIAD 2016 : Continuous Integration mesured and controlled
TIAD 2016 : Continuous Integration mesured and controlledThe Incredible Automation Day
 
Aligntech_Profile
Aligntech_ProfileAligntech_Profile
Aligntech_ProfileNorma Bitar
 

Similar a Watchguard presentation tech day el salvador (20)

brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015
 
Tech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini Summit
Tech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini SummitTech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini Summit
Tech Mahindra - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...
Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...
Bitmovin LIVE Tech Talks: Analytics for Workflow Automation (ft. Touchstream ...
 
Software supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing controlSoftware supply chain management: Gaining velocity without losing control
Software supply chain management: Gaining velocity without losing control
 
Introducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - WebcastIntroducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - Webcast
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Managing Vendor Issues on AMI Design
Managing Vendor Issues on AMI DesignManaging Vendor Issues on AMI Design
Managing Vendor Issues on AMI Design
 
Product Launch Example
Product Launch ExampleProduct Launch Example
Product Launch Example
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
 
P9000 p-017o (argon general presentation - june 2014)
P9000 p-017o (argon general presentation - june 2014)P9000 p-017o (argon general presentation - june 2014)
P9000 p-017o (argon general presentation - june 2014)
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...Data Science Case Studies: The Internet of Things: Implications for the Enter...
Data Science Case Studies: The Internet of Things: Implications for the Enter...
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
Huawei Partner Program 2010 V1.0 Mexico Jun 2010
Huawei Partner Program 2010 V1.0 Mexico Jun 2010Huawei Partner Program 2010 V1.0 Mexico Jun 2010
Huawei Partner Program 2010 V1.0 Mexico Jun 2010
 
TIAD 2016 : Continuous Integration mesured and controlled
TIAD 2016 : Continuous Integration mesured and controlledTIAD 2016 : Continuous Integration mesured and controlled
TIAD 2016 : Continuous Integration mesured and controlled
 
Juan-Camacho-1.pdf
Juan-Camacho-1.pdfJuan-Camacho-1.pdf
Juan-Camacho-1.pdf
 
SolarWinds.pdf
SolarWinds.pdfSolarWinds.pdf
SolarWinds.pdf
 
Aligntech_Profile
Aligntech_ProfileAligntech_Profile
Aligntech_Profile
 

Más de Jose Molina

Capacitacion apt blocker
Capacitacion apt blockerCapacitacion apt blocker
Capacitacion apt blockerJose Molina
 
Capacitacion apt blocker
Capacitacion apt blockerCapacitacion apt blocker
Capacitacion apt blockerJose Molina
 
Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...
Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...
Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...Jose Molina
 
Como optimizar su conectividad de internet y datos con soluciones integradas
Como optimizar su conectividad de internet y datos con soluciones integradasComo optimizar su conectividad de internet y datos con soluciones integradas
Como optimizar su conectividad de internet y datos con soluciones integradasJose Molina
 
Aplication control dpi
Aplication control dpiAplication control dpi
Aplication control dpiJose Molina
 

Más de Jose Molina (6)

Capacitacion apt blocker
Capacitacion apt blockerCapacitacion apt blocker
Capacitacion apt blocker
 
Capacitacion apt blocker
Capacitacion apt blockerCapacitacion apt blocker
Capacitacion apt blocker
 
Apt malware
Apt malwareApt malware
Apt malware
 
Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...
Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...
Conozca y detecte los nuevos ataques cibernéticos apt a los que se expone su ...
 
Como optimizar su conectividad de internet y datos con soluciones integradas
Como optimizar su conectividad de internet y datos con soluciones integradasComo optimizar su conectividad de internet y datos con soluciones integradas
Como optimizar su conectividad de internet y datos con soluciones integradas
 
Aplication control dpi
Aplication control dpiAplication control dpi
Aplication control dpi
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Watchguard presentation tech day el salvador

  • 1. Lo que debe hacer cuando llegue a su oficina para que su red opere mas eficiente.
  • 2. 18 October 2015 2 Next Generation Firewall: Capacidad Limitada AppControl Intrusion Prevention VPN/Network AntiVirus URLFiltering
  • 3. 18 October 2015 3 UTM: Seguridad CompletaAntiVirus URLFiltering VPN/Network Reputation Enabled Defense AntiSPAM AppControl DataLoss Prevention APTBlocker … Intrusion Prevention
  • 4. 18 October 2015 4 UTM combina múltiples servicios de seguridad Unified Threat Management Application Control URL Filtering Anti SPAM Gateway AntiVirus Intrusion Prevention Service Firewall
  • 5. 18 October 2015 5 Antivirus URL Filtering AntiSpam IPS App Control Platform WatchGuard Architecture 3 Year Effort Delivered the most flexible architecture / platform for UTM Highest Performance Leading UTM performance at each price point Management Console “Single Pane of Glass” policy- driven console UTM Firmware Spanning across all hardware platforms Modular Structure To support “vendor agnostic” strategy Hardware: Multiple CPU partners for best fit to specific product line Software: Always Best-of-Breed software components, with speedy integration APT
  • 6. 18 October 2015 6 Linea Completa de Firewalls NGFW y UTM XTMv Four virtual software license versions with full UTM features XTM 2 & 3 Series: Small offices, branch offices and wireless hotspots XTM 5 & 800 Series: Mid-sized businesses and distributed enterprises Escalabilidad de Software: Único Sistema Operativo en todos los equipos, incluidos los virtuales XTM 15 Series: Large distributed enterprises Wireless Access Points AP100/200 & AP102 Businesses can harness the power of mobile devices without putting network assets at risk. XTM 2520: Large enterprises and corporate data centers Firebox T10: SoHo, Kiosks Firebox M440: Mid-sized Port density, PoE *Subject to cancellation or change
  • 7. Info-Tech: “WatchGuard’s XTM Series is the best bang for any organization’s buck” Methodology: tation – Vendor Awards presents awards to exceptional solutions in is discretionary; not all awards are cape and it is entirely possible, though se solutions, and only those solutions, that ech Vendor Landscape (see Vendor esentation - Vendor Landscape, above). If no Champion Awards are presented. Champion zone, multiple Champion Awards Vendor Awards Info-Tech’s Champion Award is presented to solutions in the Champion zone of the Vendor Landscape. Landscape Methodology: ation Presentation – Vendor Awards n of all analyses, Info-Tech presents awards to exceptional solutions in egories. Award presentation is discretionary; not all awards are quent to each Vendor Landscape and it is entirely possible, though awards may be presented. es are as follows: wards are presented to those solutions, and only those solutions, that hampion zone of the Info-Tech Vendor Landscape (see Vendor Methodology: Information Presentation - Vendor Landscape, above). If and in the Champion zone, no Champion Awards are presented. multiple solutions land in the Champion zone, multiple Champion Awards d. r Awards are presented to those solutions, and only those solutions, med to include the most original/inventive product/service, or the most ntive feature/capability of a product/service. If no solution is deemed to or sufficiently original/inventive, either as a product/service on the eature/capability specifically, no Trend Setter Award is presented. Only etter Award is available for each Vendor Landscape. Value Awards are presented to those solutions, and only those at are ranked highest on the Info-Tech Value Index (see Vendor Vendor A Info Aw solu zon Lan Info Aw mo solu ws: esented to those solutions, and only those solutions, that e of the Info-Tech Vendor Landscape (see Vendor nformation Presentation - Vendor Landscape, above). If ampion zone, no Champion Awards are presented. ns land in the Champion zone, multiple Champion Awards presented to those solutions, and only those solutions, the most original/inventive product/service, or the most apability of a product/service. If no solution is deemed to original/inventive, either as a product/service on the lity specifically, no Trend Setter Award is presented. Only available for each Vendor Landscape. ds are presented to those solutions, and only those highest on the Info-Tech Value Index (see Vendor nformation Presentation – Value Index, above). If ion is made available for the evaluated solutions, such be calculated, no Best Overall Value Award will be Overall Value Award is available for each Vendor Info-Tech’s Cham Award is presen solutions in the C zone of the Vend Landscape. Info-Tech’s Tren Award is presen most original/inve solution evaluate Info-Tech’s Best Value Award is presented to the with the highest V Index score. Source: Info-Tech Vendor Landscape: Next Generation Firewall 2014
  • 8. 18 October 2015 8 Info-Tech: WatchGuard wins “Champion, Value Award, and Trend Setter”
  • 9. 18 October 2015 9 Value Score? -Tech NGFW Value Index 40 50 60 70 80 90 30 20 10 e indexes each t offering and  h relative to its oes not indicate ore high offer more uck (e.g. features, y, etc.) than the while the inverse is at score lower. enterprises may Value Score more an those who are n specific attributes. On a relative basis, WatchGuard maintained the highest Info-Tech Value ScoreTM of the vendor group. Vendors were indexed against WatchGuard’s  performance to provide a complete, relative view of their product offerings. Champion 100 92 85 42 26 11 10 0 0 0 ed to provide pricing and icing could not be found. Average Score: 52 Info-Tech: “WatchGuard maintained the highest ‘Value Score’ of the vendor group”
  • 10. 18 October 2015 10 NSS Labs 2014: “Recommended” … “Leader”  Evasions = 100% block  IPS Block Rate = 97.8%  Test Group average block rate = 91.5%  Low TCO: $11.87/Protected Mbps  Test Group average TCO = $21.80  The only products with higher efficacy cost 9x our price!
  • 11. 18 October 2015 11 #1 Desempeño UTM en todos los precios El MEJOR desempeño #1 Módulos Líderes de la Industria Best-of-Breed Technology #1 Más Altos Reconocimientos Gestión y Monitoreo Beneficios de WatchGuard como Lider en la Industria
  • 13. 18 October 2015 13 Por qué WatchGuard?
  • 14. 18 October 2015 14 Mediana Empresa (100 – 2,000 empleados)  No existe personal dedicado a seguridadad – Cómo protegerse de las amenazas avanzadas? – Cuántos dispositivos de Seguridad? – Qué servicios de seguridad perimetral? – Cómo ver lo que pasa en la red? – Sabe si la Seguridad fue vulnerada? – Están habilitados todos los servicios de Seguridad que tiene? Complicado Manejo de la Seguridad
  • 15. 18 October 2015 15 Explosión Digital  El promedio de velocidad de conexión aumentó 21% en 2.014.  Aumento annual del 23% en el total de tráfico en internet.  Las aplicaciones exigen mayor ancho de banda  Video / Audio – Streaming – Video UltraHD en 4K require entre 10–20 Mbps libres La Demanda por Ancho de Banda Aumenta 1: Akamai state of the internet report 2014 2: Cisco Global IP network forecast: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html 3: Sandvine Global Internet Phenomena: https://www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf
  • 16. 18 October 2015 16 Cifrado HTTPS  La cantidad de tráfico SSL se duplicó el año pasado  Aplicaciones communes que utilizan SSL por defecto  La inspección es un proceso con alto consumo de CPU  El tráfico SSL debe ser descifrado para poderlo inspeccionar – Advanced Malware – Command and Control – Data Loss Prevention Cerrando el Punto Ciego 1: Akamai state of the internet report 2014
  • 17. 18 October 2015 17 *Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware, Deakin University, Victoria, June 2013 Cerca del 88% del malware muta para evadir las soluciones de antivirus basadas en firmas*
  • 18. 18 October 2015 18 (R)evolución del Malware Simple Threats OpportunisticAttacks APT Solutions Antivirus Solutions TargetedAttacks Packing Sophisticated Threats Plain Virus Poly- morphic C&C Command & control Fluxing Persistent Threats Evasive Threats
  • 19. 18 October 2015 19 APTBlocker Local Cache Remote “Cache” File uploaded APT Blocker
  • 20. 18 October 2015 20 Recomendaciones
  • 21. 18 October 2015 21 No utizar el bloqueo por patrón o por PIN.
  • 22. 18 October 2015 22 No permitir descarga de ejecutables y menos en HTTPS.
  • 23. 18 October 2015 23 VI-SI-BI-LI-DAD !!!
  • 24. 18 October 2015 24 WatchGuard Dimension
  • 25. 18 October 2015 25 Policy Map: Flujo de Información
  • 27. 18 October 2015 27 GRACIAS

Notas del editor

  1. Authentication module Dynamic Routing Clustering Layer Traffic Management Multi-WAN Gateway Wireless Controller! Logging infrastructure
  2. Authentication module Dynamic Routing Clustering Layer Traffic Management Multi-WAN Gateway Wireless Controller! Logging infrastructure
  3. This is also true in perimeter security. Multiple discrete technologies deployed at the perimeter have combined into a single unified form factor: the UTM device.
  4. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html https://www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf