Publicidad

Más contenido relacionado

Similar a Sangfor's Presentation.pdf(20)

Publicidad

Sangfor's Presentation.pdf

  1. www.sangfor.com Sangfor Technologies Inc. Make IT Simpler, More Secure and Valuable
  2. Sangfor Technologies CONFIDENTIAL Page 1 Sangfor Group Network Security Enabling Enterprise-Class Security Cloud Computing One Architecture Sharing Everything
  3. 111 23Years 2000 - 2023 2000 2006 2014 2010 2011 2019 2017 2021 2015 2012 2002 2013 Sangfor Technologies | 2 Making Each User's Digital Transformation Easier and More Secure
  4. 111 > Employees From 3 Staff to... Sangfor Technologies | 3 Making Each User's Digital Transformation Easier and More Secure
  5. 111 Sangfor Team Research and Development Division( R&D) Sales & Marketing Customer Service Others 40% 30% 20% 10% Sangfor Technologies | 4 Making Each User's Digital Transformation Easier and More Secure
  6. 111 Mainland China HK/TW/MC Malaysia USA Indonesia Pakistan Vietnam UAE Philippines South Korea Thailand Italy Singapore South Africa Spain 60+ Global Branches Global Expansion Sangfor Technologies | 5 Making Each User's Digital Transformation Easier and More Secure
  7. Sangfor Technologies CONFIDENTIAL Page 6 R&D Budget 20% R&D Budget OF TOTAL REVENUE
  8. 111 Leading Technology First The World First 3rd Gen HCI The World First Converged NGFW +WAF Sangfor IPSec VPN, SSL VPN, IAG, WANO #1 in Network Security market in China Innovation Total Applied Patents: 1,500+ New Products Released Every 1-2 Year New Versions Released Every Quarter Sangfor Technologies | 7 Making Each User's Digital Transformation Easier and More Secure
  9. 111 CMMI Level 5 Certified 5 R&D Centers >40% staff R&D Nanjing (China) Silicon Valley (USA) Changsha (China) Shenzhen (China) Beijing (China) Sangfor Technologies | 8 Making Each User's Digital Transformation Easier and More Secure
  10. Sangfor Technologies CONFIDENTIAL Page 9 Strong Technical Support Local Wholly-owned subsidiaries for Better and Faster Services ISO9001 Certified Multilingual Call Center in Malaysia Remote Tech with 24/7 Support
  11. Sangfor Technologies CONFIDENTIAL 10 Page Medical  Remote Diagnosis  Mobile Health Care Education  MOOC (Massive Open Online Course)  IntelligentCampus  E-Backpack Transportation  Car Networking  Pilotless Automobile  Car Sharing Retail  O2O  Precision Marketing E-Government Government  Smart City  Service Government FSI  E-Money  P2P Loan  E-Payment Manufacturing  Industry 4.0  IoT Digital Transformation in All Industries
  12. Sangfor Technologies CONFIDENTIAL Page 11 NGAF Firewall Platform Integrated Next Generation Firewall + Next Generation WAF + Endpoint Security Industry-Leading Advanced Malware Detection by AI-powered Engine Zero & Neural-X Visibility, guidance and automation of security operation Gartner MQ Listing for Enterprise Network Firewalls & Certified by ICSA Labs, CyberRatings
  13. Proven Success Protecting Web Applications Hackers Web Application Server Users Prevents port/server scanning Prevents app vulnerability scanning Weak password protection Anti-brute force attack Core URL protection Website structure anti-scanning Web Crawler defense Scanning Process Enhanced Web Defense • SQL injection defense • OS command injection defense • XSS attack & CSRF attack IPS Application Based • Server vulnerability defense • Terminal vulnerability defense DOS attack Application layer DOS attack CC attack Authority control Exe file upload filtering Upload viruses & Trojan filtering Prevention of web shell dataflow Attack Process Theft Process
  14. Sangfor Security Capabilities Sangfor Technologies CONFIDENTIAL 13 Page * In the future, Neural-X will have more engines to detect more threats Engine Zero: For file based attacks ML powered anti-malware, Anti-virus Neural-X: For URL/IP/DNS/file based attacks ML Enabled Threat Intelligence & Analytics
  15. Sangfor Engine Zero: Stop Malware Cold Sangfor Technologies CONFIDENTIAL 14 Page Deep Learning is Everywhere Sangfor Engine Zero: Deep Learning Neural Networks • Protection from both known and unknown malware • No reliance on signatures • Detects malware in approximately 30 milliseconds • Extremely small footprint (under 60MB) • Works out of the box. No additional training required
  16. Sangfor Neural-X Attack & Defense Expert Data Scientist Security Analyst Rules Features Mining Virus Detection Malicious URL Detection Time Series Analysis DNS Amplification Attack Detection Two-Class Classifications Scanning Detection Multi Class Classification Webshell Detection Clustering Traffic Detection Outlier Monitoring Abnormal Behavior Detection Deep Learning Botnet Detection Network Malware Detection Accuracy Increased to 99.7% Reconnaissance Weaponization Delivery Exploitation Installation C&C Data Extraction IAG NGAF CC PX
  17. Security Visibility report for Different Purpose Simplified Daily Operation Step by Step Incident Response Valuable Report to BOSS
  18. In-Depth Threat Analysis 1. View current security status 2. Comprehensive analysis of network trends 2. Analysis of application servers prone to critical or high-risk vulnerabilities & attacks 3. Solutions for existing issues Timely analysis of severity ranking of potential risks Clear & concise information about attack source, target, impact & solutions
  19. Sangfor Technologies CONFIDENTIAL Page 18 Sangfor NGAF Firewall Capability Architecture ACL AV IPS Network Server Branch WAF Function layer AI engine TI Visibility Capability layer Platform-X L4-L7 Capability BBC Advantages: Effective & Simple NGAF Neural-x NGAF NGAF • Unified Management • Unified Updates • Centralized Visibility
  20. Sangfor Technologies CONFIDENTIAL Page 19 Internet Access Gateway Internet Access Gateway Simplify User & Network Management Personalized analytic reports to create business value from user online data Comprehensive authentication methods with the most powerful bandwidth management Sangfor Business Intelligence platform enables intelligent decision making Integrated with Sangfor Neural-X & Engine Zero for enhanced security protection
  21. Visible, Controllable and Valuable Visible • Legal/Illegal endpoints • Legal/Illegal users User & Devices • Porn Websites • Gambling Websites • Shopping Websites • Forums • Cloud Storage • Work Emails Apps & Contents • Streaming Traffic • P2P Traffic • Video Download • Encrypted Traffic • Online Conference Traffic Behavior Big Data Platform Valuable Controllable
  22. 2/22/2023 Email P2P User 1 User 2 User 3 Channel Management User Traffic Key application 1. More applications achieve granular control 2. Key business applications bandwidth guarantee improves work efficiency Email P2P Video P2P P2P Email P2P P2P PMS P2P MP3 PMS P2P P2P Video MP3 P2P P2P P2P Control Policy Email PMS Improve Work Efficiency
  23. More Authentication Methods • 30+ authentication methods supported • Flexible choices for user authentication • User data mining with IAG • Free marketing with customizable login page and social media AD SSO 3rd. Party Server SSO Self- Register Portal Auth.
  24. 2/22/2023 Guaranteed Bandwidth for Key Apps while Maximizing the use of Bandwidth Idle Busy Dynamic control Free Bandwidth 1. Busy networks restrict bandwidth consuming apps 1. Flexible control while the network is idle 2. Maximize the use of the bandwidth Guarantee Limit
  25. 2/22/2023 Visualize International Traffic Manage International Traffic Save Cost by Expending Bandwidth International Traffic Management Domestic International
  26. Detailed reports for investigation 1. All activity logged without legal risk 2. Flexible store in internal and external data center 3. No additional cost for regulation compliance
  27. Comprehensive reports Step by Step Review and Analysis
  28. Business Intelligence Platform Solution benefits: • Forecast Risk and Be Proactive • Generate Value from IAG • Decision Making Assistant Reports • Internet Access Analytics • Bandwidth Analytics • Electricity Waste Analytics • Leased Line Analytics • Event Analytics User Behavior Collection Big Data Mining Modeling Analysis Analytic Reports BI
  29. Sangfor Technologies CONFIDENTIAL Page 28 Endpoint Secure Endpoint Secure The Future of Endpoint Security A Different Approach for Defending Endpoints AI powered protection using Neural-X and Engine Zero On-premise, Cloud-based or Hybrid Management for Scalability Direct Integration with Sangfor NGAF and IAG
  30. One-Click/Automatic File Disposal/Restore Malware Sandbox Ransomware Honeypot Network-Wide Threat Disposal NGAF Integration One-Click/Automatic Host Micro-Isolation Threat Intelligence Global Whitelists/Blacklists Compliance Asset Tracking Multi-Dimensional Response Vulnerability Scanning Patch Management
  31. Security Visibility
  32. Sangfor Technologies CONFIDENTIAL Page 31 Detection NGAF Network View Risks to both PCs and servers are visible Endpoint Secure Client View
  33. Sangfor Technologies CONFIDENTIAL Page 32 Endpoint Secure Total Visibility of Enterprise Assets Visibility of Assets Identify core business system assets Visibility of Threats and Risks Identify vulnerabilities and risks to business assets Visiblity of Asset Behavior Distinguish between common and uncommon asset behavior
  34. Sangfor Technologies CONFIDENTIAL Page 33 Identify Communications Between Endpoints
  35. Cannot be encrypted 1. Bait files are placed in system-critical, high target and random directories 2 Encryption of bait files highlights running encryption process 3. Endpoint Secure kills the encryption process to block encryption 4. Malware controlling encryption is identified mitigated Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypting... Cannot be encrypted Encrypted Protect Agent After analysis of encryption order of tens of thousands of ransomware, key directories with a high probability of being targeted for encryption are identified Ransomware Honeypot
  36. Response
  37. Sangfor Technologies CONFIDENTIAL Page 36 One-Click Kill Endpoint Secure Manager One click mitigation for the entire network One click mitigation for the entire network Find one infection, quickly scan the network for more
  38. Sangfor Technologies CONFIDENTIAL Page 37 Micro-isolation reduces threat propagation Access control for different roles Business A Business B Department B Department A Security isolation and access control for different business systems Security isolation at different terminals Security isolation and access control in concert with NGAF Data Center Business Area Intranet office area
  39. Sangfor Technologies CONFIDENTIAL Page 38 Cyber Command Cyber Command Intelligent Threat Detection and Response Platform Sophisticated Detection by closely monitoring every step of the cybersecurity attack chain. Faster and More Efficient Response delivered using incident investigation and tight integration with network and endpoint security solutions. Simplify Threat Hunting to perform comprehensive impact analysis of known breaches and to track "patient zero“. Integration with Sangfor TIARA & MDR services.
  40. Sangfor Technologies CONFIDENTIAL Page 39 How does Cyber Command works Systems Devices Network Effective collection for full flow + security logs Sophisticated DETECTION Faster and More Efficient RESPONSE Intelligent Detection SAVE AI UEBA NTA TI EDR Threat Hunting Attack chain analysis Contextual verification Attack Path Attack sorting Security incident alert NGAF Others Powerful Intelligent Threat Detection and Response Platform 1 2 3 Sophisticated DETECTION by closely monitoring every step of the cybersecurity attack chain Faster and More Efficient RESPONSE delivered by incident investigation and tight integration with network and endpoint security solutions Simplify Threat Hunting Cyber Command Data Lake Correlate Response Block open ports Scan for other malware Quarantine Stop processes Shut down C&C Connections Simplify Threat Hunting Comprehensive Visibility
  41. Sangfor Technologies CONFIDENTIAL Page 40 Risk Protection Solution • Centralized Integrated Management • Situational Threat Awareness • Network Flow Analysis • 3rd Party Device Support Cyber Command • Risk Driven • Network Flow Analysis • Active Defense Infected? C&C Communication Encryption Lateral Propagation Endpoint Secure • Phising Email • Ransomware Detection • Malicious Domain • C&C Servers Ransomware Encrypted File Rollback • Connection Analysis • Malware Containment • Disinfestion/Blocking • Ransomware/APT Detection Ransomware NGAF HCI • Global/Local • Threat Intelligence • AI Engine • Automated Sandbox Cluster Neural-X
  42. Sangfor Technologies CONFIDENTIAL Page 41 Sangfor aCloud Sangfor aCloud Enterprise Cloud Computing Platform Built on Business-Centric HCI aCMP cloud management platform Multi-tenant management Disaster recovery CDP & Data Backup
  43. Sangfor aCloud is consolidating 3-tier IT Traditional DC Switch/Router Server FC Storage ... Management ... Security HCI-based DC Sangfor HCI-based DC compute networking storage security aSV aSAN aNET aSEC
  44. Compute Storage Networking Security 1st Gen HCI 2nd Gen HCI 3rd Gen HCI 3rd Gen HCI with Full Convergence
  45. Enable your business with end to end solution Compute Storage Networking Security x86 x86 x86 aCMP (cloud management platform) Operation Center Reliability Center Monitor Center Security Center
  46. What You Draw is What You Get
  47. What You Draw is What You Get
  48. Cloud-BasedSecurityOperationCenter Cyber BoundaryProtection&Management PrimarySite DRSite Sangfor Product Opportunity Panorama • Managed Security Service for Sangfor Security Devices: Platform-X • Real-Time Threat Monitoring, Analysis & Response: MDR • Protect network and serverby effectively detecting and defending against known & un-known threat: NGAF • Internal and external riskmanagementthrough identification, visualization & control for usersand Applications: IAG Multiple-Branches/ Remote-Office • Primary Focus on Branch Security: NGAF • Remote Working:VDI PublicInternetService • BusinessContinuity, Data Security& Uncertain Concurrency : HCI+VAF +vAD RiskAssessmentService • Security posture assessmentto identify internal threats anddevelop an effective improvement plan: TIARA Management&OperationCenter • Limited I Tmanpower and skills,requiring a unified, automated and highly visible platform, simplifying O&M and providing security riskanalysis& • comprehensive riskassessment: Cybercommand • On-line light unified management: Platform-X OfficeArea • Endpoint Anti-Ransomware: EndpointSecure • Endpoint data security, internal compliance, remote office &simplified operation: VDI • Internal East-West Flow Detection:NGAF Cyber BoundaryProtection&Management • Focus on improving businessreliability, data security, high performance & agility resources:HCI+aSEC • Private or Managed Cloud Service :HCI+aCMP +aSEC RiskAssessmentService • Cross-SiteBusinessReliability • Local Backup forVMware • DR for HCI • Solution Performance: RTO=5 mins&0RPO 47 IAG NGAF
  49. THANK YOU SANGFOR TECHNOLOGIES INDONESIA MD Place 3rd Floor, JI Setiabudi No.7, Jakarta Selatan 12910, Indonesia.
Publicidad