111
> Employees
From 3 Staff to...
Sangfor Technologies | 3
Making Each User's Digital Transformation Easier and More Secure
111
Sangfor Team
Research and Development
Division( R&D)
Sales & Marketing
Customer Service
Others
40%
30%
20%
10%
Sangfor Technologies | 4
Making Each User's Digital Transformation Easier and More Secure
111
Leading Technology
First The World First 3rd Gen HCI
The World First Converged NGFW +WAF
Sangfor IPSec VPN, SSL VPN, IAG, WANO #1 in Network
Security market in China
Innovation Total Applied Patents: 1,500+
New Products Released Every 1-2 Year
New Versions Released Every Quarter
Sangfor Technologies | 7
Making Each User's Digital Transformation Easier and More Secure
111
CMMI
Level 5 Certified
5 R&D Centers >40% staff
R&D
Nanjing
(China)
Silicon Valley
(USA)
Changsha
(China)
Shenzhen
(China)
Beijing
(China)
Sangfor Technologies | 8
Making Each User's Digital Transformation Easier and More Secure
Sangfor Technologies CONFIDENTIAL Page 9
Strong Technical Support
Local Wholly-owned
subsidiaries for Better and
Faster Services
ISO9001 Certified
Multilingual Call
Center in Malaysia
Remote Tech with 24/7
Support
Sangfor Technologies CONFIDENTIAL 10
Page
Medical
Remote Diagnosis
Mobile Health Care
Education
MOOC
(Massive Open Online Course)
IntelligentCampus
E-Backpack
Transportation
Car Networking
Pilotless Automobile
Car Sharing
Retail
O2O
Precision Marketing
E-Government
Government
Smart City
Service Government
FSI
E-Money
P2P Loan
E-Payment
Manufacturing
Industry 4.0
IoT
Digital Transformation in All Industries
Sangfor Technologies CONFIDENTIAL Page 11
NGAF Firewall Platform
Integrated Next
Generation Firewall + Next
Generation WAF +
Endpoint Security
Industry-Leading
Advanced Malware
Detection by AI-powered
Engine Zero & Neural-X
Visibility, guidance and
automation of security
operation
Gartner MQ Listing for
Enterprise Network Firewalls
&
Certified by ICSA Labs,
CyberRatings
Proven Success Protecting Web Applications
Hackers
Web Application
Server
Users
Prevents port/server scanning
Prevents app vulnerability scanning
Weak password protection
Anti-brute force attack
Core URL protection
Website structure anti-scanning
Web Crawler defense
Scanning
Process
Enhanced Web Defense
• SQL injection defense
• OS command injection
defense
• XSS attack & CSRF attack
IPS Application Based
• Server vulnerability defense
• Terminal vulnerability defense
DOS attack
Application layer DOS attack
CC attack
Authority control
Exe file upload filtering
Upload viruses & Trojan filtering
Prevention of web shell dataflow
Attack
Process
Theft
Process
Sangfor Security Capabilities
Sangfor Technologies CONFIDENTIAL 13 Page
* In the future, Neural-X will have more engines to detect more threats
Engine Zero: For file based attacks
ML powered anti-malware, Anti-virus
Neural-X: For URL/IP/DNS/file based attacks
ML Enabled Threat Intelligence & Analytics
Sangfor Engine Zero: Stop Malware Cold
Sangfor Technologies CONFIDENTIAL 14 Page
Deep Learning is
Everywhere
Sangfor Engine Zero:
Deep Learning Neural Networks
• Protection from both known and unknown malware
• No reliance on signatures
• Detects malware in approximately 30 milliseconds
• Extremely small footprint (under 60MB)
• Works out of the box. No additional training required
Sangfor Neural-X
Attack &
Defense Expert
Data Scientist
Security Analyst
Rules Features
Mining Virus
Detection
Malicious URL
Detection
Time Series
Analysis
DNS Amplification
Attack Detection
Two-Class
Classifications
Scanning
Detection
Multi Class
Classification
Webshell
Detection
Clustering
Traffic
Detection
Outlier
Monitoring
Abnormal
Behavior
Detection
Deep Learning
Botnet Detection
Network Malware Detection Accuracy Increased to 99.7%
Reconnaissance Weaponization Delivery Exploitation Installation C&C Data Extraction
IAG NGAF CC
PX
Security Visibility report for Different Purpose
Simplified Daily Operation Step by Step Incident Response Valuable Report to BOSS
In-Depth Threat Analysis
1. View current security status
2. Comprehensive analysis of network trends
2. Analysis of application servers prone to critical or high-risk vulnerabilities & attacks
3. Solutions for existing issues
Timely analysis of
severity ranking of
potential risks
Clear & concise
information about
attack source, target,
impact & solutions
Sangfor Technologies CONFIDENTIAL Page 18
Sangfor NGAF Firewall Capability Architecture
ACL
AV
IPS
Network Server
Branch
WAF
Function
layer
AI engine TI Visibility
Capability
layer
Platform-X
L4-L7
Capability
BBC
Advantages: Effective & Simple
NGAF
Neural-x
NGAF
NGAF
• Unified Management
• Unified Updates
• Centralized Visibility
Sangfor Technologies CONFIDENTIAL Page 19
Internet Access Gateway
Internet Access Gateway
Simplify User & Network Management
Personalized analytic
reports to create business
value from user online
data
Comprehensive
authentication
methods with the most
powerful bandwidth
management
Sangfor Business
Intelligence
platform enables intelligent
decision making
Integrated with Sangfor
Neural-X & Engine Zero
for enhanced security
protection
Visible, Controllable and Valuable
Visible
• Legal/Illegal endpoints
• Legal/Illegal users
User
&
Devices
• Porn Websites
• Gambling Websites
• Shopping Websites
• Forums
• Cloud Storage
• Work Emails
Apps
&
Contents
• Streaming Traffic
• P2P Traffic
• Video Download
• Encrypted Traffic
• Online Conference
Traffic
Behavior Big
Data Platform
Valuable
Controllable
2/22/2023
Email
P2P
User 1
User 2
User 3
Channel Management
User Traffic
Key application
1. More applications achieve granular control
2. Key business applications bandwidth guarantee improves work efficiency
Email
P2P
Video P2P
P2P
Email
P2P
P2P
PMS
P2P
MP3
PMS
P2P
P2P
Video MP3
P2P
P2P
P2P
Control Policy
Email
PMS
Improve Work Efficiency
More Authentication Methods
• 30+ authentication methods supported
• Flexible choices for user authentication
• User data mining with IAG
• Free marketing with customizable login page
and social media
AD SSO
3rd. Party
Server
SSO
Self-
Register
Portal
Auth.
2/22/2023
Guaranteed Bandwidth for Key Apps while Maximizing the use of Bandwidth
Idle
Busy Dynamic control
Free
Bandwidth
1. Busy networks restrict
bandwidth consuming apps
1. Flexible control while the
network is idle
2. Maximize the use of the
bandwidth
Guarantee Limit
Detailed reports for investigation
1. All activity logged without
legal risk
2. Flexible store in internal and
external data center
3. No additional cost for
regulation compliance
Business Intelligence Platform
Solution benefits:
• Forecast Risk and Be Proactive
• Generate Value from IAG
• Decision Making Assistant
Reports
• Internet Access Analytics
• Bandwidth Analytics
• Electricity Waste Analytics
• Leased Line Analytics
• Event Analytics
User Behavior Collection
Big Data
Mining
Modeling
Analysis
Analytic
Reports
BI
Sangfor Technologies CONFIDENTIAL Page 28
Endpoint Secure
Endpoint Secure
The Future of Endpoint Security
A Different Approach for
Defending Endpoints
AI powered protection
using Neural-X and Engine
Zero
On-premise, Cloud-based
or Hybrid Management for
Scalability
Direct Integration with
Sangfor NGAF and IAG
Sangfor Technologies CONFIDENTIAL Page 31
Detection
NGAF Network View
Risks to both PCs and servers are visible
Endpoint Secure Client View
Sangfor Technologies CONFIDENTIAL Page 32
Endpoint Secure Total Visibility of Enterprise Assets
Visibility of Assets
Identify core business system assets
Visibility of Threats and Risks
Identify vulnerabilities and risks to business assets
Visiblity of Asset Behavior
Distinguish between common and uncommon
asset behavior
Cannot be
encrypted
1. Bait files are placed in system-critical, high target and random directories
2 Encryption of bait files highlights running encryption process
3. Endpoint Secure kills the
encryption process to
block encryption
4. Malware
controlling encryption
is identified mitigated
Encrypted Encrypted Encrypted Encrypted Encrypted
Encrypted Encrypted Encrypted Encrypted Encrypted
Encrypted Encrypted Encrypted Encrypting...
Cannot be
encrypted
Encrypted
Protect Agent
After analysis of encryption order of tens of thousands of ransomware, key
directories with a high probability of being targeted for encryption are identified
Ransomware Honeypot
Sangfor Technologies CONFIDENTIAL Page 36
One-Click Kill
Endpoint Secure Manager
One click mitigation for the entire network
One click mitigation for the entire network
Find one infection, quickly scan the network for more
Sangfor Technologies CONFIDENTIAL Page 37
Micro-isolation reduces threat propagation
Access control for different roles
Business A Business B
Department B
Department A
Security isolation and access control for
different business systems
Security isolation at different terminals
Security isolation and access
control in concert with NGAF
Data Center
Business Area
Intranet office
area
Sangfor Technologies CONFIDENTIAL Page 38
Cyber Command
Cyber Command
Intelligent Threat Detection and
Response Platform
Sophisticated Detection by
closely monitoring every step of
the cybersecurity attack chain.
Faster and More Efficient
Response delivered using
incident investigation and tight
integration with network and
endpoint security solutions.
Simplify Threat Hunting to
perform comprehensive impact
analysis of known breaches
and to track "patient zero“.
Integration with Sangfor
TIARA & MDR services.
Sangfor Technologies CONFIDENTIAL Page 39
How does Cyber Command works
Systems
Devices
Network
Effective collection for full flow + security logs
Sophisticated
DETECTION
Faster and More
Efficient RESPONSE
Intelligent Detection
SAVE AI
UEBA NTA
TI EDR
Threat Hunting
Attack chain analysis
Contextual verification
Attack Path Attack sorting
Security incident alert
NGAF Others
Powerful Intelligent Threat Detection
and Response Platform
1
2
3
Sophisticated DETECTION by closely monitoring every step of the
cybersecurity attack chain
Faster and More Efficient RESPONSE delivered by incident investigation and tight
integration with network and endpoint security solutions
Simplify Threat Hunting
Cyber Command
Data Lake
Correlate Response
Block open ports
Scan for other malware
Quarantine Stop processes
Shut down C&C
Connections
Simplify Threat Hunting
Comprehensive Visibility
Sangfor Technologies CONFIDENTIAL Page 41
Sangfor aCloud
Sangfor aCloud
Enterprise Cloud Computing Platform Built on
Business-Centric HCI
aCMP cloud
management platform
Multi-tenant
management
Disaster recovery CDP & Data Backup
Sangfor aCloud is consolidating 3-tier IT
Traditional DC
Switch/Router
Server
FC
Storage
...
Management
...
Security
HCI-based DC
Sangfor HCI-based DC
compute networking
storage security
aSV aSAN aNET aSEC
Enable your business with end to end solution
Compute Storage Networking Security
x86
x86 x86
aCMP (cloud management platform)
Operation
Center
Reliability
Center
Monitor
Center
Security
Center