SlideShare una empresa de Scribd logo
1 de 54
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Security today The growing complexity Botnets Spam Phishing Scam Hoax Viruses Spyware Gray ware  Intrusions Denial of Service  Distributed   Denial of Service Malware Ping floods Eavesdropper Script Kiddies Espionage Root kits Adware P2P File sharing Trojans Spit Bots Backdoors Buffer Overflows  Hackers  Malcode Bugs Key loggers Crime ware Pharming Competitors Identity theft Exploits  DNS poisoning  Snarf attacks Spam bots Spy bots Trap doors War driving Ransomware ASCII bombs Bluesnarfing Worms Decrypting Reverse engineering  Port Scanning… Too many threats … Too many tools … Helpdesk Evaluation Training Deployment Management Updating Too many tasks … Firewall & VPN IPS & IDS SSL VPN Email Filter Web & IM Filter
Internet Security today The growing demand for integration   URL Filter Anti Virus VPN  Firewall 2000 Antispam  URL Filter IDS/IPS Anti Virus VPN  Firewall 2003 Central Mgmnt.. VoIP Antiphishing Antispyware Antispam  URL Filter IDS/IPS  Anti Virus VPN  Firewall 2005 Clustering SSL VPN IM/P2P control Email Encryption Single Sign On Dual AV Central Mgmnt. VoIP Antiphishing Antispyware Antispam  URL Filter IDS/IPS  Anti Virus VPN  Firewall 2008 FW/VPN UTM UTM+ XTM typical Integrated  products
Internet Security today The growing d emand for unified management Firewall Antispam VPN Antivirus URL Filter IDS/IPS … have many different management interfaces Many different tools…  Wizards  (initial setup) Web GUI (basic configuration) set admin user cfg password  set interface ethernet1  manage ssh exec ssh tftp username cfg file-name idnt_cfg.pub ip-addr 10.1.1.5 save CLI  (detailed configuration) Launch of 3rd party GUI  (for specific applications) Software client  (Off-line configuration)
Internet Security today   The Astaro All-In-One  Approach Browser-based Unified Management of  All Applications  Automatic Firmware & Pattern  Updates Integration of  Complete Email, Web & Network protection Centralized Management & Reporting Flexible  Deployment All-In-One Appliance Networking-Features  for High Avaliability  and Load Balancing
Astaro Company Overview Company Profile ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Company Overview Our Business Astaro is a leading supplier of All-In-One Internet Security Appliances for small to medium sized companies and organizations requiring integrated products for Email, Web and Network Security that are cost efficient and easy-to-use. In contrast to suppliers of single- or other multi-function products for internet security Only Astaro offers easy-to-use All-In-One security gateways with complete enterprise-class functionality.
Astaro Company Overview Successful customers
Astaro Company Overview Frequently awarded 2 × Product of the Year Recommendation Best of the Year Editor's Choice 3 × Best of the Year 2 × Editor's Choice “  The most polished and easy to use management system we’ve seen. ” InfoWorld “ An astonishingly rich set of security features.”  SC Magazine “ This is a real winner.”  SC Magazine “ Covers all the bases” “Excellent ” InfoWorld "knallharte Firewall"   PC Pr@xis
Astaro Product Overview All-In-One-Appliances extended UTM  Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
Astaro Product Overview Deployment models Hardware Operating  System Application Software  Appliance Hardware Appliance Virtual Appliance
Astaro Product Overview Management & VPN   Products Advanced IPsec VPN client with personal firewall and integrated dialer Provides Centralized management and real-time monitoring for multiple Astaro appliances Collects, correlates and analyzes security data and provides a huge portfolio of graphical reports
The Astaro Difference ,[object Object],[object Object],[object Object],[object Object],Over 47,000 customers are already protecting more than 100,000 networks  with an Astaro appliance 10-Minute-Setup One-Click Clustering 1..10
Summary Astaro Business Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Appendix Astaro Products
[object Object],[object Object],All you need for comprehensive  Email, Web and  Network security
Astaro Security Gateway Comprehensive Email, Web & Network Security extended UTM  Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
Astaro Security Gateway Deployment scenarios Internet Internal Users and Resources Mail Server DMZ
Astaro Security Gateway   Easily Managed 10-Minute-Setup
Astaro Security Gateway  Products Hardware Appliances *Pricing based #IPs/Users ASG 110/120 ASG 220 ASG 320 ASG 425 ASG 525 ASG 625 Environment Small networks Medium networks Medium networks Large networks Large networks Large networks 10/100 Mbps Network Ports 4 8 4 - - - Gigabit Network Ports - - 4 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Max. recommended FW Users 10/50 150 350 1000 2500 4000 Max. recommended UTM Users 10/25 70 200 600 1300 2000 Software Appliance*   Runs on Intel-compatible PCs and servers Virtual Appliance * Runs in any VMware environment
Astaro Security Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Security Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],All you need for comprehensive  Web security
Astaro Web Gateway Comprehensive Web Security functionality
Astaro Web Gateway Deployment scenarios Internet AWG Internal users and resources Firewall and IPS Inspect  all traffic Inspect  HTTP traffic  only HTTP
Astaro Web Gateway   Easily Managed
Astaro Web Gateway   Web Security Reporting
Astaro Web Gateway  Products Hardware Appliances *Pricing based #IPs/Users AWG 1000 AWG 2000 AWG 3000 AWG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 1 – 100 50 - 250 150 - 750 500 – 2000 Web Throughput 50 Mbit/s 80 Mbit/s 150 Mbit/s 250 Mbit/s Virtual Appliance* Runs in any VMware environment Software Appliance*   Runs on Intel-compatible PCs and servers
Astaro Web Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],All you need for comprehensive  Mail security
Astaro Mail Gateway Comprehensive Mail Security functionality Antispam Antivirus Encryption Email  Remote  Exchange  Access
Astaro Mail Gateway Deployment scenarios Internet Internal users and resources Firewall and IPS Inspect  Email traffic  only SMTP POP3 SMTP servers AMG SMTP POP3 Inspect  all traffic
Astaro Mail Gateway Easily Managed: The browser-based GUI 10-Minute-Setup
Astaro Mail Gateway The UserPortal ,[object Object]
Astaro Mail Gateway  Products Hardware Appliances *Pricing based #IPs/Users AMG 1000 AMG 2000 AMG 3000 AMG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 50-300 200-800 700-3000 2000-5000 Email Throughput  (scaned Emails/h) 50,000 100,000 150,000 200,000 Virtual Appliance Runs in any VMware environment Software Appliance*   Runs on Intel-compatible PCs and servers
Astaro Mail Gateway  Key Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Already 19,000 customers are protecting more than 20 million email addresses with an Astaro appliance
[object Object],[object Object],[object Object]
Astaro Network Security
Astaro Mail Security
Astaro Web Security
[object Object],[object Object]
Astaro Command Center  Feature Overview
Astaro Command Center  Multi Client Deployment ,[object Object],[object Object],[object Object],Customer 1 Customer 2 Browser-based Access Global distributed Astaro Gateways ,[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Command Center  Easy to use ,[object Object],[object Object],Gateway Manager Device Management for individual customers
Astaro Command Center  Products Hardware Appliances Virtual Appliance   Runs in any VMware environment Software Appliance   Runs on Intel-compatible PCs and servers ACC 1000 ACC 2000 ACC 3000 ACC 4000 Max. managed Gateways 20 50 100 200 Administrators 1 2 3 4 Clients 4 10 20 40
Astaro Command Center Benefits ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Astaro Report Manager Feature  Overview
Astaro Report Manager  Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Astaro Report Manager  Easy to use ,[object Object],[object Object],[object Object]
Astaro Report Manager  Products Software Application  Runs on Intel-compatible PCs and servers Requires Windows Platform: - Windows 2000/XP/2003 - MS IE 6.0 or compatible with JAVA runtime - MS IIS or integrated Apache
Astaro Report Manager Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object]
  Astaro All-in-One Internet Security  For more information: [email_address] Astaro Software & Virtual Appliances  Free Download www.astaro.com/download Mobile: 01225555288

Más contenido relacionado

La actualidad más candente

Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product familyxKinAnx
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 

La actualidad más candente (20)

FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Forti web
Forti webForti web
Forti web
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 
Firewall
FirewallFirewall
Firewall
 
Vpn
VpnVpn
Vpn
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 

Destacado

amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapalibuildersreviews
 
OSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinOSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinEC-Council
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationOpposing Force S.r.l.
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTSudhanshu Chauhan
 
OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with pythonJose Manuel Ortega Candel
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINTJerod Brennen
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Securitydpd
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 

Destacado (20)

amrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdfamrapali builders@@@bluetooth hacking.pdf
amrapali builders@@@bluetooth hacking.pdf
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
OSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc NewlinOSINT RF Reverse Engineering by Marc Newlin
OSINT RF Reverse Engineering by Marc Newlin
 
Resume Ramdas P
Resume Ramdas PResume Ramdas P
Resume Ramdas P
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Blackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINTBlackmagic Open Source Intelligence OSINT
Blackmagic Open Source Intelligence OSINT
 
OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with python
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 

Similar a Astaro Customer Presentation

Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Fajar Isnanto
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 RadwareINFOTIME
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Balázs Antók
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 

Similar a Astaro Customer Presentation (20)

Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Information Security
Information SecurityInformation Security
Information Security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Bitrix Software Security
Bitrix Software SecurityBitrix Software Security
Bitrix Software Security
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product LineCornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Astaro Customer Presentation

  • 1.  
  • 2.
  • 3. Internet Security today The growing complexity Botnets Spam Phishing Scam Hoax Viruses Spyware Gray ware Intrusions Denial of Service Distributed Denial of Service Malware Ping floods Eavesdropper Script Kiddies Espionage Root kits Adware P2P File sharing Trojans Spit Bots Backdoors Buffer Overflows Hackers Malcode Bugs Key loggers Crime ware Pharming Competitors Identity theft Exploits DNS poisoning Snarf attacks Spam bots Spy bots Trap doors War driving Ransomware ASCII bombs Bluesnarfing Worms Decrypting Reverse engineering Port Scanning… Too many threats … Too many tools … Helpdesk Evaluation Training Deployment Management Updating Too many tasks … Firewall & VPN IPS & IDS SSL VPN Email Filter Web & IM Filter
  • 4. Internet Security today The growing demand for integration URL Filter Anti Virus VPN Firewall 2000 Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2003 Central Mgmnt.. VoIP Antiphishing Antispyware Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2005 Clustering SSL VPN IM/P2P control Email Encryption Single Sign On Dual AV Central Mgmnt. VoIP Antiphishing Antispyware Antispam URL Filter IDS/IPS Anti Virus VPN Firewall 2008 FW/VPN UTM UTM+ XTM typical Integrated products
  • 5. Internet Security today The growing d emand for unified management Firewall Antispam VPN Antivirus URL Filter IDS/IPS … have many different management interfaces Many different tools… Wizards (initial setup) Web GUI (basic configuration) set admin user cfg password set interface ethernet1 manage ssh exec ssh tftp username cfg file-name idnt_cfg.pub ip-addr 10.1.1.5 save CLI (detailed configuration) Launch of 3rd party GUI (for specific applications) Software client (Off-line configuration)
  • 6. Internet Security today The Astaro All-In-One Approach Browser-based Unified Management of All Applications Automatic Firmware & Pattern Updates Integration of Complete Email, Web & Network protection Centralized Management & Reporting Flexible Deployment All-In-One Appliance Networking-Features for High Avaliability and Load Balancing
  • 7.
  • 8. Astaro Company Overview Our Business Astaro is a leading supplier of All-In-One Internet Security Appliances for small to medium sized companies and organizations requiring integrated products for Email, Web and Network Security that are cost efficient and easy-to-use. In contrast to suppliers of single- or other multi-function products for internet security Only Astaro offers easy-to-use All-In-One security gateways with complete enterprise-class functionality.
  • 9. Astaro Company Overview Successful customers
  • 10. Astaro Company Overview Frequently awarded 2 × Product of the Year Recommendation Best of the Year Editor's Choice 3 × Best of the Year 2 × Editor's Choice “ The most polished and easy to use management system we’ve seen. ” InfoWorld “ An astonishingly rich set of security features.” SC Magazine “ This is a real winner.” SC Magazine “ Covers all the bases” “Excellent ” InfoWorld "knallharte Firewall" PC Pr@xis
  • 11. Astaro Product Overview All-In-One-Appliances extended UTM Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
  • 12. Astaro Product Overview Deployment models Hardware Operating System Application Software Appliance Hardware Appliance Virtual Appliance
  • 13. Astaro Product Overview Management & VPN Products Advanced IPsec VPN client with personal firewall and integrated dialer Provides Centralized management and real-time monitoring for multiple Astaro appliances Collects, correlates and analyzes security data and provides a huge portfolio of graphical reports
  • 14.
  • 15.
  • 17.
  • 18. Astaro Security Gateway Comprehensive Email, Web & Network Security extended UTM Appliances Base License Network Security Firewall VPN Intrusion Prevention optional optional Subscription Mail Security Anti Spam & Phishing Dual Virus Protection Email Encryption Subscription Web Security URL Filter Antivirus & Antispyware IM & P2P Control
  • 19. Astaro Security Gateway Deployment scenarios Internet Internal Users and Resources Mail Server DMZ
  • 20. Astaro Security Gateway Easily Managed 10-Minute-Setup
  • 21. Astaro Security Gateway Products Hardware Appliances *Pricing based #IPs/Users ASG 110/120 ASG 220 ASG 320 ASG 425 ASG 525 ASG 625 Environment Small networks Medium networks Medium networks Large networks Large networks Large networks 10/100 Mbps Network Ports 4 8 4 - - - Gigabit Network Ports - - 4 6 & 2 SFP 10 & 4 SFP 10 & 8 SFP Max. recommended FW Users 10/50 150 350 1000 2500 4000 Max. recommended UTM Users 10/25 70 200 600 1300 2000 Software Appliance* Runs on Intel-compatible PCs and servers Virtual Appliance * Runs in any VMware environment
  • 22.
  • 23.
  • 24.
  • 25. Astaro Web Gateway Comprehensive Web Security functionality
  • 26. Astaro Web Gateway Deployment scenarios Internet AWG Internal users and resources Firewall and IPS Inspect all traffic Inspect HTTP traffic only HTTP
  • 27. Astaro Web Gateway Easily Managed
  • 28. Astaro Web Gateway Web Security Reporting
  • 29. Astaro Web Gateway Products Hardware Appliances *Pricing based #IPs/Users AWG 1000 AWG 2000 AWG 3000 AWG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 1 – 100 50 - 250 150 - 750 500 – 2000 Web Throughput 50 Mbit/s 80 Mbit/s 150 Mbit/s 250 Mbit/s Virtual Appliance* Runs in any VMware environment Software Appliance* Runs on Intel-compatible PCs and servers
  • 30.
  • 31.
  • 32. Astaro Mail Gateway Comprehensive Mail Security functionality Antispam Antivirus Encryption Email Remote Exchange Access
  • 33. Astaro Mail Gateway Deployment scenarios Internet Internal users and resources Firewall and IPS Inspect Email traffic only SMTP POP3 SMTP servers AMG SMTP POP3 Inspect all traffic
  • 34. Astaro Mail Gateway Easily Managed: The browser-based GUI 10-Minute-Setup
  • 35.
  • 36. Astaro Mail Gateway Products Hardware Appliances *Pricing based #IPs/Users AMG 1000 AMG 2000 AMG 3000 AMG 4000 Environment Small to Medium business Medium business Medium business Medium business, enterprise division Gigabit Network Ports 2 2 4 4 Recommended Users 50-300 200-800 700-3000 2000-5000 Email Throughput (scaned Emails/h) 50,000 100,000 150,000 200,000 Virtual Appliance Runs in any VMware environment Software Appliance* Runs on Intel-compatible PCs and servers
  • 37.
  • 38.
  • 42.
  • 43. Astaro Command Center Feature Overview
  • 44.
  • 45.
  • 46. Astaro Command Center Products Hardware Appliances Virtual Appliance Runs in any VMware environment Software Appliance Runs on Intel-compatible PCs and servers ACC 1000 ACC 2000 ACC 3000 ACC 4000 Max. managed Gateways 20 50 100 200 Administrators 1 2 3 4 Clients 4 10 20 40
  • 47.
  • 48.
  • 49. Astaro Report Manager Feature Overview
  • 50.
  • 51.
  • 52. Astaro Report Manager Products Software Application Runs on Intel-compatible PCs and servers Requires Windows Platform: - Windows 2000/XP/2003 - MS IE 6.0 or compatible with JAVA runtime - MS IIS or integrated Apache
  • 53.
  • 54. Astaro All-in-One Internet Security For more information: [email_address] Astaro Software & Virtual Appliances Free Download www.astaro.com/download Mobile: 01225555288

Notas del editor

  1. © Astaro 2008 Astaro Overview – Page