CIO Update: Security Platforms Will Transform the Network Security Arena
|
|
- Kristian Park
- 6 years ago
- Views:
Transcription
1 IGG J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will increase network security and reduce the cost of ownership for perimeter security, while preserving best-of-breed options. CIOs and other executives are interested in insights on how network-based applications can be made safe for mission-critical businesses. An integrated network security platform approach will increase network security and reduce the cost of ownership for perimeter security, while preserving best-of-breed options. The Rise of Network Security Platforms Best-of-breed security solutions have long been the most-effective choices for securing enterprise networks. However, that approach has resulted in the deployment of a disparate set of products for firewall, intrusion detection, antivirus blocking, vulnerability analysis and other network-centric security functions. That has led to gaps in protection and a high cost of ownership because of the need for multiple management consoles and a lack of integration. Gartner believes that the rise of network security platforms will enable best-of-breed security solutions to blur the lines between firewalls, network-based intrusion detection and vulnerability scanning, as well as other network-centric security technologies. What Are Network Security Platforms? Network security platforms are network-attached devices that can apply multiple security functions at a minimum, firewall, intrusion detection and vulnerability scanning at wire speeds. They provide environmental inputs (power, cooling and console) for the security capabilities, a common backplane for communications, and a control structure for communications between and to control across to security processing functions. Network security platforms use a variety of algorithms and techniques to inspect incoming and outgoing network traffic to determine if connections and payloads are dangerous to enterprises. The platforms decide whether to raise an alert regarding suspected malicious activity or to take specific actions such as block connections, drop packets or terminate sessions when malicious activity is detected. The platforms perform functions that are currently performed by firewall (network- and application-level), intrusion detection, vulnerability assessment, gateway antivirus and URL blocking products. Many network security platforms will include virtual private network capabilities. However, Gartner Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Gartner believes that such capabilities will not be long-term platform requirements, except for site-tosite connections. Network security platforms must run at wire speeds for most enterprises, that will be in the 100 Mbps (megabits per second) to 1 Gbps (gigabits per second) range for single connections, and much higher for multiple networks. For in the cloud security applications, with which telecom and Internet service providers provide security processing in the network, throughput of 2 Gbps or higher will be required. Those requirements will drive most network security platforms to be based on custom, application-specific, integrated circuits or network-security processors to support complex processing at high data rates. However, the platforms must support software-based updates, customization and scripting, similar to software-based systems. Hardware-based stack and protocol processing will be required to perform deep packet inspection without introducing unacceptable network latency. Software processing that runs on generic computing platforms will be sufficient where the network security platform primarily will be used for detection, not prevention; applications are simple or repetitive; or network data rates are low enough (see Figure 3). Figure 3 Network Security Management Through 2006 Firewall 1 Gbps or more In the Cloud Security Services Intrusion Detection Vulnerability Assessment Gateway Antivirus Network Security Platforms 100 Mbps or less Enterprise Intrusion Prevention Intrusion Prevention Appliances Source: Gartner Research Types of Network Security Platforms The four primary types of network security platforms are: Closed integrated platforms. The network security platform vendor implements all security functions in a proprietary environment and can integrate processing across functions, which enables security functions to make processing decisions based on the results of other processing functions. Vendors in this category include Tipping Point, NetScreen, BlueCoat Systems and Array Networks.
3 Closed separate platforms. The vendor implements all security functions in a proprietary environment without supporting integration across functions. Vendors include Symantec, with its initial Gateway Security product, and Cisco Systems, with its blade approach. Open integrated platforms. The vendor licenses security functions from other vendors (or supports open source) or partners with multiple security vendors that port their applications to the network security platform. Vendors include Nortel Networks/Alteon, CloudShield and Ingrian Networks. Open separate platforms. The vendor licenses security functions from other vendors (or supports open source) or partners with multiple security vendors that port their applications to the platform. However, integrated processing across functions isn t supported. Vendors include Crossbeam Systems, Blade Fusion and OmniCluster. Closed integrated platforms offer more-effective security via tighter integration between functions, but they require that enterprises abandon the best-of-breed approach to individual functions. Open integrated platforms enable enterprises to stay with best-of-breed options and preserve investments in network security products, as well as reduce the need to migrate security policies to new products. Both types of separate platforms will be interim offerings until fully integrated capabilities are available. Meaningful integration across functions is a complex issue. Gartner believes that this integration will not provide reliable results until 2H04. Within these types of platforms, different performance and price points will emerge: Carrier class. Products that run at OC-24 (Optical Carrier Rate Gbps) and higher rates, and that allow network service providers to offer in the cloud security services, which eliminate the need for customer premises equipment and enable low-cost managed service offerings. Enterprise class. Platforms that can process multiple 100 Mbps networks that are used by Global 2000-class enterprises as enterprise intrusion prevention systems. Small-and-midsize-enterprise class. Products that offer limited flexibility or operate at 100 Mbps or lower rates at low price points. Types of Network Security Platform Vendors Network security product vendors will migrate to offering security platforms, while other network performance management vendors will also provide such platforms. Network-security-focused vendors (such as firewall, intrusion detection and gateway antivirus companies) will begin to offer security platforms to meet the challenges of blended and application-level attacks, and to address market demand to lower total cost of ownership. By 2006, 60 percent of firewall and intrusion detection functionality will be delivered via network security platforms (0.6 probability).
4 Content-switching and load-balancing vendors will add security functionality to their platforms, which already offer high-speed processing and deep packet inspection for making caching and loadbalancing type decisions. These vendors view security as a new revenue stream from their installed base, and as a way to avoid the threat of network security platform vendors that are adding switching and load-balancing functions to their platforms. Although content-switching and loadbalancing vendors have extensive experience in wire-speed traffic processing, they don t have deep security expertise. That will prompt network performance vendors to acquire network security technology companies that specialize in deep packet processing. Market Road Map for Network Security Platforms In 2002, firewall vendors such as Check Point Software, Symantec and NetScreen took steps toward becoming network security platform vendors: Check Point announced Smart Defense, which integrates intrusion detection capabilities onto Firewall-1. Symantec s Gateway Security product combines firewall, intrusion detection, gateway antivirus and URL blocking functions into one appliance. NetScreen s implementation of simple, signature-based filtering and its acquisition of OneSecure were strong moves in the platform direction. Gartner s Firewall Magic Quadrant for 2H02 provides an assessment of the major firewall vendors (see Figure 4). Figure 4 Firewall Magic Quadrant for 2H02
5 Challengers Leaders Microsoft Symantec Cisco Systems Check Point Software Ability to Execute Stonesoft Whale Communications CyberGuard NetScreen SonicWALL Secure Computing WatchGuard Source: Gartner Research BorderWare Niche Players Completeness of Vision As of August 2002 Visionaries However, those first-generation efforts provide minimal integration between functions, and they generally don t add vulnerability assessment capabilities. Newer market entrants such as TippingPoint provide tighter integration of the required functions, but in a closed architecture that will require enterprise testing to determine the effectiveness of the individual firewall, intrusion detection and antivirus functions, as well as integrated capabilities. Gartner believes that products that fully integrate network security functions and that operate at wire speeds will not affect the firewall and intrusion detection markets until 2H04. After 2H04, intrusion detection vendors that do not offer network security platforms will begin to exit the market through acquisition by network security platform players or loss of market share. The initial product focus between 2004 and 2006 will be at the enterprise level, with price points in the $25,000 to $75,000 range. If the telecom market recovers from the economic downturn before 2006, mainstream telecom and Internet service providers will begin to offer managed security services that will drive the development of higher-speed, lower-priced offerings and use-based pricing models. Gartner believes that aggressive telecom providers will offer some in-the-cloud services by late The low-end, small-and-midsize-enterprise-class network security platform will
6 not be a market factor until 2007, when platforms with limited functionality and processing speeds will be available at price points of less than $10,000. Managing Multiple Security Devices Most enterprises have deployed numerous firewalls, and many have also deployed one or more intrusion detection products. Network security platforms will be viable enterprise solutions by 2006, and they will transform today s disparate network security market. Until that occurs, enterprises that have deployed firewalls and intrusion detection systems can use security device management products to gain a preliminary level of integration between network security products. Those products support alarm and alert normalization, aggregation, data reduction and a degree of correlation to greatly reduce the false alarm rate and the operational burden of monitoring security devices. Although the loose integration that is provided by the products doesn t support the speed of response necessary to implement intrusion prevention, security management products enable enterprises to extend their investments in security products and provide a management structure for incorporating advanced security products. Security management price points will have to drop below the six figures of the current offerings to reach the broad market. Outsourcing the monitoring and management of perimeter network security devices is another option for enterprises that are looking to avoid investing in early-stage technology or limited security staffing levels. Bottom Line Tighter integration and common management across network security controls is a panacea of Internet security. Network security platforms maintain best-of-breed security approaches while supporting improved attack blocking and lowering total cost of ownership. Written by Edward Younker, Research Products Analytical sources: John Pescatore, Matt Easley and Richard Stiennon, Gartner Research For related Inside Gartner articles, see: CIO Update: Answer Six Key Questions, Improve Internet Security, 6 November 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02, 25 September 2002 Management Update: Network Security Predictions for 2002, 13 February 2002
CIO Update: Enterprise Firewall Magic Quadrant for 1H03
IGG-07022003-02 R. Stiennon Article 2 July 2003 CIO Update: Enterprise Firewall Magic Quadrant for 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationCIO Update: Gartner s Storage Services Magic Quadrant
IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationMarket Scope. Magic Quadrant Methodology
Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationFinding Pure-Play Midtier ESPs: A Two-Step Process
Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors
More informationWorldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More informationFirewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary
Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationOptimize Your Broadband WAN
Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance,
More informationManagement Update: Information Security Risk Best Practices
IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine
More informationUnified Communications Magic Quadrant 1H03
Markets, B. Elliot Research Note 3 February 2003 Unified Communications Magic Quadrant 1H03 Unified communications is emerging as an enabler for business process improvement. Vendor offerings remain fragmented,
More informationKW Predicts: Who Will Own the Web-Conferencing Market?
Strategic Planning, J. Lundy, L. Latham, R. Knox Research Note 21 November 2003 KW Predicts: Who Will Own the Web-Conferencing Market? In the knowledge workplace, voice over IP will revolutionize Web conferencing
More informationDatabase Design Tool Magic Quadrant 2H02
Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database
More informationManagement Update: Wireless LAN Predictions for 2004
IGG-11192003-03 K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will
More informationIT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the
More informationTCPN-WW-CV-0102 Frank Fabricius
Frank Fabricius Cluster Research Catalog 30 December 2003 Public Network Infrastructure Worldwide Cluster Research Archive The Cluster Research Archive is a listing of deliverables for the Public Network
More informationIT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary
IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the
More informationSelect Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay
Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationFour Partial Solutions for Remote Network Access
Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationManagement Update: Gartner s New Magic Quadrant for U.S. Network Service Providers
IGG-03262003-03 J. Pultz Article 26 March 2003 Management Update: Gartner s New Magic Quadrant for U.S. Network Service Providers Most enterprises are concerned about which network service providers (NSPs)
More informationDPRO Kimberly K. Hiller, Gerald Arcuri
Kimberly K. Hiller, Gerald Arcuri Technology Overview 27 August 2003 Routers: Overview Summary Routers continue to evolve with better performance and a larger variety of WAN and LAN options, and security.
More informationCOM F. Troni, L. Fiering
F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work
More informationFICON Drives Fibre Channel Security
FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre
More informationAntivirus Market Trends
Markets, A. Hallawell Research Note 23 July 2003 Magic Quadrant for Enterprise Antivirus, 1H03 Enterprise antivirus vendors are being pressured to innovate, yet enterprises are still waiting for improvements.
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More information2017 Trends in Datacenter and Critical Infrastructure
PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter
More informationOpenService NerveCenter Event Correlation Network Management
John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its
More informationMagic Quadrant Selection Criteria
Markets, G. Johnson Research Note 30 May 2003 Magic Quadrant for Australian xdsl Providers, 2003 The Australian generic digital subscriber line market is rapidly consolidating. Network service providers
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationSurvey/Overview: Australian IT Service Provider Market
Markets, J. Longwood, M. Chon, R. Jester Research Note 15 April 2003 Survey/Overview: Australian IT Service Provider Market Market scans are used in sourcing strategy development and fast-track processes
More informationNEXT-GENERATION DATACENTER MANAGEMENT
NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators
More informationEurope Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary
Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationCan you wait until 2010?
Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their
More informationWhat to Look for When Evaluating Next-Generation Firewalls
What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationSecurity 2.0: Balancing Business Enablement and Information Security
Security 2.0: Balancing Business Enablement and Information Security 10 New Requirements for Your Business Brian Wrozek IT Security Director Texas Instruments Why Your Current Firewall is Obsolete More
More informationSecurity Made Simple by Sophos
Security Made Simple by Sophos Indian businesses in the radar of cyber-threats Frequency of cyber-attacks Most targeted systems / IT assets -- KPMG Cybercrime Survey Report 2015 3 ON AN AVERAGE, HOW MUCH
More informationMagic Quadrant for SAN Fibre Channel Switches, 1H03
Markets, N. Allen, R. Passmore Research Note 1 May 2003 Magic Quadrant for SAN Fibre Channel Switches, 1H03 In the latest Storage Area Network Fibre Channel Switch Magic Quadrant, Brocade and McDATA still
More informationAchieve deeper network security
Achieve deeper network security SonicWall next-generation firewalls Abstract Next-generation firewalls (NGFWs) have become the new norm in network security for organizations of all sizes. Unlike their
More informationSecurity Gap Analysis: Aggregrated Results
Email Security Gap Analysis: Aggregrated Results Average rates at which enterprise email security systems miss spam, phishing and malware attachments November 2017 www.cyren.com 1 Email Security Gap Analysis:
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum Trend Micro XGen security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly
More informationWatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.
WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution. Total Security. A stateful packet firewall, while essential, simply isn t enough anymore. The reality is that
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationHardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012
Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What
More informationDISRUPTIVE TECHNOLOGIES IN THE DATACENTER
DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and
More informationUNIFIED NETWORK-DEFENSE APPLIANCES... A SOLUTIONS PRIMER
UNIFIED NETWORK-DEFENSE APPLIANCES... A SOLUTIONS PRIMER Security is more than just a buzzword. It is a state of being. Networks, the lifeblood of most corporations, demand security. Yet, the medieval
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationNGN: Enterprise IP Telephony
NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations
More informationHow Cisco IT Deployed Cisco Firewall Services Modules at Scientific Atlanta
How Cisco IT Deployed Cisco Firewall Services Modules at Scientific Atlanta Deployment increases network security, reliability, and availability. Cisco IT Case Study / Security / Firewall Services Module:
More informationEncryption Vision & Strategy
Encryption Vision & Strategy Brad Zehring Principal Product Manager Encryption Vision & Strategy 1 Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationEnding the Confusion About Software- Defined Networking: A Taxonomy
Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server
More informationNetwork Security Protection Alternatives for the Cloud
A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances
More informationActivating Intrusion Prevention Service
Activating Intrusion Prevention Service Intrusion Prevention Service Overview Configuring Intrusion Prevention Service Intrusion Prevention Service Overview Intrusion Prevention Service (IPS) delivers
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationHuawei: China's Leading Equipment Vendor Returns to Growth
Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSemiconductor Market for Data Processing: Asia/Pacific, 3Q03
Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.
More informationThe Future of Threat Prevention
The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationProtecting Your Digital World
Protecting Your Digital World C O R P O R A T E O V E R V I E W With revenues of more than $105 Billion, cybercrime generates more revenue than the illegal drug trade. Source: U.S. Treasury, reported by
More informationIP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary
IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationPerformance/Throughput
Markets, S. Zaffos Research Note 31 March 2003 ATA Disks Redefine RAID Price/Performance Cost-optimized storage infrastructures should include redundant arrays of independent disks built with low-cost
More informationCentral and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary
Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the
More informationGrowth Leadership, Unified Threat Management (UTM) Global, 2010
Growth Leadership, Unified Threat Management (UTM) Global, 2010 Frost & Sullivan s Global Research Platform Frost & Sullivan is entering its 49 th year in business with a global research organization of
More informationProtecting Your Digital Business: The Case for Next-Generation Intrusion Prevention
White Paper Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention What You Will Learn Many companies that adopt a next-generation firewall (NGFW) believe that they can t benefit
More informationISV Support Is Key When Choosing a Server Operating System
Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server
More information4Q02 Update: Disk Storage Forecast Scenarios,
Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationINSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution
More informationThe Top 6 WAF Essentials to Achieve Application Security Efficacy
The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationn Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network
Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology
More information