Symantec Network Security 7100 Series

Size: px
Start display at page:

Download "Symantec Network Security 7100 Series"

Transcription

1 Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network topology and can be tuned to the Ethernet network the appliance is protecting. *Available only with Symantec Network Security 7160 and 7161 models The need for defense in depth Security personnel are tasked with ensuring the availability of critical data in an organization. Organizations may have skilled professionals on staff, but these employees are often overwhelmed by the daily tasks of incident analysis, incident response, applying or testing patches, and attempting to prevent the next intrusion. At the same time, they are also facing increasing threats and regulatory pressure to establish solid security practices and controls. Organizations need to not only maintain and leverage existing investments, but must also proactively employ constant monitoring, intelligence, and analysis. The Symantec Network Security 7100 Series provides a network security solution with simplified deployment, centralized management, and comprehensive support. Proactive intrusion prevention Symantec Network Security 7100 Series appliances provide real-time, proactive network intrusion prevention to protect enterprise networks and mitigate business disruption caused by known and unknown (or zero-day) attacks and worms. One-Click to Prevention - Transitions from a detection device to a prevention tool with a single mouse click. The Inline deployment option - Ensures threats are accurately blocked or alerted on based upon the organization s security policies and business needs. An inline fail-open network redundancy option guarantees uninterrupted network operation. High-availability/fail-over (passive mode) Enables uninterrupted network monitoring through high-availability deployments, in which a backup Symantec Network Security appliance protects in the case of a primary appliance outage. Support for asymmetric routing environments - Interface Grouping enables detection of attacks for networks with asymmetric routing. Ease of appliance maintenance - Allows a choice of configuration options depending upon organization need and deployment scenario. The Compact Flash reader/writer allows for flexible and easy configuration, and restore/backup of the configuration. Key Points Augments existing gateway and server security deployments to stop threats from propagating throughout networks Combines multiple detection technologies, including protocol anomaly detection and vulnerability attack Page 1 of 7

2 interception, in the IMUNE architecture to accurately identify and block both known and unknown attacks and worms Helps organizations establish, measure, and report on organizational best practice and compliance initiatives Integrated expertise from Symantec Security Response and Services provides early knowledge of threats to enable proactive security Requires no network reconfiguration for ease of deployment Appliances can support up to eight interfaces*, allowing organizations to monitor more network segments Three models support aggregate network bandwidth from 50Mbps to 2Gbps to meet deployment needs at branch offices, distribution sites, and the network core AutoProtect automatically by updating protection policies using LiveUpdate technology to help organizations stay ahead of continuously evolving threats One-Click to Prevention transitions the appliance from a detection device to a prevention tool with a single mouse click Network threat mitigation architecture The Symantec Network Security 7100 Series appliance employs an innovative Intrusion Mitigation Unified Network Engine (IMUNE). IMUNE system - Includes a range of detection technologies to detect both known and unknown threats, including worms, scans, probes, DoS attacks, backdoors, buffer overflow attacks, and fragmentation attacks. Protocol anomaly detection - detects attacks without knowledge of a known or disclosed vulnerability. Vulnerability attack interception - protection for known and unknown (or zero-day) worms and exploits against announced vulnerabilities. Traffic flow detection (Flow rules) - network behavioral and use policy violation detection used to determine violations of corporate network use policy. Instant messaging and peer-2-peer traffic - detects the presence of Instant Messaging and P2P traffic. IPV6 tunneled traffic identification - detects Ipv6 traffic that is being tunneled through networks, indicating possible policy violations or intrusions. Enhanced signature language detects attacks and threats more accurately and efficiently. Flexible enterprise deployment The 7100 Series offers three models for flexible intrusion prevention deployment options to best suit organizations deployment needs, whether network security is required at branch offices, distributed sites, or on the network. Highly scalable - Supports aggregate network bandwidth from 50Mbps to 2Gbps across as many as eight network segments. Interface choices - Organizations have a choice of copper or fiber interfaces for core network deployments. Deployment options Include support for multiple inline pairs or monitoring both passive and inline segments on the same appliance. Page 2 of 7

3 Extend intrusion prevention To reach the perimeter gateway by sending gating policies to Symantec Enterprise Firewall and the Symantec Gateway Security 5400 Appliance. Intelligent security content and updates Integrated expertise from Symantec Security Response and Symantec DeepSight Early Warning services and easy-to-understand security guidelines enable even faster response to security incidents. LiveUpdate of security content - LiveUpdate automatically updates protection policies to help organizations stay ahead of continuously evolving threats. Security updates from Symantec Security Response - As the threat landscape changes, organizations can be assured they are protected by the 24x7x365 coverage of Symantec Security Response. Comprehensive management Comprehensive management helps organizations establish, measure, and report on organizational best practices. Powerful and granular policy management - Allows security personnel to tailor protection based on their security policies and business need and set common or individualized detection and prevention policies per appliance. Control logging, blocking and auto-response behavior - To either ignore, alert and auto-respond to a network security event in passive monitoring mode, or block a network security event in inline prevention mode. Out-of-the-box protection - Policies based on threat category, severity, intent, reliability and profile of protected resources can be tuned to suit the profile of the network or pre-defined policies that coordinate with the organization s network security profile. Auto-update security policies during a new threat outbreak - Automatically blocks new and emerging threats without human intervention. Symantec Network Security Management Console - Provides centralized management via secure communications between the appliance and the management console which scales to support large, distributed enterprise deployments. Granular role-based access - Scalable administration to define administrative users and grant them varying levels of access. Enterprise reporting - Allows multi-level reports from executive summaries to detailed event drill-down, enabling security personnel to measure and report the overall effectiveness of their network infrastructure security. Real-time threat analysis The Symantec Network Security 7100 Series appliance gathers threat intelligence from multiple sensors across the enterprise to quickly and automatically spot trends and identify related events as they occur. Customizable event correlation views - Helps administrators work more efficiently by dramatically reducing the effort required by security personnel to Page 3 of 7

4 identify threats, giving them time for more sophisticated intrusion investigation and remediation. Packet and Session capture and playback feature - To analyze correlated events in-depth. Multi-product intrusion management The Symantec Network Security Smart Agents provide enterprise-wide, multi-source intrusion management by collecting, aggregating and responding to events from multiple Symantec and third-party host and network security products. Rapid identification of threats from multiple event sources across the enterprise allows organizations to mitigate potential damage to mission-critical assets. System requirements Symantec Network Security 7100 Series Symantec Network Security 7100 Series appliances are integrated, self-contained security devices, and as such do not have software and hardware system requirements. Symantec Network Security Management Console 4.0 Processor Intel Pentium or compatible 1.6GHz or higher Operating System Microsoft Windows 2000 or XP, Red Hat Enterprise Linux 3.0 ES Memory Minimum 256 MB (512 MB recommended) Disk Space 50 MB for installation, 100 MB post installation Screen Resolution 1024 x 768 or higher Java Sun Java 2 Runtime Environment (J2RE) version Page 4 of 7

5 COMPARISON MODEL OF THE APPLIANCES Specifications Performance Aggregate IDS throughput Up to 200 Mbps Up to 2 Gbps Up to 2 Gbps Aggregate Inline throughput Up to 100 Mbps Up to 1 Gbps Up to 1 Gbps Maximum concurrent sessions 100,000 1,000,000 1,000,000 Connections per second 1,500 12,500 12,500 Scalability Network interfaces 4 10/100 Copper 8 10/100/1000 Copper 4 10/100/1000 Copper Base-SX Fiber Inline segments Management interface 1 10/100 Copper 1 10/100/1000 Copper 1 10/100/1000 Copper TCP reset interfaces 1 10/100 Copper 3 10/100/1000 Copper 3 10/100/1000 Copper (for passive monitoring only) Interface grouping Yes Yes Yes (for passive monitoring only) (up to 4 interfaces) (up to 4 interfaces) (up to 4 interfaces) High Availability Power supply Single Dual-redundant Dual-redundant Device failure detection Yes Yes Yes Link loss detection Yes Yes Yes Disk drive Fixed Removable Removable Passive mode failover Yes Yes Yes Inline bypass (fail-open) Yes 1 Yes 1 2 MANAGEMENT Compact flash configuration Yes Yes Yes Centralized management (console) Yes Yes Yes Live Update enabled Yes Yes Yes One click to prevention Yes Yes Yes PHYSICAL AND OPERATIONAL Form factor 1u rack-mountable 2u rack-mountable 2u rack-mountable (fits 19-inch rack) (fits 19-inch rack) (fits 19-inch rack) Height 5.08 cm (2 in) 8.89 cm (3.5 in) 8.89 cm (3.5 in) Width cm (17 in) cm (17 in) cm (17 in) Depth cm (17 in) 61 cm (24.0 in) 61 cm (24.0 in) Weight 8.62 kg (19 lb) kg (36 lb) kg (36 lb) Power Volts, 50/60Hz Volts, 50/60Hz Volts, 50/60Hz 430 W Max, 190 W Draw 800 W Max, 240 W Draw 800 W Max, 240 W Draw Operating environment 5º C to 35º C (41º F to 95º F) 5º C to 40º C (41º F to 104º F) 5º C to 40º C (41º F to 104º F) 5% to 95% relative 5% to 95% relative 5% to 95% relative humidity, non-condensing humidity, non-condensing humidity, non-condensing Non-operating environment -10ºC to 70ºC (14ºF to 158ºF) -20ºC to 60ºC (-4ºF to 140ºF) -20ºC to 60ºC (-4ºF to 140ºF) 5% to 95% relative 5% to 95% relative 5% to 95% relative humidity, non-condensing humidity, non-condensing humidity, non-condensing Page 5 of 7

6 Specifications Operating altitude Up to 3000M (10,000 ft) Up to 3000M (10,000 ft) Up to 3000M (10,000 ft) Safety UL and CSA - UL UL and CSA - UL UL and CSA - UL VCCI, CE / FCC part 15B, Class A VCCI, CE / FCC part 15B, Class A VCCI, CE / FCC part 15B, Class A EN60950 (2000) EN60950 (2000) EN60950 (2000) EN (1994+A11) EN (1994+A11) EN (1994+A11) Emissions EMC Directive 89/336/EEC EMC Directive 89/336/EEC EMC Directive 89/336/EEC Low Voltage Directive Low Voltage Directive Low Voltage Directive 73/23/EEC, both as 73/23/EEC, both as 73/23/EEC, both as amended by 93/68/EEC amended by 93/68/EEC amended by 93/68/EEC 1 Separate external bypass unit available 2 External Fiber bypass unit available in calendar year 2005 Page 6 of 7

7 More information Visit our Web site To speak with a Product Specialist in the US Call toll-free To speak with a Product Specialist outside the US Symantec has operations in 35 countries. For specific country offices and contact numbers, visit our Web site. About Symantec Symantec is the global leader in information security providing a broad range of software, appliances and services designed to help individuals, small and mid-sized businesses, and large enterprises secure and manage their IT infrastructure. Symantec s Norton brand of products is the worldwide leader in consumer security and problemsolving solutions. Headquartered in Cupertino, Calif., Symantec has operations in more than 35 countries. More information is available at Symantec World Headquarters Stevens Creek Blvd. Cupertino, CA USA Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Other brands and products are trademarks of their respective holder/s. Copyright 2005 Symantec Corporation. All rights reserved. Printed in the U.S.A. All product information is subject to change without notice. 01/ Page 7 of 7

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

IPS-1 Robust and accurate intrusion prevention

IPS-1 Robust and accurate intrusion prevention Security Check Point security solutions are the marketleading choice for securing the infrastructure. IPS-1 Robust and accurate intrusion prevention Today s s operate in an environment that is ever changing,

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Cisco ASA 5500 Series IPS Solution

Cisco ASA 5500 Series IPS Solution Cisco ASA 5500 Series IPS Product Overview As mobile devices and Web 2.0 applications proliferate, it becomes harder to secure corporate perimeters. Traditional firewall and intrusion prevention system

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200

NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200 NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200 Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Intrusion Detection & Prevention Date Approved for Submission:

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

Delivers fast, accurate data about security threats:

Delivers fast, accurate data about security threats: DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate

More information

QuickSpecs. Models HP TippingPoint S8010F Next Generation Firewall Appliance

QuickSpecs. Models HP TippingPoint S8010F Next Generation Firewall Appliance Overview Models HP TippingPoint S1050F Next Generation Firewall Appliance HP TippingPoint S3010F Next Generation Firewall Appliance HP TippingPoint S3020F Next Generation Firewall Appliance HP TippingPoint

More information

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module Enhanced

More information

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

N-Dimension n-platform 340S Unified Threat Management System

N-Dimension n-platform 340S Unified Threat Management System N-Dimension n-platform 340S Unified Threat Management System Firewall Router Site-to-Site VPN Remote-Access VPN Serial SCADA VPN Proxy Anti-virus SCADA IDS Port Scanner Vulnerability Scanner System & Service

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated

More information

Cisco Stealthwatch Endpoint License

Cisco Stealthwatch Endpoint License Data Sheet Cisco Stealthwatch Endpoint License With the Cisco Stealthwatch Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. In our

More information

McAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution

McAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution Data Sheet McAfee Network Protection Solutions McAfee IntruShield Network IPS Sensor Network Intrusion Prevention Solution The Challenge The risks to enterprise and service provider security continue to

More information

Veritas Volume Replicator Option by Symantec

Veritas Volume Replicator Option by Symantec Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable

More information

Cisco 3300 Series Mobility Services Engine. Open, Appliance-Based Platform for Delivering Mobility Services

Cisco 3300 Series Mobility Services Engine. Open, Appliance-Based Platform for Delivering Mobility Services Data Sheet Cisco 3300 Series Mobility Services Engine: An Open, Appliance-Based Platform for Delivering Mobility Services Product Overview The Cisco 3300 Series Mobility Services Engine (Figure 1) is an

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated

More information

Deployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,

Deployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy, SECURITY APPLIANCES True Security Appliances reduce the complexity and increase the reliability of network security, while enhancing control, efficiency, and overall functionality for enterprises of all

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Global Services Confidence in a connected world. The demands on your IT environment continue to reach new levels.

More information

The Cisco ASA 5500 Series Adaptive Security Appliances

The Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500 Series Adaptive Security Appliances deliver a robust suite of highly integrated, marketleading security services for small and medium-sized

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

Cisco NAC Network Module for Integrated Services Routers

Cisco NAC Network Module for Integrated Services Routers Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco

More information

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

2804 Hybrid Packet Broker

2804 Hybrid Packet Broker 2804 Hybrid Packet Broker Multi-functional Bypass Packet Broker The Niagara 2804 hybrid packet broker uniquely combines multipurpose bypass functionality with a fully featured network packet broker. The

More information

Check Point DDoS Protector Introduction

Check Point DDoS Protector Introduction Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods

More information

The SonicWALL PRO Series

The SonicWALL PRO Series The SonicWALL PRO Series NETWORK SECURITY Dynamic Multi-function Network Security Appliances Powerful re-assembly free deep packet inspection engine Real-time gateway anti-virus, anti-spyware, anti-spam

More information

IBM Proventia Network Enterprise Scanner

IBM Proventia Network Enterprise Scanner Protecting corporate data with preemptive risk identification IBM Proventia Network Enterprise Scanner Identifying risk and prioritizing protection IBM Proventia Network Enterprise Scanner * (Enterprise

More information

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution

More information

Cisco 3300 Series Mobility Services Engine

Cisco 3300 Series Mobility Services Engine Cisco 3300 Series Mobility Services Engine An appliance-based platform that enables industry mobility solutions using a centralized, services engine with an open API for scalable mobility applications

More information

Cisco Intrusion Prevention Solutions

Cisco Intrusion Prevention Solutions Cisco Intrusion Prevention Solutions Proactive Integrated, Collaborative, and Adaptive Network Protection Cisco Intrusion Prevention System (IPS) solutions accurately identify, classify, and stop malicious

More information

INSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security

INSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security Symantec Enterprise Security WHITE PAPER Overview of Intelligent Message Filter Integration by David Scott Sr. Product Manager Symantec Mail Security Symantec Corporation INSIDE Overview of the IMF Increasing

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

VirtualWisdom SAN Performance Probe Family Models: ProbeFC8-HD, ProbeFC8-HD48, and ProbeFC16-24

VirtualWisdom SAN Performance Probe Family Models: ProbeFC8-HD, ProbeFC8-HD48, and ProbeFC16-24 DATASHEET VirtualWisdom SAN Performance Probe Family Models: ProbeFC8-HD, ProbeFC8-HD48, and ProbeFC16-24 Industry s only Fibre Channel monitoring probes enable comprehensive Infrastructure Performance

More information

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Cisco ASA 5500 Series Adaptive Security Appliances

Cisco ASA 5500 Series Adaptive Security Appliances Data Sheet Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500 Series Adaptive Security Appliances deliver a robust suite of highly integrated, market-leading security services for small

More information

Veritas Provisioning Manager

Veritas Provisioning Manager Veritas Provisioning Manager Automated server provisioning, part of the Veritas Server Foundation suite, automates server provisioning and management from physical bare metal discovery and OS installation

More information

Campus Manager. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet

Campus Manager. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet DataSheet Comprehensive NAC Solution Identity Management Endpoint Compliance Usage Policy Enforcement Historical Auditing and Reporting Out-of-Band Network Access Control for Wired, Wireless and VPN Networks

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

HP S1500 SSL Appliance. Product overview. Key features. Data sheet

HP S1500 SSL Appliance. Product overview. Key features. Data sheet HP S1500 SSL Appliance Data sheet Product overview The HP S1500 SSL Appliance provides hardware-accelerated Secure Sockets Layer (SSL) offloading and bridging to enable high-performance intrusion prevention

More information

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Cisco 3900 Series Router Datasheet

Cisco 3900 Series Router Datasheet Cisco 3900 Series Router Datasheet CONTENT Overview... 2 Appearance... 2 Key Features and Benefits... 3 Modularity Features and Benefits... 5 Product Specifications... 7 Basic Ordering Information... 12

More information

Data Sheet: Storage Management Veritas Storage Foundation by Symantec Heterogeneous online storage management

Data Sheet: Storage Management Veritas Storage Foundation by Symantec Heterogeneous online storage management Heterogeneous online storage management Overview Veritas Storage Foundation provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager

More information

Acme Packet Net-Net 3820

Acme Packet Net-Net 3820 Acme Packet Overview Acme Packet s is our mid-range platform for enterprises and service providers. The 1RU features Acme Packet s custom hardware design tightly integrated with Net-Net OS to provide the

More information

Product Brief Nortel Switched Firewall 6000 Series

Product Brief Nortel Switched Firewall 6000 Series Product Brief Nortel Switched Firewall 6000 Series Accelerated VPN-Firewall High-performance stateful firewall appliance for perimeter deployment Dual component switch-based appliance for highcapacity,

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

VISION ONE: SECURITY WITHOUT SACRIFICE

VISION ONE: SECURITY WITHOUT SACRIFICE VISION ONE: SECURITY WITHOUT SACRIFICE DATA SHEET Amplify your security without changing a cable. Vision ONE provides IT Operations the ability to deploy resources where they are needed most and secure

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Symantec Advanced Threat Protection: Endpoint

Symantec Advanced Threat Protection: Endpoint Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their

More information

4 PWR XL: Catalyst 3524 PWR XL Stackable 10/100 Ethernet

4 PWR XL: Catalyst 3524 PWR XL Stackable 10/100 Ethernet 4 PWR XL: Catalyst 3524 PWR XL Stackable 10/100 Ethernet Table of Contents...1 Contents...1 Introduction...1 Ordering Information...1 Key Features/Benefits...2 Flexible and Scalable Switch Clustering Architecture...3

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,

More information

NAC Director. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet

NAC Director. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet DataSheet Comprehensive Solution Identity Management Endpoint Compliance Usage Policy Enforcement Historical Auditing and Reporting Out-of-Band Network Access Control for Wired, Wireless and VPN Networks

More information

CIH

CIH mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

Cisco IOS Inline Intrusion Prevention System (IPS)

Cisco IOS Inline Intrusion Prevention System (IPS) Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network

More information

Cisco ASA 5500 Series IPS Edition for the Enterprise

Cisco ASA 5500 Series IPS Edition for the Enterprise Cisco ASA 5500 Series IPS Edition for the Enterprise Attacks on critical information assets and infrastructure can seriously degrade an organization s ability to do business. The most effective risk mitigation

More information

Juniper Networks IDP 75/250/800/8200

Juniper Networks IDP 75/250/800/8200 Datasheet Juniper Networks IDP 75/250/800/8200 With the growing number and sophistication of network attacks, it s ever more important for companies to safeguard their networks. The problem is further

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

QuickSpecs. Models. Features and Benefits Connectivity. HP ProCurve Switch 1800 Series. Overview. Retired. HP ProCurve Switch G

QuickSpecs. Models. Features and Benefits Connectivity. HP ProCurve Switch 1800 Series. Overview. Retired. HP ProCurve Switch G Overview HP ProCurve Switch 1800-24G HP ProCurve Switch 1800-8G Models HP ProCurve Switch 1800-8G HP ProCurve Switch 1800-24G J9029A J9028B Key features Web-managed Layer 2 Gigabit switch 8- and 24-port

More information

SmartWall Threat Defense System - NTD1100

SmartWall Threat Defense System - NTD1100 SmartWall Threat Defense System - NTD1100 Key Benefits Robust, real-time security coverage Real-time Layer 3-7 mitigation against volumetric attacks for both IPv4 and IPv6 traffic. Industry- leading density,

More information

NSG50/100/200 Nebula Cloud Managed Security Gateway

NSG50/100/200 Nebula Cloud Managed Security Gateway NSG50/100/200 Managed The Zyxel Managed is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive suite of security features

More information

Summit Virtual Chassis Design and Installation Guide

Summit Virtual Chassis Design and Installation Guide Summit Virtual Chassis Design and Installation Guide Extreme Networks, Inc. 10460 Bandley Drive Cupertino, California 95014 (888) 257-3000 http://www.extremenetworks.com Published: June 1998 Part No: 120031-00

More information

Installing the IPS 4345 and IPS 4360

Installing the IPS 4345 and IPS 4360 CHAPTER 4 Installing the IPS 4345 and IPS 4360 Contents This chapter describes the Cisco IPS 4345 and the IPS 4360, and includes the following sections: Installation Notes and Caveats, page 4-1 Product

More information

Datasheet Fujitsu ETERNUS DX90 S2 Disk Storage System

Datasheet Fujitsu ETERNUS DX90 S2 Disk Storage System Datasheet Fujitsu ETERNUS DX90 S2 Disk Storage System The Flexible Data Safe for Dynamic Infrastructures. ETERNUS DX S2 DISK STORAGE SYSTEMS Fujitsu s second generation of ETERNUS DX disk storage systems,

More information

Comprehensive Database Security

Comprehensive Database Security Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought

More information

Unlocking the Power of the Cloud

Unlocking the Power of the Cloud TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business The

More information

NSG100 Nebula Cloud Managed Security Gateway

NSG100 Nebula Cloud Managed Security Gateway Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive

More information

ASA5525-FPWR-K9 Datasheet. Overview. Check its price: Click Here. Quick Specs

ASA5525-FPWR-K9 Datasheet. Overview. Check its price: Click Here. Quick Specs ASA5525-FPWR-K9 Datasheet Check its price: Click Here Overview Cisco ASA with FirePOWER Services brings distinctive threat-focused next-generation security services to the Cisco ASA 5500-X Series Next-

More information

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

SINGLEstream Link Aggregation Tap (SS-100)

SINGLEstream Link Aggregation Tap (SS-100) SINGLEstream Link Aggregation Tap (SS-00) Optional 3-Unit Rack Mount Datacom Systems SINGLEstream 0/00 Link Aggregation Tap provides a superior solution for 4x7 monitoring of full-duplex Ethernet links.

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

Network Security Platform Overview

Network Security Platform Overview Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

HP V1410 Switch Series Overview. Models HP V G Switch

HP V1410 Switch Series Overview. Models HP V G Switch Overview Models HP V1410-8G Switch HP V1410-16G Switch HP V1410-24G Switch J9559A J9560A J9561A Key features Unmanaged Layer 2 Gigabit Ethernet switch 8-, 16-, and 24-port models Fanless for silent operation

More information

ABSOLUTE REAL-TIME PROTECTION SERIES

ABSOLUTE REAL-TIME PROTECTION SERIES TM DATA SHEET ABSOLUTE REAL-TIME PROTECTION SERIES ADVANCED MALWARE BLOCKER WITH CYLANCE WITH ARTIFICIAL INTELLIGENCE OVERVIEW Enterprises globally are threatened by conventional as well as advanced zero-days,

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

Block, Detect and Analyze Threats with Automated, Advanced Threat Protection at the Gateway

Block, Detect and Analyze Threats with Automated, Advanced Threat Protection at the Gateway DATA SHEET S200/S400/S500 At a glance Multi-layered security for effective defense against known and unknown threats Uses a unique, multi-detection approach to quickly analyze suspicious files and URLs,

More information

Protecting productivity with Industrial Security Services

Protecting productivity with Industrial Security Services Protecting productivity with Industrial Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. usa.siemens.com/industrialsecurityservices

More information

Written by Andy Kellett, May Network Security. TECHNOLOGY AUDIT Symantec KEY FINDINGS

Written by Andy Kellett, May Network Security. TECHNOLOGY AUDIT Symantec KEY FINDINGS Written by Andy Kellett, May 2005 TA000848NWS Operations Butler Group Subscription Services Network Security TECHNOLOGY AUDIT Symantec Symantec Network Security 7100 Series Abstract The Symantec Network

More information

CA Host-Based Intrusion Prevention System r8

CA Host-Based Intrusion Prevention System r8 PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information