Symantec Network Security 7100 Series
|
|
- Roland Mosley
- 5 years ago
- Views:
Transcription
1 Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network topology and can be tuned to the Ethernet network the appliance is protecting. *Available only with Symantec Network Security 7160 and 7161 models The need for defense in depth Security personnel are tasked with ensuring the availability of critical data in an organization. Organizations may have skilled professionals on staff, but these employees are often overwhelmed by the daily tasks of incident analysis, incident response, applying or testing patches, and attempting to prevent the next intrusion. At the same time, they are also facing increasing threats and regulatory pressure to establish solid security practices and controls. Organizations need to not only maintain and leverage existing investments, but must also proactively employ constant monitoring, intelligence, and analysis. The Symantec Network Security 7100 Series provides a network security solution with simplified deployment, centralized management, and comprehensive support. Proactive intrusion prevention Symantec Network Security 7100 Series appliances provide real-time, proactive network intrusion prevention to protect enterprise networks and mitigate business disruption caused by known and unknown (or zero-day) attacks and worms. One-Click to Prevention - Transitions from a detection device to a prevention tool with a single mouse click. The Inline deployment option - Ensures threats are accurately blocked or alerted on based upon the organization s security policies and business needs. An inline fail-open network redundancy option guarantees uninterrupted network operation. High-availability/fail-over (passive mode) Enables uninterrupted network monitoring through high-availability deployments, in which a backup Symantec Network Security appliance protects in the case of a primary appliance outage. Support for asymmetric routing environments - Interface Grouping enables detection of attacks for networks with asymmetric routing. Ease of appliance maintenance - Allows a choice of configuration options depending upon organization need and deployment scenario. The Compact Flash reader/writer allows for flexible and easy configuration, and restore/backup of the configuration. Key Points Augments existing gateway and server security deployments to stop threats from propagating throughout networks Combines multiple detection technologies, including protocol anomaly detection and vulnerability attack Page 1 of 7
2 interception, in the IMUNE architecture to accurately identify and block both known and unknown attacks and worms Helps organizations establish, measure, and report on organizational best practice and compliance initiatives Integrated expertise from Symantec Security Response and Services provides early knowledge of threats to enable proactive security Requires no network reconfiguration for ease of deployment Appliances can support up to eight interfaces*, allowing organizations to monitor more network segments Three models support aggregate network bandwidth from 50Mbps to 2Gbps to meet deployment needs at branch offices, distribution sites, and the network core AutoProtect automatically by updating protection policies using LiveUpdate technology to help organizations stay ahead of continuously evolving threats One-Click to Prevention transitions the appliance from a detection device to a prevention tool with a single mouse click Network threat mitigation architecture The Symantec Network Security 7100 Series appliance employs an innovative Intrusion Mitigation Unified Network Engine (IMUNE). IMUNE system - Includes a range of detection technologies to detect both known and unknown threats, including worms, scans, probes, DoS attacks, backdoors, buffer overflow attacks, and fragmentation attacks. Protocol anomaly detection - detects attacks without knowledge of a known or disclosed vulnerability. Vulnerability attack interception - protection for known and unknown (or zero-day) worms and exploits against announced vulnerabilities. Traffic flow detection (Flow rules) - network behavioral and use policy violation detection used to determine violations of corporate network use policy. Instant messaging and peer-2-peer traffic - detects the presence of Instant Messaging and P2P traffic. IPV6 tunneled traffic identification - detects Ipv6 traffic that is being tunneled through networks, indicating possible policy violations or intrusions. Enhanced signature language detects attacks and threats more accurately and efficiently. Flexible enterprise deployment The 7100 Series offers three models for flexible intrusion prevention deployment options to best suit organizations deployment needs, whether network security is required at branch offices, distributed sites, or on the network. Highly scalable - Supports aggregate network bandwidth from 50Mbps to 2Gbps across as many as eight network segments. Interface choices - Organizations have a choice of copper or fiber interfaces for core network deployments. Deployment options Include support for multiple inline pairs or monitoring both passive and inline segments on the same appliance. Page 2 of 7
3 Extend intrusion prevention To reach the perimeter gateway by sending gating policies to Symantec Enterprise Firewall and the Symantec Gateway Security 5400 Appliance. Intelligent security content and updates Integrated expertise from Symantec Security Response and Symantec DeepSight Early Warning services and easy-to-understand security guidelines enable even faster response to security incidents. LiveUpdate of security content - LiveUpdate automatically updates protection policies to help organizations stay ahead of continuously evolving threats. Security updates from Symantec Security Response - As the threat landscape changes, organizations can be assured they are protected by the 24x7x365 coverage of Symantec Security Response. Comprehensive management Comprehensive management helps organizations establish, measure, and report on organizational best practices. Powerful and granular policy management - Allows security personnel to tailor protection based on their security policies and business need and set common or individualized detection and prevention policies per appliance. Control logging, blocking and auto-response behavior - To either ignore, alert and auto-respond to a network security event in passive monitoring mode, or block a network security event in inline prevention mode. Out-of-the-box protection - Policies based on threat category, severity, intent, reliability and profile of protected resources can be tuned to suit the profile of the network or pre-defined policies that coordinate with the organization s network security profile. Auto-update security policies during a new threat outbreak - Automatically blocks new and emerging threats without human intervention. Symantec Network Security Management Console - Provides centralized management via secure communications between the appliance and the management console which scales to support large, distributed enterprise deployments. Granular role-based access - Scalable administration to define administrative users and grant them varying levels of access. Enterprise reporting - Allows multi-level reports from executive summaries to detailed event drill-down, enabling security personnel to measure and report the overall effectiveness of their network infrastructure security. Real-time threat analysis The Symantec Network Security 7100 Series appliance gathers threat intelligence from multiple sensors across the enterprise to quickly and automatically spot trends and identify related events as they occur. Customizable event correlation views - Helps administrators work more efficiently by dramatically reducing the effort required by security personnel to Page 3 of 7
4 identify threats, giving them time for more sophisticated intrusion investigation and remediation. Packet and Session capture and playback feature - To analyze correlated events in-depth. Multi-product intrusion management The Symantec Network Security Smart Agents provide enterprise-wide, multi-source intrusion management by collecting, aggregating and responding to events from multiple Symantec and third-party host and network security products. Rapid identification of threats from multiple event sources across the enterprise allows organizations to mitigate potential damage to mission-critical assets. System requirements Symantec Network Security 7100 Series Symantec Network Security 7100 Series appliances are integrated, self-contained security devices, and as such do not have software and hardware system requirements. Symantec Network Security Management Console 4.0 Processor Intel Pentium or compatible 1.6GHz or higher Operating System Microsoft Windows 2000 or XP, Red Hat Enterprise Linux 3.0 ES Memory Minimum 256 MB (512 MB recommended) Disk Space 50 MB for installation, 100 MB post installation Screen Resolution 1024 x 768 or higher Java Sun Java 2 Runtime Environment (J2RE) version Page 4 of 7
5 COMPARISON MODEL OF THE APPLIANCES Specifications Performance Aggregate IDS throughput Up to 200 Mbps Up to 2 Gbps Up to 2 Gbps Aggregate Inline throughput Up to 100 Mbps Up to 1 Gbps Up to 1 Gbps Maximum concurrent sessions 100,000 1,000,000 1,000,000 Connections per second 1,500 12,500 12,500 Scalability Network interfaces 4 10/100 Copper 8 10/100/1000 Copper 4 10/100/1000 Copper Base-SX Fiber Inline segments Management interface 1 10/100 Copper 1 10/100/1000 Copper 1 10/100/1000 Copper TCP reset interfaces 1 10/100 Copper 3 10/100/1000 Copper 3 10/100/1000 Copper (for passive monitoring only) Interface grouping Yes Yes Yes (for passive monitoring only) (up to 4 interfaces) (up to 4 interfaces) (up to 4 interfaces) High Availability Power supply Single Dual-redundant Dual-redundant Device failure detection Yes Yes Yes Link loss detection Yes Yes Yes Disk drive Fixed Removable Removable Passive mode failover Yes Yes Yes Inline bypass (fail-open) Yes 1 Yes 1 2 MANAGEMENT Compact flash configuration Yes Yes Yes Centralized management (console) Yes Yes Yes Live Update enabled Yes Yes Yes One click to prevention Yes Yes Yes PHYSICAL AND OPERATIONAL Form factor 1u rack-mountable 2u rack-mountable 2u rack-mountable (fits 19-inch rack) (fits 19-inch rack) (fits 19-inch rack) Height 5.08 cm (2 in) 8.89 cm (3.5 in) 8.89 cm (3.5 in) Width cm (17 in) cm (17 in) cm (17 in) Depth cm (17 in) 61 cm (24.0 in) 61 cm (24.0 in) Weight 8.62 kg (19 lb) kg (36 lb) kg (36 lb) Power Volts, 50/60Hz Volts, 50/60Hz Volts, 50/60Hz 430 W Max, 190 W Draw 800 W Max, 240 W Draw 800 W Max, 240 W Draw Operating environment 5º C to 35º C (41º F to 95º F) 5º C to 40º C (41º F to 104º F) 5º C to 40º C (41º F to 104º F) 5% to 95% relative 5% to 95% relative 5% to 95% relative humidity, non-condensing humidity, non-condensing humidity, non-condensing Non-operating environment -10ºC to 70ºC (14ºF to 158ºF) -20ºC to 60ºC (-4ºF to 140ºF) -20ºC to 60ºC (-4ºF to 140ºF) 5% to 95% relative 5% to 95% relative 5% to 95% relative humidity, non-condensing humidity, non-condensing humidity, non-condensing Page 5 of 7
6 Specifications Operating altitude Up to 3000M (10,000 ft) Up to 3000M (10,000 ft) Up to 3000M (10,000 ft) Safety UL and CSA - UL UL and CSA - UL UL and CSA - UL VCCI, CE / FCC part 15B, Class A VCCI, CE / FCC part 15B, Class A VCCI, CE / FCC part 15B, Class A EN60950 (2000) EN60950 (2000) EN60950 (2000) EN (1994+A11) EN (1994+A11) EN (1994+A11) Emissions EMC Directive 89/336/EEC EMC Directive 89/336/EEC EMC Directive 89/336/EEC Low Voltage Directive Low Voltage Directive Low Voltage Directive 73/23/EEC, both as 73/23/EEC, both as 73/23/EEC, both as amended by 93/68/EEC amended by 93/68/EEC amended by 93/68/EEC 1 Separate external bypass unit available 2 External Fiber bypass unit available in calendar year 2005 Page 6 of 7
7 More information Visit our Web site To speak with a Product Specialist in the US Call toll-free To speak with a Product Specialist outside the US Symantec has operations in 35 countries. For specific country offices and contact numbers, visit our Web site. About Symantec Symantec is the global leader in information security providing a broad range of software, appliances and services designed to help individuals, small and mid-sized businesses, and large enterprises secure and manage their IT infrastructure. Symantec s Norton brand of products is the worldwide leader in consumer security and problemsolving solutions. Headquartered in Cupertino, Calif., Symantec has operations in more than 35 countries. More information is available at Symantec World Headquarters Stevens Creek Blvd. Cupertino, CA USA Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Other brands and products are trademarks of their respective holder/s. Copyright 2005 Symantec Corporation. All rights reserved. Printed in the U.S.A. All product information is subject to change without notice. 01/ Page 7 of 7
Symantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationIPS-1 Robust and accurate intrusion prevention
Security Check Point security solutions are the marketleading choice for securing the infrastructure. IPS-1 Robust and accurate intrusion prevention Today s s operate in an environment that is ever changing,
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationCisco ASA 5500 Series IPS Solution
Cisco ASA 5500 Series IPS Product Overview As mobile devices and Web 2.0 applications proliferate, it becomes harder to secure corporate perimeters. Traditional firewall and intrusion prevention system
More informationSymantec Business Continuity Solutions for Operational Risk Management
Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationNCIRC Security Tools NIAPC Submission Summary Juniper IDP 200
NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200 Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Intrusion Detection & Prevention Date Approved for Submission:
More informationSYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationDelivers fast, accurate data about security threats:
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
More informationQuickSpecs. Models HP TippingPoint S8010F Next Generation Firewall Appliance
Overview Models HP TippingPoint S1050F Next Generation Firewall Appliance HP TippingPoint S3010F Next Generation Firewall Appliance HP TippingPoint S3020F Next Generation Firewall Appliance HP TippingPoint
More informationCisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM) and Network Module Enhanced
More informationSymantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure
Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationN-Dimension n-platform 340S Unified Threat Management System
N-Dimension n-platform 340S Unified Threat Management System Firewall Router Site-to-Site VPN Remote-Access VPN Serial SCADA VPN Proxy Anti-virus SCADA IDS Port Scanner Vulnerability Scanner System & Service
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.
More informationMcAfee Network Security Platform
McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated
More informationCisco Stealthwatch Endpoint License
Data Sheet Cisco Stealthwatch Endpoint License With the Cisco Stealthwatch Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. In our
More informationMcAfee IntruShield Network IPS Sensor Pioneering and Industry-Leading, Next-Generation Network Intrusion Prevention Solution
Data Sheet McAfee Network Protection Solutions McAfee IntruShield Network IPS Sensor Network Intrusion Prevention Solution The Challenge The risks to enterprise and service provider security continue to
More informationVeritas Volume Replicator Option by Symantec
Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable
More informationCisco 3300 Series Mobility Services Engine. Open, Appliance-Based Platform for Delivering Mobility Services
Data Sheet Cisco 3300 Series Mobility Services Engine: An Open, Appliance-Based Platform for Delivering Mobility Services Product Overview The Cisco 3300 Series Mobility Services Engine (Figure 1) is an
More informationMcAfee Network Security Platform
McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated
More informationDeployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,
SECURITY APPLIANCES True Security Appliances reduce the complexity and increase the reliability of network security, while enhancing control, efficiency, and overall functionality for enterprises of all
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationSymantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.
Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Global Services Confidence in a connected world. The demands on your IT environment continue to reach new levels.
More informationThe Cisco ASA 5500 Series Adaptive Security Appliances
Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500 Series Adaptive Security Appliances deliver a robust suite of highly integrated, marketleading security services for small and medium-sized
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched
More informationCisco SR 520-T1 Secure Router
Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationData Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
More informationInternet Scanner 7.0 Service Pack 2 Frequently Asked Questions
Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More information2804 Hybrid Packet Broker
2804 Hybrid Packet Broker Multi-functional Bypass Packet Broker The Niagara 2804 hybrid packet broker uniquely combines multipurpose bypass functionality with a fully featured network packet broker. The
More informationCheck Point DDoS Protector Introduction
Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods
More informationThe SonicWALL PRO Series
The SonicWALL PRO Series NETWORK SECURITY Dynamic Multi-function Network Security Appliances Powerful re-assembly free deep packet inspection engine Real-time gateway anti-virus, anti-spyware, anti-spam
More informationIBM Proventia Network Enterprise Scanner
Protecting corporate data with preemptive risk identification IBM Proventia Network Enterprise Scanner Identifying risk and prioritizing protection IBM Proventia Network Enterprise Scanner * (Enterprise
More informationINSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution
More informationCisco 3300 Series Mobility Services Engine
Cisco 3300 Series Mobility Services Engine An appliance-based platform that enables industry mobility solutions using a centralized, services engine with an open API for scalable mobility applications
More informationCisco Intrusion Prevention Solutions
Cisco Intrusion Prevention Solutions Proactive Integrated, Collaborative, and Adaptive Network Protection Cisco Intrusion Prevention System (IPS) solutions accurately identify, classify, and stop malicious
More informationINSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Overview of Intelligent Message Filter Integration by David Scott Sr. Product Manager Symantec Mail Security Symantec Corporation INSIDE Overview of the IMF Increasing
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationVirtualWisdom SAN Performance Probe Family Models: ProbeFC8-HD, ProbeFC8-HD48, and ProbeFC16-24
DATASHEET VirtualWisdom SAN Performance Probe Family Models: ProbeFC8-HD, ProbeFC8-HD48, and ProbeFC16-24 Industry s only Fibre Channel monitoring probes enable comprehensive Infrastructure Performance
More informationTALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT
DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationCisco ASA 5500 Series Adaptive Security Appliances
Data Sheet Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500 Series Adaptive Security Appliances deliver a robust suite of highly integrated, market-leading security services for small
More informationVeritas Provisioning Manager
Veritas Provisioning Manager Automated server provisioning, part of the Veritas Server Foundation suite, automates server provisioning and management from physical bare metal discovery and OS installation
More informationCampus Manager. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet
DataSheet Comprehensive NAC Solution Identity Management Endpoint Compliance Usage Policy Enforcement Historical Auditing and Reporting Out-of-Band Network Access Control for Wired, Wireless and VPN Networks
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationHP S1500 SSL Appliance. Product overview. Key features. Data sheet
HP S1500 SSL Appliance Data sheet Product overview The HP S1500 SSL Appliance provides hardware-accelerated Secure Sockets Layer (SSL) offloading and bridging to enable high-performance intrusion prevention
More informationMcAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks
McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationCisco 3900 Series Router Datasheet
Cisco 3900 Series Router Datasheet CONTENT Overview... 2 Appearance... 2 Key Features and Benefits... 3 Modularity Features and Benefits... 5 Product Specifications... 7 Basic Ordering Information... 12
More informationData Sheet: Storage Management Veritas Storage Foundation by Symantec Heterogeneous online storage management
Heterogeneous online storage management Overview Veritas Storage Foundation provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager
More informationAcme Packet Net-Net 3820
Acme Packet Overview Acme Packet s is our mid-range platform for enterprises and service providers. The 1RU features Acme Packet s custom hardware design tightly integrated with Net-Net OS to provide the
More informationProduct Brief Nortel Switched Firewall 6000 Series
Product Brief Nortel Switched Firewall 6000 Series Accelerated VPN-Firewall High-performance stateful firewall appliance for perimeter deployment Dual component switch-based appliance for highcapacity,
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationVISION ONE: SECURITY WITHOUT SACRIFICE
VISION ONE: SECURITY WITHOUT SACRIFICE DATA SHEET Amplify your security without changing a cable. Vision ONE provides IT Operations the ability to deploy resources where they are needed most and secure
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationSymantec Advanced Threat Protection: Endpoint
Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their
More information4 PWR XL: Catalyst 3524 PWR XL Stackable 10/100 Ethernet
4 PWR XL: Catalyst 3524 PWR XL Stackable 10/100 Ethernet Table of Contents...1 Contents...1 Introduction...1 Ordering Information...1 Key Features/Benefits...2 Flexible and Scalable Switch Clustering Architecture...3
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
More informationNAC Director. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet
DataSheet Comprehensive Solution Identity Management Endpoint Compliance Usage Policy Enforcement Historical Auditing and Reporting Out-of-Band Network Access Control for Wired, Wireless and VPN Networks
More informationCIH
mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer
More informationCA Security Management
CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate
More informationCisco IOS Inline Intrusion Prevention System (IPS)
Cisco IOS Inline Intrusion Prevention System (IPS) This data sheet provides an overview of the Cisco IOS Intrusion Prevention System (IPS) solution. Product Overview In today s business environment, network
More informationCisco ASA 5500 Series IPS Edition for the Enterprise
Cisco ASA 5500 Series IPS Edition for the Enterprise Attacks on critical information assets and infrastructure can seriously degrade an organization s ability to do business. The most effective risk mitigation
More informationJuniper Networks IDP 75/250/800/8200
Datasheet Juniper Networks IDP 75/250/800/8200 With the growing number and sophistication of network attacks, it s ever more important for companies to safeguard their networks. The problem is further
More informationTransforming Security from Defense in Depth to Comprehensive Security Assurance
Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new
More informationQuickSpecs. Models. Features and Benefits Connectivity. HP ProCurve Switch 1800 Series. Overview. Retired. HP ProCurve Switch G
Overview HP ProCurve Switch 1800-24G HP ProCurve Switch 1800-8G Models HP ProCurve Switch 1800-8G HP ProCurve Switch 1800-24G J9029A J9028B Key features Web-managed Layer 2 Gigabit switch 8- and 24-port
More informationSmartWall Threat Defense System - NTD1100
SmartWall Threat Defense System - NTD1100 Key Benefits Robust, real-time security coverage Real-time Layer 3-7 mitigation against volumetric attacks for both IPv4 and IPv6 traffic. Industry- leading density,
More informationNSG50/100/200 Nebula Cloud Managed Security Gateway
NSG50/100/200 Managed The Zyxel Managed is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive suite of security features
More informationSummit Virtual Chassis Design and Installation Guide
Summit Virtual Chassis Design and Installation Guide Extreme Networks, Inc. 10460 Bandley Drive Cupertino, California 95014 (888) 257-3000 http://www.extremenetworks.com Published: June 1998 Part No: 120031-00
More informationInstalling the IPS 4345 and IPS 4360
CHAPTER 4 Installing the IPS 4345 and IPS 4360 Contents This chapter describes the Cisco IPS 4345 and the IPS 4360, and includes the following sections: Installation Notes and Caveats, page 4-1 Product
More informationDatasheet Fujitsu ETERNUS DX90 S2 Disk Storage System
Datasheet Fujitsu ETERNUS DX90 S2 Disk Storage System The Flexible Data Safe for Dynamic Infrastructures. ETERNUS DX S2 DISK STORAGE SYSTEMS Fujitsu s second generation of ETERNUS DX disk storage systems,
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationUnlocking the Power of the Cloud
TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business The
More informationNSG100 Nebula Cloud Managed Security Gateway
Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive
More informationASA5525-FPWR-K9 Datasheet. Overview. Check its price: Click Here. Quick Specs
ASA5525-FPWR-K9 Datasheet Check its price: Click Here Overview Cisco ASA with FirePOWER Services brings distinctive threat-focused next-generation security services to the Cisco ASA 5500-X Series Next-
More informationCYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta
CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationSINGLEstream Link Aggregation Tap (SS-100)
SINGLEstream Link Aggregation Tap (SS-00) Optional 3-Unit Rack Mount Datacom Systems SINGLEstream 0/00 Link Aggregation Tap provides a superior solution for 4x7 monitoring of full-duplex Ethernet links.
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationNetwork Security Platform Overview
Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationHP V1410 Switch Series Overview. Models HP V G Switch
Overview Models HP V1410-8G Switch HP V1410-16G Switch HP V1410-24G Switch J9559A J9560A J9561A Key features Unmanaged Layer 2 Gigabit Ethernet switch 8-, 16-, and 24-port models Fanless for silent operation
More informationABSOLUTE REAL-TIME PROTECTION SERIES
TM DATA SHEET ABSOLUTE REAL-TIME PROTECTION SERIES ADVANCED MALWARE BLOCKER WITH CYLANCE WITH ARTIFICIAL INTELLIGENCE OVERVIEW Enterprises globally are threatened by conventional as well as advanced zero-days,
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationBlock, Detect and Analyze Threats with Automated, Advanced Threat Protection at the Gateway
DATA SHEET S200/S400/S500 At a glance Multi-layered security for effective defense against known and unknown threats Uses a unique, multi-detection approach to quickly analyze suspicious files and URLs,
More informationProtecting productivity with Industrial Security Services
Protecting productivity with Industrial Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. usa.siemens.com/industrialsecurityservices
More informationWritten by Andy Kellett, May Network Security. TECHNOLOGY AUDIT Symantec KEY FINDINGS
Written by Andy Kellett, May 2005 TA000848NWS Operations Butler Group Subscription Services Network Security TECHNOLOGY AUDIT Symantec Symantec Network Security 7100 Series Abstract The Symantec Network
More informationCA Host-Based Intrusion Prevention System r8
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION
More informationIntrusion prevention systems are an important part of protecting any organisation from constantly developing threats.
Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis
More information