1 / 12

Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager

Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager. Agenda. IT Security Market Landscape Key WildPackets Differentiators What WildPackets Can Offer CALEA. The Security Landscape. Let’s take a deep breath after all that Forensics talk …

minowa
Download Presentation

Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager

  2. Agenda • IT Security Market Landscape • Key WildPackets Differentiators • What WildPackets Can Offer • CALEA WildPackets Confidential

  3. The Security Landscape • Let’s take a deep breath after all that Forensics talk … • Security is broad topic – Forensics is only a subset • The current IT security landscape: • Secure Content Management: Anti-Spam/Anti-Virus/Content Filtering • Access Control • Compliance • IDS/IPS • Firewall/VPN • WW security software revenue for 2005 = $7.4B; expected to be exceed $8.5B for 2006 • New markets are emerging • Network Behavior Analytics (NBA) • Anti-Data Leakage • Security Information Management • Fraud Identification and Management WildPackets Confidential

  4. Security Market ala WildPackets • All software needs to address security • Most security software is designed to control and/or manage, but not troubleshoot • Typical security solutions, like firewalls, IDS/IPS, etc, do little to protect threats from within • There’s no “holy grail” to security solutions – many applications are needed to cover all of the threats WildPackets Confidential

  5. Key WildPackets Security Differentiators • Troubleshoot, troubleshoot, troubleshoot • Protect your network from within • Establish and monitor adherence to network security policies • Monitor what traditional security solutions do not • Top talkers • Bandwidth hogs • Security handshake protocols down to the packet exchange • Unauthorized application, web or IM utilization WildPackets Confidential

  6. Troubleshoot, Troubleshoot, Troubleshoot • What we offer • I can’t connect!! • Typical security solutions on the market today omit troubleshooting and analysis (Duh – it’s hard!) • Back to partnerships - Ex. Wireless IDS/IPS vendors have solicited WildPackets to enhance their offerings with troubleshooting • The most comprehensive, flexible, distributable, integrated and extensible network management solution on the planet • Value - Complete solutions for customers • End Customer – fills a whole • Partnership • Great differentiation • Simple integration via our extensibility WildPackets Confidential

  7. Protect Your Network from Within • What we offer – Filters, Experts • Worms • Traffic anomalies • Malfunctioning hardware • Value • Security systems typically work at the edge • Report problems as they happen • Begin troubleshooting immediately WildPackets Confidential

  8. Network Security Policies • What we offer • Establish policies for allowed behavior • Monitor and alert based on violation • Value • One tool that includes policy definition and compliance • Eliminate the need for “endpoint” solutions WildPackets Confidential

  9. Monitoring • What we offer • Top Talkers – legitimate? • Bandwidth hogs – impacting? • Protocol usage – unusual? • Application usage – acceptable? • Value • 24x7 remote monitoring with engines • Transition from monitoring to troubleshooting on the fly • Monitor all network layers – from packets to applications WildPackets Confidential

  10. How WildPackets Fits In • We enhance other security solutions • We verify the performance of other security solutions • We need to partner! WildPackets Confidential

  11. CALEA WildPackets Confidential

  12. Thank You Questions

More Related