220 likes | 454 Views
Network Box The Ultimate UTM+ Managed Security Service. PUSH Technology Features and Functions Management Technology/Service Product Roadmap. Introduction. Existing systems use PULL (or Polling) technology This relies on OS scheduling Web site availability End-User intervention
E N D
PUSH Technology Features and Functions Management Technology/Service Product Roadmap Introduction
Existing systems use PULL (or Polling) technology This relies on OS scheduling Web site availability End-User intervention For patch management it requires the user: To know there are patches available To know where to get them To have the rights to download them To install them To test them To implement No wonder this doesn’t get done! Pull Technology
Push Technology • Broadband makes PUSH possible • PUSH technology provides: • Massive improvement in delivery times • ‘Guaranteed’ delivery • Monitoring: if you can’t PUSH the solution the customer is in trouble • No End-User intervention for updates, patches etc
Managed Service Acceptable use policy Secure Hardware Additional Features Internet Threat Protection • Firewall • Virtual Private Network • Intrusion Detection • Anti-Spam • Anti-Virus • Content Filtering
Network Box hybrid firewall Solution combines the best from all recognised approaches to protection Packet Filtering for basic operations Stateful Packet Tracking for generic services Proxies for high-level filtered services This results in the best performance from the most flexible firewall, and gives you the highest levels of Network Security Firewall
Intrusion detection & prevention Actively blocks Malicious Activity • Threshold heuristics scan to detect actions of a hacker • Heuristics protect against DoS (denial of service) attacks • Profiles and thresholds are continuously updated • Tight IDP Integration with the Firewall • Zero latency (no packets get through)
Virtual Private Networking • IPSEC-compliant VPN providing : • Authentication: • 1024 - 4096bit signatures for authentication • Encryption: • Encryption using 3DES,AES,CAST,BLOWFISH,SSL • Validation: • Using MD5 or SHA hashes • Tight VPN integration to firewall allows : • Site-to-Site (office-to-office links) • Site-to-Remote (home-to-office links) • Site-to-Road Warrior (laptops to office links)
Anti -Virus • Applies four anti-virus techniques: • Heuristic analysis • Request for comment (RFC) violation • Anti-virus signatures • Just-in-time signatures • Scans SMTP, POP3, IMAP4, HTTP, FTP • Uses over 220,000 virus signatures • Heuristic alone blocks over 92% of viruses • Blocks Viruses, Spyware, Trojans • Three Independent Manufacturers • Kaspersky • Clam AVG • Network Box SRE
The Network Box anti-spam system utilises: Co-operative Spam Checksums Signatures list Heuristics Real-Time IP Blacklists Real-Time URL Blacklists URL to IP Mapping and Blacklists URL Categorization Domain Age (175,000+) and Spam Scoring White lists and Black Bayesian Filtering Challenge/Response Systems Digital Signatures Optical Character Recognition Envelope Pre-scanning Anti-Spam
Content Filtering Allows Companies to enforce a Secure Acceptable Use Policy • Web content filtering using award winning software • Restrictions set by Protocol / Service / Direction / Time etc. • Source-based rules • Attachment limitations by type and content • Tight integration with firewall and IDP systems • Off the shelf policies to suit industry and private sectors
Other features Quality of Service Load Balancing High Availability Spam Summary And More… Profanity Checker Internet Acceleration P2P Management
Monitoring and updates • All boxes are monitored. • All boxes are updated 24/7 • Patches and upgrades can be remotely implemented
Each Network box is managed by the enterprise control software in real time Over 100 different functions on each network box are monitored All updates are pushed out to every box as soon as they are available: 150+ updates each day (AV & AS signatures included) Update process takes less than 1 minute All boxes have the same revision of hardware and software so support is simplified Full redundancy and load balancing available as an option Management
24/7/365 Update of: Software updates/patches/signatures Anti-Malware Anti-Spam Intrusion Patterns Content definitions PUSH technology for all updates and configurations 45 seconds to deliver anti- malware signatures to global install base OS maintenance and patch control Monitoring of availability and pro-active testing ensure the Network Box is working effectively Intranet reports and email / SMS updates keep the client in the picture Continuous monitoring & updates
Each Box has a ‘golden copy’ configuration maintained on the NOC The ‘golden copy’ comprises the configuration files needed to configure each box All changes are made to the ‘golden copy’ and downloaded to associated Box Customer fills in configuration sheet More information allows for smoother installs Allows Channel to sell ‘consultation’ Network Box is configured at NOC Network Box configurations are created from templates Customer network simulated to test configuration Shipped to Customer Management of Services:Box configuration
Always looking for the next threat IDP: new structure and features POP3 acceleration Instant Messenger Currently Control and manage Scan in future Development Roadmap
Single all-in-one easily installed protection Network Operation Centres monitor the appliance to ensure 24x7 availability PUSH based update service Covers the widest range of Internet threats Just in time and heuristic protection against new and currently unknown threats Conclusion
Network Box UK Ltd 44 Paul Street, London, EC2A 4LB Email: M4T@network-box.co.uk Telephone number: 0800 107 6098 (outside UK: +44 207 253 3020) James Mackie – Sales Manager UK Joanna Williams – Marketing Manager UK Simon Heron – Chief Technical Analyst www.network-box.co.uk