1 / 55

The Next-Generation Firewall

The Next-Generation Firewall. Todd Humphreys Regional Sales Manager. 1995. 2011. the age of app and user enlightenment. Employees’ use of browser -based file s haring. 96% 2010. 75% 2009. 28% 2008. 96% of businesses. (a.k.a. "Sky peer-to- peer ”). 15% too much.

zamora
Download Presentation

The Next-Generation Firewall

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Next-Generation Firewall Todd Humphreys Regional Sales Manager

  2. 1995

  3. 2011

  4. the age of app and user enlightenment

  5. Employees’ use of browser-based file sharing 96% 2010 75% 2009 28% 2008

  6. 96% of businesses

  7. (a.k.a. "Sky peer-to-peer”)

  8. 15% too much

  9. the conventional approach

  10. secure only web and email traffic

  11. build more of the same

  12. INSANITY doing the same thing over and over again and expecting different results

  13. the incumbent response

  14. block applications and users

  15. the innovativeapproach

  16. extend security to all network traffic extend security to all network traffic

  17. regain visibility and control

  18. safelyenable your workforce to use applications

  19. the next-generation firewall

  20. A next-generation firewall extends network security from web browsing and email to all applications

  21. NGFW != UTM John Pescatore and Greg Young, Gartner

  22. App and User ID are at the NGFW’s core Not on a Blade

  23. NGFWs have a single access-control policy Not one port-based and another application-based

  24. NGFWs control unknownapplications A blade just lets them through

  25. NGFWs control functions within applications Not just blindly allow or block

  26. NGFWs scan for ALL threats in a single engine No separate IPS, Anti-Malware, and DLP blades

  27. NGFWs scanfor threats and data in IM, SharePoint, Google Docs, etc. Blades do not

  28. NGFWs inspect inside outbound SSL If it doesn’t, its a pile of junk

  29. NGFWs scan all portsall the time A blade only scans default ports

  30. NGFWs continuously evaluate the connection A blade classifies once and never again

  31. NGFWs runs all functions without slowing down Each blade further reduces throughput

  32. innovators vs. followers

  33. Palo Alto Networks has the only shipping NGFW As of March 2010 Source: Gartner (March 2010) All other vendors are confusing you with a blade

  34. innovate or die

  35. “…consumers aren’t standing in line for hours to pick up a Symbian smartphone… no matter how hard the company tries to spruce it up.” - The Wall Street Journal, February 2011.

More Related