Visibilidad y control de la seguridad en la nube
Septiembre 2018 Maria Garcia Iñañez mginanez@sonicwall.com +34 620 703 537
control de la seguridad en la nube Septiembre 2018 Maria Garcia - - PowerPoint PPT Presentation
Visibilidad y control de la seguridad en la nube Septiembre 2018 Maria Garcia Iaez mginanez@sonicwall.com +34 620 703 537 Estrategia de Sonicwall para el 2018 Management, Core Firewall Automated Reporting and Platforms Breach
Septiembre 2018 Maria Garcia Iñañez mginanez@sonicwall.com +34 620 703 537
Cloud enabled & zero touch deployment
countries
patents
Secure automation and 3rd party ecosystem interoperability
New APs, 802.11ac Wave2, Cloud Management, Security for Wireless
Enhance and expand the Capture service to address latest attacks
Automate AV enforcement & enhance client security
Virtual, Security, Usability, Scalability, Platforms, Multi- Gig
DEEP LEARNING ALGORITHM
Machine Learning
Artifact 1 Artifact 2 Artifact 3 Artifact 4 Data File Email PDF Streaming Data Classified Malware
RANSOMWARE Locky RANSOMWARE WannaCry TROJAN Spartan UNKNOWN
BLOCK
CLOUD CAPTURE SANDBOX Hypervisor
Good Bad
BLOCK until VERDICT
SENT
Emulation Virtualization
BLOCK
To innovation in automated breach prevention solutions
Analyzed
9.3 billion malware attack attempts in 2017
Established in 1999 Credited
Discovery of unique variants every day.
Endpoint Memory
PEAK16
Dell - Internal Use - Confidential
4
5
8
Sensors
Industry research
s in which intelligence is shared
Monitoring
Response to zero-day vulnerabilitie s
Malware samples collected daily
Malicious events analyzed daily
PEAK16
Dell - Internal Use - Confidential
https://technet.microsoft.com/en- us/security/dn467918.aspx
9
DEEP LEARNING ALGORITHM
Machine Learning
Artifact 1 Artifact 2 Artifact 3 Artifact 4 Data File Email PDF Streaming Data Classified Malware
RANSOMWARE Locky RANSOMWARE WannaCry TROJAN Spartan UNKNOWN
BLOCK
CLOUD CAPTURE SANDBOX Hypervisor
Good Bad
BLOCK until VERDICT
SENT
Emulation Virtualization
BLOCK
To innovation in automated breach prevention solutions
Analyzed
9.3 billion malware attack attempts in 2017
Established in 1999 Credited
Discovery of unique variants every day.
Endpoint Memory
FW • IPS • ATP • DPI TLS • ANTI-MALWARE • CASB • ANTI-PHISHING • URL FILTERING • WAF THREAT PREVENTION MANAGEMENT REPORTING / ANALYTICS
SECURITY
SECURITY
Network Security Platforms
SMB, DC, MSP, Distributed Enterprise, EDU, Fed
Cloud IoT Email Mobile Endpoints
SMB, MSSP
WiFi
SMB, MSSP
FW • IPS • ATP • DPI TLS • ANTI-MALWARE • CASB • ANTI-PHISHING • URL FILTERING • WAF
THREAT PREVENTION MANAGEMENT REPORTING / ANALYTICS
CAPTURE Cloud (Management, Analytics and Reporting) CAPTURE Client CAPTURE Advanced Threats CAPTURE Application Security NS Public and Private Cloud (NSv)
NGFW Cloud Security Email Security Secure Remote Access
NS Appliances Virtual Appliances SonicWave (Wireless) SaaS ES Appliances Virtual Appliances SaaS SMA Appliances Virtual Appliance Web Application Firewall
(Linux)
NGFW DPI for TLS/SSL Capture ATP Sandbox Real Time Deep Memory Inspection Capture Client
68% of Internet Traffic is encrypted 2% of malicious files are unknown RTDMI finds 50% more zero days than ATP alone Capture Client provides rollback for any malware that makes it through
Rollback to a good state for any remaining zero-day malware and mobility
Why we are different
High security efficacy, machine learning algorithms High performance patented RFDPI Multi-technology, block until verdict, deep learning Ultra-fast, catches never- before-seen attacks Shared intelligence, rollback 3,500 zero day
threats found by RTDMI
554 new threats
found by Capture ATP per day
335 encrypted
threats per customer
7,739 malware & 173 ransomware
attacks per customer
22
Unified security with single pane of glass experience
Firewall Management| Visibility and Control | Reporting and Analytics | Threat Meters Real-time visibility and control for fast remediation Intuitive dashboard with critical security alerts Simplified automated workflows Next-gen analytics with actionable information Effective policy management Advanced customizable reporting tools with scheduling
Transaction tracking with compliance audit ready information
Zero-Touch Deployment Analytics Capture Client Capture Threat Assessment
23
Workflow Automation Four simple steps to error-free policy management
Mitigates risk, reduces errors, and improves efficiency
Analytics Deep learning for actionable insight and knowledge
Reduces incident response time with real-time, actionable threat intelligence
Reports Demonstrate the value of the unseen
Deep visibility and situational awareness of the network security environment
Zero-Touch Deployment Operationalizes remote firewall in 4 easy steps
Cut time, cost and complexity of firewall provisioning while security and connectivity occur automatically
Capture Threat Assessment Know and understand security risks
Threat information for better-informed security planning and policy decisions
Deep learning for actionable insight and knowledge
25
26
Registers the new firewall in MySonicWall using it assigned Serial Number and Authentication Code and then activate license for Capture Security Center cloud services .
Activate Capture Security Center and Register the firewall
Connects the firewall to the network using the ethernet cable that came with the unit.
Connect the firewall
Power-up the firewall after connecting the power cable and plugging it into a standard wall outlet. Units is automatically assigned a WAN IP using DHCP server. Once Internet connectivity is established, the unit is automatically discovered, authenticated and added to Capture Security Center with all licenses and configurations synchronized with MySonicWall and License Manager.
Power-up the firewall
The unit is now operational and manageable by the Capture Security Center cloud-based central management console.
Manage the Firewall