Next Generation Firewalls bieden ‘Application Control’ als extra technologie naast standaard zaken zoals packetfiltering, VPN en IPS. Met Application Control is het perfect mogelijk om te differentiëren op welke internetapplicaties de firewall actief moet zijn, en hoe de applicatie dan mag worden gebruikt. Zo kan bellen via Skype worden toegestaan, terwijl de mogelijkheden voor chatten en filesharing via Skype worden geblokkeerd.
3. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
MALWARE FOUND
4. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
BOTNETS ATTACK
5. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
GEBRUIK VAN DIVERSE
APPLICATIES
6. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
TRADITIONELE FIREWALL
7. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
8. 15 JAAR VOOROP IN ICT
SECURITY
Identity
Awareness
SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
9. 15 JAAR VOOROP IN ICT
SECURITY
NEXT GENERATION FIREWALL
MUST HAVE . . .
10. 15 JAAR VOOROP IN ICT
SECURITY
Policies
Practical and relevant to daily operations
People
Different People – Different needs
Involve & Engage users in the security
process
Enforcement
Multi-layer controls for strong security
[Confidential] For designated groups and individuals
11. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
NEXT GENERATION FIREWALL
12. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
13. 15 JAAR VOOROP IN ICT
SECURITY
Identity
Awarenes
s
SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
14. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
IPS & APPLICATION CONTROL
15. 15 JAAR VOOROP IN ICT
SECURITY
IPS
Anti-Bot
Antivirus
Network Threat Prevention
Mobile Access
DLP
Sensitive Data
Application
Control
URLF
Identity
Awareness
Internet Applications Usage
User Access
Granular Visibility
Mobile
Access
SmartEvent
16. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
MULTI LAYERED THREAT
PREVENTION
17. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
THREAT MANAGEMENT
18. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
19. 15 JAAR VOOROP IN ICT
SECURITY
Identity
Awareness
SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
20. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
PROTECT AGAINST EXPLOIT OF
VULNERABILITIES IN: WORD, EXCEL, PDF,
BROWSERS, OPERATING SYSTEMS...
21. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
BLOCK MALWARE FILE DOWNLOAD AND
ACCESS TO MALWARE CONTAINING SITES
22. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
23. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
24. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
DISCOVER AND STOP BOT ATTACKS
25. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
FIGHT AGAINST UNKNOWN THREATS !
26. 15 JAAR VOOROP IN ICT
SECURITY
Download file sent
to Threat
Emulation
File Inspected
in virtual
sandbox
New attack
discovered
Malware is
blocked on
the gateway
New malware
signature sent
to ThreatCloud
Monitor unexpected behavior:
Network activity
File system & registry
changes
Process activity
Internet
Security
Gateway
27. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
POWERING THREAT PREVENTION SOFTWARE
BLADES WITH REAL-TIME SECURITY
INTELLIGENCE
28. 15 JAAR VOOROP IN ICT
SECURITY
SECURITY CHALLENGES
MULTI LAYERED THREAT PREVENTION
29. 15 JAAR VOOROPSecurity Gateways
IN ICT
Sec.Aas platform –
SECURITY
Weerbaarheid
& Monitoring
Optioneel (maatwerk):
Data Leakage Protection
Endpoint Protection
Mobile Access
Threat Emulation
STANDAARD
Preventie
Security
Gateway
Firewall
VPN
Identity Aware
NEXT GEN
Preventie
THREAT
Preventie
Security
Gateway
Security
Gateway
Firewall
VPN
Identity Aware
Firewall
VPN
Identity Aware
IPS
App Control
IPS
App Control
Malware
Filters
URL Filters
Spam Filters
Botnet Filters
31. 15 JAAR VOOROP IN -ICT
Sec. Aas Platform samenvatting
SECURITY
Wrap-up
• Geavanceerde cyberaanvallen zijn steeds lastiger te
signaleren en blokkeren;
• Motiv Next Generation platform blokkeert aanvallen met
de beste Next Generation Technologie en security
experts van Motiv;
• Dreigingen worden direct gemitigeerd dankzij security
intelligence van ThreatCloud en opvolging van
beveiligingsadviezen van NCSC;
• 24X7 monitoring met incident/response;
• Overzichtelijke compliancy rapportages.