SlideShare uma empresa Scribd logo
1 de 49
Baixar para ler offline
www.sangfor.com Sangfor Technologies Inc.
Make IT Simpler,
More Secure and Valuable
Sangfor Technologies CONFIDENTIAL Page 1
Sangfor Group
Network Security
Enabling Enterprise-Class Security
Cloud Computing
One Architecture Sharing Everything
111
23Years
2000 - 2023
2000
2006
2014
2010
2011
2019
2017
2021
2015
2012
2002
2013
Sangfor Technologies | 2
Making Each User's Digital Transformation Easier and More Secure
111
> Employees
From 3 Staff to...
Sangfor Technologies | 3
Making Each User's Digital Transformation Easier and More Secure
111
Sangfor Team
Research and Development
Division( R&D)
Sales & Marketing
Customer Service
Others
40%
30%
20%
10%
Sangfor Technologies | 4
Making Each User's Digital Transformation Easier and More Secure
111
Mainland China
HK/TW/MC
Malaysia
USA
Indonesia
Pakistan
Vietnam
UAE
Philippines
South Korea
Thailand
Italy
Singapore
South Africa
Spain
60+ Global Branches
Global Expansion
Sangfor Technologies | 5
Making Each User's Digital Transformation Easier and More Secure
Sangfor Technologies CONFIDENTIAL Page 6
R&D Budget
20%
R&D Budget
OF TOTAL REVENUE
111
Leading Technology
First The World First 3rd Gen HCI
The World First Converged NGFW +WAF
Sangfor IPSec VPN, SSL VPN, IAG, WANO #1 in Network
Security market in China
Innovation Total Applied Patents: 1,500+
New Products Released Every 1-2 Year
New Versions Released Every Quarter
Sangfor Technologies | 7
Making Each User's Digital Transformation Easier and More Secure
111
CMMI
Level 5 Certified
5 R&D Centers >40% staff
R&D
Nanjing
(China)
Silicon Valley
(USA)
Changsha
(China)
Shenzhen
(China)
Beijing
(China)
Sangfor Technologies | 8
Making Each User's Digital Transformation Easier and More Secure
Sangfor Technologies CONFIDENTIAL Page 9
Strong Technical Support
Local Wholly-owned
subsidiaries for Better and
Faster Services
ISO9001 Certified
Multilingual Call
Center in Malaysia
Remote Tech with 24/7
Support
Sangfor Technologies CONFIDENTIAL 10
Page
Medical
 Remote Diagnosis
 Mobile Health Care
Education
 MOOC
(Massive Open Online Course)
 IntelligentCampus
 E-Backpack
Transportation
 Car Networking
 Pilotless Automobile
 Car Sharing
Retail
 O2O
 Precision Marketing
E-Government
Government
 Smart City
 Service Government
FSI
 E-Money
 P2P Loan
 E-Payment
Manufacturing
 Industry 4.0
 IoT
Digital Transformation in All Industries
Sangfor Technologies CONFIDENTIAL Page 11
NGAF Firewall Platform
Integrated Next
Generation Firewall + Next
Generation WAF +
Endpoint Security
Industry-Leading
Advanced Malware
Detection by AI-powered
Engine Zero & Neural-X
Visibility, guidance and
automation of security
operation
Gartner MQ Listing for
Enterprise Network Firewalls
&
Certified by ICSA Labs,
CyberRatings
Proven Success Protecting Web Applications
Hackers
Web Application
Server
Users
Prevents port/server scanning
Prevents app vulnerability scanning
Weak password protection
Anti-brute force attack
Core URL protection
Website structure anti-scanning
Web Crawler defense
Scanning
Process
Enhanced Web Defense
• SQL injection defense
• OS command injection
defense
• XSS attack & CSRF attack
IPS Application Based
• Server vulnerability defense
• Terminal vulnerability defense
DOS attack
Application layer DOS attack
CC attack
Authority control
Exe file upload filtering
Upload viruses & Trojan filtering
Prevention of web shell dataflow
Attack
Process
Theft
Process
Sangfor Security Capabilities
Sangfor Technologies CONFIDENTIAL 13 Page
* In the future, Neural-X will have more engines to detect more threats
Engine Zero: For file based attacks
ML powered anti-malware, Anti-virus
Neural-X: For URL/IP/DNS/file based attacks
ML Enabled Threat Intelligence & Analytics
Sangfor Engine Zero: Stop Malware Cold
Sangfor Technologies CONFIDENTIAL 14 Page
Deep Learning is
Everywhere
Sangfor Engine Zero:
Deep Learning Neural Networks
• Protection from both known and unknown malware
• No reliance on signatures
• Detects malware in approximately 30 milliseconds
• Extremely small footprint (under 60MB)
• Works out of the box. No additional training required
Sangfor Neural-X
Attack &
Defense Expert
Data Scientist
Security Analyst
Rules Features
Mining Virus
Detection
Malicious URL
Detection
Time Series
Analysis
DNS Amplification
Attack Detection
Two-Class
Classifications
Scanning
Detection
Multi Class
Classification
Webshell
Detection
Clustering
Traffic
Detection
Outlier
Monitoring
Abnormal
Behavior
Detection
Deep Learning
Botnet Detection
Network Malware Detection Accuracy Increased to 99.7%
Reconnaissance Weaponization Delivery Exploitation Installation C&C Data Extraction
IAG NGAF CC
PX
Security Visibility report for Different Purpose
Simplified Daily Operation Step by Step Incident Response Valuable Report to BOSS
In-Depth Threat Analysis
1. View current security status
2. Comprehensive analysis of network trends
2. Analysis of application servers prone to critical or high-risk vulnerabilities & attacks
3. Solutions for existing issues
Timely analysis of
severity ranking of
potential risks
Clear & concise
information about
attack source, target,
impact & solutions
Sangfor Technologies CONFIDENTIAL Page 18
Sangfor NGAF Firewall Capability Architecture
ACL
AV
IPS
Network Server
Branch
WAF
Function
layer
AI engine TI Visibility
Capability
layer
Platform-X
L4-L7
Capability
BBC
Advantages: Effective & Simple
NGAF
Neural-x
NGAF
NGAF
• Unified Management
• Unified Updates
• Centralized Visibility
Sangfor Technologies CONFIDENTIAL Page 19
Internet Access Gateway
Internet Access Gateway
Simplify User & Network Management
Personalized analytic
reports to create business
value from user online
data
Comprehensive
authentication
methods with the most
powerful bandwidth
management
Sangfor Business
Intelligence
platform enables intelligent
decision making
Integrated with Sangfor
Neural-X & Engine Zero
for enhanced security
protection
Visible, Controllable and Valuable
Visible
• Legal/Illegal endpoints
• Legal/Illegal users
User
&
Devices
• Porn Websites
• Gambling Websites
• Shopping Websites
• Forums
• Cloud Storage
• Work Emails
Apps
&
Contents
• Streaming Traffic
• P2P Traffic
• Video Download
• Encrypted Traffic
• Online Conference
Traffic
Behavior Big
Data Platform
Valuable
Controllable
2/22/2023
Email
P2P
User 1
User 2
User 3
Channel Management
User Traffic
Key application
1. More applications achieve granular control
2. Key business applications bandwidth guarantee improves work efficiency
Email
P2P
Video P2P
P2P
Email
P2P
P2P
PMS
P2P
MP3
PMS
P2P
P2P
Video MP3
P2P
P2P
P2P
Control Policy
Email
PMS
Improve Work Efficiency
More Authentication Methods
• 30+ authentication methods supported
• Flexible choices for user authentication
• User data mining with IAG
• Free marketing with customizable login page
and social media
AD SSO
3rd. Party
Server
SSO
Self-
Register
Portal
Auth.
2/22/2023
Guaranteed Bandwidth for Key Apps while Maximizing the use of Bandwidth
Idle
Busy Dynamic control
Free
Bandwidth
1. Busy networks restrict
bandwidth consuming apps
1. Flexible control while the
network is idle
2. Maximize the use of the
bandwidth
Guarantee Limit
2/22/2023
Visualize International Traffic
Manage International Traffic
Save Cost by Expending Bandwidth
International Traffic Management
Domestic
International
Detailed reports for investigation
1. All activity logged without
legal risk
2. Flexible store in internal and
external data center
3. No additional cost for
regulation compliance
Comprehensive reports
Step by Step Review and Analysis
Business Intelligence Platform
Solution benefits:
• Forecast Risk and Be Proactive
• Generate Value from IAG
• Decision Making Assistant
Reports
• Internet Access Analytics
• Bandwidth Analytics
• Electricity Waste Analytics
• Leased Line Analytics
• Event Analytics
User Behavior Collection
Big Data
Mining
Modeling
Analysis
Analytic
Reports
BI
Sangfor Technologies CONFIDENTIAL Page 28
Endpoint Secure
Endpoint Secure
The Future of Endpoint Security
A Different Approach for
Defending Endpoints
AI powered protection
using Neural-X and Engine
Zero
On-premise, Cloud-based
or Hybrid Management for
Scalability
Direct Integration with
Sangfor NGAF and IAG
One-Click/Automatic File Disposal/Restore
Malware Sandbox
Ransomware Honeypot
Network-Wide Threat Disposal
NGAF Integration
One-Click/Automatic Host Micro-Isolation
Threat Intelligence
Global Whitelists/Blacklists
Compliance
Asset Tracking
Multi-Dimensional Response
Vulnerability Scanning
Patch Management
Security Visibility
Sangfor Technologies CONFIDENTIAL Page 31
Detection
NGAF Network View
Risks to both PCs and servers are visible
Endpoint Secure Client View
Sangfor Technologies CONFIDENTIAL Page 32
Endpoint Secure Total Visibility of Enterprise Assets
Visibility of Assets
Identify core business system assets
Visibility of Threats and Risks
Identify vulnerabilities and risks to business assets
Visiblity of Asset Behavior
Distinguish between common and uncommon
asset behavior
Sangfor Technologies CONFIDENTIAL Page 33
Identify Communications Between Endpoints
Cannot be
encrypted
1. Bait files are placed in system-critical, high target and random directories
2 Encryption of bait files highlights running encryption process
3. Endpoint Secure kills the
encryption process to
block encryption
4. Malware
controlling encryption
is identified mitigated
Encrypted Encrypted Encrypted Encrypted Encrypted
Encrypted Encrypted Encrypted Encrypted Encrypted
Encrypted Encrypted Encrypted Encrypting...
Cannot be
encrypted
Encrypted
Protect Agent
After analysis of encryption order of tens of thousands of ransomware, key
directories with a high probability of being targeted for encryption are identified
Ransomware Honeypot
Response
Sangfor Technologies CONFIDENTIAL Page 36
One-Click Kill
Endpoint Secure Manager
One click mitigation for the entire network
One click mitigation for the entire network
Find one infection, quickly scan the network for more
Sangfor Technologies CONFIDENTIAL Page 37
Micro-isolation reduces threat propagation
Access control for different roles
Business A Business B
Department B
Department A
Security isolation and access control for
different business systems
Security isolation at different terminals
Security isolation and access
control in concert with NGAF
Data Center
Business Area
Intranet office
area
Sangfor Technologies CONFIDENTIAL Page 38
Cyber Command
Cyber Command
Intelligent Threat Detection and
Response Platform
Sophisticated Detection by
closely monitoring every step of
the cybersecurity attack chain.
Faster and More Efficient
Response delivered using
incident investigation and tight
integration with network and
endpoint security solutions.
Simplify Threat Hunting to
perform comprehensive impact
analysis of known breaches
and to track "patient zero“.
Integration with Sangfor
TIARA & MDR services.
Sangfor Technologies CONFIDENTIAL Page 39
How does Cyber Command works
Systems
Devices
Network
Effective collection for full flow + security logs
Sophisticated
DETECTION
Faster and More
Efficient RESPONSE
Intelligent Detection
SAVE AI
UEBA NTA
TI EDR
Threat Hunting
Attack chain analysis
Contextual verification
Attack Path Attack sorting
Security incident alert
NGAF Others
Powerful Intelligent Threat Detection
and Response Platform
1
2
3
Sophisticated DETECTION by closely monitoring every step of the
cybersecurity attack chain
Faster and More Efficient RESPONSE delivered by incident investigation and tight
integration with network and endpoint security solutions
Simplify Threat Hunting
Cyber Command
Data Lake
Correlate Response
Block open ports
Scan for other malware
Quarantine Stop processes
Shut down C&C
Connections
Simplify Threat Hunting
Comprehensive Visibility
Sangfor Technologies CONFIDENTIAL Page 40
Risk Protection Solution
• Centralized Integrated Management
• Situational Threat Awareness
• Network Flow Analysis
• 3rd Party Device Support
Cyber Command
• Risk Driven • Network Flow Analysis • Active Defense
Infected? C&C Communication Encryption
Lateral Propagation
Endpoint Secure
• Phising Email
• Ransomware Detection
• Malicious Domain
• C&C Servers
Ransomware Encrypted
File Rollback
• Connection Analysis
• Malware Containment
• Disinfestion/Blocking
• Ransomware/APT Detection
Ransomware
NGAF
HCI
• Global/Local
• Threat Intelligence
• AI Engine
• Automated Sandbox Cluster
Neural-X
Sangfor Technologies CONFIDENTIAL Page 41
Sangfor aCloud
Sangfor aCloud
Enterprise Cloud Computing Platform Built on
Business-Centric HCI
aCMP cloud
management platform
Multi-tenant
management
Disaster recovery CDP & Data Backup
Sangfor aCloud is consolidating 3-tier IT
Traditional DC
Switch/Router
Server
FC
Storage
...
Management
...
Security
HCI-based DC
Sangfor HCI-based DC
compute networking
storage security
aSV aSAN aNET aSEC
Compute Storage Networking Security
1st Gen HCI
2nd Gen HCI
3rd Gen HCI
3rd Gen HCI with Full Convergence
Enable your business with end to end solution
Compute Storage Networking Security
x86
x86 x86
aCMP (cloud management platform)
Operation
Center
Reliability
Center
Monitor
Center
Security
Center
What You Draw is What You Get
What You Draw is What You Get
Cloud-BasedSecurityOperationCenter
Cyber BoundaryProtection&Management
PrimarySite DRSite
Sangfor Product Opportunity Panorama
• Managed Security Service for Sangfor Security Devices:
Platform-X
• Real-Time Threat Monitoring, Analysis & Response: MDR
• Protect network and serverby effectively detecting and
defending against known & un-known threat: NGAF
• Internal and external riskmanagementthrough
identification, visualization & control for usersand
Applications: IAG
Multiple-Branches/
Remote-Office
• Primary Focus on Branch Security:
NGAF
• Remote Working:VDI
PublicInternetService
• BusinessContinuity, Data Security&
Uncertain Concurrency :
HCI+VAF +vAD
RiskAssessmentService
• Security posture assessmentto
identify internal threats anddevelop
an effective improvement plan:
TIARA
Management&OperationCenter
• Limited I
Tmanpower and skills,requiring a unified,
automated and highly visible platform, simplifying O&M
and providing security riskanalysis&
• comprehensive riskassessment: Cybercommand
• On-line light unified management: Platform-X
OfficeArea
• Endpoint Anti-Ransomware: EndpointSecure
• Endpoint data security, internal compliance, remote
office &simplified operation: VDI
• Internal East-West Flow Detection:NGAF
Cyber BoundaryProtection&Management
• Focus on improving businessreliability, data security,
high performance & agility resources:HCI+aSEC
• Private or Managed Cloud Service :HCI+aCMP +aSEC
RiskAssessmentService
• Cross-SiteBusinessReliability
• Local Backup forVMware
• DR for HCI
• Solution Performance: RTO=5
mins&0RPO
47
IAG
NGAF
THANK YOU
SANGFOR TECHNOLOGIES INDONESIA
MD Place 3rd Floor, JI Setiabudi No.7, Jakarta
Selatan 12910, Indonesia.

Mais conteúdo relacionado

Mais procurados

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudVeloCloud Networks, Inc.
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise Colt Technology Services
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Huawei network icon database v2
Huawei network icon database v2Huawei network icon database v2
Huawei network icon database v2Carlos Romero
 
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend MicroAymen Mami
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxNajahIdrissiMoulayRa
 
Microsoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptxMicrosoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptxAlejandro Daricz
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 

Mais procurados (20)

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise The business case for SD WAN in the enterprise
The business case for SD WAN in the enterprise
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Huawei network icon database v2
Huawei network icon database v2Huawei network icon database v2
Huawei network icon database v2
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
 
SD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloudSD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloud
 
Microsoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptxMicrosoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptx
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 

Semelhante a Sangfor's Presentation.pdf

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureFidelis Cybersecurity
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...Amazon Web Services
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentJean Ryu
 

Semelhante a Sangfor's Presentation.pdf (20)

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Information Security
Information SecurityInformation Security
Information Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 

Mais de ssusera76ea9

dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
SolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfSolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfssusera76ea9
 
Template PPT Proposal Skripsi_Free - PS.pptx
Template PPT Proposal Skripsi_Free - PS.pptxTemplate PPT Proposal Skripsi_Free - PS.pptx
Template PPT Proposal Skripsi_Free - PS.pptxssusera76ea9
 
office-365-in-the-classroom.pdf
office-365-in-the-classroom.pdfoffice-365-in-the-classroom.pdf
office-365-in-the-classroom.pdfssusera76ea9
 
SharePoint_IRMS_Conference.pdf
SharePoint_IRMS_Conference.pdfSharePoint_IRMS_Conference.pdf
SharePoint_IRMS_Conference.pdfssusera76ea9
 
Day2-FrontlineWorkforceVision-Retail-TF-v12.pdf
Day2-FrontlineWorkforceVision-Retail-TF-v12.pdfDay2-FrontlineWorkforceVision-Retail-TF-v12.pdf
Day2-FrontlineWorkforceVision-Retail-TF-v12.pdfssusera76ea9
 
Investor Relations December Deck - FINAL.pdf
Investor Relations December Deck - FINAL.pdfInvestor Relations December Deck - FINAL.pdf
Investor Relations December Deck - FINAL.pdfssusera76ea9
 

Mais de ssusera76ea9 (9)

Keamanan
KeamananKeamanan
Keamanan
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
SolPartner_InterceptX.pdf
SolPartner_InterceptX.pdfSolPartner_InterceptX.pdf
SolPartner_InterceptX.pdf
 
Template PPT Proposal Skripsi_Free - PS.pptx
Template PPT Proposal Skripsi_Free - PS.pptxTemplate PPT Proposal Skripsi_Free - PS.pptx
Template PPT Proposal Skripsi_Free - PS.pptx
 
office-365-in-the-classroom.pdf
office-365-in-the-classroom.pdfoffice-365-in-the-classroom.pdf
office-365-in-the-classroom.pdf
 
SharePoint_IRMS_Conference.pdf
SharePoint_IRMS_Conference.pdfSharePoint_IRMS_Conference.pdf
SharePoint_IRMS_Conference.pdf
 
Day2-FrontlineWorkforceVision-Retail-TF-v12.pdf
Day2-FrontlineWorkforceVision-Retail-TF-v12.pdfDay2-FrontlineWorkforceVision-Retail-TF-v12.pdf
Day2-FrontlineWorkforceVision-Retail-TF-v12.pdf
 
Investor Relations December Deck - FINAL.pdf
Investor Relations December Deck - FINAL.pdfInvestor Relations December Deck - FINAL.pdf
Investor Relations December Deck - FINAL.pdf
 
ITE7_Chp9.pptx
ITE7_Chp9.pptxITE7_Chp9.pptx
ITE7_Chp9.pptx
 

Último

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 

Último (20)

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 

Sangfor's Presentation.pdf

  • 1. www.sangfor.com Sangfor Technologies Inc. Make IT Simpler, More Secure and Valuable
  • 2. Sangfor Technologies CONFIDENTIAL Page 1 Sangfor Group Network Security Enabling Enterprise-Class Security Cloud Computing One Architecture Sharing Everything
  • 3. 111 23Years 2000 - 2023 2000 2006 2014 2010 2011 2019 2017 2021 2015 2012 2002 2013 Sangfor Technologies | 2 Making Each User's Digital Transformation Easier and More Secure
  • 4. 111 > Employees From 3 Staff to... Sangfor Technologies | 3 Making Each User's Digital Transformation Easier and More Secure
  • 5. 111 Sangfor Team Research and Development Division( R&D) Sales & Marketing Customer Service Others 40% 30% 20% 10% Sangfor Technologies | 4 Making Each User's Digital Transformation Easier and More Secure
  • 6. 111 Mainland China HK/TW/MC Malaysia USA Indonesia Pakistan Vietnam UAE Philippines South Korea Thailand Italy Singapore South Africa Spain 60+ Global Branches Global Expansion Sangfor Technologies | 5 Making Each User's Digital Transformation Easier and More Secure
  • 7. Sangfor Technologies CONFIDENTIAL Page 6 R&D Budget 20% R&D Budget OF TOTAL REVENUE
  • 8. 111 Leading Technology First The World First 3rd Gen HCI The World First Converged NGFW +WAF Sangfor IPSec VPN, SSL VPN, IAG, WANO #1 in Network Security market in China Innovation Total Applied Patents: 1,500+ New Products Released Every 1-2 Year New Versions Released Every Quarter Sangfor Technologies | 7 Making Each User's Digital Transformation Easier and More Secure
  • 9. 111 CMMI Level 5 Certified 5 R&D Centers >40% staff R&D Nanjing (China) Silicon Valley (USA) Changsha (China) Shenzhen (China) Beijing (China) Sangfor Technologies | 8 Making Each User's Digital Transformation Easier and More Secure
  • 10. Sangfor Technologies CONFIDENTIAL Page 9 Strong Technical Support Local Wholly-owned subsidiaries for Better and Faster Services ISO9001 Certified Multilingual Call Center in Malaysia Remote Tech with 24/7 Support
  • 11. Sangfor Technologies CONFIDENTIAL 10 Page Medical  Remote Diagnosis  Mobile Health Care Education  MOOC (Massive Open Online Course)  IntelligentCampus  E-Backpack Transportation  Car Networking  Pilotless Automobile  Car Sharing Retail  O2O  Precision Marketing E-Government Government  Smart City  Service Government FSI  E-Money  P2P Loan  E-Payment Manufacturing  Industry 4.0  IoT Digital Transformation in All Industries
  • 12. Sangfor Technologies CONFIDENTIAL Page 11 NGAF Firewall Platform Integrated Next Generation Firewall + Next Generation WAF + Endpoint Security Industry-Leading Advanced Malware Detection by AI-powered Engine Zero & Neural-X Visibility, guidance and automation of security operation Gartner MQ Listing for Enterprise Network Firewalls & Certified by ICSA Labs, CyberRatings
  • 13. Proven Success Protecting Web Applications Hackers Web Application Server Users Prevents port/server scanning Prevents app vulnerability scanning Weak password protection Anti-brute force attack Core URL protection Website structure anti-scanning Web Crawler defense Scanning Process Enhanced Web Defense • SQL injection defense • OS command injection defense • XSS attack & CSRF attack IPS Application Based • Server vulnerability defense • Terminal vulnerability defense DOS attack Application layer DOS attack CC attack Authority control Exe file upload filtering Upload viruses & Trojan filtering Prevention of web shell dataflow Attack Process Theft Process
  • 14. Sangfor Security Capabilities Sangfor Technologies CONFIDENTIAL 13 Page * In the future, Neural-X will have more engines to detect more threats Engine Zero: For file based attacks ML powered anti-malware, Anti-virus Neural-X: For URL/IP/DNS/file based attacks ML Enabled Threat Intelligence & Analytics
  • 15. Sangfor Engine Zero: Stop Malware Cold Sangfor Technologies CONFIDENTIAL 14 Page Deep Learning is Everywhere Sangfor Engine Zero: Deep Learning Neural Networks • Protection from both known and unknown malware • No reliance on signatures • Detects malware in approximately 30 milliseconds • Extremely small footprint (under 60MB) • Works out of the box. No additional training required
  • 16. Sangfor Neural-X Attack & Defense Expert Data Scientist Security Analyst Rules Features Mining Virus Detection Malicious URL Detection Time Series Analysis DNS Amplification Attack Detection Two-Class Classifications Scanning Detection Multi Class Classification Webshell Detection Clustering Traffic Detection Outlier Monitoring Abnormal Behavior Detection Deep Learning Botnet Detection Network Malware Detection Accuracy Increased to 99.7% Reconnaissance Weaponization Delivery Exploitation Installation C&C Data Extraction IAG NGAF CC PX
  • 17. Security Visibility report for Different Purpose Simplified Daily Operation Step by Step Incident Response Valuable Report to BOSS
  • 18. In-Depth Threat Analysis 1. View current security status 2. Comprehensive analysis of network trends 2. Analysis of application servers prone to critical or high-risk vulnerabilities & attacks 3. Solutions for existing issues Timely analysis of severity ranking of potential risks Clear & concise information about attack source, target, impact & solutions
  • 19. Sangfor Technologies CONFIDENTIAL Page 18 Sangfor NGAF Firewall Capability Architecture ACL AV IPS Network Server Branch WAF Function layer AI engine TI Visibility Capability layer Platform-X L4-L7 Capability BBC Advantages: Effective & Simple NGAF Neural-x NGAF NGAF • Unified Management • Unified Updates • Centralized Visibility
  • 20. Sangfor Technologies CONFIDENTIAL Page 19 Internet Access Gateway Internet Access Gateway Simplify User & Network Management Personalized analytic reports to create business value from user online data Comprehensive authentication methods with the most powerful bandwidth management Sangfor Business Intelligence platform enables intelligent decision making Integrated with Sangfor Neural-X & Engine Zero for enhanced security protection
  • 21. Visible, Controllable and Valuable Visible • Legal/Illegal endpoints • Legal/Illegal users User & Devices • Porn Websites • Gambling Websites • Shopping Websites • Forums • Cloud Storage • Work Emails Apps & Contents • Streaming Traffic • P2P Traffic • Video Download • Encrypted Traffic • Online Conference Traffic Behavior Big Data Platform Valuable Controllable
  • 22. 2/22/2023 Email P2P User 1 User 2 User 3 Channel Management User Traffic Key application 1. More applications achieve granular control 2. Key business applications bandwidth guarantee improves work efficiency Email P2P Video P2P P2P Email P2P P2P PMS P2P MP3 PMS P2P P2P Video MP3 P2P P2P P2P Control Policy Email PMS Improve Work Efficiency
  • 23. More Authentication Methods • 30+ authentication methods supported • Flexible choices for user authentication • User data mining with IAG • Free marketing with customizable login page and social media AD SSO 3rd. Party Server SSO Self- Register Portal Auth.
  • 24. 2/22/2023 Guaranteed Bandwidth for Key Apps while Maximizing the use of Bandwidth Idle Busy Dynamic control Free Bandwidth 1. Busy networks restrict bandwidth consuming apps 1. Flexible control while the network is idle 2. Maximize the use of the bandwidth Guarantee Limit
  • 25. 2/22/2023 Visualize International Traffic Manage International Traffic Save Cost by Expending Bandwidth International Traffic Management Domestic International
  • 26. Detailed reports for investigation 1. All activity logged without legal risk 2. Flexible store in internal and external data center 3. No additional cost for regulation compliance
  • 27. Comprehensive reports Step by Step Review and Analysis
  • 28. Business Intelligence Platform Solution benefits: • Forecast Risk and Be Proactive • Generate Value from IAG • Decision Making Assistant Reports • Internet Access Analytics • Bandwidth Analytics • Electricity Waste Analytics • Leased Line Analytics • Event Analytics User Behavior Collection Big Data Mining Modeling Analysis Analytic Reports BI
  • 29. Sangfor Technologies CONFIDENTIAL Page 28 Endpoint Secure Endpoint Secure The Future of Endpoint Security A Different Approach for Defending Endpoints AI powered protection using Neural-X and Engine Zero On-premise, Cloud-based or Hybrid Management for Scalability Direct Integration with Sangfor NGAF and IAG
  • 30. One-Click/Automatic File Disposal/Restore Malware Sandbox Ransomware Honeypot Network-Wide Threat Disposal NGAF Integration One-Click/Automatic Host Micro-Isolation Threat Intelligence Global Whitelists/Blacklists Compliance Asset Tracking Multi-Dimensional Response Vulnerability Scanning Patch Management
  • 32. Sangfor Technologies CONFIDENTIAL Page 31 Detection NGAF Network View Risks to both PCs and servers are visible Endpoint Secure Client View
  • 33. Sangfor Technologies CONFIDENTIAL Page 32 Endpoint Secure Total Visibility of Enterprise Assets Visibility of Assets Identify core business system assets Visibility of Threats and Risks Identify vulnerabilities and risks to business assets Visiblity of Asset Behavior Distinguish between common and uncommon asset behavior
  • 34. Sangfor Technologies CONFIDENTIAL Page 33 Identify Communications Between Endpoints
  • 35. Cannot be encrypted 1. Bait files are placed in system-critical, high target and random directories 2 Encryption of bait files highlights running encryption process 3. Endpoint Secure kills the encryption process to block encryption 4. Malware controlling encryption is identified mitigated Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypted Encrypting... Cannot be encrypted Encrypted Protect Agent After analysis of encryption order of tens of thousands of ransomware, key directories with a high probability of being targeted for encryption are identified Ransomware Honeypot
  • 37. Sangfor Technologies CONFIDENTIAL Page 36 One-Click Kill Endpoint Secure Manager One click mitigation for the entire network One click mitigation for the entire network Find one infection, quickly scan the network for more
  • 38. Sangfor Technologies CONFIDENTIAL Page 37 Micro-isolation reduces threat propagation Access control for different roles Business A Business B Department B Department A Security isolation and access control for different business systems Security isolation at different terminals Security isolation and access control in concert with NGAF Data Center Business Area Intranet office area
  • 39. Sangfor Technologies CONFIDENTIAL Page 38 Cyber Command Cyber Command Intelligent Threat Detection and Response Platform Sophisticated Detection by closely monitoring every step of the cybersecurity attack chain. Faster and More Efficient Response delivered using incident investigation and tight integration with network and endpoint security solutions. Simplify Threat Hunting to perform comprehensive impact analysis of known breaches and to track "patient zero“. Integration with Sangfor TIARA & MDR services.
  • 40. Sangfor Technologies CONFIDENTIAL Page 39 How does Cyber Command works Systems Devices Network Effective collection for full flow + security logs Sophisticated DETECTION Faster and More Efficient RESPONSE Intelligent Detection SAVE AI UEBA NTA TI EDR Threat Hunting Attack chain analysis Contextual verification Attack Path Attack sorting Security incident alert NGAF Others Powerful Intelligent Threat Detection and Response Platform 1 2 3 Sophisticated DETECTION by closely monitoring every step of the cybersecurity attack chain Faster and More Efficient RESPONSE delivered by incident investigation and tight integration with network and endpoint security solutions Simplify Threat Hunting Cyber Command Data Lake Correlate Response Block open ports Scan for other malware Quarantine Stop processes Shut down C&C Connections Simplify Threat Hunting Comprehensive Visibility
  • 41. Sangfor Technologies CONFIDENTIAL Page 40 Risk Protection Solution • Centralized Integrated Management • Situational Threat Awareness • Network Flow Analysis • 3rd Party Device Support Cyber Command • Risk Driven • Network Flow Analysis • Active Defense Infected? C&C Communication Encryption Lateral Propagation Endpoint Secure • Phising Email • Ransomware Detection • Malicious Domain • C&C Servers Ransomware Encrypted File Rollback • Connection Analysis • Malware Containment • Disinfestion/Blocking • Ransomware/APT Detection Ransomware NGAF HCI • Global/Local • Threat Intelligence • AI Engine • Automated Sandbox Cluster Neural-X
  • 42. Sangfor Technologies CONFIDENTIAL Page 41 Sangfor aCloud Sangfor aCloud Enterprise Cloud Computing Platform Built on Business-Centric HCI aCMP cloud management platform Multi-tenant management Disaster recovery CDP & Data Backup
  • 43. Sangfor aCloud is consolidating 3-tier IT Traditional DC Switch/Router Server FC Storage ... Management ... Security HCI-based DC Sangfor HCI-based DC compute networking storage security aSV aSAN aNET aSEC
  • 44. Compute Storage Networking Security 1st Gen HCI 2nd Gen HCI 3rd Gen HCI 3rd Gen HCI with Full Convergence
  • 45. Enable your business with end to end solution Compute Storage Networking Security x86 x86 x86 aCMP (cloud management platform) Operation Center Reliability Center Monitor Center Security Center
  • 46. What You Draw is What You Get
  • 47. What You Draw is What You Get
  • 48. Cloud-BasedSecurityOperationCenter Cyber BoundaryProtection&Management PrimarySite DRSite Sangfor Product Opportunity Panorama • Managed Security Service for Sangfor Security Devices: Platform-X • Real-Time Threat Monitoring, Analysis & Response: MDR • Protect network and serverby effectively detecting and defending against known & un-known threat: NGAF • Internal and external riskmanagementthrough identification, visualization & control for usersand Applications: IAG Multiple-Branches/ Remote-Office • Primary Focus on Branch Security: NGAF • Remote Working:VDI PublicInternetService • BusinessContinuity, Data Security& Uncertain Concurrency : HCI+VAF +vAD RiskAssessmentService • Security posture assessmentto identify internal threats anddevelop an effective improvement plan: TIARA Management&OperationCenter • Limited I Tmanpower and skills,requiring a unified, automated and highly visible platform, simplifying O&M and providing security riskanalysis& • comprehensive riskassessment: Cybercommand • On-line light unified management: Platform-X OfficeArea • Endpoint Anti-Ransomware: EndpointSecure • Endpoint data security, internal compliance, remote office &simplified operation: VDI • Internal East-West Flow Detection:NGAF Cyber BoundaryProtection&Management • Focus on improving businessreliability, data security, high performance & agility resources:HCI+aSEC • Private or Managed Cloud Service :HCI+aCMP +aSEC RiskAssessmentService • Cross-SiteBusinessReliability • Local Backup forVMware • DR for HCI • Solution Performance: RTO=5 mins&0RPO 47 IAG NGAF
  • 49. THANK YOU SANGFOR TECHNOLOGIES INDONESIA MD Place 3rd Floor, JI Setiabudi No.7, Jakarta Selatan 12910, Indonesia.