NEC IWS+PAN - Cyber Security Solutions

576 views

Published on

As a leading System Integrator, NEC APAC provides the best-of-breed security solutions with Palo Alto Networks Next-Generation Firewall and Infotect Security’s iNSIGHT For Web Server (IWS) to provide the intelligence, flexibility, and scale
you need to stay secure in today’s ever-changing and increasingly chaotic threat landscape.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
576
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

NEC IWS+PAN - Cyber Security Solutions

  1. 1. CYBER SECURITY SOLUTIONSNext Generation Threat Prevention Solution ForInbound and Outbound Traffic NEC Asia Pacific www.nec.com.sg
  2. 2. TODAY 80 PERCENT OF IT SECURITY SPENDING IS AIMEDAT DEPLOYING SOLUTIONS THAT DO NOT PROTECTAGAINST TODAY’S MOST LIKELY, MOST DAMAGING, ANDCOSTLIEST ATTACKS.It often takes a massive DDoS threat, data theft from spoofing, or other sophisticated cyber-attacks before an organizationrealizes it is only protected from yesterday’s problems.As a leading System Integrator, NEC APAC provides the best-of-breed security solutions with Palo Alto Networks Next-Generation Firewall and Infotect Security’s iNSIGHT For Web Server (IWS) to provide the intelligence, flexibility, and scaleyou need to stay secure in today’s ever-changing and increasingly chaotic threat landscape. SECURITY-RELATED CHALLENGES FACED BY BUSINESS TODAYModern threats are distributed, diverse and cross the chasm that divides network components from application infrastructure.Enterprise e-services are accessible 24x7 by anyone across the world, especially now with the increased usage of mobiledevices. Yet, efforts for past decades have sorely neglected the risks of enterprise e-services and, in recent years, cloudand mobile services. Without outbound and inbound protection, incidents such as leaking private data, infecting visitorswith malware and displaying defaced web pages are often reported by the press, damaging enterprises’ reputation andcustomer confidence.The WikiLeaks attacks have taught us that information security strategies must evolve to keep up with the ever-changingattack vectors leveraged against web applications and web sites across the Internet. It is no longer enough to protectagainst traditional and modern attacks; it is now necessary to protect against both – simultaneously.Existing (traditional) security solutions like Stateful Inspection Network Firewalls, Proxy ect, port-based IPS and IDS in amulti device approach do not have a defense mechanism against:• Zero-Day Malware Attacks• INBOUND Modern Threats• OUTBOUND Data / Information Leakage• Advanced Persistent Threats (APT)• Advanced Evasion Techniques (AET)• Local Exploits• Unauthorized Changes MODERN THREATS Figure 1. Traditional Multiple Stand-Alone Security Appliances Complex Setup
  3. 3. NEXT GENERATION THREAT PREVENTION SOLUTION FOR INBOUND AND OUTBOUND TRAFFICA unified security solution that features the best multi-layer visibility with the control to detect and mitigate multi-layerattacks as well as prevent data leakage. MODERN THREATS CLEAN REQUESTS WEB IWS SERVER PALO ALTO NETWORKS NEXT (PROTECTS AGAINST INTERNET GENERATION FIREWALL INFORMATION LEAKAGE) DATABASE Custom Custom Undesirable Error Page Error Page Contents Contains sensitive information in response CLEAN REPLIES Figure 2. Next Generation Threat Prevention Solution Setup Features And BenefitsPalo Alto Networks Next-Generation Firewall• Identify, Control, and Safely Enable Applications ➤ Provides visibility and control over applications, users, and content, regardless of port, protocol, evasive tactics, or encryption.• Inspect All Content for All Threats in Real Time ➤ Allows end-customers to limit traffic to approved applications and scan it in real time and in context for threats, including exploits, viruses, spyware, confidential data leaks, and targeted malware.• Deliver High Throughput and Performance ➤ Examines all network traffic only once, using hardware with dedicated processing resources for security, networking, content scanning, and management.• Simplify Network Security Infrastructure and Reduce Total Cost of Ownership ➤ Provides end-customers a broad range of network security functionality delivered through a single platform, eliminating the need for multiple, stand-alone security appliances.• Enable Diverse Deployment Scenario ➤ Broadly deployed in the enterprise network environment, including the data centre, at the network perimeter, through the distributed enterprise, and in the evolving environments of cloud computing, virtualization, and mobility.iNFOTECT’s iNSIGHT for Web Server (IWS)• World’s First Dedicated Outbound Security Solution for Web and Cloud Services• Patented technologies that uniquely: ➤ Prevent information leakage from Web/Cloud portals. ➤ Prevent malware transmission from hacked pages to end-customers. ➤ Prevent display of defaced web pages to end-customers.• Out-of-the-box protection for 6 critical types of information: ➤ Personal ➤ Financial ➤ Healthcare ➤ Source Code ➤ Server Configurations ➤ Hacked / Infectious Pages
  4. 4. Benefits of Palo Alto Networks Next-Generation Firewall and iNSIGHT For Web ServerPalo Alto Networks Next-Generation Firewall and iNSIGHT For Web Server provide both inbound and outbound protectionto your existing security systems to form a complete 360o protection for your enterprise web servers.With NEC APAC Next Generation Threat Prevention Solution for Inbound and Outbound Traffic, end-customers will havemore confidence and trust in your web-based e-services. You can assure them of complete protection of their privateinformation. At the same time, you eliminate the need for multiple, stand-alone security appliances, complex configurationand tedious central repository setup. This will help to substantially reduce your total capital cost. In addition, you can avoidhefty regulatory penalties and damage to your brand and reputation which can result from information leakages from youre-services.Most important of all, you can be fully confident of meeting the security needs of your customers. In the process, you andyour customers can have peace of mind, knowing that your internal network is safe, secure and protected. ABOUT NEC ASIA PACIFIC PTE LTD (NEC APAC) Singapore-based NEC Asia Pacific is the regional headquarters for NEC Corporation in the Asia Pacific region (South and Southeast Asia, and Oceania). As a leading infocomm technology provider and systems integrator offering regional sales and services support and consultancy, NEC APAC develops solutions on carrier network, global identity, RFID, enterprise server, unified communications, multimedia display, and contact centre, as well as provide outsourcing and managed services. To leverage on its technological expertise, NEC APAC has established regional competency centres for public safety and display solutions to expand its capabilities and expertise to support its businesses. In line with the NEC Group Vision to realize an information society friendly to humans and the earth, NEC also embarks on corporate social responsibilities (CSR) initiatives to support and “make a difference” to the Nature (environment), Education and Community. For more information, visit www.nec.com.sg. Technology Partners: To learn more about our solutions, email us at CyberSecurity_PS@nec.com.sg or contact our authorised partners.singapore Australia india indonesia MalaysianeC asia Pacific Pte Ltd neC australia Pty Ltd neC India Pvt. Ltd. PT. neC Indonesia neC Coporation of Malaysia sdn. bhd www.nec.com.au www.necindia.in www.nec.co.id www.necmalaysia.com.my(APAC regional Headquarters) new Zealand Philippines thailand Vietnamwww.nec.com.sg neC new Zealand Ltd neC Philippines, Inc. neC Coporation (Thailand) Ltd. neC vietnam Co., Ltd. www.nec.co.nz www.nec.com.ph www.nec.co.th www.necsv.com©2012 NEC Corporation NEC and NEC logo are trademarks of NEC Corporation

×