Your SlideShare is downloading. ×
0
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
RSA Media
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

RSA Media

252

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
252
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • CxO Balancing Act: (This slide is the first of 6 that sets up the business, technology, and security issues facing the Enterprise CxO today. This slide establishes that we understand the Enterprise customer pain points, and challenges they face.) With the dynamically changing global economy, shifting business priorities and increasing threat of security breaches, today's CxOs are caught in a high stakes balancing act. - CxOs are struggling to balance their business priorities against a changing world of: Surrounding technology or economic trends – we'll go into more detail on this in a few slides. Shifting microeconomics on a global scale – this forces your company to reallocate or reprioritize the investments they are making in response to changing opportunities and competitive threats. Increasing mobile society - With technology, there continues to be more devices, more bandwidth demands and the like. Technology is enabling an increasingly mobile workforce and multimedia, example HD streaming video from YouTube, is putting new demands on bandwidth requirements –all of which must be accessed from numerous devices. More reliance on social media – both at home and at work. Impact of social media on computer security is huge since the false “intimacy” of these sites is an open invitation to scammers…while further blurring the traditional Enterprise borders. - This is all against the backdrop of a threat matrix of increasing danger and risk – Risk is more prevalent in terms of the quantity, danger level of assaults and overall risk of each threat on your business. Threats targeted against specific companies are on the rise (ex: recent Chinese attack on Google). Cybercriminals are moving towards "IP theft as well as ID theft" . These threats are more malicious, more business driven, more organized and more frequent. - The CxO has the tough balancing act of simultaneously dealing with: World requirements and threats Against the pursuit of new market opportunities and need to drive to higher ROI/lower TCO. All while driving up employee productivity, increasing customer & partner collaboration, and keeping the company in regulatory compliance.
  • Technology Trends: (This slide establishes our knowledge of the key technology drivers and correlated demands these technology advances have for the Enterprise infrastructure.) As we stated on the business priority slide companies today are just looking to pursue business priorities which are still all about seizing opportunities, improving productivity and maximizing return on investment. Let's discuss these major technology trends and the implications to network security. Web 2.0 – The exploding demand for applications to facilitate web-based communities for social networking, content sharing, messaging, blogs, etc. is one of the most important technology trends. Web 2.0 has arrived with increasing demand for web surfing, Twitter/Facebook, IM, Streaming audio and video, games and personal email. Collaboration, increased productivity and improved marketing & sales insights to customers/prospects are all key benefits. With these benefits comes new security threats as well as dramatic increases in network bandwidth. Mobility – Now in our DNA, mobility is an assumed requirement with today's increasing mobile workforce. With this mobility, companies will realize increased productivity gains as employees can work from anywhere at anytime. There is an added benefit for built in disaster avoidance. However, along with these benefits comes security implications. With the greater number of mobile devices, end points, and user diversity, you need the ability to identify with confidence and convenience the user of the device. Secure remote access to these devices/end points, whether it is wired or wireless, and tying access rules to individuals is much harder as many of the endpoints are unmanaged. Virtualization – A way to achieve greater economy of existing physical assets in a a data center, Cloud Computing or Software as a Service (SaaS) environment. This provides ways to economize in a more predictable fashion the amount of applications or services purchased yet poses new threats to inter- application security as well as to the security of the hypervisors. Cloud/SaaS – The benefits of cloud computing/SaaS are many. Rapidly scalability, redundancy and decreased Cap-Ex are among the top. However, with these benefits comes security implications. Your data and applications are now beyond your perimeter. There is now direct access from mobile users to your data. Latency and bandwidth sensitive applications may suffer. Securing the link between your Enterprise systems and hosted systems for data exchange while being able to mutually authenticate both the server and client is a concern. All these implications need to be addressed. Converged Communications and Consolidation - Then of course you have converged communications and consolidation which provides companies wonderful ways of both saving money by reducing the number of vendors, the number of appliances, and the number of applications. This improves productivity in the converged communication space by providing a rich feature set utilizing VoIP. As Converged Communications advance to conform to new usage patterns of the new workforce, this provides more carriers for malware, and places greater demands on the network. Example: this new workforce is uploading every minute 15 hours of YouTube videos. Companies start to tap into those technologies, and what you see happening to the infrastructure is highlighted on the right. Since I can not tolerate a decline in my performance, I can not introduce latency into the network on a phone call for example, the availability has to be there and I don’t want to bring on more complexity into this equation. Ease of use remains a key demand especially since companies today have scaled back in 2009. We don’t have luxury of having people to dedicate themselves to complex deployments - and it has to be manageable and of course it has to be secure. They certainly don’t want to open up a network to the threats we talked about earlier.
  • - In an increasingly collaborative and mobile world, where apps exist in consolidated data centers and in the cloud, it makes more sense to move the perimeter more tightly around the apps themselves and focus on authorization vs. authentication.  That is the emphasis for application visibility and application control- that trends are pushing organizations to focus security more on app layer access vs. network layer authentication. - The network is both contracting and expanding- contracting by moving the authorization perimeter around the apps, expanding by defining the network to be any point of interaction between users and data, where more users are remote and more data exists in the cloud.  That speaks to the balancing act around security and also reinforces the dissolving borders, they are not gone, but they exist in multiple layers and the old style perimeter from 10 years ago has dissolved
  • During the day – employees are “just” downloading files… or surfing … or IM’ing. Data from a Burst Media survey shows that over 25% of office Internet traffic is non-business. Forrester Research data states 50% of surveyed companies say at least 30% of their network bandwidth if being consumed by social media traffic. The result: higher bandwidth costs with reduced employee productivity.
  • A Secure Future: (This is a crucial slide. This sets up the SonicWALL vision for a Secure Future. This slide is designed to help establish thought leadership and provide "our take" on what a Secure Future will look like. Keep in mind this is a vision so not all the answers can be realized today yet, SonicWALL is on the fast track to do so.) - Dramatically read the questions. Accent the words in bold . These words are critical differentiators for SonicWALL . - What if.... You could control, manage and protect  your global network  easily, automatically ? You could receive & share threat and defense data around the world in  real time ? You could secure any user, any device, using any application from anywhere ? You could scale services securely without compromising reliability ? You could access any Carrier, SaaS, or Cloud without security impact ? You could control different applications more easily , manage their bandwidth , and block objectionable applications? You could always see and know what the malicious activities are on your network? You could do all of this and actually lower your TCO ?
  • Dynamic Security for the Global Network - Our vision is simple: we believe security solutions should be smart enough to adapt as organizations evolve and as threats evolve, dynamically, globally. We believe customers around the world should have the ability to control, manage and protect their global network easily and automatically. We believe customers should be able to receive & share threat and defense data around the world so they can anticipate and stop attacks before they happen. We believe customers should be able to secure any user, any device, using any application from anywhere so they can collaborate securely across different networks. All this needs to be achieved with maximum ease of deployment and at the best economic value and in a compliant framework. - Built upon a shared network of millions of global touch points, Dynamic Security requires: Be Global and support distributed, diverse networks. Have Mobility in its genes and recognize that we are increasingly in a mobile world. Work on your own network and secure applications as well as secure data in the Cloud. Supply real time Situational Visibility and Awareness so you can see and understand what is going on in your network – at all times. Realize the need for communication of shared threats and shared defenses. P roactively provide Risk Management while also ensuring Compliance. All of this is done with the Best Economics in the industry. - To realize this vision against a fast moving, ever-changing business, technology and social world, you need network security that is dynamic and designed to proactively anticipate threats and provide defenses. It needs to dynamically scale to protect your business – today and tomorrow. - At SonicWALL this is our vision. We call this Dynamic Security for the Global Network.
  • Technology Trends: (This slide establishes our knowledge of the key technology drivers and correlated demands these technology advances have for the Enterprise infrastructure.) As we stated on the business priority slide companies today are just looking to pursue business priorities which are still all about seizing opportunities, improving productivity and maximizing return on investment. Let's discuss these major technology trends and the implications to network security. Web 2.0 – The exploding demand for applications to facilitate web-based communities for social networking, content sharing, messaging, blogs, etc. is one of the most important technology trends. Web 2.0 has arrived with increasing demand for web surfing, Twitter/Facebook, IM, Streaming audio and video, games and personal email. Collaboration, increased productivity and improved marketing & sales insights to customers/prospects are all key benefits. With these benefits comes new security threats as well as dramatic increases in network bandwidth. Mobility – Now in our DNA, mobility is an assumed requirement with today's increasing mobile workforce. With this mobility, companies will realize increased productivity gains as employees can work from anywhere at anytime. There is an added benefit for built in disaster avoidance. However, along with these benefits comes security implications. With the greater number of mobile devices, end points, and user diversity, you need the ability to identify with confidence and convenience the user of the device. Secure remote access to these devices/end points, whether it is wired or wireless, and tying access rules to individuals is much harder as many of the endpoints are unmanaged. Virtualization – A way to achieve greater economy of existing physical assets in a a data center, Cloud Computing or Software as a Service (SaaS) environment. This provides ways to economize in a more predictable fashion the amount of applications or services purchased yet poses new threats to inter- application security as well as to the security of the hypervisors. Cloud/SaaS – The benefits of cloud computing/SaaS are many. Rapidly scalability, redundancy and decreased Cap-Ex are among the top. However, with these benefits comes security implications. Your data and applications are now beyond your perimeter. There is now direct access from mobile users to your data. Latency and bandwidth sensitive applications may suffer. Securing the link between your Enterprise systems and hosted systems for data exchange while being able to mutually authenticate both the server and client is a concern. All these implications need to be addressed. Converged Communications and Consolidation - Then of course you have converged communications and consolidation which provides companies wonderful ways of both saving money by reducing the number of vendors, the number of appliances, and the number of applications. This improves productivity in the converged communication space by providing a rich feature set utilizing VoIP. As Converged Communications advance to conform to new usage patterns of the new workforce, this provides more carriers for malware, and places greater demands on the network. Example: this new workforce is uploading every minute 15 hours of YouTube videos. Companies start to tap into those technologies, and what you see happening to the infrastructure is highlighted on the right. Since I can not tolerate a decline in my performance, I can not introduce latency into the network on a phone call for example, the availability has to be there and I don’t want to bring on more complexity into this equation. Ease of use remains a key demand especially since companies today have scaled back in 2009. We don’t have luxury of having people to dedicate themselves to complex deployments - and it has to be manageable and of course it has to be secure. They certainly don’t want to open up a network to the threats we talked about earlier.
  • Technology Trends: (This slide establishes our knowledge of the key technology drivers and correlated demands these technology advances have for the Enterprise infrastructure.) As we stated on the business priority slide companies today are just looking to pursue business priorities which are still all about seizing opportunities, improving productivity and maximizing return on investment. Let's discuss these major technology trends and the implications to network security. Web 2.0 – The exploding demand for applications to facilitate web-based communities for social networking, content sharing, messaging, blogs, etc. is one of the most important technology trends. Web 2.0 has arrived with increasing demand for web surfing, Twitter/Facebook, IM, Streaming audio and video, games and personal email. Collaboration, increased productivity and improved marketing & sales insights to customers/prospects are all key benefits. With these benefits comes new security threats as well as dramatic increases in network bandwidth. Mobility – Now in our DNA, mobility is an assumed requirement with today's increasing mobile workforce. With this mobility, companies will realize increased productivity gains as employees can work from anywhere at anytime. There is an added benefit for built in disaster avoidance. However, along with these benefits comes security implications. With the greater number of mobile devices, end points, and user diversity, you need the ability to identify with confidence and convenience the user of the device. Secure remote access to these devices/end points, whether it is wired or wireless, and tying access rules to individuals is much harder as many of the endpoints are unmanaged. Virtualization – A way to achieve greater economy of existing physical assets in a a data center, Cloud Computing or Software as a Service (SaaS) environment. This provides ways to economize in a more predictable fashion the amount of applications or services purchased yet poses new threats to inter- application security as well as to the security of the hypervisors. Cloud/SaaS – The benefits of cloud computing/SaaS are many. Rapidly scalability, redundancy and decreased Cap-Ex are among the top. However, with these benefits comes security implications. Your data and applications are now beyond your perimeter. There is now direct access from mobile users to your data. Latency and bandwidth sensitive applications may suffer. Securing the link between your Enterprise systems and hosted systems for data exchange while being able to mutually authenticate both the server and client is a concern. All these implications need to be addressed. Converged Communications and Consolidation - Then of course you have converged communications and consolidation which provides companies wonderful ways of both saving money by reducing the number of vendors, the number of appliances, and the number of applications. This improves productivity in the converged communication space by providing a rich feature set utilizing VoIP. As Converged Communications advance to conform to new usage patterns of the new workforce, this provides more carriers for malware, and places greater demands on the network. Example: this new workforce is uploading every minute 15 hours of YouTube videos. Companies start to tap into those technologies, and what you see happening to the infrastructure is highlighted on the right. Since I can not tolerate a decline in my performance, I can not introduce latency into the network on a phone call for example, the availability has to be there and I don’t want to bring on more complexity into this equation. Ease of use remains a key demand especially since companies today have scaled back in 2009. We don’t have luxury of having people to dedicate themselves to complex deployments - and it has to be manageable and of course it has to be secure. They certainly don’t want to open up a network to the threats we talked about earlier.
  • Unique Technology Approach - Key to achieving our vision is through the unique technology innovation approach combined with the power of SonicWALL Grid Network backed by SonicWALL Research Labs. We feel in order to achieve our vision for a Secure Future you must engineer for: 1) Real time, deep protection – this provides simultaneous, proactive, multi-directional scanning and analysis capability that's more than just inspecting headers at the packet level. It's more than inspecting just signatures because we do a deeper, behavioral analysis on the traffic. This is done in real time, dynamically as we constantly communicate with the SonicWALL Grid Network. 2) We build all our technologies upon a Scalable Engine Architecture. This crown jewel does Re-assembly Free Deep Packet Inspection (RFDPI) at wire speeds . It is the technology that enables us to scale in performance as well as provide inspection superiority. It's designed for all current and future protocols. 3) Another area for innovation is our Clustering Technology . By implementing our security clustering technology we are able to greatly improve availability, greatly increase network throughput and lower overall costs. 4) Massive Scalability & Bandwidth – With the increasing network bandwidth and security processing requirements needed to handle the technology and business trends, it is critical to design your architecture for massive scalability and high network bandwidth. To achieve this we have tightly coupled the scalable engine architecture with advances in hardware technology (e.g., multi-core, active-active clustering), along with the processing power of a multi-core design to simultaneously inspect both inbound and outbound network traffic – at super fast speeds. And unlike other engines, SonicWALL’s RFDPI engine is not limited by file size, number of connections, bandwidth available or the amount of concurrent traffic it can scan – all a key part of our ability to give businesses increased levels of awareness and visibility. 5) Best Economical Solution – the SonicWALL solution remains economical because it is not only easy to adopt, easy to deploy, easy to manage but it's modular design enables cost effective and easy purchase, upgrades and subscription services.
  • Technology Trends: (This slide establishes our knowledge of the key technology drivers and correlated demands these technology advances have for the Enterprise infrastructure.) As we stated on the business priority slide companies today are just looking to pursue business priorities which are still all about seizing opportunities, improving productivity and maximizing return on investment. Let's discuss these major technology trends and the implications to network security. Web 2.0 – The exploding demand for applications to facilitate web-based communities for social networking, content sharing, messaging, blogs, etc. is one of the most important technology trends. Web 2.0 has arrived with increasing demand for web surfing, Twitter/Facebook, IM, Streaming audio and video, games and personal email. Collaboration, increased productivity and improved marketing & sales insights to customers/prospects are all key benefits. With these benefits comes new security threats as well as dramatic increases in network bandwidth. Mobility – Now in our DNA, mobility is an assumed requirement with today's increasing mobile workforce. With this mobility, companies will realize increased productivity gains as employees can work from anywhere at anytime. There is an added benefit for built in disaster avoidance. However, along with these benefits comes security implications. With the greater number of mobile devices, end points, and user diversity, you need the ability to identify with confidence and convenience the user of the device. Secure remote access to these devices/end points, whether it is wired or wireless, and tying access rules to individuals is much harder as many of the endpoints are unmanaged. Virtualization – A way to achieve greater economy of existing physical assets in a a data center, Cloud Computing or Software as a Service (SaaS) environment. This provides ways to economize in a more predictable fashion the amount of applications or services purchased yet poses new threats to inter- application security as well as to the security of the hypervisors. Cloud/SaaS – The benefits of cloud computing/SaaS are many. Rapidly scalability, redundancy and decreased Cap-Ex are among the top. However, with these benefits comes security implications. Your data and applications are now beyond your perimeter. There is now direct access from mobile users to your data. Latency and bandwidth sensitive applications may suffer. Securing the link between your Enterprise systems and hosted systems for data exchange while being able to mutually authenticate both the server and client is a concern. All these implications need to be addressed. Converged Communications and Consolidation - Then of course you have converged communications and consolidation which provides companies wonderful ways of both saving money by reducing the number of vendors, the number of appliances, and the number of applications. This improves productivity in the converged communication space by providing a rich feature set utilizing VoIP. As Converged Communications advance to conform to new usage patterns of the new workforce, this provides more carriers for malware, and places greater demands on the network. Example: this new workforce is uploading every minute 15 hours of YouTube videos. Companies start to tap into those technologies, and what you see happening to the infrastructure is highlighted on the right. Since I can not tolerate a decline in my performance, I can not introduce latency into the network on a phone call for example, the availability has to be there and I don’t want to bring on more complexity into this equation. Ease of use remains a key demand especially since companies today have scaled back in 2009. We don’t have luxury of having people to dedicate themselves to complex deployments - and it has to be manageable and of course it has to be secure. They certainly don’t want to open up a network to the threats we talked about earlier.
  • Thank you! - We welcome further discussions and invite any additional questions you may have on our capabilities. - We thank you for your time and attention today.
  • Transcript

    • 1. RSA Media & Analyst Briefing March 2-4, 2010
    • 2. The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger Changing World Business Priorities Partner & Customer Collaboration High ROI Low TCO Workforce Effectiveness Risk Management & Compliance New & Malicious Threats Macro Economics Mobile Social Media
    • 3. Technology Trends Impacts to Productivity & ROI <ul><li>Infrastructure Demands: </li></ul><ul><ul><li>Bandwidth </li></ul></ul><ul><ul><li>Performance </li></ul></ul><ul><ul><li>Availability </li></ul></ul><ul><ul><li>Ease of use </li></ul></ul><ul><ul><li>Manageability </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><ul><li>TCO </li></ul></ul>Converged Comms Cloud/SaaS Consolidation Virtualization Web 2.0 Mobile Devices
    • 4. The Business Impact – Perimeter Contraction / Network Expansion 2001: Network Perimeter 2010: Network Expansion Corporate Data Centers Customers or Suppliers Remote Access External Users Beyond 2010 – More Collaboration, More Content, More Communications = More IT Challenges VOIP Users Traveling Users Remote Employees User Protection Access Control Productivity Controls Saas, Web 2.0 Real-Time Apps Perimeter / Internal Security Business Communication Protection Partner Access WANs Extranets Collaboration Cloud/ SaaS Converged Communications
    • 5. Employee Productivity & Security Impact <ul><li>Blogging </li></ul><ul><li>Facebook </li></ul><ul><li>Twitter </li></ul><ul><li>IM </li></ul><ul><li>Streaming video </li></ul><ul><li>Streaming audio </li></ul><ul><li>Downloading files </li></ul><ul><li>Playing games </li></ul><ul><li>Webmail </li></ul><ul><li>Wikis </li></ul>Copyright 2009 SonicWALL Inc. All Right Reserved. <ul><li>25% of office Internet traffic is non-business related (Burst Media Survey, 2008) </li></ul><ul><ul><li>50% of surveyed companies said at least 30% of their bandwidth is being consumed by social networking traffic (Forrester, Feb 2009) </li></ul></ul><ul><ul><li>Malware, Trojans, BotNets, Intrusions out of control </li></ul></ul>
    • 6. A Secure Future <ul><li>What if.... </li></ul><ul><li>You could control, manage and protect your global network easily, automatically? </li></ul><ul><li>You could control different applications more easily, manage their bandwidth, and block objectionable applications? </li></ul><ul><li>You could receive & share threat and defense data around the world in real time? </li></ul><ul><li>You could secure any user, any device, using any application from anywhere? </li></ul><ul><li>You could scale services securely without compromising reliability? </li></ul><ul><li>You could access any Carrier, SaaS, or Cloud without security impact? </li></ul><ul><li>You could always see and know what the malicious activities are on your network? </li></ul><ul><li>You could do all of this and actually lower your TCO?  </li></ul>
    • 7. Dynamic Security for the Global Network <ul><li>Global, Distributed, Mobile and Cloud </li></ul><ul><li>Real-time Situational Visibility and Awareness </li></ul><ul><li>Communication of Shared Threats and Shared Defenses </li></ul><ul><li>Proactive Risk Management and Compliance </li></ul><ul><li>Best Economics </li></ul>
    • 8. What's New? <ul><li>Family of Virtual Appliances Focused on SECURITY </li></ul><ul><li>Deployed in VMware environment </li></ul><ul><li>Choice and flexibility for Enterprises, SMBs, and Managed Service Providers </li></ul><ul><li>Solutions to range from Global Management, Reporting, Email Security, SSL VPN </li></ul><ul><li>Multi-Gigabit Appliances delivered with Application Intelligence & Control AND Intrusion Prevention </li></ul><ul><li>New Intuitive Visualization Tools to categorize and take action on all network activity for optimization </li></ul><ul><li>Flexible Deployment as the Gateway or In-Line behind a Firewall </li></ul>Introducing Portfolio of Security Virtual Appliances New Category of Products Focused on Application Intelligence, Control, and Security
    • 9. Delivering Virtual Appliance Solutions
    • 10. Technology Trends Impacts to Productivity & ROI <ul><li>Infrastructure Demands: </li></ul><ul><ul><li>Bandwidth </li></ul></ul><ul><ul><li>Performance </li></ul></ul><ul><ul><li>Availability </li></ul></ul><ul><ul><li>Ease of use </li></ul></ul><ul><ul><li>Manageability </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><ul><li>TCO </li></ul></ul>Cloud, SaaS, Consolidation, Virtualization Driven By TCO and Optimization Needs Converged Comms Cloud/SaaS Consolidation Virtualization Web 2.0 Mobile Devices
    • 11. Technology Trends Plus Fundamental TCO Economics Source:1. IDC, U.S. and Worldwide Server Installed Base 2007–2011 Forecast, Doc #207044, May 2007 2. IDC, Virtualization And Multicore Innovations Disrupt The Worldwide Server Market, Doc #206035, March 2007 3. Source: VMware
    • 12. Benefits of Security Virtual Appliance Strategy Advantage Details Increased Security: Hardened SonicLinux Operating System; users are not able to tamper with the virtual appliance Lower TCO: The virtual appliance is a pre-configured virtual machine - there are no dedicated hardware prerequisites, no professional service fees and no hidden costs. It's all in the appliance! Higher Performance Optimized software and hardware architecture; no unnecessary processes active Reduced Complexity: Simplified product selection, product integration, ongoing support.
    • 13. SonicWALL GMS and ViewPoint Virtual Appliances Introduced at RSA
    • 14. SonicWALL GMS Virtual Appliance <ul><li>The GMS Virtual Appliance is based on SonicWALL GMS version 6.0 announced earlier this year </li></ul><ul><li>Flexible, powerful and intuitive solution to centrally manage and rapidly deploy all of their SonicWALL firewall, anti-spam, backup and recovery, and secure remote access solutions </li></ul><ul><li>Enterprises and MSPs use SonicWALL GMS to manage thousands of appliances simultaneously </li></ul><ul><ul><li>Centrally create &push security policies </li></ul></ul><ul><ul><li>Provide real-time monitoring and Alerting </li></ul></ul><ul><ul><li>Intuitive compliance and usage reports from a single management interface. </li></ul></ul>
    • 15. SonicWALL ViewPoint Virtual Appliance <ul><li>The ViewPoint Virtual Appliance provides granular reporting on one or more SonicWALL security devices, allowing administrators to closely track network utilization, monitor security activity and view Web usage. </li></ul>
    • 16. Delivering Multi-Gigabit Application Intelligent Firewall with IPS
    • 17. Technology Trends Impacts to Productivity & ROI <ul><li>Infrastructure Demands: </li></ul><ul><ul><li>Bandwidth </li></ul></ul><ul><ul><li>Performance </li></ul></ul><ul><ul><li>Availability </li></ul></ul><ul><ul><li>Ease of use </li></ul></ul><ul><ul><li>Manageability </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><ul><li>TCO </li></ul></ul>Web 2.0, Converged Communications, Mobile Devices Drive Need for Dynamic Security While Maintaining Performance Cloud/SaaS Consolidation Virtualization Converged Comms Web 2.0 Mobile Devices
    • 18. SonicWALL E-Class NSA E8500 Application Intelligence and IPS
    • 19. SonicWALL NSA E8500: High Performance Application Intelligence & IPS <ul><li>Comprehensive Inspection W/ Ease of Use </li></ul><ul><li>Application Intelligence & Control </li></ul><ul><li>Powerful IPS, Multi-gig performance </li></ul><ul><li>Management of traffic </li></ul><ul><li>Visualization of traffic </li></ul><ul><li>RFDPI Technology (low latency) </li></ul><ul><li>SSL Traffic Inspection </li></ul><ul><li>“ Bump in the Wire” mode or traditional gateway </li></ul><ul><li>The Technology </li></ul><ul><li>16-Core, 4GB RAM </li></ul><ul><li>8.0 Gbps Stateful Inspection </li></ul><ul><li>3.5 Gbps IPS </li></ul><ul><li>2.0 Gbps Application Control </li></ul><ul><li>Detects over 1,000,000 unique threats </li></ul>Detects, Classifies and Controls over 1,100 Unique Applications
    • 20. Unique Technology Approach Every bit, every protocol, every user & application <ul><li>Scalable Engine Architecture </li></ul><ul><ul><li>Re-Assembly Free DPI – at wire speed </li></ul></ul><ul><ul><li>Virtually no latency introduced </li></ul></ul><ul><ul><li>Designed for current & future protocols </li></ul></ul><ul><ul><li>Foundation for all technologies </li></ul></ul><ul><li>Clustering Technology </li></ul><ul><ul><li>Increased availability </li></ul></ul><ul><ul><li>Increased throughput </li></ul></ul><ul><li>Massive Scalability & Bandwidth </li></ul><ul><ul><li>Multi-core, parallel architectures </li></ul></ul><ul><ul><li>Unlimited data size or formats </li></ul></ul><ul><ul><li>Unlimited number of connections </li></ul></ul><ul><li>Best Economical Solution </li></ul><ul><ul><li>Easy to adopt, deploy and manage </li></ul></ul><ul><ul><li>Modular platform </li></ul></ul><ul><li>Real-time, Deep protection </li></ul><ul><ul><li>Simultaneous, proactive, multi-threat scanning & analysis </li></ul></ul><ul><ul><li>Real-time communications with SonicWALL GRID Network </li></ul></ul><ul><ul><li>Behavioral Analysis & Protection </li></ul></ul>
    • 21. Application Intelligence & Control <ul><li>Identify </li></ul><ul><li>By App </li></ul><ul><li>Not by Port & Protocol </li></ul><ul><li>Categorize </li></ul><ul><li>By app </li></ul><ul><li>By Category of App </li></ul><ul><li>By destination </li></ul><ul><li>For which person or groups </li></ul><ul><li>Control </li></ul><ul><li>Allow </li></ul><ul><li>Block </li></ul><ul><li>Bandwidth Prioritize </li></ul>Critical Business (Allocate Bandwidth) Observe, Act, React (Dig in, Take New Action) Acceptable Applications (Limit Bandwidth) Social (Allocate bandwidth to Marketing Block Social to all others) Application Chaos (So many on port 80)
    • 22. Bringing It All Together Converged Comms Cloud/SaaS Consolidation Virtualization Web 2.0 Mobile Devices Virtualized Environment Network Security Protection for Virtualized Environment
    • 23. SonicWALL Financial Results
    • 24. Use of Non-GAAP Financial Measures
    • 25. Fourth Quarter 2009 At-a-Glance *Please see non-GAAP disclosures. $166.9m $103.5m $0.11 $5.9m 15.5% 71.3% $54.3 Q4 2008 $203.0m $116.7m $0.10 $5.4m 15.8% 73.3% $50.7 Q3 2009 29% 6% $215.9m Cash and Investments 20% 6% $124.2m Deferred Revenue 0% 10% $0.11 Non-GAAP EPS 2% 11% $6.0m Non-GAAP Net Income 5% 5% 16.2% Non-GAAP Op. Margin -- -- 70.7% Non-GAAP Gross Margin 0% 7% $54.1 Revenue Y-Y % Growth Seq. % Growth Q4 2009
    • 26. Momentum in Deferred Revenue
    • 27. Momentum in Cash Flow $36 million in CFO in 2009
    • 28. Revenue Breakdown Q4 08 Q3 09 Q4 09 60% 40% 62% 38% 42% 58%
    • 29. Total Revenue by Product Category Q4 08 Q3 09 Q4 09 77% 78% 78% 9% 9% 9% 10% 9% 9% 4% 4% 4%
    • 30. Product Revenue by Product Line Q4 08 Q3 09 Q4 09 35% 38% 38% 42% 41% 40% 23% 21% 22%
    • 31. Our Vision <ul><li>We believe security solutions should be “smart” enough to adapt as organizations evolve and as threats evolve, dynamically, globally. </li></ul><ul><li>We believe customers around the world should have the ability to control, manage and protect their global network easily and automatically.  </li></ul><ul><li>We believe our customers should be able to receive and share threat and defense data around the world so they can anticipate and stop attacks before they happen. We want our customers to be able to secure any user, any device, using any application from anywhere so they can collaborate securely across different networks. </li></ul><ul><li>All this needs to be achieved with maximum ease of deployment and at the best economic value and in a compliant framework.  </li></ul>
    • 32. Thank You! Colleen Nichols Sr. Director, Public Relations +1.408.962.6131 [email_address] www.sonicwall.com John Gordineer Director, Product Marketing +1.408.962.7887 [email_address] www.sonicwall.com Kelly Blough Sr. Director, Investor Relations +1.408.962.6329 [email_address] www.sonicwall.com

    ×