Is Astaro's security solution the right fit for my business?
Upcoming SlideShare
Loading in...5
×
 

Is Astaro's security solution the right fit for my business?

on

  • 992 views

 

Statistics

Views

Total Views
992
Views on SlideShare
990
Embed Views
2

Actions

Likes
0
Downloads
25
Comments
0

1 Embed 2

http://www.slideshare.net 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page in 1995 we used firewalls in 2000 we added xyz in 2005 we used all the prior - plus xyz… now we even need tools to centrally manage for any customer this is slow and complex, and therefore insecure expensive, and therefore prohibitive Therefore we predict for 2010 Service providers will provide clean(er) pipes (use example of electricity and water provider…) UTM gateways and switches Special apps Transition: …and this is the business Astaro is in
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page

Is Astaro's security solution the right fit for my business? Is Astaro's security solution the right fit for my business? Presentation Transcript

  • Simplifying Email, Web & Network Protection
  • Topics
    • Astaro Company Profile
    • The Security Struggle
    • Overview of Astaro Security Gateway
    • Security Applications
      • Web Security
      • Email Security
      • Network Security
    • Appliances and Software
    • Additional Astaro Products
    • Business Value
    © Astaro 2007 Network Security Web Security Email Security
  • Astaro Company Profile
    • Founded in 2000
    • Pioneered what is called Unified Threat Management market
    • Profitable, growing 60%
    • Award-Winning Products
      • Astaro Security Gateway – the most flexible solution for integrated email, web, and network protection
      • protects 40.000+ networks in over 60 countries
      • Easy to deploy and manage
    • Global Presence
      • Headquarters in Karlsruhe, Germany and Boston, USA
      • 100+ employees in EMEA, Americas and APAC
      • 24x7 technical support
      • 1000+ partners & reseller worldwidet (700+ in EMEA)
    © Astaro 2007
  • Customers © Astaro 2007
  • Recognition © Astaro 2007 Best of the year 2004 Best of the year 2005 Best of the year 2006 Editor's choice (2x) 5/5 Star Review (2x) Best of the year 2004 Best of the year 2005 Editor's choice Recommended product Product of the year 2005 Product of the year 2006
  • The Security Struggle © Astaro 2007 MULTIPLYING THREATS DEMAND MULTIPLE DEFENSES THAT ARE DIFFICULT TO INTEGRATE AND MANAGE
    • Evaluate
    • Purchase
    • Train
    • Install
    • Integrate
    • Configure
    • Manage
    • Update
    Firewall VPN Spam Blocking Anti- Virus Intrusion Detection URL Filtering Anti- Spyware
    • Firewall
    • 1995
    The growing demand for Internet Security © Astaro 2007 VPN URL Filter IDS Email Anti Virus Firewall 2000 Central report tool Central config tool Central mgmt tool Signing/encryption VoIP Security VPN Remote access NAC Wireless security P2P filter IM filter Anti Spyware Multi protocol AV IPS VPN URL Filter IDS Email Anti Virus Firewall 2005 App 3 App 2 App 1 UTM Gateways Clean pipe 2010
  • Astaro Security Gateway
    • Complete Perimeter Security
    © Astaro 2007 Network Security Web Security Email Security
  • Integrated Email, Web and Network Protection © Astaro 2007 Content Filter Anti Virus & Spyware IM & P2P Control Web Filtering Firewall IPS VPN Network Protection Email Security Spam Filter Anti Virus & Phishing Encryption
  • Layered Security © Astaro 2007 Astaro Security Gateway V7 External users Internet Firewall and VPN Intrusion Protection Content Filtering– Virus/Spam/URL/ Spyware/Phishing Internal users LANs Email Database Web Internal Resources
  • Integrated Management © Astaro 2007 Installation Update Logging and Reporting Network Security Web Security Email Security Management Interface
  • Web Security © Astaro 2007 Network Security Email Security Content Filtering Virus Protection IM and P2P Control Web Security Spyware Protection
  • Spyware Protection
    • Blocks downloads of spyware, adware, and other malicious software
    • Prevents infected systems from sending information back to the spyware server
    • Checks against a database of known spyware URLs
    • Gateway spyware blocking complements desktop anti-spyware tools
    © Astaro 2007
  • Virus Protection for the Web
    • Block viruses, worms, trojans, and other “malware” before they reach desktops
    • Scans HTTP and FTP traffic
      • Web & ftp downloads
      • Web-based email (MSN Hotmail, Yahoo! Mail)
    • Dual virus scanners with multiple detection methods
      • Virus signatures, heuristic analysis
    • Database of more than 300,000 virus signatures
      • Frequent automatic updates
    • Flexible management
      • Can specify file formats and text strings to block
    © Astaro 2007
  • Content Filtering (URL Blocking)
    • Enforces policies on appropriate use of the web
    • Administrators can define web use policies based on pre-defined categories of web sites
      • Nudity, gambling, criminal activities, shopping, drugs, job search, sports, entertainment, etc.
    • Sophisticated classification techniques
      • text classification, recognition of symbols and logos
    • Whitelists and blacklists to tailor access for groups of users
    • Measure and report on activities
    © Astaro 2007
  • IM & P2P Control
    • Manage the use of Instant Messaging Clients
      • AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google Talk/Jabber, Skype
    • Manage the use of Peer-to-Peer applications
      • Bittorrent, Edonkey, Gnutella,WinMX, Winny, Manolito, Ares, Direct Connect
    • Flexible control
      • For each application administrator can define, if it should be allowed or blocked and if he should receive a notice about its usage.
    © Astaro 2007
  • Email Security © Astaro 2007 Network Security Web Security Email Security Virus Protection Spam Protection Phishing Protection Email Security
  • Virus Protection for Email
    • Block viruses, worms, trojans, and other “malware” before they reach email servers of desktops
    • Scans SMTP and POP3 traffic
    • Dual virus scanners with multiple detection methods
      • Virus signatures, heuristic analysis
    • Database of more than 300,000 virus signatures
      • Frequent automatic updates
    • Flexible management
      • Can specify file formats and text strings to block
      • Emails and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined
    • Gateway virus protection supplements desktop virus scanning.
    © Astaro 2007
  • Spam Protection
    • Identifies and disposes unsolicited emails (spam)
    • Scans SMTP and POP emails
    • Multiple methods to identify spam
      • Reputation service with spam outbreak detection using patented Recurrent-Pattern Detection TM technology
      • Realtime Blackhole Lists, Whitelists/Blacklists, Greylisting, URL scanning, BATV, SPF record checking…
    • Detects spam in every language and format
    • Flexible management
      • Emails and attachments can be rejected with message to sender, passed with a warning or quarantined
      • User can individually release blocked messages via daily spam report or end user portal
    © Astaro 2007
  • Protection Against “Phishing”
    • “ Phishing” –
      • Criminals imitate emails from banks, credit card companies, eBay and other sources to obtain confidential user information
    • Astaro identifies and blocks phishing emails through several techniques:
      • Virus scanner identifies phishing signatures
      • URL filtering database captures phishing servers in the “suspicious” category
      • Content downloaded from web sites will be blocked if it matches patterns of phishing content
    © Astaro 2007 Internet Email Server Web Server Email Databases of Phishing Sites Scans for phishing signatures
  • Email Security © Astaro 2007 Network Security Web Security Email Security Email Encryption
  • Email Encryption
    • En-/Decryption and Digital Signatures for Emails
      • supports OpenPGP and S/MIME
    • Completely transparent
      • No additional Software on Client required
    • Easy Setup
      • Only three configuration steps to start
    • Central Management of all keys and certificates
      • No key or certificate distribution required
    • Allows Content/Virus scanning even for encrypted SMTP emails
    © Astaro 2007 SMTP Email in clear text Email Server Encrypted Email ‘ snmffdsa g Dsfg sdfgdsfgfdg Fdsg fgsdfgsdfgdsf Sfdgsdfdsfgsdf Fg fdsgdsfgsdfg Dfgdfsgfdsgfdsg dslsgdsfg External User Internal User
  • Network Security © Astaro 2007 Network Security Web Security Email Security VPN Gateway Firewall Intrusion Protection Network Security
  • Firewall
    • Stateful Packet Inspection
      • Packet filtering – inspects packet headers
      • Stateful packet inspection – tracks events across a session to detect violations of normal processes
      • Time-based rules and Policy-based routing
    • Application-Level Deep Packet Filtering
      • Scans packet payloads to enforce protocol-specific rules
    • Security proxies to simplify management
      • HTTP, FTP, POP3, SMTP, DNS, Socks, Ident
    • NAT (Network Address Translation) and masquerading
    • DoS (Denial of Service Attack) protection
    • Transparent mode eases administration
    © Astaro 2007
  • Virtual Private Network (VPN) Gateway
    • Encrypts data to create a secure private communications “tunnel” over the public Internet
    • Supports IPSec, SSL, L2TP, and PPTP VPNs
      • Windows, Linux, Unix and MacOS x clients
    • Advanced encryption
      • Supports all major encryption methods
    • Many authentication methods
    • Internal certificate authority
      • Full Public Key Infrastructure (PKI) support
    • Supports VPN tunnels based on dynamic IP interface addresses (DynDNS)
    © Astaro 2007
  • Intrusion Protection
    • Identifies and blocks application- and protocol- related probes and attacks
    • Database of over 6,000 patterns and rules
      • Probing, port scans, interrogations, host sweeps
      • Attacks on application vulnerabilities
      • Protocol exploitations
    • Intrusion detection and prevention
      • Notify administrator, or block traffic immediately
    • Powerful management interface
      • One click to enable or disable complete rule sets e.g. for email- or webservers
    © Astaro 2007
  • Astaro Security Gateway Appliances © Astaro 2007 1) hot-swappable Astaro Security Gateway 110/120 Astaro Security Gateway 220 Astaro Security Gateway 320 Astaro Security Gateway 425 Astaro Security Gateway 525/525F Environment Small office/ branch office Small to Medium business Medium business Medium business, enterprise division enterprise division Hardware specs 3 x 10/100 Base-TX ports integrated HD 8 x 10/100 Base-TX ports integrated HD 4 x 10/100 Base-TX ports 4 x Gigabit Base-TX port integrated HD 4 x Gigabit ports – PCI bus 4 x Gigabit ports – PCI Express bus Hardware acceleration card integrated HD Dual Intel Xeon CPU 10 x Gigabit ports – PCI Express bus - 525: 10 x Copper - 525F: 4 x Copper/6 x SFP Hardware acceleration card 2 integrated HD (RAID1) 1) 2 redundant Power supplies ) Performance Firewall VPN IPS 100 Mbps 30 Mbps 55 Mbps 260 Mbps 150 Mbps 110 Mbps 420 Mbps 200 Mbps 180 Mbps 1,200 Mbps 265 Mbps 450 Mbps 3,000 Mbps 400 Mbps 750 Mbps Astaro Security Gateway Software Runs on Intel-compatible PCs and servers
  • Other Astaro Products © Astaro 2007 Centralized management and real-time monitoring of installations with multiple ASG appliances Astaro Command Center Advanced IPSec VPN client with personal firewall and integrated dialer Astaro Secure Client Centralized security reporting engine that collects, correlates and analyzes security data and provides a huge portfolio of grafical reports Astaro Report Manager
  • Business Value
    • Enhance Security
      • Block threats with complete perimeter security
      • Integrated management reduces human error and increases speed of response
    • Increase productivity
      • Keep systems, networks and web sites up and running
      • Increase productivity by blocking spam and inappropriate web surfing
    • Simplify management
      • A complete perimeter security solution that is easy to deploy, manage and update, and that scales seamlessly from small offices to large headquarters installations.
    © Astaro 2007 Network Security Web Security Email Security
  • SC Magazine Awards 2007 ‘Best Network Security’ Solution
      • Voted as finalist by Astaro’s loyal user base
      • Selected as winner by jury of independent industry experts
      • Ceremony organized by the UK’s industry leading security publication
    © Astaro 2007
      • Winner of ‘Best Network Security’ Solution category in the 2007 SC Magazine European Awards