SlideShare a Scribd company logo
1 of 4
Download to read offline
CYBER SECURITY SOLUTIONS
Next Generation Threat Prevention Solution For
Inbound and Outbound Traffic




                                                 NEC Asia Pacific
                                                 www.nec.com.sg
TODAY 80 PERCENT OF IT SECURITY SPENDING IS AIMED
AT DEPLOYING SOLUTIONS THAT DO NOT PROTECT
AGAINST TODAY’S MOST LIKELY, MOST DAMAGING, AND
COSTLIEST ATTACKS.


It often takes a massive DDoS threat, data theft from spoofing, or other sophisticated cyber-attacks before an organization
realizes it is only protected from yesterday’s problems.

As a leading System Integrator, NEC APAC provides the best-of-breed security solutions with Palo Alto Networks Next-
Generation Firewall and Infotect Security’s iNSIGHT For Web Server (IWS) to provide the intelligence, flexibility, and scale
you need to stay secure in today’s ever-changing and increasingly chaotic threat landscape.




 SECURITY-RELATED CHALLENGES FACED BY BUSINESS TODAY

Modern threats are distributed, diverse and cross the chasm that divides network components from application infrastructure.

Enterprise e-services are accessible 24x7 by anyone across the world, especially now with the increased usage of mobile
devices. Yet, efforts for past decades have sorely neglected the risks of enterprise e-services and, in recent years, cloud
and mobile services. Without outbound and inbound protection, incidents such as leaking private data, infecting visitors
with malware and displaying defaced web pages are often reported by the press, damaging enterprises’ reputation and
customer confidence.

The WikiLeaks attacks have taught us that information security strategies must evolve to keep up with the ever-changing
attack vectors leveraged against web applications and web sites across the Internet. It is no longer enough to protect
against traditional and modern attacks; it is now necessary to protect against both – simultaneously.

Existing (traditional) security solutions like Stateful Inspection Network Firewalls, Proxy ect, port-based IPS and IDS in a
multi device approach do not have a defense mechanism against:

•	   Zero-Day Malware Attacks
•	   INBOUND Modern Threats
•	   OUTBOUND Data / Information Leakage
•	   Advanced Persistent Threats (APT)
•	   Advanced Evasion Techniques (AET)
•	   Local Exploits
•	   Unauthorized Changes




                                                                                                             MODERN THREATS




                              Figure 1. Traditional Multiple Stand-Alone Security Appliances Complex Setup
NEXT GENERATION THREAT PREVENTION SOLUTION FOR
    INBOUND AND OUTBOUND TRAFFIC

A unified security solution that features the best multi-layer visibility with the control to detect and mitigate multi-layer
attacks as well as prevent data leakage.

                                      MODERN THREATS                        CLEAN REQUESTS




                                                                                                                                  WEB
                                                                                                      IWS
                                                                                                                                  SERVER
                                                      PALO ALTO NETWORKS NEXT                  (PROTECTS AGAINST
                        INTERNET                        GENERATION FIREWALL                  INFORMATION LEAKAGE)                       DATABASE




                                          Custom                                 Custom                             Undesirable
                                         Error Page                             Error Page                           Contents
                                                                                                                                     Contains
                                                                                                                                     sensitive
                                                                                                                                   information
                                                                                                                                   in response
                                                                           CLEAN REPLIES


                                                Figure 2. Next Generation Threat Prevention Solution Setup




    Features And Benefits

Palo Alto Networks Next-Generation Firewall
•	 Identify, Control, and Safely Enable Applications
	    ➤	 Provides visibility and control over applications, users, and content, regardless of port, protocol, evasive tactics, or encryption.
•	 Inspect All Content for All Threats in Real Time
	    ➤	 Allows end-customers to limit traffic to approved applications and scan it in real time and in context for threats, including exploits,
        viruses, spyware, confidential data leaks, and targeted malware.
•	 Deliver High Throughput and Performance
	    ➤	 Examines all network traffic only once, using hardware with dedicated processing resources for security, networking, content
        scanning, and management.
•	 Simplify Network Security Infrastructure and Reduce Total Cost of Ownership
	    ➤	 Provides end-customers a broad range of network security functionality delivered through a single platform, eliminating the need
        for multiple, stand-alone security appliances.
•	 Enable Diverse Deployment Scenario
	    ➤	 Broadly deployed in the enterprise network environment, including the data centre, at the network perimeter, through the distributed
        enterprise, and in the evolving environments of cloud computing, virtualization, and mobility.


iNFOTECT’s iNSIGHT for Web Server (IWS)
•	 World’s First Dedicated Outbound Security Solution for Web and Cloud Services
•	 Patented technologies that uniquely:
	    ➤	 Prevent information leakage from Web/Cloud portals.
	    ➤	 Prevent malware transmission from hacked pages to end-customers.
	    ➤	 Prevent display of defaced web pages to end-customers.
•	 Out-of-the-box protection for 6 critical types of information:
	    ➤	   Personal
	    ➤	   Financial
	    ➤	   Healthcare
	    ➤	   Source Code
	    ➤	   Server Configurations
	    ➤	   Hacked / Infectious Pages
Benefits of Palo Alto Networks Next-Generation Firewall and
 iNSIGHT For Web Server

Palo Alto Networks Next-Generation Firewall and iNSIGHT For Web Server provide both inbound and outbound protection
to your existing security systems to form a complete 360o protection for your enterprise web servers.

With NEC APAC Next Generation Threat Prevention Solution for Inbound and Outbound Traffic, end-customers will have
more confidence and trust in your web-based e-services. You can assure them of complete protection of their private
information. At the same time, you eliminate the need for multiple, stand-alone security appliances, complex configuration
and tedious central repository setup. This will help to substantially reduce your total capital cost. In addition, you can avoid
hefty regulatory penalties and damage to your brand and reputation which can result from information leakages from your
e-services.

Most important of all, you can be fully confident of meeting the security needs of your customers. In the process, you and
your customers can have peace of mind, knowing that your internal network is safe, secure and protected.




 ABOUT NEC ASIA PACIFIC PTE LTD (NEC APAC)
  Singapore-based NEC Asia Pacific is the regional headquarters for NEC Corporation in the Asia Pacific region (South and Southeast
  Asia, and Oceania). As a leading infocomm technology provider and systems integrator offering regional sales and services support
  and consultancy, NEC APAC develops solutions on carrier network, global identity, RFID, enterprise server, unified communications,
  multimedia display, and contact centre, as well as provide outsourcing and managed services. To leverage on its technological
  expertise, NEC APAC has established regional competency centres for public safety and display solutions to expand its capabilities
  and expertise to support its businesses.

  In line with the NEC Group Vision to realize an information society friendly to humans and the earth, NEC also embarks on corporate
  social responsibilities (CSR) initiatives to support and “make a difference” to the Nature (environment), Education and Community.
  For more information, visit www.nec.com.sg.




         Technology Partners:




    To learn more about our solutions, email us at CyberSecurity_PS@nec.com.sg or contact our authorised partners.


singapore                                     Australia                    india                   indonesia                        Malaysia
neC asia Pacific Pte Ltd                       neC australia Pty Ltd        neC India Pvt. Ltd.     PT. neC Indonesia                neC Coporation of Malaysia sdn. bhd
                                              www.nec.com.au               www.necindia.in         www.nec.co.id                    www.necmalaysia.com.my
(APAC regional Headquarters)
                                              new Zealand                  Philippines             thailand                         Vietnam
www.nec.com.sg
                                              neC new Zealand Ltd          neC Philippines, Inc.   neC Coporation (Thailand) Ltd.   neC vietnam Co., Ltd.
                                              www.nec.co.nz                www.nec.com.ph          www.nec.co.th                    www.necsv.com
©2012 NEC Corporation NEC and NEC logo are trademarks of NEC Corporation

More Related Content

What's hot

Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreAT Kishore
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco SoldiSMAU
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - rightresponsedatacomms
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsRemo Hardeman
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Aus lug lotus protector
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protectoraosborne
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Video Conferencing and Security
Video Conferencing and SecurityVideo Conferencing and Security
Video Conferencing and SecurityVideoguy
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 

What's hot (20)

Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Recent Work
Recent WorkRecent Work
Recent Work
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - right
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Aus lug lotus protector
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protector
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Video Conferencing and Security
Video Conferencing and SecurityVideo Conferencing and Security
Video Conferencing and Security
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 

Viewers also liked

Masonry Center of St. Louis
Masonry Center of St. LouisMasonry Center of St. Louis
Masonry Center of St. Louisdennygb
 
Joka Toinen Avioliitto PääTtyy Avioeroon
Joka Toinen Avioliitto PääTtyy AvioeroonJoka Toinen Avioliitto PääTtyy Avioeroon
Joka Toinen Avioliitto PääTtyy AvioeroonJaakko Väisänen
 
Performance In Lighting Giornale Installatore Elettrico 02.08
Performance In Lighting Giornale Installatore Elettrico 02.08Performance In Lighting Giornale Installatore Elettrico 02.08
Performance In Lighting Giornale Installatore Elettrico 02.08Performance in Lighting PiL
 
Reglamento 2008 2009
Reglamento 2008 2009Reglamento 2008 2009
Reglamento 2008 2009est47
 
Tuntisuunnitelma Lapuan Liike
Tuntisuunnitelma Lapuan LiikeTuntisuunnitelma Lapuan Liike
Tuntisuunnitelma Lapuan LiikeJaakko Väisänen
 
Comparing job offers_1.1.3.g1
Comparing job offers_1.1.3.g1Comparing job offers_1.1.3.g1
Comparing job offers_1.1.3.g1myersps
 
Diety Sołtysów 2009
Diety Sołtysów 2009Diety Sołtysów 2009
Diety Sołtysów 2009zembrzyce.eu
 
Etnisyys Osana Identiteettiä
Etnisyys Osana IdentiteettiäEtnisyys Osana Identiteettiä
Etnisyys Osana IdentiteettiäJaakko Väisänen
 

Viewers also liked (18)

Asiat
AsiatAsiat
Asiat
 
Masonry Center of St. Louis
Masonry Center of St. LouisMasonry Center of St. Louis
Masonry Center of St. Louis
 
Image1
Image1Image1
Image1
 
Yk TehtäViä
Yk TehtäViäYk TehtäViä
Yk TehtäViä
 
Kysymyspaperi Vastauksineen
Kysymyspaperi VastauksineenKysymyspaperi Vastauksineen
Kysymyspaperi Vastauksineen
 
Joka Toinen Avioliitto PääTtyy Avioeroon
Joka Toinen Avioliitto PääTtyy AvioeroonJoka Toinen Avioliitto PääTtyy Avioeroon
Joka Toinen Avioliitto PääTtyy Avioeroon
 
Actividad3 03
Actividad3 03Actividad3 03
Actividad3 03
 
Brand question
Brand questionBrand question
Brand question
 
Performance In Lighting Giornale Installatore Elettrico 02.08
Performance In Lighting Giornale Installatore Elettrico 02.08Performance In Lighting Giornale Installatore Elettrico 02.08
Performance In Lighting Giornale Installatore Elettrico 02.08
 
Reglamento 2008 2009
Reglamento 2008 2009Reglamento 2008 2009
Reglamento 2008 2009
 
Tuntisuunnitelma Lapuan Liike
Tuntisuunnitelma Lapuan LiikeTuntisuunnitelma Lapuan Liike
Tuntisuunnitelma Lapuan Liike
 
Comparing job offers_1.1.3.g1
Comparing job offers_1.1.3.g1Comparing job offers_1.1.3.g1
Comparing job offers_1.1.3.g1
 
Diety Sołtysów 2009
Diety Sołtysów 2009Diety Sołtysów 2009
Diety Sołtysów 2009
 
Statistiques - Moodle
Statistiques - MoodleStatistiques - Moodle
Statistiques - Moodle
 
Homero5ºA1
Homero5ºA1Homero5ºA1
Homero5ºA1
 
Etnisyys Osana Identiteettiä
Etnisyys Osana IdentiteettiäEtnisyys Osana Identiteettiä
Etnisyys Osana Identiteettiä
 
1000 calorie diet
1000 calorie diet1000 calorie diet
1000 calorie diet
 
Xp Sp3
Xp Sp3Xp Sp3
Xp Sp3
 

Similar to NEC IWS+PAN - Cyber Security Solutions

infraxstructure: Piotr Wojciechowski "Secure Data Center"
infraxstructure: Piotr Wojciechowski  "Secure Data Center"infraxstructure: Piotr Wojciechowski  "Secure Data Center"
infraxstructure: Piotr Wojciechowski "Secure Data Center"PROIDEA
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Privafy NetEdge
Privafy NetEdgePrivafy NetEdge
Privafy NetEdgePrivafy
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsCisco Case Studies
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Blind spots in the network.pdf
Blind spots in the network.pdfBlind spots in the network.pdf
Blind spots in the network.pdfDivyeshMDesai
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxtmbainjr131
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationVMware
 

Similar to NEC IWS+PAN - Cyber Security Solutions (20)

B&W Netsparker overview
B&W Netsparker overviewB&W Netsparker overview
B&W Netsparker overview
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
infraxstructure: Piotr Wojciechowski "Secure Data Center"
infraxstructure: Piotr Wojciechowski  "Secure Data Center"infraxstructure: Piotr Wojciechowski  "Secure Data Center"
infraxstructure: Piotr Wojciechowski "Secure Data Center"
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Privafy NetEdge
Privafy NetEdgePrivafy NetEdge
Privafy NetEdge
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Blind spots in the network.pdf
Blind spots in the network.pdfBlind spots in the network.pdf
Blind spots in the network.pdf
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
CYRENWebSecurity
CYRENWebSecurityCYRENWebSecurity
CYRENWebSecurity
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 

More from NECIndia

Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...
Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...
Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...NECIndia
 
Nec mobile-access-controller-brochure
Nec mobile-access-controller-brochureNec mobile-access-controller-brochure
Nec mobile-access-controller-brochureNECIndia
 
Nec safer cities solution (updated, sep2012) lowres
Nec safer cities solution   (updated, sep2012) lowresNec safer cities solution   (updated, sep2012) lowres
Nec safer cities solution (updated, sep2012) lowresNECIndia
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storageNECIndia
 
J75912 nec cloud brochure marketplace
J75912 nec cloud brochure marketplaceJ75912 nec cloud brochure marketplace
J75912 nec cloud brochure marketplaceNECIndia
 
L51W LED Mobile Projector
L51W LED Mobile ProjectorL51W LED Mobile Projector
L51W LED Mobile ProjectorNECIndia
 
J75912 nec cloud brochure desktop
J75912 nec cloud brochure desktopJ75912 nec cloud brochure desktop
J75912 nec cloud brochure desktopNECIndia
 
NEC IAC 6pp - folding for printer reference
NEC IAC 6pp - folding  for printer referenceNEC IAC 6pp - folding  for printer reference
NEC IAC 6pp - folding for printer referenceNECIndia
 
NEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNECIndia
 
NEC Virtual PC Center (VPCC)
NEC Virtual PC Center (VPCC)NEC Virtual PC Center (VPCC)
NEC Virtual PC Center (VPCC)NECIndia
 
Ambient Interface by Real World Interaction
Ambient Interface by Real World InteractionAmbient Interface by Real World Interaction
Ambient Interface by Real World InteractionNECIndia
 
NEC Cloud Solution (SaaS) Telefonica S.A.
NEC Cloud Solution (SaaS)  Telefonica S.A.NEC Cloud Solution (SaaS)  Telefonica S.A.
NEC Cloud Solution (SaaS) Telefonica S.A.NECIndia
 
NEC Carrier Cloud
NEC Carrier CloudNEC Carrier Cloud
NEC Carrier CloudNECIndia
 
UC For Business - Executive Desktop
UC For Business - Executive DesktopUC For Business - Executive Desktop
UC For Business - Executive DesktopNECIndia
 
Terms & Conditions For Tweet To Win Contest
Terms & Conditions For Tweet To Win ContestTerms & Conditions For Tweet To Win Contest
Terms & Conditions For Tweet To Win ContestNECIndia
 
This way up with NEC
This way up with NECThis way up with NEC
This way up with NECNECIndia
 
Unified Communication - Healthcare's New Aid
Unified Communication - Healthcare's New AidUnified Communication - Healthcare's New Aid
Unified Communication - Healthcare's New AidNECIndia
 
Blade Servers for SMEs - A Growing Adoption
Blade Servers for SMEs - A Growing AdoptionBlade Servers for SMEs - A Growing Adoption
Blade Servers for SMEs - A Growing AdoptionNECIndia
 
NEC Covered in ITPV Magazine
NEC Covered in ITPV MagazineNEC Covered in ITPV Magazine
NEC Covered in ITPV MagazineNECIndia
 

More from NECIndia (20)

Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...
Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...
Leveraging Channel Strength: A corporate story in the ‘Enterprise Channels’ o...
 
L51 w
L51 wL51 w
L51 w
 
Nec mobile-access-controller-brochure
Nec mobile-access-controller-brochureNec mobile-access-controller-brochure
Nec mobile-access-controller-brochure
 
Nec safer cities solution (updated, sep2012) lowres
Nec safer cities solution   (updated, sep2012) lowresNec safer cities solution   (updated, sep2012) lowres
Nec safer cities solution (updated, sep2012) lowres
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storage
 
J75912 nec cloud brochure marketplace
J75912 nec cloud brochure marketplaceJ75912 nec cloud brochure marketplace
J75912 nec cloud brochure marketplace
 
L51W LED Mobile Projector
L51W LED Mobile ProjectorL51W LED Mobile Projector
L51W LED Mobile Projector
 
J75912 nec cloud brochure desktop
J75912 nec cloud brochure desktopJ75912 nec cloud brochure desktop
J75912 nec cloud brochure desktop
 
NEC IAC 6pp - folding for printer reference
NEC IAC 6pp - folding  for printer referenceNEC IAC 6pp - folding  for printer reference
NEC IAC 6pp - folding for printer reference
 
NEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition System
 
NEC Virtual PC Center (VPCC)
NEC Virtual PC Center (VPCC)NEC Virtual PC Center (VPCC)
NEC Virtual PC Center (VPCC)
 
Ambient Interface by Real World Interaction
Ambient Interface by Real World InteractionAmbient Interface by Real World Interaction
Ambient Interface by Real World Interaction
 
NEC Cloud Solution (SaaS) Telefonica S.A.
NEC Cloud Solution (SaaS)  Telefonica S.A.NEC Cloud Solution (SaaS)  Telefonica S.A.
NEC Cloud Solution (SaaS) Telefonica S.A.
 
NEC Carrier Cloud
NEC Carrier CloudNEC Carrier Cloud
NEC Carrier Cloud
 
UC For Business - Executive Desktop
UC For Business - Executive DesktopUC For Business - Executive Desktop
UC For Business - Executive Desktop
 
Terms & Conditions For Tweet To Win Contest
Terms & Conditions For Tweet To Win ContestTerms & Conditions For Tweet To Win Contest
Terms & Conditions For Tweet To Win Contest
 
This way up with NEC
This way up with NECThis way up with NEC
This way up with NEC
 
Unified Communication - Healthcare's New Aid
Unified Communication - Healthcare's New AidUnified Communication - Healthcare's New Aid
Unified Communication - Healthcare's New Aid
 
Blade Servers for SMEs - A Growing Adoption
Blade Servers for SMEs - A Growing AdoptionBlade Servers for SMEs - A Growing Adoption
Blade Servers for SMEs - A Growing Adoption
 
NEC Covered in ITPV Magazine
NEC Covered in ITPV MagazineNEC Covered in ITPV Magazine
NEC Covered in ITPV Magazine
 

NEC IWS+PAN - Cyber Security Solutions

  • 1. CYBER SECURITY SOLUTIONS Next Generation Threat Prevention Solution For Inbound and Outbound Traffic NEC Asia Pacific www.nec.com.sg
  • 2. TODAY 80 PERCENT OF IT SECURITY SPENDING IS AIMED AT DEPLOYING SOLUTIONS THAT DO NOT PROTECT AGAINST TODAY’S MOST LIKELY, MOST DAMAGING, AND COSTLIEST ATTACKS. It often takes a massive DDoS threat, data theft from spoofing, or other sophisticated cyber-attacks before an organization realizes it is only protected from yesterday’s problems. As a leading System Integrator, NEC APAC provides the best-of-breed security solutions with Palo Alto Networks Next- Generation Firewall and Infotect Security’s iNSIGHT For Web Server (IWS) to provide the intelligence, flexibility, and scale you need to stay secure in today’s ever-changing and increasingly chaotic threat landscape. SECURITY-RELATED CHALLENGES FACED BY BUSINESS TODAY Modern threats are distributed, diverse and cross the chasm that divides network components from application infrastructure. Enterprise e-services are accessible 24x7 by anyone across the world, especially now with the increased usage of mobile devices. Yet, efforts for past decades have sorely neglected the risks of enterprise e-services and, in recent years, cloud and mobile services. Without outbound and inbound protection, incidents such as leaking private data, infecting visitors with malware and displaying defaced web pages are often reported by the press, damaging enterprises’ reputation and customer confidence. The WikiLeaks attacks have taught us that information security strategies must evolve to keep up with the ever-changing attack vectors leveraged against web applications and web sites across the Internet. It is no longer enough to protect against traditional and modern attacks; it is now necessary to protect against both – simultaneously. Existing (traditional) security solutions like Stateful Inspection Network Firewalls, Proxy ect, port-based IPS and IDS in a multi device approach do not have a defense mechanism against: • Zero-Day Malware Attacks • INBOUND Modern Threats • OUTBOUND Data / Information Leakage • Advanced Persistent Threats (APT) • Advanced Evasion Techniques (AET) • Local Exploits • Unauthorized Changes MODERN THREATS Figure 1. Traditional Multiple Stand-Alone Security Appliances Complex Setup
  • 3. NEXT GENERATION THREAT PREVENTION SOLUTION FOR INBOUND AND OUTBOUND TRAFFIC A unified security solution that features the best multi-layer visibility with the control to detect and mitigate multi-layer attacks as well as prevent data leakage. MODERN THREATS CLEAN REQUESTS WEB IWS SERVER PALO ALTO NETWORKS NEXT (PROTECTS AGAINST INTERNET GENERATION FIREWALL INFORMATION LEAKAGE) DATABASE Custom Custom Undesirable Error Page Error Page Contents Contains sensitive information in response CLEAN REPLIES Figure 2. Next Generation Threat Prevention Solution Setup Features And Benefits Palo Alto Networks Next-Generation Firewall • Identify, Control, and Safely Enable Applications ➤ Provides visibility and control over applications, users, and content, regardless of port, protocol, evasive tactics, or encryption. • Inspect All Content for All Threats in Real Time ➤ Allows end-customers to limit traffic to approved applications and scan it in real time and in context for threats, including exploits, viruses, spyware, confidential data leaks, and targeted malware. • Deliver High Throughput and Performance ➤ Examines all network traffic only once, using hardware with dedicated processing resources for security, networking, content scanning, and management. • Simplify Network Security Infrastructure and Reduce Total Cost of Ownership ➤ Provides end-customers a broad range of network security functionality delivered through a single platform, eliminating the need for multiple, stand-alone security appliances. • Enable Diverse Deployment Scenario ➤ Broadly deployed in the enterprise network environment, including the data centre, at the network perimeter, through the distributed enterprise, and in the evolving environments of cloud computing, virtualization, and mobility. iNFOTECT’s iNSIGHT for Web Server (IWS) • World’s First Dedicated Outbound Security Solution for Web and Cloud Services • Patented technologies that uniquely: ➤ Prevent information leakage from Web/Cloud portals. ➤ Prevent malware transmission from hacked pages to end-customers. ➤ Prevent display of defaced web pages to end-customers. • Out-of-the-box protection for 6 critical types of information: ➤ Personal ➤ Financial ➤ Healthcare ➤ Source Code ➤ Server Configurations ➤ Hacked / Infectious Pages
  • 4. Benefits of Palo Alto Networks Next-Generation Firewall and iNSIGHT For Web Server Palo Alto Networks Next-Generation Firewall and iNSIGHT For Web Server provide both inbound and outbound protection to your existing security systems to form a complete 360o protection for your enterprise web servers. With NEC APAC Next Generation Threat Prevention Solution for Inbound and Outbound Traffic, end-customers will have more confidence and trust in your web-based e-services. You can assure them of complete protection of their private information. At the same time, you eliminate the need for multiple, stand-alone security appliances, complex configuration and tedious central repository setup. This will help to substantially reduce your total capital cost. In addition, you can avoid hefty regulatory penalties and damage to your brand and reputation which can result from information leakages from your e-services. Most important of all, you can be fully confident of meeting the security needs of your customers. In the process, you and your customers can have peace of mind, knowing that your internal network is safe, secure and protected. ABOUT NEC ASIA PACIFIC PTE LTD (NEC APAC) Singapore-based NEC Asia Pacific is the regional headquarters for NEC Corporation in the Asia Pacific region (South and Southeast Asia, and Oceania). As a leading infocomm technology provider and systems integrator offering regional sales and services support and consultancy, NEC APAC develops solutions on carrier network, global identity, RFID, enterprise server, unified communications, multimedia display, and contact centre, as well as provide outsourcing and managed services. To leverage on its technological expertise, NEC APAC has established regional competency centres for public safety and display solutions to expand its capabilities and expertise to support its businesses. In line with the NEC Group Vision to realize an information society friendly to humans and the earth, NEC also embarks on corporate social responsibilities (CSR) initiatives to support and “make a difference” to the Nature (environment), Education and Community. For more information, visit www.nec.com.sg. Technology Partners: To learn more about our solutions, email us at CyberSecurity_PS@nec.com.sg or contact our authorised partners. singapore Australia india indonesia Malaysia neC asia Pacific Pte Ltd neC australia Pty Ltd neC India Pvt. Ltd. PT. neC Indonesia neC Coporation of Malaysia sdn. bhd www.nec.com.au www.necindia.in www.nec.co.id www.necmalaysia.com.my (APAC regional Headquarters) new Zealand Philippines thailand Vietnam www.nec.com.sg neC new Zealand Ltd neC Philippines, Inc. neC Coporation (Thailand) Ltd. neC vietnam Co., Ltd. www.nec.co.nz www.nec.com.ph www.nec.co.th www.necsv.com ©2012 NEC Corporation NEC and NEC logo are trademarks of NEC Corporation