SlideShare a Scribd company logo
1 of 23
Download to read offline
1
www.hillstonenet.com
Hillstone Corporate Overview
Hillstone Networks
2
2
Hillstone – Making Network Security More Intelligent
for Enterprises
and Data Centers
Detect
– Automation for
discovery of modern
threats
– High-performance
Visualize – Real-time insight
in network risk
Enforce
– High-end security
without the high price
– Complement to existing
security devices
3
3
Hillstone at a Glance
Founded in 2006 by founding engineers from Netscreen
10,000+ customers in 27 countries: financial, telecom, education
500+ employees globally, >50% in engineering
Beijing
Singapore
Silicon
Valley
• Experienced leadership
from Netscreen, Cisco,
Juniper, Intel
World Class Team
Dubai
Latin
America
4
4
Gartner Enterprise Firewall Magic Quadrant
2015
Hillstone sustains its
strong entry on the
Magic Quadrant for
a 2nd year!
5
5
Partnered with Technology Leaders
6
6
Hillstone’s Product Portfolio of Innovation
7
7Hillstone
Intelligent Firewalls (i+NGFW)
for Enterprises
Find & Stop Threats in Minutes
with Hillstone’s Behavioral Intelligence
8
8
Traditional (signature)
defenses only stop
old, “amateur” attacks.
The Changing Enterprise Security Landscape
9
9New, professional
attacks
go right through.
malware
APTs
Zero-Days
BYOD
Insider Theft
“In 60% of cases,
attackers are able to
compromise an organization
within minutes.”
– Verizon 2015 DBIR
10
10
Modern threats can lurk for months
without being detected.
11
11
“Behavioral Intelligence” can uncover
hidden threats in minutes – not months
12
12
Hillstone
Intelligent
i+Next-GenFW
Behavior-based
What Is Behavioral Intelligence
Hillstone Intelligent Firewall Architecture
Unknown
Threats
Abnormal
Behaviors
Detection
Risk
Indexing
Interactive
Forensics
Visualization
Context-aware
Mitigation
Enforcement
Stone OS 64-bit Multi-core Platform
FW VPN AV IPS URL User/App
QoS
Behavioral Intelligence Engine
Traditional
Next-Gen FW
Signature-based
13
13
Behavioral Intelligence Engine
Detect
Find modern threats
• External
• Internal
Visualize
Improve understanding
• Network Risk
• Root Cause Analysis
Enforce
Mitigate dynamically
• Slow down bandwidth
• Apply policy changes
so you can
Behavioral Intelligence Automates Network Security
Unknown
Threats
Abnormal
Behaviors
Risk
Indexing
Interactive
Forensics
Context-aware
Mitigation
14
14
Hillstone Deploys Easily for Monitoring or Enforcement
Enforce
(Detect & Protect)
Monitor
(Detect-only)
Perimeter Internal Network
Internet Firewall
Hillstone Intelligent Next-Generation Firewalls
Distributed Threat Detection
Centralized Threat Detection
Segment Firewall
15
15
Hillstone Protects Across the Cyber Kill Chain
NGFW
Malware
Detection Software
Hillstone Intelligent NGFW (i+NGFW with Behavioral Intelligence)
Traditional FW
Reconnaissance Breach Theft
pre-breach post-breach
16
16Hillstone
Cloud Security Solutions
for Virtualized Data Centers
Complete Protection for the Cloud
X Series Data
Center NGFW
17
17
Traditional Perimeter Security Fails in the Cloud
• No visibility of cloud internal
traffic and threats
• East-West workloads are not
secured
• Security cannot be scaled with the
cloud
N
S
Tenants
Internet
TenantsW E
?
18
18
Hillstone Provides Complete Protection for the Cloud
W E
N
S
W E W E
W E W E
N
S
VPC
N
S
VPC
19
19
Hillstone CloudEdge & CloudHive
North-South
Traffic
VPC Gateway
Typical Scenario:
Public Cloud VPC
or Multi-tenants
Perimeter
Protection
CloudEdge
Segmentation
of each VM
East-West
Traffic
Typical Scenario:
Private Cloud
VM visibility
& Segmentation
Micro-
segmentation
20
20
CloudHive: Security for each VM
Cloud Orchestrations
vSOM
vSCM
vSSM
• Non-disruptive,
progressive
deployment
• Deep visibility
• Fine-grained
control
• Elasticity
21
21
CloudEdge: Perimeter Protection for VPC
VPC VPC
Public Cloud
Internet
• Integrated with
popular public Cloud
• Provide NGFW
security
• On-demand
expansion and charge
• Ease of use
22
22
Flexible Adaption to Hypervisors and CMPs
Private Cloud Based on
vCenter+ESXi
AWS
Xen
OpenStack
KVM
Vmware
vCenter
ESXi
Private Cloud based on
OpenStack+KVM
www.hillstonenet.com.cn23www.hillstonenet.com
Network Intelligence to Detect, Visualize, Enforce
Strong entry on Gartner Magic Quadrant for 2nd year
10,000+ customers around the world
Enterprise – Behavioral Intelligence
•Fast and affordable EDGE protection
•Finds & stops threats FASTER – in minutes
Data Center – Complete Protection
•Carrier-grade performance & high availability
•Micro-Segmentation to secure each VM
Summary

More Related Content

What's hot

Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectRobb Boyd
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityCisco Canada
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Canada
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherLancope, Inc.
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simpleCisco Canada
 
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...Cisco Canada
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Security at the Speed of the Network
Security at the Speed of the NetworkSecurity at the Speed of the Network
Security at the Speed of the NetworkHantzley Tauckoor
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 

What's hot (20)

Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
Security at the Speed of the Network
Security at the Speed of the NetworkSecurity at the Speed of the Network
Security at the Speed of the Network
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 

Similar to Hillstone-Corporate-Overview-EN-V3.0

Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security EbookIdeba
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 

Similar to Hillstone-Corporate-Overview-EN-V3.0 (20)

Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 

More from Shamal Abeyrathne

More from Shamal Abeyrathne (7)

Catalogue_ServersCheck
Catalogue_ServersCheckCatalogue_ServersCheck
Catalogue_ServersCheck
 
HIKVISION Quarterly Featured Products 2016Q2
HIKVISION Quarterly Featured Products 2016Q2HIKVISION Quarterly Featured Products 2016Q2
HIKVISION Quarterly Featured Products 2016Q2
 
FUMO Company 2016
FUMO Company 2016FUMO Company 2016
FUMO Company 2016
 
Introduction
IntroductionIntroduction
Introduction
 
Vutlan presentation 09.2015 EN - Shamal Abeyrathne
Vutlan presentation 09.2015 EN - Shamal AbeyrathneVutlan presentation 09.2015 EN - Shamal Abeyrathne
Vutlan presentation 09.2015 EN - Shamal Abeyrathne
 
Spamtitan_brochure_V3 E Flyer
Spamtitan_brochure_V3 E FlyerSpamtitan_brochure_V3 E Flyer
Spamtitan_brochure_V3 E Flyer
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
 

Hillstone-Corporate-Overview-EN-V3.0

  • 2. 2 2 Hillstone – Making Network Security More Intelligent for Enterprises and Data Centers Detect – Automation for discovery of modern threats – High-performance Visualize – Real-time insight in network risk Enforce – High-end security without the high price – Complement to existing security devices
  • 3. 3 3 Hillstone at a Glance Founded in 2006 by founding engineers from Netscreen 10,000+ customers in 27 countries: financial, telecom, education 500+ employees globally, >50% in engineering Beijing Singapore Silicon Valley • Experienced leadership from Netscreen, Cisco, Juniper, Intel World Class Team Dubai Latin America
  • 4. 4 4 Gartner Enterprise Firewall Magic Quadrant 2015 Hillstone sustains its strong entry on the Magic Quadrant for a 2nd year!
  • 7. 7 7Hillstone Intelligent Firewalls (i+NGFW) for Enterprises Find & Stop Threats in Minutes with Hillstone’s Behavioral Intelligence
  • 8. 8 8 Traditional (signature) defenses only stop old, “amateur” attacks. The Changing Enterprise Security Landscape
  • 9. 9 9New, professional attacks go right through. malware APTs Zero-Days BYOD Insider Theft “In 60% of cases, attackers are able to compromise an organization within minutes.” – Verizon 2015 DBIR
  • 10. 10 10 Modern threats can lurk for months without being detected.
  • 11. 11 11 “Behavioral Intelligence” can uncover hidden threats in minutes – not months
  • 12. 12 12 Hillstone Intelligent i+Next-GenFW Behavior-based What Is Behavioral Intelligence Hillstone Intelligent Firewall Architecture Unknown Threats Abnormal Behaviors Detection Risk Indexing Interactive Forensics Visualization Context-aware Mitigation Enforcement Stone OS 64-bit Multi-core Platform FW VPN AV IPS URL User/App QoS Behavioral Intelligence Engine Traditional Next-Gen FW Signature-based
  • 13. 13 13 Behavioral Intelligence Engine Detect Find modern threats • External • Internal Visualize Improve understanding • Network Risk • Root Cause Analysis Enforce Mitigate dynamically • Slow down bandwidth • Apply policy changes so you can Behavioral Intelligence Automates Network Security Unknown Threats Abnormal Behaviors Risk Indexing Interactive Forensics Context-aware Mitigation
  • 14. 14 14 Hillstone Deploys Easily for Monitoring or Enforcement Enforce (Detect & Protect) Monitor (Detect-only) Perimeter Internal Network Internet Firewall Hillstone Intelligent Next-Generation Firewalls Distributed Threat Detection Centralized Threat Detection Segment Firewall
  • 15. 15 15 Hillstone Protects Across the Cyber Kill Chain NGFW Malware Detection Software Hillstone Intelligent NGFW (i+NGFW with Behavioral Intelligence) Traditional FW Reconnaissance Breach Theft pre-breach post-breach
  • 16. 16 16Hillstone Cloud Security Solutions for Virtualized Data Centers Complete Protection for the Cloud X Series Data Center NGFW
  • 17. 17 17 Traditional Perimeter Security Fails in the Cloud • No visibility of cloud internal traffic and threats • East-West workloads are not secured • Security cannot be scaled with the cloud N S Tenants Internet TenantsW E ?
  • 18. 18 18 Hillstone Provides Complete Protection for the Cloud W E N S W E W E W E W E N S VPC N S VPC
  • 19. 19 19 Hillstone CloudEdge & CloudHive North-South Traffic VPC Gateway Typical Scenario: Public Cloud VPC or Multi-tenants Perimeter Protection CloudEdge Segmentation of each VM East-West Traffic Typical Scenario: Private Cloud VM visibility & Segmentation Micro- segmentation
  • 20. 20 20 CloudHive: Security for each VM Cloud Orchestrations vSOM vSCM vSSM • Non-disruptive, progressive deployment • Deep visibility • Fine-grained control • Elasticity
  • 21. 21 21 CloudEdge: Perimeter Protection for VPC VPC VPC Public Cloud Internet • Integrated with popular public Cloud • Provide NGFW security • On-demand expansion and charge • Ease of use
  • 22. 22 22 Flexible Adaption to Hypervisors and CMPs Private Cloud Based on vCenter+ESXi AWS Xen OpenStack KVM Vmware vCenter ESXi Private Cloud based on OpenStack+KVM
  • 23. www.hillstonenet.com.cn23www.hillstonenet.com Network Intelligence to Detect, Visualize, Enforce Strong entry on Gartner Magic Quadrant for 2nd year 10,000+ customers around the world Enterprise – Behavioral Intelligence •Fast and affordable EDGE protection •Finds & stops threats FASTER – in minutes Data Center – Complete Protection •Carrier-grade performance & high availability •Micro-Segmentation to secure each VM Summary