SlideShare a Scribd company logo
1 of 4
Download to read offline
In-depth, layered security is
vital to protecting corporate
credibility and secure
information flow throughout
your business operations




A secure network, internally and externally,
is a healthy one. StoneGate™ Intrusion
Prevention System (IPS)—part of the
award-winning StoneGate Platform including
the StoneGate Firewall and VPN—takes
your security to the next level, both inside
and outside the perimeter. With StoneGate
IPS you can proactively detect and stop
harmful traffic, ensure resilient connectivity
and significantly reduce the costs of threat
management and compliance. This will leave
your bottom line healthier, too.




Secure Information Flow
StoneGate IPS benefits                          Protect your network inside and out
• Unified threat management – Integrate         In today’s technology world, intrusions to your network can come from
  with StoneGate’s enterprise-level Firewall,   almost anywhere at anytime. While firewalls can allow or deny specific
  VPN and IPS for unified threat protection     users, they can’t analyze or act on malicious activity once someone gains
  from internal and external attacks.           access to your network. Your business applications, a laptop connecting
                                                to your network and even PDAs can deliver worms, denial of service,
• Enforcement – Provide inline proactive        peer-to-peer traffic, spyware and other attacks. Gaining intelligence about
  protection for vulnerable applications and    your security and regulatory risks and having the ability to proactively
  operating systems with multiple detection     manage them, all while protecting your corporate credibility, is now a
  methods. Deploy IPS in monitoring and/or      business priority. Additionally, whether it’s internal or external attacks,
  prevention mode (IDS and/or                   every network is unique and requires a flexible solution to manage these
  IPS) simultaneously.                          demands efficiently.

• Simplified management – Leverage              StoneGate’s IPS sensors and analyzers provide flexible deployment options
  centralized management for accelerated        and multiple detection methods allowing you to protect your network down
  incident handling and proactively patch       to as granular a level as you need—for both internal and external attacks.
  vulnerable web applications and systems.      Its unique use of regular expressions provides intelligent and efficient
                                                correlation that can detect the smallest variations and vulnerabilities.
• Compliance – Efficiently run the              Unlike other systems, StoneGate IPS doesn’t require individual alerts
  auditing reports necessary to ensure          or signatures for every variant. Our solution also provides precise
  compliance with PCIA, Sarbanes-Oxley,         detection by combining fingerprinting and protocol validation, along with
  HIPAA, FISMA                                  customizable fingerprints to enhance the level of protection. By combining
  and other regulatory requirements.            these techniques, StoneGate IPS delivers accurate proactive protection,
                                                with fewer false positives and fewer false negatives, to simplify threat
• Lowest TCO – Reduce the costs and             management while ensuring protection.
  complexities of traditional multiple
  vendor solutions.
                                                StoneGate IPS solution
   IPS




                                                     Traffic




                                                                              SENSOR                          ANALYZER                     SMC
                                                                 Billions
                                                                of Events      Flexible                       Intelligent                 Incident
                                                                             and Precise                      Correlation               Handling and
                                                                                                Thousands                      Tens
                                                                              Detection         of Events                   of Events     Response
                                                                                                of Interest
                                                                              Configurable
                                                                            Context Sensitive
                                                                                Multiple
                                                                            Detection Methods




                                                The best solution for flexible,
                                                intelligent enforcement
                                                Attacks don’t wait until you’re in the office. Increasingly, you’re fighting
                                                against sophisticated organizations that are in the business of attempting
                                                to tap into confidential data around the clock. You need a flexible,
                                                intelligent solution to take quick action before attacks have dramatic
                                                impact on revenue and business transactions.

                                                Since StoneGate IPS is an inline device, it can proactively stop malicious
                                                activity before damage is done. At the same time, it provides alternative
                                                enforcement methods that can be customized at any time to combat
                                                specific types of threats. When attacks are noticed, you can configure
                                                StoneGate IPS to proactively terminate, record, log, alert, blacklist or
                                                simply monitor the event. The solution can run in monitoring and/or
                                                prevention mode (IDS and/or IPS) simultaneously, providing additional
                                                flexibility to adapt to your network configurations.
Centralized management simplifies tasks,                                   Results from the 2006 CSI/FBI Computer
                                                                           Crime and Security Survey indicate that
reduces TCO and ensures compliance                                         unauthorized access, denial of service,
                                                                           and system penetration resulted in almost
Combined with the StoneGate Management Center, StoneGate IPS               $200,000 of annual revenue loss per
integrates with StoneGate Firewall/VPN to give your organization           company. As the number of network
centralized management of alert escalation, incident handling and          security incidents continues to grow
reporting. As a result, your IT department can minimize the time spent     at an exponential rate, so too does the
researching incidents, react faster and proactively patch vulnerable       requirement for a simplified and cost-
applications and systems.                                                  effective defense-in-depth security solution.
                                                                           Best practices have shown that while
With centralized management, your IT staff can manage the security         firewalls serve their purpose, a layered
at literally hundreds of locations within your network from a single       approach reduces corporate network
management console, significantly reducing the operational and resource    downtime and business risks.
costs of managing separate solutions and your total cost of ownership
(TCO). Using the easy-to-use management interface, they can efficiently
handle everything from system-level configurations to remote software
upgrades from a single location.                                          “The minute we turned on Stonesoft’s
                                                                           solution it was like turning on a light switch.
Additionally, the solution can provide detailed auditing information       Immediately we had analysis and reports
to ensure regulatory compliance with StoneGate’s incident                  that provided clear details of who and what
management, audit management, advanced logging, reporting                  was trying to access our network, which
and policy snapshot capabilities.                                          enabled us to defuse potential threats ahead
                                                                           of time.”

                                                                           Ron Peters
                                                                           President and Founder
                                                                           Red Folder



                                                                          “As a subsidiary of the oldest and the largest
                                                                           Japanese non-life insurance company, Tokio
                                                                           Millennium requires a unified solution that
                                                                           addresses not just security and business
                                                                           continuity, but also stringent compliance
                                                                           requirements set by the Japanese and
                                                                           US regulators. With StoneGate’s unified
                                                                           Firewall, VPN, IPS solution we have a
                                                                           proactive threat management solution
                                                                           combined with advanced auditing tools.
                                                                           As a result, Tokio Millennium has credible
                                                                           IT systems meeting all the compliance
                                                                           requirements which lead us to a distinct
                                                                           competitive business advantage in a highly
                                                                           competitive market.”
Choose StoneGate IPS to proactively detect and stop harmful                Dwayne Basden
traffic, ensure resilient connectivity and significantly reduce the        Vice President - Information Technology
costs of threat management and compliance.                                 Tokio Millennium Re Ltd
StoneGate IPS –
a key part of the StoneGate Platform
Stonesoft is an innovative provider of integrated network security and resilient
connectivity solutions. Stonesoft is a global company focused on enterprise
level customers requiring advanced network security and always-on business
connectivity with the lowest TCO, the best price-to-performance ratio and the
highest ROI. StoneGate IPS is a key part of the award-winning StoneGate™
Platform that unifies firewall, VPN and IPS, blending network security,
end-to-end availability and award-winning load balancing into a centrally
managed system for distributed enterprises.



    SMC                 VPN                  FW            IPS




                                                                                                Secure Information Flow

  Stonesoft Inc.                       1050 Crown Pointe Parkway,        tel. +1 866 869 4075       www.stonesoft.com
                                       Suite 900, Atlanta, GA 30338      fax +1 770 668 1131        info.americas@stonesoft.com


© 2007 Stonesoft Inc. All rights reserved.

More Related Content

What's hot

Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assochamnmrdkoz
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach FinalHossam Hassanien
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2lamcindoe
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011Satish Hemachandran
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyerjordagro
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive SecurityComputerworld Philippines
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 

What's hot (20)

Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assocham
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Axxera Siem
Axxera SiemAxxera Siem
Axxera Siem
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyer
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 

Viewers also liked

Mahrukh Swimming Final
Mahrukh Swimming FinalMahrukh Swimming Final
Mahrukh Swimming FinalQamar Bashir
 
Module 3 lp-simplex
Module 3 lp-simplexModule 3 lp-simplex
Module 3 lp-simplexraajeeradha
 
Q&A: How Nestle Pizza Improved Efficiency with Workforce Scheduling
Q&A: How Nestle Pizza Improved Efficiency with Workforce SchedulingQ&A: How Nestle Pizza Improved Efficiency with Workforce Scheduling
Q&A: How Nestle Pizza Improved Efficiency with Workforce SchedulingFoodProcessing.com
 
Carregador de bateria wind generator
Carregador de bateria wind generatorCarregador de bateria wind generator
Carregador de bateria wind generatorRogerio Eduardo
 
MODI Method- Optimization of transportation problem
MODI Method- Optimization of transportation problemMODI Method- Optimization of transportation problem
MODI Method- Optimization of transportation problemraajeeradha
 
Foundations of Modern Psychology
Foundations of Modern PsychologyFoundations of Modern Psychology
Foundations of Modern Psychologyschmucka69
 
Theory of metal cutting
Theory of metal cuttingTheory of metal cutting
Theory of metal cuttingraajeeradha
 
Resistance welding
Resistance weldingResistance welding
Resistance weldingraajeeradha
 
Advanced welding
Advanced weldingAdvanced welding
Advanced weldingraajeeradha
 

Viewers also liked (15)

Mahrukh 0
Mahrukh 0Mahrukh 0
Mahrukh 0
 
Mahrukh Swimming Final
Mahrukh Swimming FinalMahrukh Swimming Final
Mahrukh Swimming Final
 
Module 3 lp-simplex
Module 3 lp-simplexModule 3 lp-simplex
Module 3 lp-simplex
 
Q&A: How Nestle Pizza Improved Efficiency with Workforce Scheduling
Q&A: How Nestle Pizza Improved Efficiency with Workforce SchedulingQ&A: How Nestle Pizza Improved Efficiency with Workforce Scheduling
Q&A: How Nestle Pizza Improved Efficiency with Workforce Scheduling
 
Milling
MillingMilling
Milling
 
amina3
amina3amina3
amina3
 
Carregador de bateria wind generator
Carregador de bateria wind generatorCarregador de bateria wind generator
Carregador de bateria wind generator
 
MODI Method- Optimization of transportation problem
MODI Method- Optimization of transportation problemMODI Method- Optimization of transportation problem
MODI Method- Optimization of transportation problem
 
Electromagnetic bomb
Electromagnetic bomb Electromagnetic bomb
Electromagnetic bomb
 
Thread cutting
Thread cuttingThread cutting
Thread cutting
 
Foundations of Modern Psychology
Foundations of Modern PsychologyFoundations of Modern Psychology
Foundations of Modern Psychology
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
Theory of metal cutting
Theory of metal cuttingTheory of metal cutting
Theory of metal cutting
 
Resistance welding
Resistance weldingResistance welding
Resistance welding
 
Advanced welding
Advanced weldingAdvanced welding
Advanced welding
 

Similar to Stone gate ips

Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.Mindtree Ltd.
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqriteseo
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluationasundaram1
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
Cylance_Protect_Datasheet
Cylance_Protect_DatasheetCylance_Protect_Datasheet
Cylance_Protect_DatasheetTiana Henriks
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017ForgeRock
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 

Similar to Stone gate ips (20)

Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Why ips slide share
Why ips slide shareWhy ips slide share
Why ips slide share
 
Select idps
Select idpsSelect idps
Select idps
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluation
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Cylance_Protect_Datasheet
Cylance_Protect_DatasheetCylance_Protect_Datasheet
Cylance_Protect_Datasheet
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
UEBA
UEBAUEBA
UEBA
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 

Stone gate ips

  • 1. In-depth, layered security is vital to protecting corporate credibility and secure information flow throughout your business operations A secure network, internally and externally, is a healthy one. StoneGate™ Intrusion Prevention System (IPS)—part of the award-winning StoneGate Platform including the StoneGate Firewall and VPN—takes your security to the next level, both inside and outside the perimeter. With StoneGate IPS you can proactively detect and stop harmful traffic, ensure resilient connectivity and significantly reduce the costs of threat management and compliance. This will leave your bottom line healthier, too. Secure Information Flow
  • 2. StoneGate IPS benefits Protect your network inside and out • Unified threat management – Integrate In today’s technology world, intrusions to your network can come from with StoneGate’s enterprise-level Firewall, almost anywhere at anytime. While firewalls can allow or deny specific VPN and IPS for unified threat protection users, they can’t analyze or act on malicious activity once someone gains from internal and external attacks. access to your network. Your business applications, a laptop connecting to your network and even PDAs can deliver worms, denial of service, • Enforcement – Provide inline proactive peer-to-peer traffic, spyware and other attacks. Gaining intelligence about protection for vulnerable applications and your security and regulatory risks and having the ability to proactively operating systems with multiple detection manage them, all while protecting your corporate credibility, is now a methods. Deploy IPS in monitoring and/or business priority. Additionally, whether it’s internal or external attacks, prevention mode (IDS and/or every network is unique and requires a flexible solution to manage these IPS) simultaneously. demands efficiently. • Simplified management – Leverage StoneGate’s IPS sensors and analyzers provide flexible deployment options centralized management for accelerated and multiple detection methods allowing you to protect your network down incident handling and proactively patch to as granular a level as you need—for both internal and external attacks. vulnerable web applications and systems. Its unique use of regular expressions provides intelligent and efficient correlation that can detect the smallest variations and vulnerabilities. • Compliance – Efficiently run the Unlike other systems, StoneGate IPS doesn’t require individual alerts auditing reports necessary to ensure or signatures for every variant. Our solution also provides precise compliance with PCIA, Sarbanes-Oxley, detection by combining fingerprinting and protocol validation, along with HIPAA, FISMA customizable fingerprints to enhance the level of protection. By combining and other regulatory requirements. these techniques, StoneGate IPS delivers accurate proactive protection, with fewer false positives and fewer false negatives, to simplify threat • Lowest TCO – Reduce the costs and management while ensuring protection. complexities of traditional multiple vendor solutions. StoneGate IPS solution IPS Traffic SENSOR ANALYZER SMC Billions of Events Flexible Intelligent Incident and Precise Correlation Handling and Thousands Tens Detection of Events of Events Response of Interest Configurable Context Sensitive Multiple Detection Methods The best solution for flexible, intelligent enforcement Attacks don’t wait until you’re in the office. Increasingly, you’re fighting against sophisticated organizations that are in the business of attempting to tap into confidential data around the clock. You need a flexible, intelligent solution to take quick action before attacks have dramatic impact on revenue and business transactions. Since StoneGate IPS is an inline device, it can proactively stop malicious activity before damage is done. At the same time, it provides alternative enforcement methods that can be customized at any time to combat specific types of threats. When attacks are noticed, you can configure StoneGate IPS to proactively terminate, record, log, alert, blacklist or simply monitor the event. The solution can run in monitoring and/or prevention mode (IDS and/or IPS) simultaneously, providing additional flexibility to adapt to your network configurations.
  • 3. Centralized management simplifies tasks, Results from the 2006 CSI/FBI Computer Crime and Security Survey indicate that reduces TCO and ensures compliance unauthorized access, denial of service, and system penetration resulted in almost Combined with the StoneGate Management Center, StoneGate IPS $200,000 of annual revenue loss per integrates with StoneGate Firewall/VPN to give your organization company. As the number of network centralized management of alert escalation, incident handling and security incidents continues to grow reporting. As a result, your IT department can minimize the time spent at an exponential rate, so too does the researching incidents, react faster and proactively patch vulnerable requirement for a simplified and cost- applications and systems. effective defense-in-depth security solution. Best practices have shown that while With centralized management, your IT staff can manage the security firewalls serve their purpose, a layered at literally hundreds of locations within your network from a single approach reduces corporate network management console, significantly reducing the operational and resource downtime and business risks. costs of managing separate solutions and your total cost of ownership (TCO). Using the easy-to-use management interface, they can efficiently handle everything from system-level configurations to remote software upgrades from a single location. “The minute we turned on Stonesoft’s solution it was like turning on a light switch. Additionally, the solution can provide detailed auditing information Immediately we had analysis and reports to ensure regulatory compliance with StoneGate’s incident that provided clear details of who and what management, audit management, advanced logging, reporting was trying to access our network, which and policy snapshot capabilities. enabled us to defuse potential threats ahead of time.” Ron Peters President and Founder Red Folder “As a subsidiary of the oldest and the largest Japanese non-life insurance company, Tokio Millennium requires a unified solution that addresses not just security and business continuity, but also stringent compliance requirements set by the Japanese and US regulators. With StoneGate’s unified Firewall, VPN, IPS solution we have a proactive threat management solution combined with advanced auditing tools. As a result, Tokio Millennium has credible IT systems meeting all the compliance requirements which lead us to a distinct competitive business advantage in a highly competitive market.” Choose StoneGate IPS to proactively detect and stop harmful Dwayne Basden traffic, ensure resilient connectivity and significantly reduce the Vice President - Information Technology costs of threat management and compliance. Tokio Millennium Re Ltd
  • 4. StoneGate IPS – a key part of the StoneGate Platform Stonesoft is an innovative provider of integrated network security and resilient connectivity solutions. Stonesoft is a global company focused on enterprise level customers requiring advanced network security and always-on business connectivity with the lowest TCO, the best price-to-performance ratio and the highest ROI. StoneGate IPS is a key part of the award-winning StoneGate™ Platform that unifies firewall, VPN and IPS, blending network security, end-to-end availability and award-winning load balancing into a centrally managed system for distributed enterprises. SMC VPN FW IPS Secure Information Flow Stonesoft Inc. 1050 Crown Pointe Parkway, tel. +1 866 869 4075 www.stonesoft.com Suite 900, Atlanta, GA 30338 fax +1 770 668 1131 info.americas@stonesoft.com © 2007 Stonesoft Inc. All rights reserved.