SlideShare a Scribd company logo
Configuring Your
Hardware Firewall
Presented by:
Chad Brown
Amber Williams
866-528-9313 | AventisSystems.com
Hardware Firewalls
866-528-9313 | AventisSystems.com
Potential Intrusions
Can Take Many Forms:
Attackers who steal data
Attackers who host pirated software on your hardware
Proper Implementation of Firewalls:
Ward off threats
Keep data safe
866-528-9313 | AventisSystems.com
Inbound Traffic Control
Only Ports Open = Required for Communication
Examples:
Port 80 for Internet Access (HTTP)
Port 443 for Secure Internet Access (HTTPS)
Port 25 for Emails (SMTP)
866-528-9313 | AventisSystems.com
Open Ports for Applications
Additional Open Ports for Applications
Most enterprise software open ports during installation
866-528-9313 | AventisSystems.com
Outbound Traffic Control
Prevent Sending of Certain Files or Data Outside Network
Prevent Users from Accessing Certain Sites
Examples:
Social Networks
eCommerce Sites
866-528-9313 | AventisSystems.com
Ensure Internal Transmission
Utilize a Demilitarized Zone (DMZ)
Sensitive data can be shared internally
Private
Resources
Private
Resources
Internet
Internal
Firewall
Server-side
Firewall
Demilitarized Zone (DMZ)
866-528-9313 | AventisSystems.com
DMZ Tips
DMZ Setup Tips
Use Multiple Appliances & Configurations
Each employee has own rights within DMZ
Name each device with individual IP address
Do not use actual name or URL
Intruders not pointed to device with sensitive data
866-528-9313 | AventisSystems.com
Take a Look
Advanced IT Services - Network & Security Solutions
http://www.aventissystems.com/Network-and-Security-Solutions-s/8262.htm
Hover & Click
866-528-9313 | AventisSystems.com
Sign Up
www.AventisSystems.com
866-528-9313 | AventisSystems.com
Follow Us
@AventisSystems

More Related Content

What's hot

Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
Rohit Phulsunge
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protection
david rom
 
Firewall ppt
Firewall pptFirewall ppt
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
Anthony Daniel
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
fire walls
fire wallsfire walls
fire walls
iqra_ilyas
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Firewalls
FirewallsFirewalls
Firewalls
Akhil Sharma
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
Student
 
firewall
firewallfirewall
firewall
Chirag Patel
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Gopal Sakarkar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 

What's hot (20)

Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protection
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
fire walls
fire wallsfire walls
fire walls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
FireWall
FireWallFireWall
FireWall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
firewall
firewallfirewall
firewall
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Viewers also liked

Virus
VirusVirus
More charitable deductions possible
More charitable deductions possibleMore charitable deductions possible
More charitable deductions possible
Ed Baxter
 
View wtcc slovakia 2015
View wtcc slovakia 2015View wtcc slovakia 2015
View wtcc slovakia 2015
bertbertrand689
 
Digital watt meter with current and voltage display
Digital watt meter with current and voltage displayDigital watt meter with current and voltage display
Digital watt meter with current and voltage display
Jagadeesh Yadav
 
JOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANTJOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANTbeverly fortuin
 

Viewers also liked (7)

Virus
VirusVirus
Virus
 
Projekt 2009 - SOS fra de sure SOSUer FINAL
Projekt 2009 - SOS fra de sure SOSUer FINALProjekt 2009 - SOS fra de sure SOSUer FINAL
Projekt 2009 - SOS fra de sure SOSUer FINAL
 
Mariselvam
MariselvamMariselvam
Mariselvam
 
More charitable deductions possible
More charitable deductions possibleMore charitable deductions possible
More charitable deductions possible
 
View wtcc slovakia 2015
View wtcc slovakia 2015View wtcc slovakia 2015
View wtcc slovakia 2015
 
Digital watt meter with current and voltage display
Digital watt meter with current and voltage displayDigital watt meter with current and voltage display
Digital watt meter with current and voltage display
 
JOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANTJOB PROFILE -HR CONSULTANT
JOB PROFILE -HR CONSULTANT
 

Similar to Configuring Your Hardware Firewall

Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issuesmmubashirkhan
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future Musings
Port80 Software
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)
BilalMehmood44
 
Dark Alleys Part2
Dark Alleys Part2Dark Alleys Part2
Dark Alleys Part2
Anne Adrian
 
Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoT
Altoros
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
Md Shihab
 
152 ready eng
152 ready eng152 ready eng
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
Razorpoint Security
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
phanleson
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT SecurityCRISIL Limited
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
ApdiazizHussein
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
Network security
Network securityNetwork security
Internal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideInternal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guide
Darin Fredde
 

Similar to Configuring Your Hardware Firewall (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future Musings
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)
 
Dark Alleys Part2
Dark Alleys Part2Dark Alleys Part2
Dark Alleys Part2
 
Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoT
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
152 ready eng
152 ready eng152 ready eng
152 ready eng
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT Security
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Network security
Network securityNetwork security
Network security
 
Internal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideInternal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guide
 

More from Aventis Systems, Inc.

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
Aventis Systems, Inc.
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
Aventis Systems, Inc.
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Aventis Systems, Inc.
 
Windows Server 2016 Licensing Tips
Windows Server 2016 Licensing TipsWindows Server 2016 Licensing Tips
Windows Server 2016 Licensing Tips
Aventis Systems, Inc.
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
Aventis Systems, Inc.
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government Sector
Aventis Systems, Inc.
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
Aventis Systems, Inc.
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCs
Aventis Systems, Inc.
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and Support
Aventis Systems, Inc.
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade Infrastructure
Aventis Systems, Inc.
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut It
Aventis Systems, Inc.
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save Later
Aventis Systems, Inc.
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
Aventis Systems, Inc.
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Aventis Systems, Inc.
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Aventis Systems, Inc.
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Aventis Systems, Inc.
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!
Aventis Systems, Inc.
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT Hardware
Aventis Systems, Inc.
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT Labs
Aventis Systems, Inc.
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
Aventis Systems, Inc.
 

More from Aventis Systems, Inc. (20)

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
 
Windows Server 2016 Licensing Tips
Windows Server 2016 Licensing TipsWindows Server 2016 Licensing Tips
Windows Server 2016 Licensing Tips
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government Sector
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCs
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and Support
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade Infrastructure
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut It
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save Later
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT Hardware
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT Labs
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Configuring Your Hardware Firewall

Editor's Notes

  1. Firewalls play a key role in keeping cyber criminals from accessing your company’s network. In this webinar ‘Configuring Your Hardware Firewall’ we’re covering setup suggestions to keep your business safe.
  2. Hardware Firewalls are important for your infrastructure because they monitor all inbound and outbound network traffic. This allows the device to identify and block any potential intrusions.
  3. These potential intrusions can take many forms, such as someone trying to steal company data or someone using your hardware and bandwidth to host pirated software. Ensuring proper implementation of the device will help to ward off these types of threats and help keep your company data safe. Kyle Interjection Great point Chad! What kind of tips do you have for setting up the device?
  4. It is important to ensure that the only ports open to the outside are ports required for important data communication. For example, port 80 allows internet access and port 443 will allow secure internet access (HTTPS). Closing these ports would disallow access by employees. Another important port to leave open is 25 (SMTP for emails).
  5. While these are sufficient for email and browsing work, you will need additional ports for other applications Most enterprise software will open the port during the installation that is required.
  6. Firewalls can also prevent employees from sending certain types of files or sensitive data outside of the network. They can also prevent users from accessing certain types of sites, such as social networking and shipping. Kyle Interjection That’s great information Chad, but what if I want to send a sensitive file to another employee?
  7. While keeping transmission from outside is very important, it is equally as important to ensure that you are not disallowing data transmission from within the company Set up a Demilitarized zone (DMZ) within the organization so that sensitive data can still be shared from within
  8. Using multiple appliances and configurations will allow you to also ensure that each employee has their own rights within the DMZ so that employees cannot share information with someone who should not see it When attaching these different devices, best practice is to name each device by an individual IP address as opposed to a name or URL. This helps ensure that if someone does gain access to your system, they are not immediately pointed to the device housing sensitive data Kyle Wrap-up & Close Thanks, Chad!
  9. To our viewers, we want to point out the Advanced IT Services offered by Aventis Systems include network & security services such as firewall configuration and testing. Take a look at our full portfolio of services that we designed with the most pressing needs of small and midsize organizations in mind.
  10. And make sure you sign up for our emails to receive product specials and keep up with our resources for IT pros including webinars, blog articles, and more.
  11. You can also stay up-to-date by following us on Facebook and Twitter @AventisSystems.