SlideShare a Scribd company logo
1 of 39
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
WatchGuard Technologies
Insert Presenter’s Name Here
1
Smart Security, Simply Done.
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
companies that faced a
cyber security attack¹
attacks that resulted in a
data breach¹
average cost of a
cyber attack²
companies that go
out of business within 6-months
of a breach³
61%
$188K 60%
54%
¹ Ponemon 2017 State of SMB Cybersecurity Report; ² Symantec Internet Security Threat Report; ³ National Cyber Security Alliance
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
WatchGuard is dedicated to
eliminating the cost and
complexity of security, making
it accessible to organizations
of all types and sizes,
regardless of budget and
technical staff!
45%
of organizations reported
lack of adequate security
controls in 2017
4
65%
of organizations
reported a security
incident in 2016…
65%
lack cyber
security staff
57%
lack budget
for security
54%
lack time to
prioritize security
37%
lack proper
staff training
Source: Netwrix 2017 IT Risks Report
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
5
65%
of organizations
reported a security
incident in 2016… 45%
of organizations reported
lack of adequate security
controls in 2017
65%
54%
57%
37%
lack cyber
security staff
lack budget
for security
lack time to
prioritize security
lack proper
staff training
Trust your security to one of
WatchGuard’s 1,500+ certified VARs or
MSSPs around the world and rest easy.
WatchGuard offers the highest performing
products at every price point, making
enterprise-grade security accessible to all.
Simplicity is in our DNA. WatchGuard has
saved customer more than 16 years with
our RapidDeploy™ feature alone.
WatchGuard products can be configured
and maintained by any non-technical
staff – barrier eliminated.
Source: Netwrix 2017 IT Risks Report
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
You know you need security;
WatchGuard knows how to help.
6
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
7
What We Do - Philosophy
Intelligent
Protection
Actionable
Visibility
Simplified
Management
Effective protection against
today’s digital threat landscape
requires multiple services
working intelligently together.
Prevent, detect, and instantly
respond to cyber attacks with
automated policies.
.
Monitor and report on the health
of your IT infrastructure.
Actionable visibility tools enable
you to proactively identify
threats, while providing
corrective action against known
issues.
Managing security across your
organization has never been
simpler. Use out-of-the-box tools
to quickly and easily deploy,
configure, and maintain your
security with the granularity of
your choice.
Smart Security, Simply Done.
Full enterprise-grade security, none of the complexity.
No Security Admin, No Problem! No IT Resources, No Problem! No Data Analyst, No Problem!
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
CORE VALUES
Be Accountable
It is all about doing the right thing and doing it the right way. Stand up for what you
believe, do what you say you are going to do, and don’t be afraid to admit mistakes
and correct them.
8
Be Passionate About Success
Once we make up our mind, let’s go make it happen. Don’t stop until you succeed,
and most importantly, be proud of that success with the highest integrity and
humbleness.
Strong Customer Focus
Our success is impossible without a diligent focus on our customers and partners.
We all impact customers in many ways each day - they are central to our
successful execution
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
9
What We Do – Technology
Network Security
Multi-Factor Authentication
Secure Wi-Fi
• Firebox® UTM/Firewall Appliances
• Full Portfolio of Malware Prevention Security Services
• ThreatSync® Threat Correlation and Response Engine
• Dimension™ Centralized Management and Reporting
• AuthPoint® Cloud-based MFA Platform
• AuthPoint Mobile App (Push, OTP, and QR-codes)
• Mobile Device DNA Context Based Authentication
• WatchGuard Cloud® Highly Scalable Mgmt. Platform
• High Performance In/Outdoor Access Points
• Patented WIPS Security
• Powerful Customer Engagement & Analytics Tools
• WG Wi-Fi Cloud® Centralized Mgmt. and Reporting
Protect your network
from malware,
malicious content, and
phishing attacks.
Protect your
employees' corporate
identities from theft
and misuse.
Protect your Wi-Fi and
the people on it from
prying eyes, data theft,
and malware.
Why How
What
Protect What Matters, Protect Your Business.
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
10
What We Do – A Unified Security Platform
WatchGuard Visibility & Management
Centralized Management, Actionable Visibility, and Advanced Reporting
Secure Wi-Fi Network Security
Multi-Factor
Authentication
Total Security, Total Control.
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
The WatchGuard Difference
11
The quickest
access to new
and improved
security services
Innovation
Certified product
performance –
speed, efficacy,
and reliability –
performance at all
price points
Performance
Enterprise-grade
security without
the complexity -
always easy
to configure,
deploy, and
centrally manage
Simplicity
Correlate security
events from
your network,
endpoints, and
other TI feeds
for maximum
protection
Correlation
Full network
visibility with the
power to take
action
immediately.
Visibility
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Industry Recognition
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Come for the Security, Stay for the Simplicity.
TV Globo
All organizations need enterprise-grade security. Those who value
streamlined deployment and simple management always chose WatchGuard.
Who We Serve
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
NSS Security Value Map (SVM) 2018
14
Only 3 vendors recommended 2-years in a row!
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
By the Numbers
15
WatchGuard appliances conduct
>1 billion security scans every hour
A WatchGuard Firebox is deployed
every 4 minutes around the world
WatchGuard protected our customers
22+ BILLION times last year
WatchGuard has saved customers
>16 years of labor with RapidDeploy
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Who We Are
16
Founded in 1996
HQ: Seattle, WA
700+ Employees
100+ Distributors
9,000+ Active VARs
80K+ Customers
Operations in 5 countries;
direct presence in 21
Global. Experienced. Trusted.
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
A Pioneer in Cyber Security for Over 20 Years
17
1996
Pioneered
FIRST security
appliance
2003
FIRST to
incorporate UTM
capabilities into
single appliance
2013
Introduced
Access
Points
2015
Introduced
Dimension
Command
2010
New product
architecture
launched
2011
Cloud-based
defense
(RED); App
Control
(NGFW)
2013
Introduced
Dimension
2014
Introduced
APT
Protection
2014
Introduced
Firebox NG
appliances
2016
Secure
Cloud-
Managed
Wi-Fi
2017
Introduced
Threat
Correlation
2017
Expanded
Network
Security to
the Endpoint
2018
Introduced
DNSWatch
2018
Introduced
AuthPoint
MFA
2019
Launched
WatchGuard
Cloud
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
A Dedicated Channel of Certified Partners
18
With a Reseller for Every Need
Copyright ©2018 WatchGuard Technologies, Inc. All Rights Reserved
Network Security
19
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
A Layered Defense
WatchGuard breaks the Cyber Kill
Chain® at each level using layered
security and intelligent prevention,
detection, and response defenses that
shut down targeted attacks.
20
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Bringing It All Together
21
Our unique threat correlation engine is constantly working to correlate network
and endpoint security events with known threat intelligence data to identify and
stop new threats and constantly improve preventative security measures.
Protect your network from
threats before they ever
execute on a host
computer
Observe hosts, files,
applications and traffic for
abnormal behavior
Set policies to
automatically alert and/or
respond to threats
PREVENT DETECT RESPOND
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Best-in-Class Security Services
22
INTRUSION PREVENTION
SERVICE (IPS)
GATEWAY ANTIVIRUS (GAV)
APT BLOCKER
REPUTATION ENABLED
DEFENSE SERVICE (RED)
WEBBLOCKER
DATA LOSS
PREVENTION (DLP)
SPAMBLOCKER
APPLICATION CONTROL
NETWORK
DISCOVERY
FUNDAMENTAL SECURITY SERVICES
ADVANCED SECURITY SERVICES
DIMENSION
COMMAND
THREAT DETECTION &
RESPONSE
HOST RANSOMWARE
PREVENTION (HRP)
ACCESS PORTAL DNSWATCH INTELLIGENTAV
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Centralized and easy to use management for your network
security appliances and services.
Centralized Management
– Zero touch deployment
– Quick, easy onboarding
– Unlimited scalability
– Simplified inventory and license
management
– One-click logging setup
23
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Actionable Visibility
24
Endpoint Activity Security Services Wi-Fi Activity Threat Feeds
Network Activity
Easily identify actionable network and security trends, monitor security service
efficacy, and easily generate business, compliance, and network health reports
with stunning visualization tools.
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Packaged to Your Needs
25
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
One Platform, Total Security
26
EASIER TO PURCHASE
One platform, one package, total security. Our security platform
delivers a suite of powerful network, Wi-Fi, and endpoint security
services along with the intelligence of correlation and industry-
leading performance.
EASIER TO DEPLOY
Remotely deploy and configure multiple Firebox appliances
across a distributed enterprise with minimal on-site assistance
using a cloud-based deployment and configuration tool.
EASIER TO MANAGE
Manage one Firebox appliance or hundreds from a single, easy-
to-use console, maximizing efficiency and streamlining network
administration, while applying configuration changes in real time
or as a scheduled task.
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Product Integrations for Smarter Security
27
Learn more:
www.watchguard.com/techpartners
 Better interoperability in
your IT environments
 More robust security
solutions
 Easier deployments
with greater confidence
Secure Wi-Fi
28
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
WatchGuard Secure Wi-Fi
29
Cloud-Ready Access Points Wi-Fi Cloud
WatchGuard doesn’t just offer Wi-Fi connectivity, we offer patented security,
increased productivity, and improved customer satisfaction. When you
deploy a WatchGuard access point with a WatchGuard Wi-Fi Cloud
subscription, you gain invaluable tools to take your business to the next level.
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
WatchGuard Wi-Fi Cloud – 4 Products in 1
30
Patented Wireless Security
Only hands-off automated
WIPS with low false
positives on the market
Business Driven Analytics
Location tracking, footfall, dwell time,
repeat visitors, and more at no extra cost
and no third-party requirements
Powerful Engagement Tools
Captivating splash pages and campaigns
to interact with visitors using social media,
video, polls, and more
Management That Scales
Only platform that easily scales from one
AP to unlimited with no infrastructure
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Wi-Fi Packaged to Your Needs
31
The only SKU that requires a
Firebox® to manage the
WatchGuard access points.
The Wi-Fi packages serve to enable you to quickly and easily find the right set of
features your customers need today…and tomorrow.
Multi-Factor Authentication
32
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
MFA Protects With More Than Just A Password
Multi-Factor Authentication Is Essential Protection
By requiring additional proof of identity beyond a simple password, multi-factor
authentication (MFA) is the most important safeguard to protect your business
33
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
WatchGuard AuthPoint – MFA That’s REALLY Easy
34
Multi-Factor Authentication
Password | Push Message | Phone Biometrics | Mobile Phone DNA
AuthPoint Mobile App
iOS & Android | 11 Languages | OTP | QR Code | Multiple Authenticators
WatchGuard Cloud
Visibility | Configuration | Management | Token Allocation in Seconds
Extensive MFA Coverage
Dozens of 3rd Party Integrations | Web SSO | Windows/Mac Computer Logon
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Protects VPNs, Web Apps, PC Login, and more!
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Easy to use, deploy and manage
36
User-friendly mobile app
• Supports multiple authenticators
• Allows tokens to be personalized
with pictures and names
• Enables users to respond to
authentication push messages
without opening the app
Cloud-based management
• Easy configuration and management
- from anywhere!
• Syncs with LDAP and AD and allows
you to allocate tokens automatically
• Intuitive interface with useful, easy-to-
understand reporting
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
Product Integrations for Smarter Security
37
Learn more:
www.watchguard.com/techpartners
 Better interoperability in
your IT environments
 More robust security
solutions
 Easier deployments
with greater confidence
c
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
38
Get Connected, Stay Informed
Daily Security Bytes
Check out our Daily Security Byte videos to stay
informed about the latest InfoSec news and tips.
The 443 Podcast – Security Simplified
Subscribe to our podcast for fresh content on leading
white-hat hackers and security researchers.
Secplicity
Explore daily cybersecurity videos and editorial
content for real-time information about the latest
threats and how to cope with them.
Social Media
Connect with us on social media for the latest
updates and cybersecurity information.
Subscribe:
Thank You
39

More Related Content

Similar to WatchGuard Corporate Presentation.pptx

RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRockwell Automation
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Cloud Security Alliance, UK chapter
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveCyber Watching
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1Clay Melugin
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
deceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterdeceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterGrayMatter
 

Similar to WatchGuard Corporate Presentation.pptx (20)

RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
deceptionGUARD by GrayMatter
deceptionGUARD by GrayMatterdeceptionGUARD by GrayMatter
deceptionGUARD by GrayMatter
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

WatchGuard Corporate Presentation.pptx

  • 1. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Technologies Insert Presenter’s Name Here 1
  • 3. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved companies that faced a cyber security attack¹ attacks that resulted in a data breach¹ average cost of a cyber attack² companies that go out of business within 6-months of a breach³ 61% $188K 60% 54% ¹ Ponemon 2017 State of SMB Cybersecurity Report; ² Symantec Internet Security Threat Report; ³ National Cyber Security Alliance
  • 4. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard is dedicated to eliminating the cost and complexity of security, making it accessible to organizations of all types and sizes, regardless of budget and technical staff! 45% of organizations reported lack of adequate security controls in 2017 4 65% of organizations reported a security incident in 2016… 65% lack cyber security staff 57% lack budget for security 54% lack time to prioritize security 37% lack proper staff training Source: Netwrix 2017 IT Risks Report
  • 5. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved 5 65% of organizations reported a security incident in 2016… 45% of organizations reported lack of adequate security controls in 2017 65% 54% 57% 37% lack cyber security staff lack budget for security lack time to prioritize security lack proper staff training Trust your security to one of WatchGuard’s 1,500+ certified VARs or MSSPs around the world and rest easy. WatchGuard offers the highest performing products at every price point, making enterprise-grade security accessible to all. Simplicity is in our DNA. WatchGuard has saved customer more than 16 years with our RapidDeploy™ feature alone. WatchGuard products can be configured and maintained by any non-technical staff – barrier eliminated. Source: Netwrix 2017 IT Risks Report
  • 6. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved You know you need security; WatchGuard knows how to help. 6
  • 7. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved 7 What We Do - Philosophy Intelligent Protection Actionable Visibility Simplified Management Effective protection against today’s digital threat landscape requires multiple services working intelligently together. Prevent, detect, and instantly respond to cyber attacks with automated policies. . Monitor and report on the health of your IT infrastructure. Actionable visibility tools enable you to proactively identify threats, while providing corrective action against known issues. Managing security across your organization has never been simpler. Use out-of-the-box tools to quickly and easily deploy, configure, and maintain your security with the granularity of your choice. Smart Security, Simply Done. Full enterprise-grade security, none of the complexity. No Security Admin, No Problem! No IT Resources, No Problem! No Data Analyst, No Problem!
  • 8. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved CORE VALUES Be Accountable It is all about doing the right thing and doing it the right way. Stand up for what you believe, do what you say you are going to do, and don’t be afraid to admit mistakes and correct them. 8 Be Passionate About Success Once we make up our mind, let’s go make it happen. Don’t stop until you succeed, and most importantly, be proud of that success with the highest integrity and humbleness. Strong Customer Focus Our success is impossible without a diligent focus on our customers and partners. We all impact customers in many ways each day - they are central to our successful execution
  • 9. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved 9 What We Do – Technology Network Security Multi-Factor Authentication Secure Wi-Fi • Firebox® UTM/Firewall Appliances • Full Portfolio of Malware Prevention Security Services • ThreatSync® Threat Correlation and Response Engine • Dimension™ Centralized Management and Reporting • AuthPoint® Cloud-based MFA Platform • AuthPoint Mobile App (Push, OTP, and QR-codes) • Mobile Device DNA Context Based Authentication • WatchGuard Cloud® Highly Scalable Mgmt. Platform • High Performance In/Outdoor Access Points • Patented WIPS Security • Powerful Customer Engagement & Analytics Tools • WG Wi-Fi Cloud® Centralized Mgmt. and Reporting Protect your network from malware, malicious content, and phishing attacks. Protect your employees' corporate identities from theft and misuse. Protect your Wi-Fi and the people on it from prying eyes, data theft, and malware. Why How What Protect What Matters, Protect Your Business.
  • 10. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved 10 What We Do – A Unified Security Platform WatchGuard Visibility & Management Centralized Management, Actionable Visibility, and Advanced Reporting Secure Wi-Fi Network Security Multi-Factor Authentication Total Security, Total Control.
  • 11. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved The WatchGuard Difference 11 The quickest access to new and improved security services Innovation Certified product performance – speed, efficacy, and reliability – performance at all price points Performance Enterprise-grade security without the complexity - always easy to configure, deploy, and centrally manage Simplicity Correlate security events from your network, endpoints, and other TI feeds for maximum protection Correlation Full network visibility with the power to take action immediately. Visibility
  • 12. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Industry Recognition
  • 13. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Come for the Security, Stay for the Simplicity. TV Globo All organizations need enterprise-grade security. Those who value streamlined deployment and simple management always chose WatchGuard. Who We Serve
  • 14. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved NSS Security Value Map (SVM) 2018 14 Only 3 vendors recommended 2-years in a row!
  • 15. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved By the Numbers 15 WatchGuard appliances conduct >1 billion security scans every hour A WatchGuard Firebox is deployed every 4 minutes around the world WatchGuard protected our customers 22+ BILLION times last year WatchGuard has saved customers >16 years of labor with RapidDeploy
  • 16. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Who We Are 16 Founded in 1996 HQ: Seattle, WA 700+ Employees 100+ Distributors 9,000+ Active VARs 80K+ Customers Operations in 5 countries; direct presence in 21 Global. Experienced. Trusted.
  • 17. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved A Pioneer in Cyber Security for Over 20 Years 17 1996 Pioneered FIRST security appliance 2003 FIRST to incorporate UTM capabilities into single appliance 2013 Introduced Access Points 2015 Introduced Dimension Command 2010 New product architecture launched 2011 Cloud-based defense (RED); App Control (NGFW) 2013 Introduced Dimension 2014 Introduced APT Protection 2014 Introduced Firebox NG appliances 2016 Secure Cloud- Managed Wi-Fi 2017 Introduced Threat Correlation 2017 Expanded Network Security to the Endpoint 2018 Introduced DNSWatch 2018 Introduced AuthPoint MFA 2019 Launched WatchGuard Cloud
  • 18. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved A Dedicated Channel of Certified Partners 18 With a Reseller for Every Need Copyright ©2018 WatchGuard Technologies, Inc. All Rights Reserved
  • 20. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved A Layered Defense WatchGuard breaks the Cyber Kill Chain® at each level using layered security and intelligent prevention, detection, and response defenses that shut down targeted attacks. 20
  • 21. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Bringing It All Together 21 Our unique threat correlation engine is constantly working to correlate network and endpoint security events with known threat intelligence data to identify and stop new threats and constantly improve preventative security measures. Protect your network from threats before they ever execute on a host computer Observe hosts, files, applications and traffic for abnormal behavior Set policies to automatically alert and/or respond to threats PREVENT DETECT RESPOND
  • 22. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Best-in-Class Security Services 22 INTRUSION PREVENTION SERVICE (IPS) GATEWAY ANTIVIRUS (GAV) APT BLOCKER REPUTATION ENABLED DEFENSE SERVICE (RED) WEBBLOCKER DATA LOSS PREVENTION (DLP) SPAMBLOCKER APPLICATION CONTROL NETWORK DISCOVERY FUNDAMENTAL SECURITY SERVICES ADVANCED SECURITY SERVICES DIMENSION COMMAND THREAT DETECTION & RESPONSE HOST RANSOMWARE PREVENTION (HRP) ACCESS PORTAL DNSWATCH INTELLIGENTAV
  • 23. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Centralized and easy to use management for your network security appliances and services. Centralized Management – Zero touch deployment – Quick, easy onboarding – Unlimited scalability – Simplified inventory and license management – One-click logging setup 23
  • 24. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Actionable Visibility 24 Endpoint Activity Security Services Wi-Fi Activity Threat Feeds Network Activity Easily identify actionable network and security trends, monitor security service efficacy, and easily generate business, compliance, and network health reports with stunning visualization tools.
  • 25. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Packaged to Your Needs 25
  • 26. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved One Platform, Total Security 26 EASIER TO PURCHASE One platform, one package, total security. Our security platform delivers a suite of powerful network, Wi-Fi, and endpoint security services along with the intelligence of correlation and industry- leading performance. EASIER TO DEPLOY Remotely deploy and configure multiple Firebox appliances across a distributed enterprise with minimal on-site assistance using a cloud-based deployment and configuration tool. EASIER TO MANAGE Manage one Firebox appliance or hundreds from a single, easy- to-use console, maximizing efficiency and streamlining network administration, while applying configuration changes in real time or as a scheduled task.
  • 27. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Product Integrations for Smarter Security 27 Learn more: www.watchguard.com/techpartners  Better interoperability in your IT environments  More robust security solutions  Easier deployments with greater confidence
  • 29. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Secure Wi-Fi 29 Cloud-Ready Access Points Wi-Fi Cloud WatchGuard doesn’t just offer Wi-Fi connectivity, we offer patented security, increased productivity, and improved customer satisfaction. When you deploy a WatchGuard access point with a WatchGuard Wi-Fi Cloud subscription, you gain invaluable tools to take your business to the next level.
  • 30. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Wi-Fi Cloud – 4 Products in 1 30 Patented Wireless Security Only hands-off automated WIPS with low false positives on the market Business Driven Analytics Location tracking, footfall, dwell time, repeat visitors, and more at no extra cost and no third-party requirements Powerful Engagement Tools Captivating splash pages and campaigns to interact with visitors using social media, video, polls, and more Management That Scales Only platform that easily scales from one AP to unlimited with no infrastructure
  • 31. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Wi-Fi Packaged to Your Needs 31 The only SKU that requires a Firebox® to manage the WatchGuard access points. The Wi-Fi packages serve to enable you to quickly and easily find the right set of features your customers need today…and tomorrow.
  • 33. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved MFA Protects With More Than Just A Password Multi-Factor Authentication Is Essential Protection By requiring additional proof of identity beyond a simple password, multi-factor authentication (MFA) is the most important safeguard to protect your business 33
  • 34. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard AuthPoint – MFA That’s REALLY Easy 34 Multi-Factor Authentication Password | Push Message | Phone Biometrics | Mobile Phone DNA AuthPoint Mobile App iOS & Android | 11 Languages | OTP | QR Code | Multiple Authenticators WatchGuard Cloud Visibility | Configuration | Management | Token Allocation in Seconds Extensive MFA Coverage Dozens of 3rd Party Integrations | Web SSO | Windows/Mac Computer Logon
  • 35. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Protects VPNs, Web Apps, PC Login, and more!
  • 36. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Easy to use, deploy and manage 36 User-friendly mobile app • Supports multiple authenticators • Allows tokens to be personalized with pictures and names • Enables users to respond to authentication push messages without opening the app Cloud-based management • Easy configuration and management - from anywhere! • Syncs with LDAP and AD and allows you to allocate tokens automatically • Intuitive interface with useful, easy-to- understand reporting
  • 37. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved Product Integrations for Smarter Security 37 Learn more: www.watchguard.com/techpartners  Better interoperability in your IT environments  More robust security solutions  Easier deployments with greater confidence
  • 38. c Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved 38 Get Connected, Stay Informed Daily Security Bytes Check out our Daily Security Byte videos to stay informed about the latest InfoSec news and tips. The 443 Podcast – Security Simplified Subscribe to our podcast for fresh content on leading white-hat hackers and security researchers. Secplicity Explore daily cybersecurity videos and editorial content for real-time information about the latest threats and how to cope with them. Social Media Connect with us on social media for the latest updates and cybersecurity information. Subscribe:

Editor's Notes

  1. It is no secret, no business or organization is safe from a cyber attack. In fact, the volume of attacks targeting small-midsized organizations continues to grow at an alarming pace. The following stats are from reports focused on small to midsized businesses and organizations only.
  2. Everyone knows there is a threat, but the real question why is nothing being done to adopt the security mechanisms to prevent costly breaches when these attacks occur? In 2016, 65% of surveyed organizations reported a security incident, making it top of mind heading into 2017, but we all know that right – companies are getting breached and security is important. What always stuns me is the lack of action. To that point, when 2017 came around, 45% of organizations still reported lack of adequate security controls.   Why?   What is preventing organizations from implementing the technology they know they need to protect their businesses, their employees, even their customers? Understanding this is key to understanding how to bring security to those who need it most and still lack it.   Amongst those surveyed, at the top of the list was one of the things we already discussed – lack of cyber security staff. The number one reason reported by organizations in 2017 for not implementing security was lack of staff who knew how to manage the process.   Close behind was lack of budget for security,   followed by lack of time to dedicate to security. If you don’t have security staff that means someone else must pick up the security project in addition to their day job and often that time never comes.   And the final reason ties right into reason 1 and 3… if you don’t employ dedicated security or IT staff someone has to be trained to deploy and manage security and again, these people have day jobs and security training rarely becomes the priority.   This is where WatchGuard comes in. WatchGuard is dedicated to eliminating the cost and complexity of security, making it accessible to organizations of all types and sizes, regardless of budget and technical staff! Let’s look at a few examples:          https://www.netwrix.com/2017itrisksreport.html About the report: Netwrix analyzed feedback collected between March 15 and April 15, 2017, from 723 respondents holding various positions in IT departments across all major industries worldwide. 32% large enterprise, 68% small-medium organizations.
  3. WatchGuard is 100% channel-driven, meaning we have spent the last year recruiting, training, and delivering security through a highly educated and fiercely loyal channel community. For customers, this means buying a product and someone trusted to deploy and manage it.   Across all product lines WatchGuard consistently delivers the highest performing, enterprise-grade security at a variety of price points, eliminating budget as a gating factor to adopting security. This is proven through extensive 3rd party testing with companies like Miercom and NSS Labs but also through our own obsession with this guarantee to our customers.   The last two objections tie right into the need for simplified security solutions. Our products are architected from the ground up to be a quick and as easy to deploy as possible, featuring predefined policies and configuration profiles and award-winning visibility tools for distilling oceans of data into meaningful information that anyone can understand and action – whether you are an IT professional focused on many different tasks beyond security or the owner of a small business just trying to tick the security box.   Now that we have established the need for simplified security and demonstrated our commitment to delivering it, let’s dive into the product portfolio. When I go through the portfolio I like to highlight two things. First our philosophy and second the actual product portfolio.
  4. WatchGuard is a security vendor. We are focused on identifying the security services that are a must-have for every organization and then adapting those services for mainstream consumption. During that process our focus is on three things:   First – Delivering the highest level of security efficacy on the market. There are some things that can be enterprise-grade but security should just be security and everyone should have access to the best.   Second - simplifying the implementation and management aspects of that security offering. As previously discussed, more often than note, accessibility is about time and resources to implement security and not necessarily about budget. We know that and that is why simplified management is a top priority across everything we do.   Finally – it is one thing to get logs of data from your security solution, it is another thing altogether to get information that is useful and actionable. With WatchGuard you get both – you get the ability to dive into the data or just browse the highlights to keep your business on track.   We started in network security 20 years ago and have taken this same philosophy and successfully applied it to the wi-fi and multi-factor authentication spaces. Let’s take a look at the portfolio…
  5. The WatchGuard portfolio features three families of security solutions for addressing the most common threats facing businesses and organizations today.   Featuring more than 15 best-in-class security services from URL and DNS filtering to sandboxing, data loss protection, and advanced threat detection, correlation and response our network security solutions protect organizations from known and evasive malware, malicious email and web content, phishing attacks, and more.   Stolen passwords top the list of vulnerabilities that lead to major breaches. WatchGuard’s AuthPoint multi-factor authentication service enables organizations to easily eliminate that threat by rendering a password alone useless.   Finally, what business can operate without Wi-Fi? The list is short (if not empty. Wi-Fi is not new, but it can leave employees, visitors, and therefore organizations vulnerable when not properly secured. With WatchGuard, customers can confidently provide trusted wireless environments, protecting their wi-fi and the people on it from prying eyes, data theft, and malware.
  6. Beyond providing enterprise-grade security for your network, your identities, and your airspace, each of these solutions are quick and easy to deploy and just as easy to manage on a day to day basis. Today, each offering features its own cloud-based centralized management and visibility platform. Whether you want to set it and forget it or dive in and check out what is going WatchGuard Wi-Fi Cloud, Dimension, and WatchGuard Cloud provide a quick and intuitive way to manage your security. In the future all of these systems will be consolidated under WatchGuard Cloud, providing a single pane of glass for managing all security across a customer’s environment.
  7. Simplicity: We offer simplicity without compromise. From how our services are packaged, to the ease of deployment and ongoing management, WatchGuard strives for simplicity across all aspects of our offering, it is in our DNA. We are the easiest product to resell, to buy, and to use. Our customer and partners consistently choose WatchGuard because they get the highest-end security available without any of the complexity associated with powerful security solutions. It is what we do best and what we are most proud of. Performance: WatchGuard offers the best blend of security efficacy and performance at every single price point. Not only do we consistently out preform the competition, we deliver top performance when it matters, when security is running. For our network security appliances, this means top performance with all UTM services and HTTPS decryption enabled. For Wi-Fi this means being able to deploy full WIPS Protection without impacting user experience or shutting down neighboring networks. This reinforces the strength of our security despite the simplicity of our packaging and deployment. Visibility: Beyond basic reporting, WatchGuard enables customers to transform data into rich visualizations of information for easy consumption. This makes full network visibility; security service efficacy and visibility; as well as reporting and compliance easier than ever before. This is constantly a deciding factor in favor of WatchGuard in competitive selling situations. Correlation – as with anything, the more you know the more you can do. With threatsync, WatchGuard reaches beyond the network to collect security event information from endpoints and additional threat intelligence feeds. This data is then correlated to score and prioritize and take action against threats that may have otherwise gone unnoticed. ThreatSync brings another layer of intelligence to WatchGuard’s approach to network security. Our Innovative Security Platform: WatchGuard has proven our ability to out-innovate competition by adding new security services, thus elevating the value to end-customers and partners. Whether it is bringing to market a completely new solution like AuthPoint, adding another layer of security to an existing product like when we added sandboxing via APT blocker, or upgrading an existing service like Gateway Antivirus WatchGuard makes sures our partners and customers have the quickest access to the products and services they need most.
  8. WatchGuard was the first to develop a multi-function security appliance. What evolved from a basic Firewall, WatchGuard introduced the concept of layered security, which incorporated additional security services included on top of a Firewall within one appliance. Over the years, WatchGuard has been a pioneer in introducing the most cutting-edge technologies into our security platform, including recently in 2017 with Threat Detection and Response and in 2014 with our advanced sandboxing technology called APT Blocker – both of which I will talk in more depth later in this presentation. We have also led the way in providing the top performance at all price points. Whether it is protecting the network, Wi-Fi environments or endpoints, WatchGuard is constantly looking ahead of the industry to incorporate the next technology to stay far ahead of the rapidly evolving threat landscape.
  9. WatchGuard sells its products and services 100% through the channel – and we have the most dedicated Channel in the industry with about 10,000 partners, ranging from traditional resellers, value-added resellers who provide deployment and configuration services, to full on managed security service providers who deliver end-to-end security management for our customers. Our WatchGuardONE Channel program ensures that our partners are the experts in our products and services, as their partner level within the program is based of the trainings and certifications they complete rather than revenue volumes that are common in these types programs. From our website, you can quickly find a WatchGuard channel partner in your location based on the services they offer and the WatchGuardONE partnership level.
  10. Providing true enterprise-grade security is all about layered security. There is never going to be one defense that can stop all attacks. Threats change and evolve all the time. There are many different stages of an attack. There is the network layer where they might be trying gain access to a computer, or there might be an exploit where they take over the computer based on a vulnerability – malware has all these different stages. The benefit to the WatchGuard approach is that we can block all of the stages in the kill chain with a layered security approach to truly prevent, detect, and respond to threats.
  11. As explained earlier in this training, management and visibility are key elements of a Unified Security Platform. Fireboxes can be managed directly using the WebUI or Command line interface, or for centralized management, our network security offering comes with a feature rich management platform called WatchGuard System Manager or WSM. This software makes it easy to manage a large number of security appliances and services with centralized policy enforcement, inherited configurations, time-saving drag and drop VPN configuration and so much more.
  12. The power and value of the Total Security Suite is a true differentiator for WatchGuard. We offer more best-in-class services that protect more layers of your IT infrastructure than any else on the market. As a customer with Total Security Suite, you can rest assured that you are always getting the most advanced security technologies while always being a step ahead of the cyber criminals. As new security services are introduced, you automatically get them as a Total Security Suite owner, and we make them easy for you to deploy them into existing deployments.
  13. Through WatchGuard, you get one platform that provides total security – both for today and tomorrow across the network, Wi-Fi, and endpoints. We make it easier to purchase through one package that continually provides the latest we have to offer, while making it easy to upgrade both the software and hardware. And we make our security easier to deploy and manage with centralized management tools and simple interfaces. You choose the level of granularity at which you manage your security, and you set policies to automate processes across all of our security services.
  14. We also partner with a wide range of industry-leading technology companies to develop product integrations that for stronger security and better interoperability in your IT environments. We know that WatchGuard is one of many technologies you are using, and we want to make sure all the technologies are working well together to provide the smartest security. Every integration we have includes an step-by-step integration guide available to everyone through on our corporate website, and we continually partner with new companies to build this ecosystem of integrations. Our customers’ feedback drives many of these partnerships, so as a customer we look to you for feedback and recommendations.
  15. WatchGuard not only provides enterprise-grade protection for your wired networks, we extend it to your wireless networks, providing the same security services through wireless connections. We also take it several steps further. Our access points lead in all of the performance areas that you have come to expect with Wi-Fi, and when paired with our Wi-Fi Cloud, you get enhanced security through the industry’s best Wireless Intrusion Prevention System, along with a host tools that provide customer engagement services, customer analytics, reporting, and ease of management that scales with no infrastructure required.
  16. WatchGuard’s WIPS uses patented Marker Packet technology that continuously defends your airspace from unauthorized devices, rogue APs, and malicious attacks – and with close to zero false positives. This is a true differentiator among the competition – whereas competing technologies act as a detection method rather than true prevention with immediate response. Using the cloud-management features of Wi-Fi Cloud, you can quickly scale from one AP to an unlimited without any infrastructure. Gone are the days of requiring a controller to manage your Wi-Fi. You can also group APs per location for ease of management. Analytics tools enable you to learn more about your customers. Wi-Fi Cloud tracks repeated visitors, footfall, and dwell time. You can also generate reports that demonstrate compliance adherence straight form the management interface – and schedule them to be delivered by email automatically. Use a WYSIWYG editor to quickly create splash pages with integrated social media authentication, videos, polling questions and more - whether you are looking to learn more about your customers or use Wi-Fi as a means of marketing with highlighted promotions on your splash page. They easy create and keep updated.
  17. We also partner with a wide range of industry-leading technology companies to develop product integrations that for stronger security and better interoperability in your IT environments. We know that WatchGuard is one of many technologies you are using, and we want to make sure all the technologies are working well together to provide the smartest security. Every integration we have includes an step-by-step integration guide available to everyone through on our corporate website, and we continually partner with new companies to build this ecosystem of integrations. Our customers’ feedback drives many of these partnerships, so as a customer we look to you for feedback and recommendations.