html5-img
1 / 27

ProCurve ProActive Defense Smart Enough to See it Coming

ProCurve ProActive Defense Smart Enough to See it Coming. Mauricio Sanchez, Chief Security Architect ProCurve Networking by HP – October 2007. © 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice . Agenda.

Sharon_Dale
Download Presentation

ProCurve ProActive Defense Smart Enough to See it Coming

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ProCurve ProActive DefenseSmart Enough to See it Coming Mauricio Sanchez, Chief Security Architect ProCurve Networking by HP – October 2007 © 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

  2. Agenda • Introduction to ProCurve Adaptive Networks • Network Security Trends and Challenges • ProCurve Proactive Defense • Conclusion

  3. ProCurve vision ProCurve Networking Business is a widely known supplier of networking solutions and is renowned for being the first to deliver Robust Easy to use Cost-effective solutions For the customer looking for best business value

  4. What is an Adaptive Network? A cohesive, flexible network infrastructure that enables your organization to: Fortify security Increase productivity Reduce complexity

  5. Adaptive Networks must be: • Adaptive to users • Adaptive to applications • Adaptive to organization needs All on a cohesive, flexible network infrastructure that is highly secure and available

  6. ProCurve Delivers on its Adaptive Networks Vision Providing unprecedented value today and tomorrow Leading the industry with quality, reliability and ease of use Helping customers create the right network IT infrastructure Enabling organizations to complete effectively by fortifying security, increasing productivity and reducing complexity 6 6

  7. ProCurve NetworkingAdaptive EDGE Architecture™ Based on two key principles: • Control to the Edge moves intelligence out to the point of connection so that decisions are made immediately • Command from the Center, based on business needs, configures policies driven by user identity, application, and device type

  8. Servers Intelligent EDGE WirelessClients High performance forwarding fabric Clients Clients Per Port Distributed Processors Internet The Adaptive EDGE Architecture Each port incorporates a rich set of network capabilities Centrally and dynamically managed

  9. Network Security Trends and Challenges

  10. Security Issues are Here to Stay What is the activity inside the network ? How to protect against some internal network based attacks ? How to deal with an increasingly mobile and fragmented workforce ? How to maximize network uptime ? How to meet new regulatory compliance requirements ?

  11. The Great Compromise Performance Security Lower Risk Lower Availability Better ROI Lower Acquisition Costs

  12. Traditional fragmented approaches to network security

  13. ProCurve Proactive Defense

  14. I need to take control ! • Eliminate unwanted network traffic • Apply access rights and take control over network usage • Help to demonstrateregulatory compliance • Based on open standards

  15. Security is a Process Validation Policies Trusted Network Infrastructure

  16. ProCurve Integrated Security ProActive Defense Access Control Network Immunity Secure Infrastructure

  17. ProCurve Integrated Security ProActive Defense • Secure Infrastructure • Trusted platform • Secure device management • Protect data in transit Access Control Network Immunity Secure Infrastructure

  18. ProCurve Integrated Security ProActive Defense • Access Control • Controls who and how users connect to the network • Unmanaged/guest to trusted clients Access Control Network Immunity Secure Infrastructure

  19. ProCurve Integrated Security ProActive Defense • Network Immunity • Detecting, and responding to network attacks Access Control Network Immunity Secure Infrastructure

  20. ProCurve Integrated Security ProActive Defense • ProActive Defense • A comprehensive and integrated security framework • Control over network through a “single pane of glass” • Based on the Adaptive Edge Architecture Access Control Network Immunity Secure Infrastructure

  21. ProCurve ProActive Defense The GreatCompromise Security Performance Better ROI Lower Acquisition Costs Highly secure High Availability

  22. ProCurve Security Solutions – 2007 ProActive Defense Network Immunity Manager Pervasive intelligent threat defense for a highly available network ProCurve NAC Access control solution to prevent unauthorized network use Access Control Network Immunity Command from the center “Single pane of glass” to take control of your network ProVision ASIC security Virus and DoS protection with the ProVision ASIC Secure Infrastructure

  23. ProCurve ProActive Defenseis delivering Superior Business Value Building Trusted Network Infrastructure with ProActive Defense

  24. Conclusion

  25. ProCurve delivers ProActive Defense solutions to build a Trusted Unified LAN/WLAN Network That are : • Simple to deploy and to use • Inherently secure and dependable • Help to demonstrate compliancy • Based on open standards

  26. Voting member, Contributor IEEE 802.1AE MAC Security / Ethernet Encryption Initiated standard, Interim Chair Trusted Computing Group Initiated standard, Key Technical Contributor IEEE 802.1X End Device Compliance Authorization Port Authentication Protocol IETF Radius Extensions Internet-Draft Editor, Technical Advisor Identity Driven Manager (IDM) Attributes Voting member, Contributor IEEE 802.1AR Secure Device Identity Security Standards Leadership Working Group Vice-Chair IEEE 802.1 Ethernet Switching Standards standards leadership TCG/TNC Liaison, Contributor IETF NEA Network Endpoint Assessment Voting member, Contributor IEEE 802.1af Encryption Key Agreement Protocol

More Related