1 / 31

Cisco SA 500 Security Appliance

S

hermione
Download Presentation

Cisco SA 500 Security Appliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Cisco SA 500 Security Appliance Cisco Small Business Pro

    2. Sécurité: Investissement N°1 pour les PME

    3. Les équipements de Sécurité Tout-en-Un (UTM) remplacent les Routeurs Another interesting research finding is based on analysis conducted by IDC in November of 2008. They have seen and continue to predict that UTM (Unified Threat Management) security devices, also known as all-in-one security appliances, will continue to increase in share while more basic router based solutions decrease in share. The key driver of this change is the difference in security capabilities between these devices… routers typically have some basic firewall and VPN functionality. With the increasing types of threats on the Internet today, those capabilities alone are not sufficient. Email and Web are key entry paths for threats and All-in-one security appliances are required to properly secure a small business. The shift in sales to UTMs or All-in-ones is a validation that small businesses are increasingly moving in this direction. The opportunity for partners is to move customers off of traditional SOHO class routers with limited security to a more full featured all-in-one security appliance. Another interesting research finding is based on analysis conducted by IDC in November of 2008. They have seen and continue to predict that UTM (Unified Threat Management) security devices, also known as all-in-one security appliances, will continue to increase in share while more basic router based solutions decrease in share. The key driver of this change is the difference in security capabilities between these devices… routers typically have some basic firewall and VPN functionality. With the increasing types of threats on the Internet today, those capabilities alone are not sufficient. Email and Web are key entry paths for threats and All-in-one security appliances are required to properly secure a small business. The shift in sales to UTMs or All-in-ones is a validation that small businesses are increasingly moving in this direction. The opportunity for partners is to move customers off of traditional SOHO class routers with limited security to a more full featured all-in-one security appliance.

    4. Pourquoi cet intérêt pour la Sécurité Tout-en-Un? Les PC des employés sont lents ou se comportent bizarrement à cause des vers, virus et autres malware. Les employés perdent du temps à surfer sur des sites non professionnels et infectent leurs PC lorsqu’ils cliquent sur un lien du type “vous devez voir cette vidéo!”. Des emails importants provenant de clients sont enterrés dans des boîtes-aux-lettres remplies de Spam. Plus de 95% du trafic Email mondial est du SPAM. Les clients n’obtiennent pas l’attention qu’ils veulent et passent à la concurrence. Le réseau et les PC des employés fonctionnent comme il se doit. Les employés sont productifs. Les demandes et les emails des Clients sont traités rapidement. La fidélité des clients est élevée.. Entreprises SANS Sécurité Tout-en-Un Entreprises AVEC Sécurité Tout-en-Un To better understand the interest in all-in-one security appliances let’s take a look at two businesses. First, a business without an all-in-one network security appliance. Their Employee PCs run slow or behave erratically due to worms, viruses and other malware Their Employees waste time surfing non-business related web sites and infect their PC when they hit a innocent but malicious link for ‘you have to see this video’ Important customer emails are buried in in-boxes filled with spam emails Customers are not getting the attention they want, and take their business to a competitor The business struggles to grow, much less stay in business. Now, lets see what the situation is like for a business that has deployed an all-in-one network security appliance. The network and PCs work as they should. Employees are productive. Customer inquiries and emails are addressed Customer loyalty is high Business grows and prospers As we can see, with the abundance of threats including web and email based threats, an all-in-one network security appliance is required to properly protect, secure and thus help drive small businesses to succeed. To better understand the interest in all-in-one security appliances let’s take a look at two businesses. First, a business without an all-in-one network security appliance. Their Employee PCs run slow or behave erratically due to worms, viruses and other malware Their Employees waste time surfing non-business related web sites and infect their PC when they hit a innocent but malicious link for ‘you have to see this video’ Important customer emails are buried in in-boxes filled with spam emails Customers are not getting the attention they want, and take their business to a competitor The business struggles to grow, much less stay in business. Now, lets see what the situation is like for a business that has deployed an all-in-one network security appliance. The network and PCs work as they should. Employees are productive. Customer inquiries and emails are addressed Customer loyalty is high Business grows and prospers As we can see, with the abundance of threats including web and email based threats, an all-in-one network security appliance is required to properly protect, secure and thus help drive small businesses to succeed.

    5. Voici le nouveau Cisco® SA 500 ! Equipement de Sécurité Tout-en-Un (UTM) : développé spécifiquement pour les PME et leurs besoins en Sécurité. Fait partie de la Gamme Cisco Small Business Pro Pour les Entreprise de moins de 100 utilisateurs Configuration, Déploiement, et Gestion simplifiés Support par le Centre de Support Small Business Revenu annuel récurrent (Abonnement) pour les options soumises à licence. The SA 500 Series is specifically designed to address the all-in-one security capabilities that small businesses are seeking. They include a business grade firewall, Email security, Web Threat protection and URL filtering, as well as Site to Site VPN for remote offices and both IPsec and SSL VPN to enable remote access for employees and contractors. The wireless model includes 802.11n wireless for secure wireless connectivity. The SA 500 Series security appliances deliver full strength protection at full speed. The web and email security services are delivered via a unique cloud based approach to provide full strength security without impacting bandwidth. Threats are stopped before they get to the business. We’ll see that this is a key product advantage and differentiator against many of the competitors in this space. Most importantly for partners, the SA 500 Series is a member of the Small Business Pro category of products. It has been designed to optimize partner success when selling to a small business. It has a number of software licenses that can be easily added, including some that are subscription based which provide an opportunity for an on-going revenue stream. It includes smart defaults preconfigured on the device which simplify configuration and the time required to deploy the device. It is supported by Cisco Configuration Assistant via cross-launch functionality, and can be sold with an optional Small Business Pro service contract. ==== Cisco is pleased to introduce the Cisco SA 500 Series of Security Appliances. The SA 500 Series is specifically designed to address the all-in-one security capabilities that small businesses are seeking. They include a business grade firewall, Email security, Web Threat protection and URL filtering, as well as Site to Site VPN for remote offices and both IPsec and SSL VPN to enable remote access for employees and contractors. The wireless model includes 802.11n wireless for secure wireless connectivity. The SA 500 Series security appliances deliver full strength protection at full speed. The web and email security services are delivered via a unique cloud based approach to provide full strength security without impacting bandwidth. Threats are stopped before they get to the business. We’ll see that this is a key product advantage and differentiator against many of the competitors in this space. Most importantly for partners such as yourself, the SA 500 Series is a member of the Small Business Pro category of products. It has been designed to optimize partner success when selling to a small business. We’ll see that it has a number of software licenses that can be easily added, including some that are subscription based which provide an opportunity for an on-going revenue stream. It includes smart defaults preconfigured on the device which simplify configuration and the time required to deploy the device. It is supported by Cisco Configuration Assistant via cross-launch functionality, and can be sold with an optional Small Business Pro service contract. Next, we’ll take a look at each of these items in more detail. ===== Part of Cisco Small Business Pro Series A complete family of solutions that work together as integrated systems to solve business problems. Backed with Cisco Small Business Pro Service for the most investment value and delivered by experienced Cisco partners – trusted advisors to small business – makes selection, configuration, deployment, and support simple. The SA 500 Series is specifically designed to address the all-in-one security capabilities that small businesses are seeking. They include a business grade firewall, Email security, Web Threat protection and URL filtering, as well as Site to Site VPN for remote offices and both IPsec and SSL VPN to enable remote access for employees and contractors. The wireless model includes 802.11n wireless for secure wireless connectivity. The SA 500 Series security appliances deliver full strength protection at full speed. The web and email security services are delivered via a unique cloud based approach to provide full strength security without impacting bandwidth. Threats are stopped before they get to the business. We’ll see that this is a key product advantage and differentiator against many of the competitors in this space. Most importantly for partners, the SA 500 Series is a member of the Small Business Pro category of products. It has been designed to optimize partner success when selling to a small business. It has a number of software licenses that can be easily added, including some that are subscription based which provide an opportunity for an on-going revenue stream. It includes smart defaults preconfigured on the device which simplify configuration and the time required to deploy the device. It is supported by Cisco Configuration Assistant via cross-launch functionality, and can be sold with an optional Small Business Pro service contract. ==== Cisco is pleased to introduce the Cisco SA 500 Series of Security Appliances. The SA 500 Series is specifically designed to address the all-in-one security capabilities that small businesses are seeking. They include a business grade firewall, Email security, Web Threat protection and URL filtering, as well as Site to Site VPN for remote offices and both IPsec and SSL VPN to enable remote access for employees and contractors. The wireless model includes 802.11n wireless for secure wireless connectivity. The SA 500 Series security appliances deliver full strength protection at full speed. The web and email security services are delivered via a unique cloud based approach to provide full strength security without impacting bandwidth. Threats are stopped before they get to the business. We’ll see that this is a key product advantage and differentiator against many of the competitors in this space. Most importantly for partners such as yourself, the SA 500 Series is a member of the Small Business Pro category of products. It has been designed to optimize partner success when selling to a small business. We’ll see that it has a number of software licenses that can be easily added, including some that are subscription based which provide an opportunity for an on-going revenue stream. It includes smart defaults preconfigured on the device which simplify configuration and the time required to deploy the device. It is supported by Cisco Configuration Assistant via cross-launch functionality, and can be sold with an optional Small Business Pro service contract. Next, we’ll take a look at each of these items in more detail. ===== Part of Cisco Small Business Pro Series A complete family of solutions that work together as integrated systems to solve business problems. Backed with Cisco Small Business Pro Service for the most investment value and delivered by experienced Cisco partners – trusted advisors to small business – makes selection, configuration, deployment, and support simple.

    6. Cisco SA 500 Security Appliance This table provides a quick comparison of the key features that vary from one model to the next. As an overview, the SA 520 and SA 520W are essentially identical except that the SA 520W includes wireless with 802.11 (read as eight-oh-two-dot-eleven) b, g, and n support. The SA 540 is a higher performance model, but is not available with wireless. It also includes 8 gig Ethernet LAN ports instead of the 4 found on the SA 520 and SA 520W. As noted earlier SSL VPN is a licensed feature on the SA 520 and SA 520W which come with 2 seats, but purchase of an SSL license is required for additional users up to the maximum of 25 SSL VPN seats total. The SA540 comes with 50 SSL VPN seats included. Please see the SA 500 Series datasheet available at the URL referenced at the end of this presentation for a complete specification of the devices capabilities. This table provides a quick comparison of the key features that vary from one model to the next. As an overview, the SA 520 and SA 520W are essentially identical except that the SA 520W includes wireless with 802.11 (read as eight-oh-two-dot-eleven) b, g, and n support. The SA 540 is a higher performance model, but is not available with wireless. It also includes 8 gig Ethernet LAN ports instead of the 4 found on the SA 520 and SA 520W. As noted earlier SSL VPN is a licensed feature on the SA 520 and SA 520W which come with 2 seats, but purchase of an SSL license is required for additional users up to the maximum of 25 SSL VPN seats total. The SA540 comes with 50 SSL VPN seats included. Please see the SA 500 Series datasheet available at the URL referenced at the end of this presentation for a complete specification of the devices capabilities.

    7. Firewall Professionnel pour les PME The SA 500 Series includes a business grade firewall to protect the business from unwanted visitors, unwanted traffic, and malicious attacks. Bandwidth in the Local Area Network or LAN is not wasted on unwanted traffic. Additionally, Dual WAN functionality is included which enables the small business to have two connections to the internet. If one connection or service provider should go down, the second connection is there to maintain connectivity. The business can also load-balance their connection and select which traffic would go out on which connection. Finally the SA 500 Series can also support a DMZ or Demilitarized zone where the small business can easily and safely host file, web, and e-mail servers without exposing the devices on the internal LAN. One item to note is that the customer has a choice of the Dual WAN or use of the DMZ functionality, but cannot select both. For those businesses that do require both, it is possible to support Dual WAN, and to host servers on the LAN, but it does require a few extra configuration steps. The SA 500 Series includes a business grade firewall to protect the business from unwanted visitors, unwanted traffic, and malicious attacks. Bandwidth in the Local Area Network or LAN is not wasted on unwanted traffic. Additionally, Dual WAN functionality is included which enables the small business to have two connections to the internet. If one connection or service provider should go down, the second connection is there to maintain connectivity. The business can also load-balance their connection and select which traffic would go out on which connection. Finally the SA 500 Series can also support a DMZ or Demilitarized zone where the small business can easily and safely host file, web, and e-mail servers without exposing the devices on the internal LAN. One item to note is that the customer has a choice of the Dual WAN or use of the DMZ functionality, but cannot select both. For those businesses that do require both, it is possible to support Dual WAN, and to host servers on the LAN, but it does require a few extra configuration steps.

    8. VPN pour tout type de déploiement For remote connections for on the go users, branch offices and telecommuting employees, the SA 500 series has built-in virtual private network (VPN) capabilities to support IPsec or SSL encrypted network traffic. The SA 500 Series provides VPN services for all deployment types. For customers with more than one office location, site to site VPN can be easily configured. For businesses with remote employees, such as sales people, or third party contractors or partners, safe, secure remote access can be enabled.For remote connections for on the go users, branch offices and telecommuting employees, the SA 500 series has built-in virtual private network (VPN) capabilities to support IPsec or SSL encrypted network traffic. The SA 500 Series provides VPN services for all deployment types. For customers with more than one office location, site to site VPN can be easily configured. For businesses with remote employees, such as sales people, or third party contractors or partners, safe, secure remote access can be enabled.

    9. VPN SSL Préféré pour l’Accès Distant Etapes de déploiement pour IPSec Créer un compte utilisateur. Envoyer le client IPSec sur le PC. Installer le client IPSec. Configurer le client IPSec. L’utilisateur se connecte. (Conflit probable si un autre client est déjà installé) There are two technology choices for remote access using a VPN connection: IPsec, an older technology, and SSL VPN a newer and in many ways better technology for remote access, and thus the recommended solution. To understand why SSL VPN is preferred, lets look at the table. On the left side are the steps to deploy IPsec. First the admin must create a user account. Second they have to send the IPsec client to remote access user. That user then has to install the IPsec client and configure it. Now, if that user is a contractor, partner, or employee loading the client on a non-business owned PC, there is the possibility they may already have another IPsec client installed for another brand of device… it that is the case there is a high likelihood of conflicts and a lot of time spent trying to resolve the issue. In short, deploying IPsec is not very easy, and can require considerable amount of an Administrator’s time and resources. Looking to the right side of the chart, we see a simpler process… the administrator creates an account for the user which takes less than 30 seconds, they then send out the URL for the VPN portal to the remote user via email, that remote user can then bookmark and use that URL to connect to the business network at any time. No conflicts with other clients, no configuration complexity.. Just a VPN solution that works. SSL VPN has other advantages as well… in a disaster recovery situation, perhaps a snow storm hits a town, and office based employees are stuck in their homes and they don’t have business issued PCs, they can easily connect to the office using SSL VPN with their personal PCs, connect to all the same network resources they would use when in the office, and maintain productivity. While other businesses are effectively shut down, this business would continue to operate taking care of customers, making sales, and driving profitability. Two Factor Authentication is another capability that is supported on the SA 500 Series with SSL VPN. Via a partnership with VeriSign, the business can subscribe to a hosted token based authentication service for enhanced security with SSL VPN remote access. The benefit of a hosted solution in this case is that the business does not need to purchase any of the authentication equipment. And as for tokens, a number of options are available including phone based tokens, so employees don’t have an extra card or similar device to keep track of that has the token information. Finally, SSL VPN is a licensed feature on two of the three SA 500 series models. NOTE TO VENDOR: ANIMATION INSTRUCTIONS: FOCUS SHOULD BE PLACED ON THE RESPECTIVE SIDES OF THE TABLE AS THEY ARE BEING DISCUSSED, THEN THE BULLETS CAN BE BROUGHT IN OR HIGHLIGHTED AS THEY ARE BEING ADDRESSED.There are two technology choices for remote access using a VPN connection: IPsec, an older technology, and SSL VPN a newer and in many ways better technology for remote access, and thus the recommended solution. To understand why SSL VPN is preferred, lets look at the table. On the left side are the steps to deploy IPsec. First the admin must create a user account. Second they have to send the IPsec client to remote access user. That user then has to install the IPsec client and configure it. Now, if that user is a contractor, partner, or employee loading the client on a non-business owned PC, there is the possibility they may already have another IPsec client installed for another brand of device… it that is the case there is a high likelihood of conflicts and a lot of time spent trying to resolve the issue. In short, deploying IPsec is not very easy, and can require considerable amount of an Administrator’s time and resources. Looking to the right side of the chart, we see a simpler process… the administrator creates an account for the user which takes less than 30 seconds, they then send out the URL for the VPN portal to the remote user via email, that remote user can then bookmark and use that URL to connect to the business network at any time. No conflicts with other clients, no configuration complexity.. Just a VPN solution that works. SSL VPN has other advantages as well… in a disaster recovery situation, perhaps a snow storm hits a town, and office based employees are stuck in their homes and they don’t have business issued PCs, they can easily connect to the office using SSL VPN with their personal PCs, connect to all the same network resources they would use when in the office, and maintain productivity. While other businesses are effectively shut down, this business would continue to operate taking care of customers, making sales, and driving profitability. Two Factor Authentication is another capability that is supported on the SA 500 Series with SSL VPN. Via a partnership with VeriSign, the business can subscribe to a hosted token based authentication service for enhanced security with SSL VPN remote access. The benefit of a hosted solution in this case is that the business does not need to purchase any of the authentication equipment. And as for tokens, a number of options are available including phone based tokens, so employees don’t have an extra card or similar device to keep track of that has the token information. Finally, SSL VPN is a licensed feature on two of the three SA 500 series models. NOTE TO VENDOR: ANIMATION INSTRUCTIONS: FOCUS SHOULD BE PLACED ON THE RESPECTIVE SIDES OF THE TABLE AS THEY ARE BEING DISCUSSED, THEN THE BULLETS CAN BE BROUGHT IN OR HIGHLIGHTED AS THEY ARE BEING ADDRESSED.

    10. Accès Wifi Sécurisé Vitesse maximale et portée étendue grâce au 802.11n (compatibilité conservée avec 802.11b et 802.11g). Authentification 802.1x : Permet de ne laisser accéder que les équipements autorisés. Chiffrement puissant WPA pour sécuriser les communications.

    11. Trend Micro ProtectLink As we mentioned earlier, firewalls alone are not sufficient to protect a small business. Web and Email are the two primary avenues for threats into small businesses today. To protect against this threat, the SA 500 Series supports a licensed upgrade feature called Trend Micro ProtectLink Gateway. The ProtectLink Gateway capability provides Email security, Web Threat Protection and URL Filtering. Two important points for partners: First, because this feature is enabled via a license key it can be easily added after the fact… so if you sell the customer an SA 500 series device without the license, there is still a chance to upgrade them later, and all it takes is a license key… no new hardware to install. All the SA 500 Series devices come with a 30-day free trial of this offering, to help encourage the customer to make the additional purchase. The second point is that ProtectLink Gateway is a subscription based offering… it requires the customer to renew this offering on an annual basis. This provides partners with an on going opportunity for revenue and profit each year, not just at the time of initial sale. OK, so now lets take a closer look at what ProtectLink Gateway offers. As we mentioned earlier, firewalls alone are not sufficient to protect a small business. Web and Email are the two primary avenues for threats into small businesses today. To protect against this threat, the SA 500 Series supports a licensed upgrade feature called Trend Micro ProtectLink Gateway. The ProtectLink Gateway capability provides Email security, Web Threat Protection and URL Filtering. Two important points for partners: First, because this feature is enabled via a license key it can be easily added after the fact… so if you sell the customer an SA 500 series device without the license, there is still a chance to upgrade them later, and all it takes is a license key… no new hardware to install. All the SA 500 Series devices come with a 30-day free trial of this offering, to help encourage the customer to make the additional purchase. The second point is that ProtectLink Gateway is a subscription based offering… it requires the customer to renew this offering on an annual basis. This provides partners with an on going opportunity for revenue and profit each year, not just at the time of initial sale. OK, so now lets take a closer look at what ProtectLink Gateway offers.

    12. Exemple de malware “Koobface” le worm qui vole des données 1ere apparition du worm en juillet-Aout 2008 Réapparition début décembre avec une nouvelle campagne “malware” avec comme cible les utilisateurs de FaceBook Un Email arrive avec comme source vos contacts Facebook vous envoyant vers un faux lien Youtube L’utilisateur est sollicité pour installer une mise à jour d’Adobe Flash Player. En fait il s'agît du malware. Une fois installé le worm récupère des informations confidentielles sur les PCs infectés (N° carte de crédit …) The “Koobface” worm was first discovered in the mid-2008, around the July time-frame. The first campaign targeted both Facebook and Myspace users. However, this campaign was solely targeted at Facebook users. The malicious email includes a link from a friend saying they saw them in a video on YouTube.The “Koobface” worm was first discovered in the mid-2008, around the July time-frame. The first campaign targeted both Facebook and Myspace users. However, this campaign was solely targeted at Facebook users. The malicious email includes a link from a friend saying they saw them in a video on YouTube.

    14. Email Protection Email via Trend Micro ProtectLink Protection Email : Les Emails qui vous sont destinés sont scannés à la recherche de spam, virus, malware, spyware, et attaques de phishing. Basé sur le service hébergé primé de Trend Micro : Interscan Hosted Messaging Security (IMHS). Solution Unique “In the Cloud” : Protection maximale : + de 3 millions de signatures anti-virus et + de 400,000 signatures anti-spyware, 10 techniques différentes pour identifier le spam, incluant une méthode qui regarde à la fois l’adresse IP de l’expéditeur et analyse le contenu du mail proprement dit. Pas de risque que les signatures antivirus soient obsolètes. Les Menaces sont bloquées avant qu’elles n’atteignent votre réseau. La Bande Passante n’est pas du tout affectée par le traitement qui se passe “dans le nuage”. ProtectLink Gateway works with customer’s mail server. ProtectLink Gateway protects all email going into a small business. It inspects the email for spam, viruses, malware, spyware, and phishing attacks. Up to 95% of global email traffic has been found to be spam. If not prevented, these threats can impact the network bandwidth, bring down critical applications the business relies on for day to day activities, waste employee’s time, and disrupt the profitability of the business. The email protection in ProtectLink Gateway is based on the Trend Micro Interscan Hosted Messaging Security offering. What is unique about this solution is that it performs inspections in the cloud. This has a number of benefits… perhaps the most important being the increased level of security the small business realizes as a result of full strength protection. For example, While most typical small business security all-in-one devices can only support a few thousand threat patterns at most, the ProtectLink Gateway solution analyzes threats in the cloud where high-performance hardware can check each email against a database of over 3 million anti-virus patterns and over 400,000 anti-spyware patterns. In the case of anti-spam, ProtectLink Gateway utilizes 10 different techniques to identify and stop spam email. These techniques evaluate both the senders IP address as well as the actual content of the email itself. Most competitive solutions use only one or two techniques at most, typically only focused on the senders IP address. The benefit of this cloud based approach for ProtectLink Gateway customers is that they are able to protect their business with a solution that provides the breadth and depth of security at a price per seat not typically available or affordable to a small business. And your customers won’t have to worry about whether their inspection engine is out of date because it is continually updated by Trend Micro directly as soon as new patterns are available. Threats are stopped before they get to the customer’s business so enabling this protection won’t impact network bandwidth.. this is another area that many competitive solutions struggle with… their firewall performance looks impressive, but as soon as the customer turns on anti-virus and other features, the performance drops drastically.ProtectLink Gateway works with customer’s mail server. ProtectLink Gateway protects all email going into a small business. It inspects the email for spam, viruses, malware, spyware, and phishing attacks. Up to 95% of global email traffic has been found to be spam. If not prevented, these threats can impact the network bandwidth, bring down critical applications the business relies on for day to day activities, waste employee’s time, and disrupt the profitability of the business. The email protection in ProtectLink Gateway is based on the Trend Micro Interscan Hosted Messaging Security offering. What is unique about this solution is that it performs inspections in the cloud. This has a number of benefits… perhaps the most important being the increased level of security the small business realizes as a result of full strength protection. For example, While most typical small business security all-in-one devices can only support a few thousand threat patterns at most, the ProtectLink Gateway solution analyzes threats in the cloud where high-performance hardware can check each email against a database of over 3 million anti-virus patterns and over 400,000 anti-spyware patterns. In the case of anti-spam, ProtectLink Gateway utilizes 10 different techniques to identify and stop spam email. These techniques evaluate both the senders IP address as well as the actual content of the email itself. Most competitive solutions use only one or two techniques at most, typically only focused on the senders IP address. The benefit of this cloud based approach for ProtectLink Gateway customers is that they are able to protect their business with a solution that provides the breadth and depth of security at a price per seat not typically available or affordable to a small business. And your customers won’t have to worry about whether their inspection engine is out of date because it is continually updated by Trend Micro directly as soon as new patterns are available. Threats are stopped before they get to the customer’s business so enabling this protection won’t impact network bandwidth.. this is another area that many competitive solutions struggle with… their firewall performance looks impressive, but as soon as the customer turns on anti-virus and other features, the performance drops drastically.

    15. ProtectLink : Un vrai Système de Réputation D’abord : Examen de la Reputation Email Email Reputation Services (ERS) bloque tous les emails en provenance des émetteurs de mauvaise réputation Si Spammeur connu : email bloqué de manière permanente Si Zombie ou Botnet : email bloqué temporairement ERS bloque les messages sans avoir à scanner le contenu des messages Puis : Filtrage d’Email basé sur le Contenu Le reste des Emails est scanné au niveau du contenu Scanning : viruses, spam, spyware, phishing, et filtrage de contenu par règles paramétrables.

    16. ProtectLink : Latence et Confidentialité Latence Le process Email se mesure en millisecondes Délai insensible pour l’utilisateur Pas plus de 5 secondes en moyenne Ne dépasse jamais 2 minutes Confidentialité Garantie Tous les emails sont traités en automatique de manière transparente Pas d’intervention humaine Les informations relatives à l’émetteur sont capturées pour la Base de Réputation Email (ERS), le contenu de l’email n’est PAS enregistré. Les messages ne sont pas stockés, sauf si : Le Client utilise la quarantaine, alors les messages sont stockés jusqu’à 7 jours. Le réseau du Client est inaccessible, alors les messages sont mis en attente pour un maximum de 5 jours.

    17. ProtectLink - Continuité de l’Email Continuité d’exploitation et Disaster Recovery Taux de livraison garanti à 99.999% Data center répartis géographiquement 2 aux US 1 en Europe Systèmes à répartition de charge, complètement redondés Livraison avec contrôle intelligent du flux pour permettre une meilleure gestion en aval.

    18. Protection Web via Trend Micro ProtectLink Protection des Menaces Web : Le blocage d’URL basé sur la Réputation empêche les utilisateurs d’accéder à des sites web dangereux, connus pour héberger du malware, du phishing, etc. Filtrage d’URL : Plus de 80 catégories de sites Web référencés pour contrôler l’activité web des utilisateurs, améliorer la productivité et réduire le risque légal lié à l’utilisation inappropriée du surf sur le web. A second area of protection with Trend Micro ProtectLink Gateway is Web Security. There are two parts to this… First is web threat protection. This feature protects customers from accessing dangerous websites known to infect users that access them. Trend Micro continuously scans the internet checking websites and currently classifies over 8 million sites as dangerous, and the SA 500 Series blocks access to them via the ProtectLink Gateway solution. The second aspect of web security is URL filtering. ProtectLink Gateway has over 80 categories of websites that a business can select from to control employee browsing. And they can set different policies for different days or times of day. URL filtering helps increase employee productivity by preventing access to inappropriate web sites based on the business’ selection from the over 80 categories of websites. For instance a business can block access to sports, news, and social networking web sites, but still enable access to others. In addition to boosting employee productivity, URL filtering can also minimize legal exposure… an example here is one employee surfs a pornography site, a second employee may see this and be offended… at minimum it disrupts the employees, at worse the employee that was offended may seek legal action against the business. A second area of protection with Trend Micro ProtectLink Gateway is Web Security. There are two parts to this… First is web threat protection. This feature protects customers from accessing dangerous websites known to infect users that access them. Trend Micro continuously scans the internet checking websites and currently classifies over 8 million sites as dangerous, and the SA 500 Series blocks access to them via the ProtectLink Gateway solution. The second aspect of web security is URL filtering. ProtectLink Gateway has over 80 categories of websites that a business can select from to control employee browsing. And they can set different policies for different days or times of day. URL filtering helps increase employee productivity by preventing access to inappropriate web sites based on the business’ selection from the over 80 categories of websites. For instance a business can block access to sports, news, and social networking web sites, but still enable access to others. In addition to boosting employee productivity, URL filtering can also minimize legal exposure… an example here is one employee surfs a pornography site, a second employee may see this and be offended… at minimum it disrupts the employees, at worse the employee that was offended may seek legal action against the business.

    19. Pourquoi ProtectLink est-il un service hébergé ? Avantages du service hébergé Contient les menaces complètement en dehors du réseau. Permet aux PME/TPE de ne pas perdre de temps à gérer la sécurité. Préserve la bande passante, l’espace de stockage, etc. Optimise la protection avec des mises-à-jour et des règlages gérés par Trend Micro Réduit les coûts d’infrastructure, et d’administration. Greater Protection Keeps threats completely off of the network Block out 80% of the threat in the cloud Preserves bandwidth, storage, and other network resources Instant updates ensures all threat engines are up to date Lower Cost Requires ZERO additional software & hardware investment Lowers deployment effort Nothing to install (redirecting MX record) Trend Micro conducts all tuning to ensure optimized security Reduces maintenance and administrationGreater Protection Keeps threats completely off of the network Block out 80% of the threat in the cloud Preserves bandwidth, storage, and other network resources Instant updates ensures all threat engines are up to date Lower Cost Requires ZERO additional software & hardware investment Lowers deployment effort Nothing to install (redirecting MX record) Trend Micro conducts all tuning to ensure optimized security Reduces maintenance and administration

    20. Configuration Simplifiée et Administration Commune Outil de Configuration dédié en mode Web (web-based GUI) livré avec l’équipement. L’outil “Security Appliance Configuration Utility” se lance comme une partie de la Solution Cisco Configuration Assistant. Accès en mode console (avec Menus…) pour la récupération en cas d’incident. Supervision à distance via SNMP. The SA 500 series features an embedded GUI that can be accessed using a standard web browser. It is supported by Cisco Configuration Assistant (CCA) via cross-launch functionality The Security Appliance Configuration Utility include smart defaults preconfigured on the device which simplify configuration and reduces the time required to deploy the device . CCA is a no-charge PC application. Use of CCA simplifies SA 500 configuration when deployed as part of a Small Business Pro network. Monitoring via Simple Network Management Protocol (SNMP) is also supported. The SA 500 series features an embedded GUI that can be accessed using a standard web browser. It is supported by Cisco Configuration Assistant (CCA) via cross-launch functionality The Security Appliance Configuration Utility include smart defaults preconfigured on the device which simplify configuration and reduces the time required to deploy the device . CCA is a no-charge PC application. Use of CCA simplifies SA 500 configuration when deployed as part of a Small Business Pro network. Monitoring via Simple Network Management Protocol (SNMP) is also supported.

    21. Une brique de base de la Solution Cisco Small Business Pro Solutions data, voix, vidéo, wireless. Intégration transparente avec les autres produits Cisco Small Business Pro à venir Expérience utilisateur intuitive et prévisible avec des assistants d’installation et des outils de configuration graphique ergonomiques. Autodécouverte, terminologie et look and feel communs These are some high level possible deployment of the SA 500 as part of the Cisco Small Business Pro solution.These are some high level possible deployment of the SA 500 as part of the Cisco Small Business Pro solution.

    22. Configuration Simplifiée : Exemple CCA 2.1 permet de cloner une configuration Wireless sur les autres équipements Wireless de la Gamme SB Pro

    23. Un ensemble de produits administrables Cisco Small Business Pro consiste en un ensemble de briques de base administrables – sécurité, switching, wireless, routage – qui permet aux partenaires de construire des solutions pour les PME avec une meilleure marge.

    24. Service de Support Small Business Pro “3 Ans de Tranquillité d’Esprit” The Cisco Small Business Pro Service helps you get the most value from your technology investment by helping you enjoy the best performance and reliability from Cisco Small Business Pro solutions. Delivered by Cisco, the device-level, subscription-based service includes software upgrades and updates, extended access to the Cisco Small Business Support Center, and next-business-day hardware replacement as necessary. The Cisco Small Business Pro Service helps you get the most value from your technology investment by helping you enjoy the best performance and reliability from Cisco Small Business Pro solutions. Delivered by Cisco, the device-level, subscription-based service includes software upgrades and updates, extended access to the Cisco Small Business Support Center, and next-business-day hardware replacement as necessary.

    25. Prix du Cisco SA 500 This table shows the part number (SKUs) for the SA 500 Series Security Appliances and the upsells that can be sold with it. Please note that these products are only available via Distribution. The VeriSign VIP service which provides two factor authentication for SSL VPN is available directly from VeriSign… use the URL shown to obtain additional details and ordering information. This table shows the part number (SKUs) for the SA 500 Series Security Appliances and the upsells that can be sold with it. Please note that these products are only available via Distribution. The VeriSign VIP service which provides two factor authentication for SSL VPN is available directly from VeriSign… use the URL shown to obtain additional details and ordering information.

    26. Gamme Cisco Sécurité Small Business

    27. Solutions Email Cisco Small Business

    28. Analyse Concurrentielle du SA 500

    29. Cisco SA 500 : Opportunités de Vente Cherchez les Entreprises … qui souffrent du volume de Spam. … qui veulent changer leur Antivirus poste de travail. La protection web et mail au niveau de la passerelle Internet améliore la sécurité, et préserve la bande passante en empêchant la quasi totalité des menaces de rentrer sur le réseau. Offre des services qui seraient inefficaces au niveau du poste de travail comme l’AntiSpam et le filtrage d’URL. … qui cherchent à contrôler l’activité web des utilisateurs au bureau. … qui ont besoin d’accès distant sécurisé simple et efficace pour leurs employés, partenaires, et prestataires. … Avec plus d’un seul site et qui veulent les relier entre eux. … avec un routeur SOHO et un firewall basique qui pourraient bénéficier d’une sécurité Tout-en-Un. … qui cherchent l’aide et les conseils d’un partenaire pour sécuriser efficacement leur réseau. To help you identify sales opportunities, we have put together a list describing the types of small businesses that would best benefit from the SA 500 Series. We suggest you look for businesses that are having problems with the volume of spam emails. Businesses looking to roll out new end-point Anti-Virus protection. Providing Email and Web protection prior to the end-point increases security and maintains bandwidth, as well as addresses services the end-point products cannot deliver, such as spam and url filtering. Businesses seeking to control employee browsing of web sites from the office. businesses that need simple and easy remote access options to enable employees, partners, and contractors to easily connect to the business network. businesses with more than one site and that require site-site connectivity. Businesses with SOHO class routers with basic firewall capabilities that would benefit from moving up to a security appliance class product with all-in-one capabilities. And finally, businesses that are seeking a partner’s help and advice on how best to secure their network. To help you identify sales opportunities, we have put together a list describing the types of small businesses that would best benefit from the SA 500 Series. We suggest you look for businesses that are having problems with the volume of spam emails. Businesses looking to roll out new end-point Anti-Virus protection. Providing Email and Web protection prior to the end-point increases security and maintains bandwidth, as well as addresses services the end-point products cannot deliver, such as spam and url filtering. Businesses seeking to control employee browsing of web sites from the office. businesses that need simple and easy remote access options to enable employees, partners, and contractors to easily connect to the business network. businesses with more than one site and that require site-site connectivity. Businesses with SOHO class routers with basic firewall capabilities that would benefit from moving up to a security appliance class product with all-in-one capabilities. And finally, businesses that are seeking a partner’s help and advice on how best to secure their network.

    30. Traiter les Objections

More Related