1 / 15

Introducing WatchGuard Dimension

Introducing WatchGuard Dimension. Oceans of Log Data. The 3 Dimensions of Big Data Volume “Log E verything - Storage is Cheap” Becomes too much data – Hiding what's important Retention can be years – Required by regulation Variety Translating large volumes of disparate information

tanuja
Download Presentation

Introducing WatchGuard Dimension

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introducing WatchGuard Dimension

  2. Oceans of Log Data The 3 Dimensions of Big Data • Volume • “Log Everything - Storage is Cheap” • Becomes too much data – Hiding what's important • Retention can be years – Required by regulation • Variety Translating large volumes of disparate information into decisions - FW, AV, IPS, Content Control, etc… • Velocity The speed at which the data is created, stored, analyzed and visualized .

  3. Top 5 Reasons for Logging Sorting Through the Noise SANS Eighth Annual 2012 Log and Event Management Survey Results 80% of respondents collect logs from firewalls • Detect / Track suspicious behavior • Support Forensics analysis and correlation • Prevent incidents • Meet / Prove Compliance • Detect advanced Persistent threat style Malware

  4. Top 3 Challenges with Logs • Key events from normal background activity • Correlation of information from multiple sources • Lack of analytics capabilities 35% of respondents spend ZERO time reviewing logs ONLY 24% of respondents review logs as a normal part of work flow

  5. Gap Between Logging and Security In 66% of cases, the breach wasn’t discovered for months or even years. 1% of breaches discovered by log analysis Executive Summary – 2013 Verizon Data Breach Investigation Report

  6. Making Better Decisions Business leaders are using new tools to analyze and run their business. Why not do the same for security?

  7. WatchGuard Dimension Brings big data visibility to network security • How many viruses were blocked? • Were intrusion attempts stopped? • Is private data leaking from our company? • How effective is our anti-spam solution? • Who is using the most bandwidth? • Which applications are using themost bandwidth? • What sites has a particular user visited? • What applications does a user use?

  8. “Zero Install” – flexible deployment options Simply import a virtual appliance • ONE INSTALL Includes OS, database, utilities, and WatchGuard server software Download WatchGuardDiemsion from your WatchGuard Account to start seeing what you are missing Private Cloud Public Cloud OR

  9. Set the same log encryption key as used on WatchGuard Dimension Enable Logging for All Policies You Want Visibility Enable Enhanced Logging for Proxies Configure the Firewall to Send Messages

  10. Drill down into detail information about domains Demo Or Users … Or Web Categories …

  11. WatchGuard DimensionBETTER VISIBILITY, STRONGER SECURITY View Groups Of Firewalls… View Individual Firewalls User Defined Access Create and Email Reports

  12. WatchGuard DimensionBETTER VISIBILITY, STRONGER SECURITY Drill down into detail information about domains or users… or web categories…

  13. WatchGuard DimensionBETTER VISIBILITY, STRONGER SECURITY Identify the user that is taking all of the bandwidth Identify the user and all the applications that he is using

  14. WatchGuard DimensionBETTER VISIBILITY, STRONGER SECURITY Identify policy violations

More Related