Global Protect

Page 1

IT SECURITY


SECURITY 1-2-3 SEE

Next Generation Firewall defined by Gartner: “move to next-gen firewalls at the next refresh”

PROTECT KNOW

Global Protection by Virtual Security System

Compliancy demands a cont.gap analysys: the knowledge of who is accessing your data


Global Protect

GlobalProtect protects users’ and corporate assets when users roam off of the protected corporate network. Using GlobalProtect, roaming devices will discover the nearest security gateway and have the benefit of all of the application and user-based policies as well as the complete threat prevention and URL filtering. GlobalProtect requires a license for the overall system and a license on each firewall that will be participating in the distributed enforcement.


Protect the Firewall RISK LESS – Integrated deep content scanning, vulnerability blocking, anti virus gateway & URL control

MANAGE RISK

– VALUE MORE – See & control all application, users, threats, bandwidth that traverses your network – Simplify security & risk management

– SAVE MORE – 50+% saved directly less appliances, licenses, maintenance, power – 50+% saved indirect less instruments, less time, beter eye on security, better eye on applications, better eye on users

IMPROVE SERVICE

REDUCE COSTS


Endpoint management

Systems Management Cost

More than 50% of end users change their security settings

Virtualization technology usage has grown by more than 45%; increasing mgmt challenges

95% of the workforce are mobile; connectivity is often inconsistent and unreliable

Most enterprises do not standardize on a single OS; requiring multiple tools & breadth of expertise Confidentiality, integrity and availability needs to be proven – for all assets, everywhere

Systems Management Complexity


Global Protect Management Lightweight, Robust Infrastructure • Use existing systems as Relays • Built-in redundancy • Support/secure roaming endpoints

Cloud-based Content Delivery • Highly extensible • Automatic, on-demand functionality

Single Server & Console • Highly secure, highly scalable • Aggregates data, analyzes & reports • Pushes out pre-defined/custom policies

Single Intelligent Agent • Performs multiple functions • Continuous self-assessment & policy enforcement • Minimal system impact (< 2% CPU)

6


Manage Endpoints

Single Server & Console Single Intelligent Agent • Continuous self-assessment • Continuous Policy enforcement • Minimal system impact (<2% cpu)

• Highly secure, highly available • Aggregates data, analyzes & reports • Manages >250k endpoints An existing TEM managed asset can become a relay in minutes

Powerful policy language (Fixlets) • Thousands of out-of-the-box policies • Best practices for ops and security • Simple custom policy authoring • Highly extensible / applicable across all platforms

Virtual Infrastructure • Designate any TEM agent a relay or scan point • Built-in redundancy • Leverage existing systems/ shared infrastructure


Global Security Protection $ $ $ $ $ $ $


ON2IT SECURE NETWORKS GLOBAL PROTECT Network Discovery and Auto-Connection •The GlobalProtect client supports automatic network discovery to determine when the user is off the corporate network and auto- connection to the nearest gateway for seamless, unobtrusive connection setup and scanning.

Host Profiling •In addition to the existing matching criteria, information about the host state can now be used in policy through Host Information Profiles.

Windows XP, Vista, 7 Support •GlobalProtect is now available for Windows XP, Vista, and Windows 7 both 32- and 64-bit versions.

Single Sign-On Support •GlobalProtect can leverage existing Windows login processes.


ON2IT MANAGED SECURITY • •

can include : can include:

• • • • • • • • • •

standard: standard : standard: standard: standard: standard: standard: standard: standard: standard:

HARDWARE/SOFTWARE/RENEWALS INSTALLATION (INTAKE/POLICY REVIEW/CONFIG./TESTING/ PLACEMENT/TESTING/DOCUMENTING/AFTER CARE) UNLIMITED POLICY CHANGE REQUESTS BACKUP OF CONFIGURATION UPDATES/UPGRADES CONTINUOUS FINETUNING COLLECT/ANALYZE/REPORT 24x7x365 TELEPHONE & ONSITE SUPPORT 24x7x365 ADVANCED REPLACEMENT MAXIMUM TIME TO FIX: 8 HOURS CONFIDENTIALITY AGREEMENT ON2IT YOUR TRUSTED PARTNER


ON2IT VALUE ADD •

EXPERIENCE: THE ON2IT WAY. ASK OUR CUSTOMERS

• • • •

TRAINED: MANAGED: SERVICE: TRY:

ON2IT SECURITY CONSULTANTS & ENGINEERS ARE PAN CERTIFIED IN-HOUSE SECURITY OPERATIONS CENTER (SOC 24x7) IN-COUNTRY SPARES AND HELPPDESK FREE TRAIL + REPORT AND WITHOUT OBLIGATION


ON2IT SECURITY ON2IT is opgericht in 2005 en is specialist in het beveiligen van netwerken en informatiesystemen. Ons specialisme wordt gedreven door de gezonde ambitie van de ON2IT-medewerkers en intensieve samenwerking met een beperkt aantal leveranciers. Leveranciers: IBM Security, Palo Alto Networks,RSA, Juniper, VM Ware Contact:

ON2IT BV Steenweg 17b NL-4181 AJ Waardenburg T: +31 418 653 818

ON2IT NV Walenstraat 86 B-3500 Hasselt T: +32 11 301 450


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.