1 / 13

Control your enterprise

Control your enterprise. A simple model for provisioning secure LAN’s. risk of disgruntled employee customer / dbase theft or simple time wastage. regulatory environment demands audits. rogue hosts & access points. Visitors, contractors and partners need access. Attacks motivated by profit.

ciqala
Télécharger la présentation

Control your enterprise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Control your enterprise A simple model for provisioning secure LAN’s © 2007 ConSentry Networks CONFIDENTIAL

  2. risk of disgruntled employee customer / dbase theft or simple time wastage regulatory environment demands audits rogue hosts & access points Visitors, contractors and partners need access Attacks motivated by profit Historically we haven’t secured the LAN. What’s changed? diversity of endpoints attacks are getting more elusive & can be brought in by trusted people The Problem: The SME owner needs 24*7 LAN control to insure continuity & productivity Many problems face the SME owner © 2007 ConSentry Networks CONFIDENTIAL

  3. maintain signatures add analysis server/engine add monitors on switch mirror port upgrade to 802.1x switches install supplicant software on desktops add IDS/IDP to LAN segments $$$ Access Switch add ACS server $$$ 802.1x Switch add firewalls to LAN segments $$ Radius $$$ configure group policies $$$ $$$ $$$ Access Switch 802.1x Switch $$$ $$$ $$$ Access Switch ACS Server Radius 802.1x Switch $$ $$$ $$ $$ user with infection Build your own? • Slow, intrusive, expensive • Ineffective Internet Firewall Router IDS/IDP $$$ Core Switch A/D Server Finance $$ Database Servers WLAN Switch Operations Sales © 2007 ConSentry Networks CONFIDENTIAL

  4. ConSentry InSight Internet GUI-based LAN tracking, incident reports, and policy setting Or get secure infrastructure from with ConSentry? LANShield Switch LANShield Controller Embedded security Total control for the existing LAN infrastructure Total SME control Every port Secured, every staff member controlled Router Firewall Business Value • Protect Information / Assets automatically • Reduce Risk Exposure • Monitor all staff, guest, contractor activity • Address Compliance and Auditing • Improve and Maintain Network Availability • Easy to afford OPEX model IDS/IPS Access Switch Core Switch Access Switch AD Server RADIUS Server Database Server, etc.. Access Switch WLAN Switch Data Center © 2007 ConSentry Networks CONFIDENTIAL

  5. ConSentry secures your business Only valid people & clean systems get on the LAN • Authentication and posture check • No changes to the user log-in procedure Complete LAN understanding • Who’s on? • What are they doing? • Everything tied to the user • Automatic incident response Automatic network protection • Zero-day malware containment • Application defense Control access to resources and applications • Control where people can go by their role • Only allow them access to applications relevant to their task © 2007 ConSentry Networks CONFIDENTIAL

  6. Global Awareness and User Identity Immediate value for the business owner • Who’s on my network? What app’s are they using? • What are they doing? Work or wasting time? • Where are they going? • Am I at risk? Am I loosing anyone? • Am I leaking critical data? • Only clean machines can connect • One simple screen = total network visibility © 2007 ConSentry Networks CONFIDENTIAL

  7. Standard L2/L3 Software Features Rapid STP for failover ACL, VLAN support L2, L3 QoS (.1p, .1Q, DSCP) L3 capable via software license Centralized management LANShield Switch Overview 10/100 out-of-band management port CS-4048 Hot-swappable power, fans RS-232 Console Compact Flash slot 101-Mpps L2/L3 Switching 10 Gbps Secured Throughput Per-user threat containment 2 10 Gbps uplinks 44 10/100/1000 copper ports with PoE 4 10/100/1000 SFPs © 2007 ConSentry Networks CONFIDENTIAL

  8. LANShield Controller Overview 10/100 out-of-band management port CS-2400 Dual built-in power supplies (AC or DC) RS-232 Console Compact Flash slot 10 Gbps secured throughput Up to 2,000 users 20 GigE ports (SFP connectors) 10 Gig in / 10 Gig out 4 GigE ports (SFP connectors) Port mirroring / HA synchro CS-1000 4 Gbps Secured Throughput Up to 800 users 8 GigE ports (SFP connectors) 4 Gig in / 4 Gig out 2 GigE ports (SFP connectors) Port mirroring / HA synch © 2007 ConSentry Networks CONFIDENTIAL

  9. Validation from Gartner • From the Campus LAN Magic Quadrant: • “We expect network access control to be a standard feature of switches in the future.” • “Embedded security will expand to … include technologies such as post admission control, threat containment and content security.” • “The best example of these new vendors is ConSentry Networks.” © 2007 ConSentry Networks CONFIDENTIAL

  10. ConSentry Leadership Select Customers Recognition “The best example of these new [embedded security] vendors is ConSentry Networks.” -- Mark Fabbi, Gartner © 2007 ConSentry Networks CONFIDENTIAL

  11. Company Background © 2007 ConSentry Networks CONFIDENTIAL

  12. Company Profile • Founded – August 2003 • HQ in Silicon Valley, CA • Approx. 100 employees • Mission – To protect corporate assets by securing and controlling the enterprise LAN • Funding – $51 million from leading VCs © 2007 ConSentry Networks CONFIDENTIAL

  13. Jeff Prince – Chairman and CTO Co-founder of Foundry, Centillion Tom Barsi– President and CEO Co-founder, VINA Technologies Brad Mandell – VP, NA Sales Juniper/Peribit, Jetstream, 3Com Dean Hickman-Smith – VP, WW Sales Juniper, NetScreen, TopLayer Dan Leary – VP, Marketing Juniper/Peribit, Vital Signs, SynOptics Mario Nemirovsky – VP, Chief Scientist CTO, founder of XStream Logic, Chief Architect, National Semiconductor Sam Farsad – VP, Engineering Extreme, Nortel William Delaney – CFO Chelsio, MediaQ, Incyte Pharmaceuticals Franklin Grosvenor – VP, Operations Cisco Management Team © 2007 ConSentry Networks CONFIDENTIAL

More Related