1 / 45

Company presentation

Company presentation. http://www.aker.com.br info@aker.com.br. About us About our products Why work with Aker ? Firewalls comparative. About us. Aker was founded in Brasília in 1997 Currently, we have branches in São Paulo, Rio de Janeiro and Curitiba (Brasília is still the headquarter)

kyrene
Télécharger la présentation

Company presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Company presentation http://www.aker.com.br info@aker.com.br

  2. About us • About our products • Why work with Aker ? • Firewalls comparative

  3. About us • Aker was founded in Brasília in 1997 • Currently, we have branches in São Paulo, Rio de Janeiro and Curitiba (Brasília is still the headquarter) • Branchin Palmas/TO with opening scheduled for the 2rd quarter of 2003 • Our mission is to offer our clients a high security level, rising information trustability

  4. Growth and Quality • Aker maintained an average rise of 160% a year on its turnover during the last 5 years • The number of our clients has been increasing dramatically each year • 89% of our clients renew theirs upgrade plans each year. • 85% of our clients renew their support contracts each year • 96% of our clients are satisfied or very satisfied with our products or services

  5. Most important clients • Aker has a broad range of clients, from the most distinct areas, such as: • National Defense institutions • Government institutions • Telephony companies • Banks • Large multinational companies • ISPs

  6. Stategic importance • It is a 100% Brazilian company, so it does not suffer from exportation restrictions • Develops the only commercial network security products in Brazil • All its products are developed to have the best cost/benefit relation • Offer a high level support 24 hours a day, in English or Portuguese

  7. Branches and Resellers in Brazil • Brasília • São Paulo • Rio de Janeiro • Curitiba • Palmas • Fortaleza • Salvador • Uberlândia • Cuiabá • Campo Grande • Goiânia • Manaus • Joinville • Caxias do Sul • Porto Alegre E outras mais…

  8. Quality proven overseas • Aker exports its products to several countries in the world, among them, Russia, Poland, Portugal and USA • Aker Firewall has been certified by the Russian government • Aker have resellers in Russia and Poland • Its products are available in Portuguese, English and Russian

  9. About us • About our products • Why work with Aker ? • Firewalls comparative

  10. Aker Security Suite • The most advanced technology in network security: Security and Trustability • Integrated tools • Covers all critical inbound and outbound data flows in corporate networks • It is like a team of experts on alert, watching over every company entrance

  11. Aker Security Suite • Components of Aker Security Suite: • Aker Firewall • Aker Web Content Analyser • Aker Log Analyser • Aker Encryption Client • Aker Secure Roaming • Third party integrated products: • IDS • Dragon • Real Secure • Antivirus • Panda • Dr Web

  12. Aker Web Content Analyser Aker Security Solutions Aker Web Content Analyser Users • Reduces dramatically abusive Internet usage • Sites filtering by category • Automatic classification of clients’ URLs • Up to 5.000 URL categorizations per second • User defined HTML blocking page • Incremental updating • Runs on Windows, Linuxand FreeBSD • Integrated with Aker Firewall, Firewall-1, Squidand ISA Server *

  13. Aker Log Analyser • Generates graphics per hour, week or month • Real time graphics generation • Reports with summaries for users which access most, hosts most accessed, most visited web pages and so on. • Automatic information crossing • Works with all SQL/ODBC databases • Detects port-scans performed by hackers • Generates reports showing the most accessed web categories per user

  14. Aker Encryption Client • Used with Aker Firewall • Completely transparent • Supports third party encryption algorithms • Uses 1024 bits certificates for key exchange • Compatible with Windows 9*/Me/NT/2000/XP • Supports TCP and UDP protocols • Encryption algorithms with up to 256 bits • Supports user authentication using: • Usernames/passwords (can be transparent); • SecurID Tokens; • Smart cards with X509 certificates

  15. Allows Remote users to work as if they were inside the corporation Encryption with keys of 256 bits Multiplatform Aker Secure Roaming

  16. Aker Secure Roaming • Add roaming users to the internal network

  17. Aker Secure Roaming • Crosses any type of NAT

  18. Aker Secure Roaming • Completely transparent to all applications

  19. Aker Firewall • Stateful filtering • NAT • Strong IPSEC compliant VPN • User Authentication • Transparent Proxies • Anti-virus for SMTP and POP3 • Load balacing for internal servers • Bandwidth control and traffic priorization • Integration with IDS tools • Best price-benefit relation in the market • Available in 3 languages: Portuguese, English and Russian • 100% developed in Brazil

  20. E-Mail Filtering Mail Server Users • Removal of attached files • Limits the size of messages • Protection against “relay” • Protection against “spam” (RBL) • Keywords verification inside e-mails • Antivirus support • Can send copies of the e-mails sent and received • Failover for antivirus • Transparent Proxy • Works with SMTP and POP3

  21. Integration with IDS Hacker URL Filtering Monitor IDS Users • Blocks the attack at the moment it is happening • The IDS can automatically add blocking rules in the firewall to deny and prevent new attacks • Integrated with Dragon IDS and others

  22. Servers Load Balancing IDS Aker Web ContentAnalyser Monitor IDS Users • Load balancing among servers for any service • Different weights for each server • Persistent sessions (session control) • Monitoring by Pingor by service Server 1 Server 2 Server 3 Server 4

  23. Firewall Failover IDS Aker Web Content Analyser Monitor IDS Users • Prevents hardware failures • Works as Master and Slave • Replicates the configuration on real-time • Automatic activation Server 1 Server 2 Server 3 Server 4

  24. User authentication/filtering External clients Certification Authority SecurID Server Authenticator 1(Windows 2000) Authenticator 3(Novell) Authenticator 2(Unix) Database manager • Filtering rules for all firewall supported services • Filtering of web pages by keyword or category • FTP command filtering • Usage of user databases from Windows NT/2000 and Unix (Linux, FreeBSD, Solaris and AIX) and Novell • Authentication using username/password, SecurID and Smart Cards • Transparent firewall logon WWW Internal Network

  25. Strong VPN Internet Server WWW WWW • Supports by default DES, 3DES, Blowfish 128/256 bits and AES • Supports up to 256 bits of key size • Supports third-party encryption algorithms • Uses 1024 digital certificates for user authentication/key exchange • IPSEC compliant • Interoperable with equipments from other manufactures • Creates tunnels between invalid networks External Clients Database manager Internal Network I Internal Network II

  26. Powerful and Flexible NAT • The most complete and flexible NAT in the market • Allows the creation of several backbones • A given server can have several external addresses depending on whom it is talking to • Enables double network address translation (source and destination of the same connection) • Supports services translation, 1-1, N-1, 1-N and N-N translation modes 10.1.1.1 200.1.1.2 10.2.1.2 10.3.1.3 192.168.1.1

  27. Traffic Balancing (QoS) • Optimizes the link usage • Preserves link bandwidth • Limits the bandwidth of services, hosts or users • Creates priorities for different kind of traffics Without QoS

  28. Traffic Balancing (QoS) With QoS

  29. Firewall Box • Appliance system • Does not have hard disk • Configuration saved in Flash memory • Does not need shutdowns • High availability • 19’’ rack mountable chassis • Dedicated port to failover module • Supports up to 10 Fast Ethernet adapters • Supports up to 4 WANs of up to 4096 Mbit/s • Supportstwo 1 Ghz processors and 1Gbyte of RAM

  30. About us • About our products • Why work with Aker ? • Firewalls comparative

  31. Why Work with Aker ? • Good profit margins • Lower prices when compared with similar products (thus easier to be sold) • Native integration with several complementary products, thus enhancing sells profits • Annual upgrade and support contracts, enabling year after year of profit in a same client • Free sales and technical training • Free marketing assistance • Possibility of installing demos

  32. Aker Firewall Advantages • It does not suffer from exportation restriction and thus can offer strong encryption to any country in the world • It is the only firewall that supports third party encryption algorithms • It has a API that enables developers to create transparent proxies to the Firewall easily

  33. Aker Firewall Advantages (2) • It is the only firewall that can perform user level filtering for all services and for Web pages • It is the only product capable of using user database of several operating systems Simultaneously to perform user authentication (Windows, Unix and Novell) • It is available in Portuguese, English and Russian

  34. Aker Web Analyser Advantages • It is the fastest web analyser in the market • It has a smart updates download method, saving bandwidth when downloading only the modifications generated every day • It demands a much less expensive hardware when compared with the competitors and can run on the firewall box • It has the smaller price of all similar products

  35. Aker Log Analyser Advantages • It was designed specifically for Aker Firewall and thus can summarize all pieces of information present in its log • It generates several types of information crossing not present on the competitors • It is the only Log analyser which can automatically detect port scans • It has the smaller price of all similar products

  36. Aker Encryption Client Advantages • It does not suffer from exportation restriction and thus can offer strong encryption to any country in the world • It is the only encryption client that supports third party encryption algorithms • Can be installed through logon scripts • Completely transparent for user and applications • It has the smaller price of all similar product

  37. About us • About our products • Why work with Aker ? • Firewalls comparative

  38. Firewalls Comparative Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages Developer Aker Security Solutions Check Point Software Tecnologies Inc. Network Associates Inc. Symantec Cisco Systems Inc. Sistema Aberto Supported Platforms FreeBSD and Linux (Red Hat and Conectiva) Windows NT, Windows 2000, Solaris 2.7/2.8, Red Hat 6.2/7.0 Solaris 8 and HP-UX 11 Windows NT, Windows 2000 and Solaris 2.6/2.7 IOS (proprietary) Linux Available in hardware (appliance) Yes Yes No Yes Yes No Minimum HW Pentium II 350, 64 Mb RAM Pentium II 400, 128 Mb RAM, Sun Sparc PCI Bus, 128Mb RAM SPARC or UltraSPARC 128 Mb RAM / HP PA-RISC 128 Mb RAM Pentum III 400MHz 256 Mb / Sun Sparc PCI Bus, 128Mb RAM Proprietary hardware, already sold with the product Pentium 133, 32Mb RAM

  39. Firewalls Comparative (2) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages Supported network technologies Fast/Gigabit Ethernet, ATM Serial, FDDI, Token Ring, Frame Relay, PPP, HDLC Fast/Gigabit Ethernet, ATM Serial, FDDI, Token Ring, Frame Relay, PPP, HDLC 10/100 Mbit/s Ethernet, Token Ring and ATM ATM, Fast/Gigabit Ethernet, FDDI, Token Ring, Ethetnet, Fast Ethernet e Gigabit Ethernet Fast/Gigabit Ethernet,ATM Serial, FDDI, Token Ring, Frame Relay, PPP, HDLC Remote administration Yes (Windows NT/2000 e 9x proprietary) Yes (Windows NT/2000 e 9x proprietary) Yes Yes (Windows NT only) Telnet, Windows NT/2000 , 9x, Solaris 2.6 e 2.7 e Red Hat 7.0 (demands a Web Browser) Telnet/Ssh VPN between firewalls Yes Yes (there is need to buy additional product) Yes Yes (there is need to buy additional product) Yes Yes (through the use of a separate package) VPN Client-Firewall Yes Yes (there is need to buy additional product) Yes Yes (there is need to buy additional product No No

  40. Firewalls Comparative (3) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages Supported encryption algorithms AES, DES, 3DES, Blowfish 128/256 bits, SKIP, IKE, third party algorithms CAST, DES, 3DES, RC4/IKE and FWZ-1 DES/IKE DES, 3DES, 40-bit RC2/IKE, proprietary DES, 3DES, IKE DES, 3DES IPSEC compliant Yes Yes (there is need to buy additional product) Yes Yes (there is need to buy additional product) Yes Yes (through the use of a separate package) Support to strong / third party developed encryption algorithms Yes No No No No No Protection against DoS attacks Yes Yes Yes Yes Yes (through local configuration only) No

  41. Firewalls Comparative (4) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages Network Address Translation (NAT) Yes Yes Yes Yes Yes Yes NAT depending on the destination Yes No No No No No Load balancing for internal servers Yes Yes (there is need to buy additional product) No No Yes No Bandwidth control / traffic priorization Yes Yes (there is need to buy additional product) No No No No

  42. Firewalls Comparative (5) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages SMTP content filtering by keywords Yes Yes Yes Yes No (only filters SMTP commands) No Virus scanning and removal in SMTP/POP3 messages Yes Yes Yes Yes No No URL filtering by category Yes Yes Yes Yes Yes No User level filtering Yes Yes Yes No Yes No

  43. Firewalls Comparative (6) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages User authentication using operating systems databases Yes Yes Yes No Only for HTTP, FTP and Telnet No User authentication using hardware tokens Yes Yes Yes Yes No No User authentication using Smart Cards Yes Yes No No No No User authentication using Windows, Unix and Novell user databases simultaneously Yes No No No No No

  44. Firewalls Comparative (7) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages User access profiles integrated with user databases from Windows NT/2000 and Unix Yes No No No No No Transparent proxy support Yes Yes Yes No No No Socks 5 proxy Yes Yes Yes No No No Real-time Graphics of network usage Yes No No No No No

  45. Firewalls Comparative (8) Aker Firewall Firewall-1 Gauntlet Firewall Raptor Firewall/Symantec Enterprise Firewall PIX Linux IPChains and free packages Visualization of the users logged in the firewall Yes No No No No No Integration with IDS tools Yes Yes No Yes Yes No Failover support Yes Yes Yes Yes Yes No Backup performed remotely, in a single file, and restoration without rebooting the firewall Yes No No No Yes No

More Related