1 / 29

Security that is... Ergonomic, Economical and Efficient! In every way!

Security that is... Ergonomic, Economical and Efficient! In every way! . SSL. Stonesoft SSL VPN. VPN. Trends and challenges. What´s your situation?. Trends. 1. 2. 3. 4. Cloud Computing Maximize efficiency, minimize operating and administrative costs. Universal , secured access

mele
Télécharger la présentation

Security that is... Ergonomic, Economical and Efficient! In every way!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security that is...Ergonomic,Economical andEfficient! In every way! SSL Stonesoft SSL VPN VPN

  2. Trends and challenges What´s your situation?

  3. Trends 1 2 3 4 Cloud Computing Maximize efficiency, minimize operating and administrative costs Universal , secured access From anydeviceto anyapplication with single sign on Context AwareSecurity Access based on connecting client’s security posture Low OPEXCost-efficient, hardware token free and strong authentication solution

  4. Cloud computing Achieving IT agility “Business as a service” Minimizing OPEX Moving to Cloud Problem is securing the Access!

  5. Universal secured access User preferred devices Ergonomic Mobile working “Internet of things” Mobility meets Security

  6. Context aware security IT is losing control… why? Verify the security posture! • It’s not only a matter of authentication technology • Need to trust what you don’t own and control • Validate the context

  7. Lower OPEX Software vs. hardware tokens Faster time to market Fit to existing environment Complexity=costs

  8. What about You? Are you embracing cloud computing now or in the future? Are you concerned about the security of people accessing your data and applications? Are you willing to offer users more freedom to use any device from anywhere at any time? Do you want to simplify authentication and access while lowering operational costs?

  9. Stonesoft SSL VPN Our Value Proposition

  10. High Security meets high management. SSL VPN is integrated with the Stonesoft management center and authentication server.

  11. Stonesoft SSL VPN More user friendliness through Identity and Access Management for People More flexibility through universal access with Single Sign On More security through contextual verification of security posture What does it offer? SSL VPN

  12. Why IAM for People? Stonesoft SSL VPN • Access design and strategy focused on users > Usability first, technology enables. • Flexible Criteria > You choose the criteria for the different use cases • Dynamic application availability >you choose the apps that are relevant to you and satisfies the criteria.

  13. Why Universal Access? • Any client from anywhere brings freedom • No need for client software brings simplicity • Single Sign On for web and legacy apps brings user satisfaction

  14. Why Verification of Security Posture? • Validate the context, not just credentials! • Trust of the whole entity, not just users! • Holistic approach instead of one only

  15. Why Stonesoft? Total solution of a2cloud.

  16. Your NextSSL VPN...

  17. YOU CHOOSE: CAPACITY SSL-1030 4 x 10/100/1000 copper interfaces + 3 extension modules (optional)Up to 1000 concurrent users SSL-3202 4 x 10/100/1000 copper interfaces+ 3 extension modules (optional)Up to 15000 concurrent users

  18. YOU CHOOSE: ENVIRONMENT SSL VPN SSL VPN Physical Virtual Appliance

  19. YOU CHOOSE: FEATURE Licensed by number of ConcurrentUsers 1 Spike license for emergencysituations Active-Active Mirrored HA 2 3

  20. YOU CHOOSE: SERVICES Basic Support 5x8 – NBD Response Time 1 Premium Support 24x7 – 2H Response Time 2

  21. FEAtures Under the surface

  22. AUTHENTICATION • 6 Methodsincluded • Supports over 15 externalauthenticationmethods • Possibility to combine authenticationmethods

  23. AUTHORIZATION • Flexible Authorization Strategy with Multiple Criteria • Contextual Evaluation • Periodical Scan • Trace Removal

  24. SINGLE SIGN-ON • Multiple SSO techniques • SSO for Legacy and Web applications • Multiple SSO Domains

  25. Trace Removal • Cleans browser history • Transparent or Interactive • Removestemporaryfiles • Customisable

  26. Manageability • Standalone or with SMC • Reporting, Auditing and Statistics • Alerting and multichannel notification • Flexible architecture Vulnerabilities Situations Visualizations Rule Usage Anomalies Management Statistics Alerts Logs Users Reports Audit Logs Applications Geolocations Incident Cases

  27. Stonesoft Delivering Network Security for 23 years. Transformable & Adaptable: Next Generation Firewall. Evasion & Intrusion Prevention System. Resilience. Centralised Configuration & Event Management.

  28. Alan.cottom@stonesoft.com Thank You!

More Related