NK Butuan Presentaion

18

Transcript of NK Butuan Presentaion

Page 1: NK Butuan Presentaion
Page 2: NK Butuan Presentaion

LEANDER JAN CHAVEZ LARGO,CCNA, MCP, VCA6-DCV, ITIL-F V3, CFOT, C(SS, IBM Certified Professional - QRadar SIEM

Product Manager | Support Engineer

Page 3: NK Butuan Presentaion

IT: A Teaching Strategy

Page 4: NK Butuan Presentaion
Page 5: NK Butuan Presentaion

Today’s IT Security

ChallengesGrowing Security Threats

Solution Complexity

Increased Demand in Network Performance

BYOD Evolution

Visibility and Control

Page 6: NK Butuan Presentaion

Growing Security Threats

Source: IBM X-Force® Research 2013 Trend and Risk Report

Operational Sophistication

Year of the Security Breach

Near Daily Leaks of Sensitive Data

40% increase in reported data

breaches and incidents

Relentless Use of Multiple Methods

500,000,000+ records were leaked, while the future

shows no sign of change

2011 2013 2015

SQL injection Spear phishing DDoS Third-party software

Physical access Malware XSS Watering hole UndisclosedAttack types

Note: Size of circle estimates relative impact of incident in terms of cost to business.

Page 7: NK Butuan Presentaion

Increased Demand in Network Performance

Page 8: NK Butuan Presentaion

BYOD Evolution

Page 9: NK Butuan Presentaion

Visibility and Control

Page 10: NK Butuan Presentaion

Solution Complexity

?

Page 11: NK Butuan Presentaion

IT Network and Security Management Solutions

Page 12: NK Butuan Presentaion

Unified Threat Management and Next Generation Firewall

• NGFW• IPS• VPN Gateway• Application Control• URL Filtering• Data Loss/Leak Prevention

• Gateway Anti-Virus• Gateway Anti-Spam• Advanced Persistent Threat (APT)• End Point Protection• Wi-Fi Controller

Page 13: NK Butuan Presentaion

Next Generation Intrusion Prevention Systems (IPS)

• SQL Injection Attack• Cross Site Scripting• Denial Of Service• Ransomware• Spear Phishing• Identity Theft

Prevent the following:

Page 14: NK Butuan Presentaion

Link-Load Balancer and WAN Aggregation Solutions

• Multi-WAN Internet Load Balancer• Channel Bonding• Traffic Shaping• Quality of Service (QoS)• VPN Aggregation (Peplink Only)• Application Delivery Networking• Content Delivery Networking

Page 15: NK Butuan Presentaion

Security Information and Event Management (SIEM)

• Log Management• Real-time Analysis• Historical Correlation• Vulnerability Assessment• Incident Forensics• Risk Management

Page 16: NK Butuan Presentaion

Internet Bandwidth Optimization

With CACHEBOX you will:• Save Bandwidth• Deliver a better internet experience• Be able to monitor and control web usage

You need CACHEBOX if:• Your bandwidth is full and/or too expensive• Your students are frustrated because the web is too slow• You want to add more users to your network without overloading it• You need to monitor and control what websites your students are visiting

Page 17: NK Butuan Presentaion

Network Analysis, Management, Monitoring and Visibility

NETWORK MANAGEMENT• Network Performance Monitoring• Network Bandwidth Analyzer• Network Troubleshooting Bundle• Network Traffic Analyzer• Etc.

SYSTEM MANAGEMENT• Server and Application Monitor• Virtualization Manager• Storage Resource Monitor

DATABASE MANAGEMENT• Database Performance Analyzer for MSSQL, Oracle, MySQL, DB2, SAP

Page 18: NK Butuan Presentaion

Thank You!