Secured Workflow - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Secured Workflow

Description:

Networks that solve key challenges of IT - Provide a service with constrained capital & resources ... MAC Address is placed into a blacklist and policy set ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 14
Provided by: johnd85
Category:

less

Transcript and Presenter's Notes

Title: Secured Workflow


1
Secured Workflow
  • Bob Honour
  • Systems Marketing Manager
  • Email bob_honour_at_3com.com
  • Office 44 1 442 438246
  • Cell 44 7767 391866

2
The Right Tool for the job!
3
CHALLENGES YOU MAY BE FACING?
requiring 24/7 secure network operation
New business applications
all within new budget constraints
  • Fast payback
  • Value for money
  • Easy to deploy
  • LOBs
  • Security
  • Video
  • Extending to Customersand Partners
  • Mobility
  • Rogue apps
  • VoIP

4
THE CIO CHALLENGE
  • Be a business leader
  • Improve effectiveness
  • Strengthen competitiveness
  • Demonstrate IT value add

Security
  • Attacks number of attackers are increasing
  • Threats tools gaining in sophistication
  • Regulations, mobile devices IP applications
    increase risks

Converged
  • Move to Real Time Communications
  • Enhanced Collaboration
  • Perceived High Cost of Ownership

Networks
  • All users having access to all services
  • Quality of Service power for convergence
  • Performance for the future

5
The CIO Opportunity
  • Imagine where
  • Security threats are automatically addressed
  • Media-rich collaboration happens at a click
  • Networks enableBusiness Process Management

Secure
Converged
Networks
6
NETWORK EVOLUTION
Head Office
HotSpot
HotSpot
UserMigration
Regional Offices
Branch Offices
HotSpot
HotSpot
Teleworkers/SOHO
7
Ways to enable Effective Business
ProcessMEDIA-RICH COLLABORATION
Hi Lets bringin Kyle
Reduces cost, enhances business process,
strengthens customer interactions
8
SECURING THE CONTENT
Client Software Applications
  • Pop Up Blocker
  • Spyware
  • Adware
  • Anti-Virus
  • Personal FW
  • Content Filter
  • Spam Filter
  • IPSec Client
  • Citrix Client

1000s of users Unmanageable
  • OS dependent
  • Device dependent
  • Updating nightmare
  • Disparate solution set

The market does not need another endpoint
software security application to purchase,
configure, distribute, install, maintain, and
manage.
9
WHERE WOULD YOU RATHER START ROLLING OUT ENDPOINT
POLICY ENFORCEMENT?
or here?
TippingPointIPS
10
QUARANTINE AUTOMATIC PROTECTION
  • Quarantine Process
  • Client Authenticates via SMS
  • SMS acts as Radius proxy, learns MAC/Switch/Port
    from Switch via RADA

RADIUS
  • EVENT Illegal Activity
  • SMS resolves IP to MAC
  • MAC Address is placed into a blacklist and policy
    set
  • SMS forces re-authentication of compromised
    device
  • Device is contained within the set policy at the
    access switch ingress port

2
SMS
4
5
Safe Zone
1
Data Center
3
6
TippingPoint IPS
7
Access
Clients
Breach to Containment in under 5 seconds
11
END TO END SOLUTIONS FROM A SINGLE VENDOR
Converged
Secure
WAN
12
Summary
  • 3Coms Secure Converged Networks provide
  • Integrated business security
  • Investment protection through real-time
    application awareness
  • Scaleable performance
  • High availability, less downtime
  • Reduced total cost of ownership
  • Meet todays and tomorrows Business Process
    Application demands

13
Thank You
Write a Comment
User Comments (0)
About PowerShow.com