Share Tech NextGen UTM UR Series Share Tech

  • Slides: 48
Download presentation
Share. Tech Next-Gen UTM UR Series

Share. Tech Next-Gen UTM UR Series

Share. Tech Next-Gen UTM Common network intrusion methods Hacking Prevention Network Query Identity Intrusion

Share. Tech Next-Gen UTM Common network intrusion methods Hacking Prevention Network Query Identity Intrusion Prevention Qo. S Encrypted Connection Security Audit Layer 7 APP Control Virus Filters Intrusion, Sniffer, illegal connection DHCP MAC, IP Layer 2, ICMP, TCP UDP Anomaly Vo. IP P 2 P SSL VPN SOX HIPPA IM P 2 P URL SMTP/POP 3 Http FTP Gateway Security Network Auth. Auditing Share. Tech Information Co. , Ltd. Here comes your footer Page 2

Share. Tech Next-Gen UTM Competitive Advantages for SMB Before Now Anti-Spam Anti-Virus Load Balance

Share. Tech Next-Gen UTM Competitive Advantages for SMB Before Now Anti-Spam Anti-Virus Load Balance Qo. S Share. Tech Information Co. , Ltd. Here comes your footer Page 3

Share. Tech Next-Gen UTM Solve Your Network Problems Share. Tech Information Co. , Ltd.

Share. Tech Next-Gen UTM Solve Your Network Problems Share. Tech Information Co. , Ltd. Here comes your footer Page 4

About Share. Tech Information Co. , Ltd. Company Profile Present Stage More than 50%

About Share. Tech Information Co. , Ltd. Company Profile Present Stage More than 50% employees is RD Developing Stage n n Mail Server OEM n UTM/ Wireless UTM Mail Server in 2004 Early Stage First hardware-based n WF Solution (+AP) n Software Development n Small Device Agent Firewall Flow Analysis, Watchlan… (Modem/IP Router) n System integration n Founded In 1999 -2000 Share. Tech Information Co. , Ltd. 2000 -2010 2014 - Here comes your footer Page 5

Becoming Our Agent What you need to know before getting starteded Our Vision Share.

Becoming Our Agent What you need to know before getting starteded Our Vision Share. Tech Next-Gen UTM Four Major Features Share. Tech Next-Gen UTM Product Series and Spec Service and Support Success Stories Share. Tech Information Co. , Ltd. Here comes your footer Page 6

Becoming Our Agent Our Vision - Becoming a leading Network Security Brand Target Markets

Becoming Our Agent Our Vision - Becoming a leading Network Security Brand Target Markets O SOH SMB Strategy dle d i M ess n Busi Internal Co-Defense Integrated with Switch Sound Management Online behavior, APP, Qo. S control Share. Tech Information Co. , Ltd. ent m n n er Gov nizatio a Org hools Sc Cloud CMS Make sure each spot functioned well Here comes your footer l ncia a n i F vice r e s Tele ness Busi al Rent Complete Online Behavior Record AP Management Secure wired & wireless network Page 7

Share. Tech Next-Gen UTM Four Major Features Security Protection Internal Control § Anti-Virus, Anti-Spyware,

Share. Tech Next-Gen UTM Four Major Features Security Protection Internal Control § Anti-Virus, Anti-Spyware, Anti- Phishing, Anti-Do. S, Anti-Hacking and Anti-Relay § IDP & Botnet § Co-Defense § § § Policy Control (Qo. S/VPN/Auth. ) Filter APP Content Filter Mail Audit Network Load Balancing Easy Management Record-based Monitoring § § § Incoming/Outgoing mail record IM record FTP download record Encrypted SKEYP & QQ record Event log Share. Tech Information Co. , Ltd. § § § Webpage Management CMS AP Control Bulletin Board Flow Reports Here comes your footer Page 8

Share. Tech Next-Gen UTM Security Protection - IPv 4/v 6 Dual Stack Share. Tech

Share. Tech Next-Gen UTM Security Protection - IPv 4/v 6 Dual Stack Share. Tech Next-Gen UTM IPv 6 Certification Some parts of the world have already exhausted their IPv 4 allocations. Share. Tech UTM supports IPv 4 -only, IPv 6 -only, and dual-stack for each host. UR Series have been certificated with “IPv 6 Ready” logo by the IPv 6 forum. Share. Tech Information Co. , Ltd. Here comes your footer Page 9

Share. Tech Next-Gen UTM Security Protection - Anti-Virus n Share. Tech Next-Gen UTM firewall

Share. Tech Next-Gen UTM Security Protection - Anti-Virus n Share. Tech Next-Gen UTM firewall provides advanced threat protection such as anti-virus gateway and anti-spam gateway. With network security in place, Web and email pass through multiple threat detection engines. Security problems can be detected in real time. n Automatic Anti-Virus Signature Update: email viruses spread quickly through the network. Share. Tech uses Clam AV that can be efficient in providing real-time protection to eliminates viruses, spyware, and other malware. n Viruses embedded within incoming and outgoing mail, www. , and FTP will be discovered and blocked by virus scanning. Share. Tech Information Co. , Ltd. Here comes your footer Page 10

Share. Tech Next-Gen UTM Security Protection - IDP (Instrusion Detection Prevention) n Signatures :

Share. Tech Next-Gen UTM Security Protection - IDP (Instrusion Detection Prevention) n Signatures : Default (2243), Custom n IDP Policies: Multiple, Custom n Deep Packet Inspection: inspect the packets from OSI layer 4 - 7 (app layer) n Protocol Anomaly Detection n Risk management: 3 levels (High, Medium, Low) Share. Tech Information Co. , Ltd. Here comes your footer Page 11

Share. Tech Next-Gen UTM Security Protection - Bot. Net n “Bot. Net” (known as

Share. Tech Next-Gen UTM Security Protection - Bot. Net n “Bot. Net” (known as Zombie Network). A bot can be left for future activation, typically runs hidden and uses IRC to communicate with its Command Control (C&C) server. n When a command is released from the "controller", your computer performs automated tasks over the Internet. Being a vulnerable server, it will send spam distribution to many computers. n Share. Tech UTM integrated with Bot. Net with in-built NAT which can explicitly point out the real attack running hidden and suspense malicious software spreading in the internal network. Share. Tech Information Co. , Ltd. Here comes your footer Page 12

Share. Tech Next-Gen UTM Security Protection - Anomaly Flow Analysis n n n Network

Share. Tech Next-Gen UTM Security Protection - Anomaly Flow Analysis n n n Network Anomaly Detection ARP Spoofing Detection Prevent the spread of known worm Auto Prevention Session Log Access Control - Quarantine, Qo. S, Rate limit, IP/MAC Share. Tech Information Co. , Ltd. Here comes your footer Page 13

Share. Tech Next-Gen UTM Security Protection - ARP Spoofing Protection n ARP Spoofing is

Share. Tech Next-Gen UTM Security Protection - ARP Spoofing Protection n ARP Spoofing is to send fake ARP messages to LAN. Its aim is to associate the attacker's MAC address with the IP address and leads to network connection failure. n The first feature of ARP spoofing is data intercepted by the gateway. All the data can only be sent to the wrong MAC address, resulting in a normal PC not receiving the message. And the second is establishing forged gateway, so it is a cheating gateway issued false data to the PC, rather than going through the normal means of access routers. n Share. Tech UTM uses scheduled MAC addresses update technique to avoid changing MAC to IP address entries by ARP attackers. Share. Tech Information Co. , Ltd. Here comes your footer Page 14

Share. Tech Next-Gen UTM Security Protection - Co-Defense n Cooperated with an SNMP managed

Share. Tech Next-Gen UTM Security Protection - Co-Defense n Cooperated with an SNMP managed switch, administrators can find out problematic devices via the UTM management interface, and control the devices (allow or block) instantly. Share. Tech Information Co. , Ltd. Here comes your footer Page 15

Share. Tech Next-Gen UTM Security Protection - High Avaibility (HA) n Share. Tech UTM

Share. Tech Next-Gen UTM Security Protection - High Avaibility (HA) n Share. Tech UTM provides high availability solution that provides highly available services at all times. Master system normally has priority for serving as a gateway. Master and Slave systems get connected and keep the data synchronized. n HA offers continuous access to business-critical applications, information, and services. n Supported in UTM Series Share. Tech Information Co. , Ltd. Here comes your footer Page 16

Share. Tech Next-Gen UTM Internal Control - Qo. S n Smart Qo. S provides

Share. Tech Next-Gen UTM Internal Control - Qo. S n Smart Qo. S provides different priorities between individual users and applications. n Share. Tech UTM provides Qo. S-guaranteed wired network. Personal bandwidth setting can be made for personal requirements. Qo. S can be applied together with personal Qo. S, and then bandwidth reservation can be made. n It reserves remaining bandwidth automatically and dynamically allocates between users in real time. Share. Tech Information Co. , Ltd. Here comes your footer Page 17

Share. Tech Next-Gen UTM Internal Control - Failover Backup (Load Balance) Outbound Load Balance

Share. Tech Next-Gen UTM Internal Control - Failover Backup (Load Balance) Outbound Load Balance n Auto distribution n Manual distribution n Distributed based on source n Distributed based on destination IP Share. Tech Information Co. , Ltd. Inbound Load Balance n Analysis of distributed DNS n Analysis of host connections Here comes your footer Page 18

Share. Tech Next-Gen UTM Internal Control - APP Control n In-built various APP access

Share. Tech Next-Gen UTM Internal Control - APP Control n In-built various APP access control techniques n Easy-to-manage network security n Monitor employee wireless network usage Share. Tech Information Co. , Ltd. Here comes your footer Page 19

Share. Tech Next-Gen UTM Internal Control - Web Filtering n Web Filtering blocks access

Share. Tech Next-Gen UTM Internal Control - Web Filtering n Web Filtering blocks access to sites which contains violence, adult material and unauthorized websites which contains hackers and virus. Administrators can define a set of policies to reduce exposure to legal liability. Share. Tech Information Co. , Ltd. Here comes your footer Page 20

Share. Tech Next-Gen UTM Internal Control - URL Database n Built-in “Cloud URL Database”

Share. Tech Next-Gen UTM Internal Control - URL Database n Built-in “Cloud URL Database” which automatically categorized webpages, administrators can easily block the vicious URL websites by clicking on the target categories instead of entering website IP address and keywords one by one. n The database collects almost 1, 000 URLs and updates every period of time without additional charge. All these URLs and their contents were analyzed and classified into 12 categories. Share. Tech Information Co. , Ltd. Here comes your footer Page 21

Share. Tech Next-Gen UTM Internal Control - Authentication n Built-in integrated authentication mechanisms such

Share. Tech Next-Gen UTM Internal Control - Authentication n Built-in integrated authentication mechanisms such as Local AD/POP 3/Radius Servers are provided to authenticate users. Administrators monitor all user accounts in the internal network which reduces cost and increases business efficiency. n Only users with valid account and password are allowed to enter the internal network. Share. Tech Information Co. , Ltd. Here comes your footer Page 22

Share. Tech Next-Gen UTM Internal Control - IPSec VPN n Built-in IPsec VPN secures

Share. Tech Next-Gen UTM Internal Control - IPSec VPN n Built-in IPsec VPN secures the site-to-site connections. After passing authentication, more than two devices are allowed to access the same network and transmit encrypted data over the virtual private network. n Configuration for the LAN-to-LAN IPsec tunnel n GRE over IPSec tunnels supported n VPN tunnels can be established after tunnel users (endpoints) are authenticated using valid account name and password. n Other VPN devices supported Share. Tech Information Co. , Ltd. Here comes your footer Page 23

Share. Tech Next-Gen UTM Internal Control - PPTP Server/Client VPN n PPTP VPN offers

Share. Tech Next-Gen UTM Internal Control - PPTP Server/Client VPN n PPTP VPN offers point to point connection for employee at home. PPTP creates a TCP control connection between the VPN client and VPN server to establish a tunnel which enables employee get access to industry’s network securely and easily. n Configuration for VPN PPTP Server/Client tunnel n Options at Client side: -Using Share. Tech VPN Broadband Router -Windows/UNIX/Linux PPTP Client software n Other VPN devices supported Share. Tech Information Co. , Ltd. Here comes your footer Mal Server Page 24 Web Server

Share. Tech Next-Gen UTM Internal Control - SSL VPN n SSL VPN provides extensive

Share. Tech Next-Gen UTM Internal Control - SSL VPN n SSL VPN provides extensive network access control methods. Remote users are requested to established security policies based on the 2 directions. - entering internal network - entering VPN Server network. n Using web browsers (IE, Firefox, Opera) and open webpage, enter company IP at the address bar. Enter connection information (SSL VPN username and password). Share. Tech Information Co. , Ltd. Here comes your footer Page 25

Share. Tech Next-Gen UTM Record-Based Monitoring - Spam Filtering n Share. Tech UTM employs

Share. Tech Next-Gen UTM Record-Based Monitoring - Spam Filtering n Share. Tech UTM employs multiple spam mechanisms: ST-IP network rating, Fingerprinting, Bayesian Filtering, Auto learning, Auto-whitelist, system and personal Blacklist/Whitelist and Spam characteristics filtering. n Personal blacklist/whitelist and auto-learning can be activated in more flexible policies for high accuracy spam filtering. Share. Tech Information Co. , Ltd. Here comes your footer Page 26

Share. Tech Next-Gen UTM Record-Based Monitoring - Mail Auditing Default Conditions • Combined Conditions

Share. Tech Next-Gen UTM Record-Based Monitoring - Mail Auditing Default Conditions • Combined Conditions • Sender/Receiver • Sender source IP 3. Detection • • • Instant Action Mail title Mail subject Mail content Mail capacity Attachments • • Quarantine Delete Block IP Send copy • Notification • Adjust Spam Scores • Disable Spam Filter 4. Actions Taken Filter Policies Policy Engine 5. Good Mail 2. Outbound Email Company & Mail Record Rules • • Intellectual Property Rights Responsibility Laws Invasive Data Sensitive Data Legitimacy of Control • HIPAA (Health Insurance Portability and Accountability ) • So. X (Sarbanes-Oxley) • Private Information Protection Law 1. Rules and Legitimacy Share. Tech Information Co. , Ltd. Here comes your footer Page 27

Share. Tech Next-Gen UTM Record-Based Monitoring - Online Behavior Tracking n Record files transfer

Share. Tech Next-Gen UTM Record-Based Monitoring - Online Behavior Tracking n Record files transfer over WEB, Mail (POP 3 and SMTP), FTP, chat history over instant messaging (Yahoo, ICQ, IRC, Gadu, Jabber), and chat history and files transfer over encrypted Skype and QQ. Share. Tech Information Co. , Ltd. Here comes your footer Page 28

Share. Tech Next-Gen UTM Record-Based Monitoring - Web Browsing History n Web browsers record

Share. Tech Next-Gen UTM Record-Based Monitoring - Web Browsing History n Web browsers record stores a list of page title, time of visit and tracks visited websites. Clicking on web history links displays scanned webpages at the moment. Share. Tech Information Co. , Ltd. Here comes your footer Page 29

Share. Tech Next-Gen UTM Record-Based Monitoring - Email Delivery Record n All incoming and

Share. Tech Next-Gen UTM Record-Based Monitoring - Email Delivery Record n All incoming and outgoing mail will be recorded along with attached files. n Email record can be exported to a separate EML file which is most likely to be saved in and read in any operating system. Share. Tech Information Co. , Ltd. Here comes your footer Page 30

Share. Tech Next-Gen UTM Record-Based Monitoring - Instant Messaging Record n IM record results

Share. Tech Next-Gen UTM Record-Based Monitoring - Instant Messaging Record n IM record results include start time, chat time, computer name, IP address, IM type, account, speaker, and content. Clicking on the content icon, the detailed chat history will display. Share. Tech Information Co. , Ltd. Here comes your footer Page 31

Share. Tech Next-Gen UTM Record-Based Monitoring - Encrypted Skype/QQ Record n In addition to

Share. Tech Next-Gen UTM Record-Based Monitoring - Encrypted Skype/QQ Record n In addition to user access control, complete content record (text and file transmission) and search box are provided for administrators to find chat history fast via the friendly interface. Share. Tech Information Co. , Ltd. Here comes your footer Page 32

Share. Tech Next-Gen UTM Easy Management - Central Management System (CMS) n Increase operation

Share. Tech Next-Gen UTM Easy Management - Central Management System (CMS) n Increase operation and distribution efficiency n Avoid costly mistakes and significantly reduce costs in network management n Manage customers distributed in different areas n Manage distributed appliances installation across remote offices and clients with ease Share. Tech Information Co. , Ltd. Here comes your footer Page 33

Share. Tech Next-Gen UTM Easy Management - AP Management n Share. Tech UTM monitors

Share. Tech Next-Gen UTM Easy Management - AP Management n Share. Tech UTM monitors operational status, online user status via the management interface. n Administrators gain controls over flow, delivery, AP groups and access to the internal wireless network. Share. Tech Information Co. , Ltd. Here comes your footer Page 34

Share. Tech Next-Gen UTM Easy Management - Flow Reports n Chart type options allow

Share. Tech Next-Gen UTM Easy Management - Flow Reports n Chart type options allow administrators to custom how the chart types (bar, pie, line, table) or texts will be displayed at the top of the report. n Share. Tech UTM displays operation status for the time frame specified (day, week, month), including CPU/RAM/modification times/security level/ flow monitor reports. Share. Tech Information Co. , Ltd. Here comes your footer Page 35

Becoming Our Agent What you need to know before getting starteded Our Vision Share.

Becoming Our Agent What you need to know before getting starteded Our Vision Share. Tech Next-Gen UTM Four Major Features Share. Tech Next-Gen UTM Product Series and Spec Service and Support Success Stories Share. Tech Information Co. , Ltd. Here comes your footer Page 36

Share. Tech Product Series and Spec Product Line Extension Middle-sized Business Performance SMB Recommended

Share. Tech Product Series and Spec Product Line Extension Middle-sized Business Performance SMB Recommended Users: 100 Large Enterprise Recommended Users: 400~1000 Recommended Users: 200 Branch Office Recommended Users: 50 § Hi. Guard Pro Firewall, IPv 4/v 6, Qo. S, Load Balance, VPN, Content Filter… § UR-910 § UR-915 § UR-918 Anti-Virus, Anti-Spam, Firewall, IPv 4/v 6, Qo. S, Load Balance, VPN, Record, Content Filter… § UR-930 § UR-935 § UR-938 Anti-Virus, Anti-Spam, IDP, Botnet, Firewall, IPv 4/v 6, Qo. S, Load Balance, VPN, SSL VPN , Record, Content Filter… § UR-955 § UR-958 § UR-959 § UR-760 F Anti-Virus, Anti-Spam, IDP, Botnet, Firewall, Co-Defense, Audit, IPv 4/v 6, Qo. S, Load Balance, VPN, SSL VPN, Record, Flow Analysis, Content Filter…. Business Size – Recommended Users Share. Tech Information Co. , Ltd. Here comes your footer Page 37

Share. Tech Product Series and Spec UR Series Hi. Guard Pro • • •

Share. Tech Product Series and Spec UR Series Hi. Guard Pro • • • Throughput: 600 Mbps 160, 000 sessions VPN: 78 Mbps 2 WAN/1 LAN/1 DMZ Desktop UR-918 • • • Throughput: 600 Mbps 170, 000 sessions VPN: 85 Mbps HTTP Anti-Virus: 65 Mbps 2 WAN/1 LAN/1 DMZ 1 U Share. Tech Information Co. , Ltd. UR-910 • • • Throughput: 600 Mbps 170, 000 sessions VPN: 85 Mbps 2 WAN/1 LAN/1 DMZ 1 U UR-930 • • • Throughput: 950 Mbps 600, 000 sessions VPN: 240 Mbps HTTP Anti-Virus: 120 Mbps 2 WAN/1 LAN/1 DMZ 1 U Here comes your footer UR-915 • • • Throughput: 600 Mbps 170, 000 sessions VPN: 85 Mbps 2 WAN/1 LAN/1 DMZ 1 U UR-935 • • • Throughput: 950 Mbps 620, 000 sessions VPN: 280 Mbps HTTP Anti-Virus: 124 Mbps 4 WAN/1 LAN/1 DMZ 1 U Page 38

Share. Tech Product Series and Spec UR Series UR-938 • • • Throughput: 960

Share. Tech Product Series and Spec UR Series UR-938 • • • Throughput: 960 Mbps 620, 000 sessions VPN: 290 Mbps HTTP Anti-Virus: 124 Mbps 4 WAN/1 LAN/1 DMZ 1 U UR-959 • • • UR-955 • • • Throughput: 1, 000 Mbps 1, 850, 000 sessions VPN: 650 Mbps HTTP Anti-Virus: 350 Mbps 4 WAN/1 LAN/1 DMZ 1 U UR-760 Throughput: 1, 600 Mbps 1, 850, 000 sessions VPN: 650 Mbps HTTP Anti-Virus: 350 Mbps 4 WAN/1 LAN/1 DMZ 1 U Share. Tech Information Co. , Ltd. UR-958 • • • Throughput: 4, 800 Mbps 2, 000 sessions VPN: 830 Mbps HTTP Anti-Virus: 1, 080 Mbps 4 WAN/3 LAN/1 DMZ 1 U Here comes your footer Page 39

Share. Tech Product Series and Spec Comparison and Contrast - SMB Hi. Guard Pro

Share. Tech Product Series and Spec Comparison and Contrast - SMB Hi. Guard Pro UR-910 UR-915 UR-918 UR-930 UR-935 UR-938 HD X X 250 G 250 G Suggested Users Under 70 50 -75 50 -100 100 -200 Firewall O O O Outbound O O O O Inbound X X O O O CMS+AP Control O O O O Co Defense X O O O VPN O O O O SSL VPN X O O X O Anomaly Block X O O O IDP & Bot. Net X X O O O X O Anti-Spam X X O O O Anti-Virus X X O O O URL Database X X O O O Content Record X X X O O O X Reports/Audit Option / X X/X Option / Option X / X X/X Share. Tech Information Co. , Ltd. Here comes your footer Page 40

Share. Tech Product Series and Spec Comparison and Contrast - Enterprises UR-955 UR-958 UR-959

Share. Tech Product Series and Spec Comparison and Contrast - Enterprises UR-955 UR-958 UR-959 UR-760 F HD 500 G 300 G 2. 5’ Suggested Users Under 400 Under 600 -1000 Firewall O O Outbound O O O Inbound O O O CMS+AP Control O O O Co Defense O O O VPN O O O SSL VPN X O O Anomaly Block O O O IDP X O O Bot. Net O O O Anti-Spam O O O Anti-Virus O O O URL Database O O O Content Record O X O O O Reports O O O Audit Option O O Share. Tech Information Co. , Ltd. Here comes your footer Page 41

Becoming Our Agent What you need to know before getting starteded Our Vision Share.

Becoming Our Agent What you need to know before getting starteded Our Vision Share. Tech Next-Gen UTM Four Major Features Share. Tech Next-Gen UTM Product Series and Spec. Service and Support Success Stories Share. Tech Information Co. , Ltd. Here comes your footer Page 42

Share. Tech Service and Support Heaquarter, Branches in Taiwan & Oversea Market Expansion China,

Share. Tech Service and Support Heaquarter, Branches in Taiwan & Oversea Market Expansion China, Japan, Philippine, Indonesia, Malaysia, Thailand, Vietnam, Bangladesh, Lebanon 2001 Taipei 2005 Shanghai 1999 Taichung 2006 Kaohsiung Share. Tech Information Co. , Ltd. Page 43 Here comes your footer Page 43

Becoming Our Agent What you need to know before getting starteded Our Vision Share.

Becoming Our Agent What you need to know before getting starteded Our Vision Share. Tech Next-Gen UTM Four Major Features Share. Tech Next-Gen UTM Product Series and Spec. Service and Support Success Stories Share. Tech Information Co. , Ltd. Here comes your footer Page 44

Share. Tech Success Stories Business Share. Tech Information Co. , Ltd. Here comes your

Share. Tech Success Stories Business Share. Tech Information Co. , Ltd. Here comes your footer Page 45

Share. Tech Success Stories Governments and Schools Share. Tech Information Co. , Ltd. Here

Share. Tech Success Stories Governments and Schools Share. Tech Information Co. , Ltd. Here comes your footer Page 46

Share. Tech Online Demo Try it online! http: //www. sharetech. com. tw/web_eng/main. php? type=support

Share. Tech Online Demo Try it online! http: //www. sharetech. com. tw/web_eng/main. php? type=support &down=On-Line%20 Demo Share. Tech Information Co. , Ltd. Here comes your footer Page 47

www. sharetech. com. tw Technical Support § help@sharetech. com. tw Sales Inquiry § sales@sharetech.

www. sharetech. com. tw Technical Support § help@sharetech. com. tw Sales Inquiry § sales@sharetech. com. tw Share. Tech Information Co. , Ltd. Here comes your footer Page 48