The Next Generation Firewall Markus Laaksonen Systems Engineer

  • Slides: 48
Download presentation
The Next Generation Firewall Markus Laaksonen Systems Engineer Nordics

The Next Generation Firewall Markus Laaksonen Systems Engineer Nordics

innovate or die

innovate or die

“…consumers aren’t standing in line for hours to pick up a Symbian smartphone… no

“…consumers aren’t standing in line for hours to pick up a Symbian smartphone… no matter how hard the company tries to spruce it up. ” - The Wall Street Journal, February 2011.

1995

1995

2011

2011

the age of app and user enlightenment

the age of app and user enlightenment

Employees’ use of browser-based file sharing 28% 2008 75% 2009 96% 2010

Employees’ use of browser-based file sharing 28% 2008 75% 2009 96% 2010

96% of businesses

96% of businesses

(a. k. a. "Sky peer-to-peer”)

(a. k. a. "Sky peer-to-peer”)

15% too much

15% too much

the conventional approach

the conventional approach

secure only web and email traffic

secure only web and email traffic

the incumbent response

the incumbent response

block applications and users

block applications and users

the innovative approach

the innovative approach

extend security to all network traffic

extend security to all network traffic

regain visibility and control

regain visibility and control

safely enable your workforce to use applications

safely enable your workforce to use applications

the next-generation firewall

the next-generation firewall

SSL traffic (Application Usage and Risk Report (May 2011) Sample size of 1, 253

SSL traffic (Application Usage and Risk Report (May 2011) Sample size of 1, 253 participating organizations and a view into more than 28 exabytes (28, 046, 165, 463, 032, 900, 000) worth of data is arguably, the largest application analysis of its kind. Report available www. paloaltonetworks. com/aur

latest Breaches

latest Breaches

Targets • Epsilon • RSA • Comodo • Playstation Network © 2011 Palo Alto

Targets • Epsilon • RSA • Comodo • Playstation Network © 2011 Palo Alto Networks. Proprietary and Confidential. Page 35 |

Epsilon Page 36 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Epsilon Page 36 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Epsilon Page 37 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Epsilon Page 37 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Epsilon Page 38 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Epsilon Page 38 | © 2011 Palo Alto Networks. Proprietary and Confidential.

RSA Page 39 | © 2011 Palo Alto Networks. Proprietary and Confidential.

RSA Page 39 | © 2011 Palo Alto Networks. Proprietary and Confidential.

RSA Page 40 | © 2011 Palo Alto Networks. Proprietary and Confidential.

RSA Page 40 | © 2011 Palo Alto Networks. Proprietary and Confidential.

RSA Page 41 | © 2011 Palo Alto Networks. Proprietary and Confidential.

RSA Page 41 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Comodo Page 42 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Comodo Page 42 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Comodo Page 43 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Comodo Page 43 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Comodo – Why it matters Page 44 | © 2011 Palo Alto Networks. Proprietary

Comodo – Why it matters Page 44 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Playstation Network Page 45 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Playstation Network Page 45 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Playstation Network Impact Page 46 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Playstation Network Impact Page 46 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Summary Page 47 | © 2011 Palo Alto Networks. Proprietary and Confidential.

Summary Page 47 | © 2011 Palo Alto Networks. Proprietary and Confidential.