1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my...

11
1 Managed Premises Firewall

Transcript of 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my...

Page 1: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

1

Managed Premises Firewall

Page 2: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

2

Typical Business IT Security Challenges

How do I protect all my locations from malicious intruders and malware?

How can I lower the OPEX of managing firewalls at all my locations?

Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?

How do I keep my cloud based servers and IT assets protected?

How do I ensure that content filtering and URL blocking policies are deployed on a uniform basis across multiple locations?

How do I get my limited IT staff refocused on strategic revenue generating initiatives?

How can I lower or eliminate the CAPEX of deploying multiple firewall devices?

Page 3: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

Security & Compliance are Mission Critical

“Approximately 80 percent of small businesses that experience a data breach go bankrupt or suffer severe financial losses within two years of a security breach”

- Small Business Computing Magazine

“2011 proved to be another tough year for companies attempting to defend sensitive information from cyber attack. Rate of personal records being compromised roughly tripled from 12 million in 2010 to 30 million in 2011.”

– Privacy Rights Clearinghouse

Cyber attacks have nearly tripled in the past year.

Page 4: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

• Provides Unified Threat Management (UTM) • Security experts on EarthLink staff support your business• EarthLink proactively maintains latest security patches• Protects against theft• Protects your key business information assets 24/7• Reduces need for security experts on staff• Eliminates maintenance and management of customer-

owned firewall• Improves network performance by blocking data from non-

approved sites, applications and content

Managed Premises Firewall

Page 5: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

5

• Two options– Managed Premises Firewall

• Designed for 1+ sites

– Data Center Based Firewall• Shared• Dedicated

Secure managed firewall to reduce Internet threats by stopping

both inbound and outbound security threats. We lower cost and ensure that your most valuable and confidential

information stays secure.

Managed Premises Firewall

Page 6: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

6

Select Package to Meet Your Needs  

 Managed Premises Firewall 

Basic  Package

 Premium Package

Firewall withStateful Inspection

A firewall blocks attacks by inspecting traffic, keeping track of valid sessions across the network and filtering traffic that looks suspect so that it cannot pass into the network. x x

Number of Sites

A site can be a company location or it can be services located within a data center. EarthLink MPLS not required.

Any number of locations

Any number of locations

Configuration backup and restore

The configuration of your security device is backed up, so that in the event of hardware failure, the original configuration can be restored to a new device. x x

URL Filtering 

URL Filtering uses a method called Whitelist and Blacklist for filtering. A whitelist is a list of URLs that are allowed. Conversely, a blacklist is a list of URLs that are denied. x

Content Filtering

Allows you to choose categories of websites to block at the firewall. This feature can be used to block or allow access to common Internet categories like Social Networking (e.g., Facebook, Google and MySpace)

x

Intrusion DetectionSystem (IDS)

IDS monitors network and/or system activities for malicious activities or policy violations and reports them, but does not stop them. x

Antivirus/Malware/Spyware

Antivirus is used to prevent, detect and remove malware. Malware is software designed to secretly access a computer system without the owner’s consent. Spyware is a type of malware that can be installed on computers to collect small pieces of information about users without their knowledge.

x

Application Control

Uses dynamic application identification engines that recognize applications based on their behavior. By coupling application control policies with sophisticated security features, you can achieve a more granular level of security at the individual application level or by managing categories of applications.

x

Page 7: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

7

Includes:• Firewall with stateful inspection• NAT & PAT

Benefits:• Keeps track of the state of network connections• Has the ability to identify legitimate packets for different types

of connections• Only packets matching a known active connection will be

allowed to pass through the firewall• Rejects all other packets• Can be customized to allow or block ports and protocols

Basic Package

Page 8: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

8

Includes:• Basic Package plus…• URL Filtering (whitelist & blacklist)• Web Content Filtering• Intrusion Detection Service (IDS) and Intrusion Prevention Service (IPS)• Anti-Virus, Anti-Malware, Anti-Spyware via scanning of data streams

Benefits:• Specify which websites should be accessible (whitelisted) or blocked (blacklisted) at the

firewall using URL Filtering• Choose categories of websites to block or allow at the firewall such as pornography, racism

& hate, and arts & entertainment using Web Content Filtering. May also be set at category/sub-category level allowing for more granular security control

• Application Control to manage the type of applications that can access data outside the firewall. Permit or block non-approved application categories such as chat or peer-to-peer clients to improve productivity and protect valuable company information.

• Allow specific applications to operate through the firewall using Application Control even though the application category itself may be blocked

• The ability to identify malicious content within a data stream to both log and block via IPS• The system detects, logs and blocks harmful software (malware, viruses & tracking software)

from entering network

Premium Package

Page 9: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

9

• Managed firewall based on customer premises• Industry leading firewall devices from Fortinet:

Managed Premises Firewall

Page 10: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

10

• EarthLink multitenant firewall based in the EarthLink SSAE 16 SOC 2 data center

• Shared and dedicated options

• Firewall solution designed to protect hosted services in the data center

• Custom dedicated firewall solutions available

Data Center Firewall

Page 11: 1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.

11

11

EarthLink Differentiators

• SSAE 16 SOC 2 Data Centers

• CISSP and CISA security experts to help you meet industry compliance requirements

• Advanced features: Application Control, Antivirus/Malware/Spyware, Intrusion Detection System

• Private MPLS infrastructure and nationwide footprint

• IT consultants to help design your customized solution

• Personalized support - an extension of your IT staff

• Online portal will consistently monitor your network and automatically open trouble tickets

• Proven service provider across multiple industries