the evolution of network security

Post on 03-Feb-2022

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Endpoints Remote Ethernet Device

Internet Router

Road Warrior (VPN)

Mobile User EndpointsEndpoints UTM Company

ServerWireless

INTERNET

BRANCH OFFICE CENTRAL OFFICE ROAD WARRIORSWLAN

How UTM Protects You can easily extend UTM protection to remote offices, mobile devices, WLANs and road warriors.

You’re Safer in Our WorldSophos is a registered trademark of Sophos Ltd. and Sophos Group. Other product/company names cited are trademarks/registered trademarks of their respective owners. © Copyright 2012. Sophos Ltd. All rights reserved.

Network security is a race against threats.Stay ahead of the curve with unified threat management.

The Evolution of

Network Security

Get our UTM Buyers Guide at Sophos.com

2007TJX CompaniesRecords 45.6 M

Damages $256 M

2011Epsilon

Records 60 MDamages $4 B

2011Sony Corp

Records 100 MDamages $2 B

2012Global Payments

Records 7 M+Damages TBD

ImpactToughest data protection law

in the U.S.

Data breach

Key

UTM solution integrated by year

Industry milestone

2009Heartland Payment

SystemsRecords 100 M

Damages $140 M

ImpactNew card data

encryptionstandards

2000 2001

20032006

2007

2008

2009

20102011

2012

Flame attacks Iran’s oil industryOpen SQL injection exploit in Facebook’s API

ILOVEYOU worm infects millions of computers worldwide within hours of release

Hacktivist group Anonymous is formed

Stuxnet worm attacks Iran’s nuclear facilities

Koobface malware spreads on Facebook and TwitterConficker worm infiltrates millions of PCs worldwide despite available patch

Malicious version of Angry Birds hits Android Market Hacktivist group Lulz Security targets Sony

Infamous Nigerian scam spam, also known as 419 spam, becomes widespread

Microsoft sites hit by denial-of-service (DoS) attacks on domain name servers

Leap, the first Mac OS X virus, appearsSQL injection attack hits UCLA database

Threats

Thwarts2000

2008

2010

2012

2003 2004 2005

2009

2011

UTM reduces the attack surface

UTM secures communication

Threats drive consolidation of network protection

Microsoft takes down Rustock botnet responsible for 45% of spam worldwide

Apple releases rudimentary virus protection

Email encryption P2P controlSSL VPN

URL filterAntivirusVPNFirewall

Anti-spamAPS

App controlWireless security

Cloud/UTMaaSMobile control

Remote Ethernet DeviceWeb application firewall

Endpoint protectionClientless HTML5 VPN

VoIP securityAnti-phishingAnti-spyware

Phrase unified threat management (UTM) defined as network security in one appliance

UTM secures expanding network perimeter

A single appliance to protect the entire network, including cloud, mobile endpoints, branch offices, wireless networks and road warriors

UTM

top related