the evolution of network security
TRANSCRIPT
Endpoints Remote Ethernet Device
Internet Router
Road Warrior (VPN)
Mobile User EndpointsEndpoints UTM Company
ServerWireless
INTERNET
BRANCH OFFICE CENTRAL OFFICE ROAD WARRIORSWLAN
How UTM Protects You can easily extend UTM protection to remote offices, mobile devices, WLANs and road warriors.
You’re Safer in Our WorldSophos is a registered trademark of Sophos Ltd. and Sophos Group. Other product/company names cited are trademarks/registered trademarks of their respective owners. © Copyright 2012. Sophos Ltd. All rights reserved.
Network security is a race against threats.Stay ahead of the curve with unified threat management.
The Evolution of
Network Security
Get our UTM Buyers Guide at Sophos.com
2007TJX CompaniesRecords 45.6 M
Damages $256 M
2011Epsilon
Records 60 MDamages $4 B
2011Sony Corp
Records 100 MDamages $2 B
2012Global Payments
Records 7 M+Damages TBD
ImpactToughest data protection law
in the U.S.
Data breach
Key
UTM solution integrated by year
Industry milestone
2009Heartland Payment
SystemsRecords 100 M
Damages $140 M
ImpactNew card data
encryptionstandards
2000 2001
20032006
2007
2008
2009
20102011
2012
Flame attacks Iran’s oil industryOpen SQL injection exploit in Facebook’s API
ILOVEYOU worm infects millions of computers worldwide within hours of release
Hacktivist group Anonymous is formed
Stuxnet worm attacks Iran’s nuclear facilities
Koobface malware spreads on Facebook and TwitterConficker worm infiltrates millions of PCs worldwide despite available patch
Malicious version of Angry Birds hits Android Market Hacktivist group Lulz Security targets Sony
Infamous Nigerian scam spam, also known as 419 spam, becomes widespread
Microsoft sites hit by denial-of-service (DoS) attacks on domain name servers
Leap, the first Mac OS X virus, appearsSQL injection attack hits UCLA database
Threats
Thwarts2000
2008
2010
2012
2003 2004 2005
2009
2011
UTM reduces the attack surface
UTM secures communication
Threats drive consolidation of network protection
Microsoft takes down Rustock botnet responsible for 45% of spam worldwide
Apple releases rudimentary virus protection
Email encryption P2P controlSSL VPN
URL filterAntivirusVPNFirewall
Anti-spamAPS
App controlWireless security
Cloud/UTMaaSMobile control
Remote Ethernet DeviceWeb application firewall
Endpoint protectionClientless HTML5 VPN
VoIP securityAnti-phishingAnti-spyware
Phrase unified threat management (UTM) defined as network security in one appliance
UTM secures expanding network perimeter
A single appliance to protect the entire network, including cloud, mobile endpoints, branch offices, wireless networks and road warriors
UTM