the evolution of network security

1
Endpoints Remote Ethernet Device Internet Router Road Warrior (VPN) Mobile User Endpoints Endpoints UTM Company Server Wireless INTERNET BRANCH OFFICE CENTRAL OFFICE ROAD WARRIORS WLAN How UTM Protects You can easily extend UTM protection to remote offices, mobile devices, WLANs and road warriors. You’re Safer in Our World Sophos is a registered trademark of Sophos Ltd. and Sophos Group. Other product/company names cited are trademarks/registered trademarks of their respective owners. © Copyright 2012. Sophos Ltd. All rights reserved. Network security is a race against threats. Stay ahead of the curve with unified threat management. The Evolution of Network Security Get our UTM Buyers Guide at Sophos.com 2007 TJX Companies Records 45.6 M Damages $256 M 2011 Epsilon Records 60 M Damages $4 B 2011 Sony Corp Records 100 M Damages $2 B 2012 Global Payments Records 7 M+ Damages TBD Impact Toughest data protection law in the U.S. Data breach Key UTM solution integrated by year Industry milestone 2009 Heartland Payment Systems Records 100 M Damages $140 M Impact New card data encryption standards 2000 2001 2003 2006 2 0 0 7 2008 2 0 0 9 2010 2011 2012 Flame attacks Iran’s oil industry Open SQL injection exploit in Facebook’s API ILOVEYOU worm infects millions of computers worldwide within hours of release Hacktivist group Anonymous is formed Stuxnet worm attacks Iran’s nuclear facilities Koobface malware spreads on Facebook and Twitter Conficker worm infiltrates millions of PCs worldwide despite available patch Malicious version of Angry Birds hits Android Market Hacktivist group Lulz Security targets Sony Infamous Nigerian scam spam, also known as 419 spam, becomes widespread Microsoft sites hit by denial-of-service (DoS) attacks on domain name servers Leap, the first Mac OS X virus, appears SQL injection attack hits UCLA database Threats Thwarts 2000 2008 2010 2012 2003 2004 2005 2009 2011 UTM reduces the attack surface UTM secures communication Threats drive consolidation of network protection Microsoft takes down Rustock botnet responsible for 45% of spam worldwide Apple releases rudimentary virus protection Email encryption P2P control SSL VPN URL filter Antivirus VPN Firewall Anti-spam APS App control Wireless security Cloud/UTMaaS Mobile control Remote Ethernet Device Web application firewall Endpoint protection Clientless HTML5 VPN VoIP security Anti-phishing Anti-spyware Phrase unified threat management (UTM) defined as network security in one appliance UTM secures expanding network perimeter A single appliance to protect the entire network, including cloud, mobile endpoints, branch offices, wireless networks and road warriors UTM

Upload: others

Post on 03-Feb-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Endpoints Remote Ethernet Device

Internet Router

Road Warrior (VPN)

Mobile User EndpointsEndpoints UTM Company

ServerWireless

INTERNET

BRANCH OFFICE CENTRAL OFFICE ROAD WARRIORSWLAN

How UTM Protects You can easily extend UTM protection to remote offices, mobile devices, WLANs and road warriors.

You’re Safer in Our WorldSophos is a registered trademark of Sophos Ltd. and Sophos Group. Other product/company names cited are trademarks/registered trademarks of their respective owners. © Copyright 2012. Sophos Ltd. All rights reserved.

Network security is a race against threats.Stay ahead of the curve with unified threat management.

The Evolution of

Network Security

Get our UTM Buyers Guide at Sophos.com

2007TJX CompaniesRecords 45.6 M

Damages $256 M

2011Epsilon

Records 60 MDamages $4 B

2011Sony Corp

Records 100 MDamages $2 B

2012Global Payments

Records 7 M+Damages TBD

ImpactToughest data protection law

in the U.S.

Data breach

Key

UTM solution integrated by year

Industry milestone

2009Heartland Payment

SystemsRecords 100 M

Damages $140 M

ImpactNew card data

encryptionstandards

2000 2001

20032006

2007

2008

2009

20102011

2012

Flame attacks Iran’s oil industryOpen SQL injection exploit in Facebook’s API

ILOVEYOU worm infects millions of computers worldwide within hours of release

Hacktivist group Anonymous is formed

Stuxnet worm attacks Iran’s nuclear facilities

Koobface malware spreads on Facebook and TwitterConficker worm infiltrates millions of PCs worldwide despite available patch

Malicious version of Angry Birds hits Android Market Hacktivist group Lulz Security targets Sony

Infamous Nigerian scam spam, also known as 419 spam, becomes widespread

Microsoft sites hit by denial-of-service (DoS) attacks on domain name servers

Leap, the first Mac OS X virus, appearsSQL injection attack hits UCLA database

Threats

Thwarts2000

2008

2010

2012

2003 2004 2005

2009

2011

UTM reduces the attack surface

UTM secures communication

Threats drive consolidation of network protection

Microsoft takes down Rustock botnet responsible for 45% of spam worldwide

Apple releases rudimentary virus protection

Email encryption P2P controlSSL VPN

URL filterAntivirusVPNFirewall

Anti-spamAPS

App controlWireless security

Cloud/UTMaaSMobile control

Remote Ethernet DeviceWeb application firewall

Endpoint protectionClientless HTML5 VPN

VoIP securityAnti-phishingAnti-spyware

Phrase unified threat management (UTM) defined as network security in one appliance

UTM secures expanding network perimeter

A single appliance to protect the entire network, including cloud, mobile endpoints, branch offices, wireless networks and road warriors

UTM