Download - NK Butuan Presentaion
![Page 1: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/1.jpg)
![Page 2: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/2.jpg)
LEANDER JAN CHAVEZ LARGO,CCNA, MCP, VCA6-DCV, ITIL-F V3, CFOT, C(SS, IBM Certified Professional - QRadar SIEM
Product Manager | Support Engineer
![Page 3: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/3.jpg)
IT: A Teaching Strategy
![Page 4: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/4.jpg)
![Page 5: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/5.jpg)
Today’s IT Security
ChallengesGrowing Security Threats
Solution Complexity
Increased Demand in Network Performance
BYOD Evolution
Visibility and Control
![Page 6: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/6.jpg)
Growing Security Threats
Source: IBM X-Force® Research 2013 Trend and Risk Report
Operational Sophistication
Year of the Security Breach
Near Daily Leaks of Sensitive Data
40% increase in reported data
breaches and incidents
Relentless Use of Multiple Methods
500,000,000+ records were leaked, while the future
shows no sign of change
2011 2013 2015
SQL injection Spear phishing DDoS Third-party software
Physical access Malware XSS Watering hole UndisclosedAttack types
Note: Size of circle estimates relative impact of incident in terms of cost to business.
![Page 7: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/7.jpg)
Increased Demand in Network Performance
![Page 8: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/8.jpg)
BYOD Evolution
![Page 9: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/9.jpg)
Visibility and Control
![Page 10: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/10.jpg)
Solution Complexity
?
![Page 11: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/11.jpg)
IT Network and Security Management Solutions
![Page 12: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/12.jpg)
Unified Threat Management and Next Generation Firewall
• NGFW• IPS• VPN Gateway• Application Control• URL Filtering• Data Loss/Leak Prevention
• Gateway Anti-Virus• Gateway Anti-Spam• Advanced Persistent Threat (APT)• End Point Protection• Wi-Fi Controller
![Page 13: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/13.jpg)
Next Generation Intrusion Prevention Systems (IPS)
• SQL Injection Attack• Cross Site Scripting• Denial Of Service• Ransomware• Spear Phishing• Identity Theft
Prevent the following:
![Page 14: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/14.jpg)
Link-Load Balancer and WAN Aggregation Solutions
• Multi-WAN Internet Load Balancer• Channel Bonding• Traffic Shaping• Quality of Service (QoS)• VPN Aggregation (Peplink Only)• Application Delivery Networking• Content Delivery Networking
![Page 15: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/15.jpg)
Security Information and Event Management (SIEM)
• Log Management• Real-time Analysis• Historical Correlation• Vulnerability Assessment• Incident Forensics• Risk Management
![Page 16: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/16.jpg)
Internet Bandwidth Optimization
With CACHEBOX you will:• Save Bandwidth• Deliver a better internet experience• Be able to monitor and control web usage
You need CACHEBOX if:• Your bandwidth is full and/or too expensive• Your students are frustrated because the web is too slow• You want to add more users to your network without overloading it• You need to monitor and control what websites your students are visiting
![Page 17: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/17.jpg)
Network Analysis, Management, Monitoring and Visibility
NETWORK MANAGEMENT• Network Performance Monitoring• Network Bandwidth Analyzer• Network Troubleshooting Bundle• Network Traffic Analyzer• Etc.
SYSTEM MANAGEMENT• Server and Application Monitor• Virtualization Manager• Storage Resource Monitor
DATABASE MANAGEMENT• Database Performance Analyzer for MSSQL, Oracle, MySQL, DB2, SAP
![Page 18: NK Butuan Presentaion](https://reader035.vdocuments.pub/reader035/viewer/2022081507/58890cce1a28ab4a5c8b509d/html5/thumbnails/18.jpg)
Thank You!