0% found this document useful (0 votes)
46 views17 pages

Internet Access Gateway Presentation

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views17 pages

Internet Access Gateway Presentation

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Sangfor IAG

Unparallel Visibility and Control


Jon “EL” Fernandez
Pre-Sales Manager

www.sangfor.com Sangfor Technologies Inc.


Challenges – Common Pain Points

Application Identification

WHAT?

User Identity and Endpoint Traffic Usage


WHO? HOW?

Sangfor Technologies CONFIDENTIAL Page 2


Challenges - Facts

90% of web traffic is encrypted Encryption = Danger Data Exfiltration


Malware infections and malicious Undetected Confidential data and intellectual
content infiltration Threats property exposed

Sangfor Technologies CONFIDENTIAL Page 3


Whenever Problems are present

User Complain Management issues Productivity Decrease


NGFW vs SWG
A Glance Review the Difference

IAG

 Monitor User, Endpoints,Network and Apps


 Proxy Server NGFW
 Granular Apps control  Basic URL
 Multiple-authentications filtering
 Anti-proxy (Block illegal VPN) IPS
 Basic Apps
 Anti-virus
 Asset Discovery and management control 
 Smart Bandwitth Management Risk Assessment
 Basic BM  Threat-Intelligence
 Traffic Quota  Basic 
 Ingress check APT Protection
authentication
 WAF
 Business Intelligence
  Security Attacks Report
User & Network & Apps Report Center

Network Management Security Protection


Internet Access Gateway

Compliance

SSL Audit
Decryption

Reporting Users
Visibility
Branch Office
Data
Analytics Endpoints
SANGFOR
Analytics IAG ldentity

Integration loT Web and SaaS


Control Applications
Headquarters
Bandwidth
Applications Management

SaaS

Sangfor Technologies Page 7


End-to-end User Life-cycle Management

Identification • User and endpoints identification


(who are you?)

• Evidence supported policy setup


• Policy change based on the analytics result
• Pro-active to the risk in the network
• Decision making assistance
• 30+ authentication method
(are you legal?)
Response Authentication • Build-in classified app/URL
database (what you can access?)
• Localized popular application

• User/Endpoints/schedule base control


• User behavior logs and risk analytics
• Business oriented control policy
• Traffic detail monitor
• Full Visibility to SSL Traffic
• International bandwidth Monitor
• Traffic bandwidth analytics reports Audit & Authorize/ • Granular control over the applications
• Flexible control of the bandwidth channel
• Business intelligence analytics Analytics Control • Illegal internet sharing
• Comprehensive report
• AI based anti-malware and Neural-X
(What have you done?)
(what you can/can't do?)

Sangfor Technologies Page 8


Sangfor IAG’s Value

Improve Work Productivity Simplify Network Management Revenue Generating IT Expenditure


Accurate Recognition and Granular Control
App Identification Biz Perspective App Control More Granular App Control Cloud Application Control

• High bandwidth
consumption

• Disclosure Risk

• 6000+ applications • Upload • Quota • Identification


• Updated every two weeks • Reduces Work
• Download • Duration • Bandwidth
• Localized application Efficiency
• Login • Bandwidth experience
• Post • Terminal
Improve Work Efficiency
User Traffic
P2P Email Channel Management
User 1 P2P
Email

P2P P2P
P2P P2P
Video MP3
P2P

P2P Email
Video
User 2
P2P Control Policy
Key application

Email
P2P PMS MP3
User 3 P2P
PMS
P2P PMS

1. More applications achieve granular control


2. Key business applications bandwidth guarantee improves work efficiency
Guaranteed Bandwidth for Key Apps while
Maximizing the use of Bandwidth

Busy Idle Dynamic control

1. Busy networks restrict


Guarantee Limit
bandwidth consuming apps
Free
2. Flexible control while the network
Bandwidth
is idle
3. Maximize the use of the
bandwidth
More Authentication Methods

3rd. Party Self- • 30+ authentication methods supported


AD SSO Server
Register
SSO • Flexible choices for user authentication
• User data mining with IAM
• Free marketing with customizable login page
Portal
Auth. and social media
Endpoint Discovery, Classification and Check

Features
• Automatic IOT categorization

• 6 categories with customization

• Ways to filter and export

• Identify device to user identity

Benefits
• Increase visibility to onboarding device

• Identify device which is previously unknown

Sangfor Technologies Page 14


What’s New? – Endpoint Security Posture

• OS version
• Process/file/task
• Registry
• Anti-virus update
• Unauthorized internet access
• Botnet (Neural-X)
• Patch verification
• Bitcoin mining (Neural-X)
• Login domain
Endpoint Check • Windows account Antivirus Check
(Ingress Client) • Change IP/MAC prevention (Traffic Based)
• Anti-virus signature verification
• Deny/Allow IP access control
• Software installation inspection

Sangfor Technologies Page 15


IAG as a Proxy Server

Internet

• Hide internal PC/server’s IP address and guarantee endpoints’


privacy and safety.
• Simplify security policy configuration. Only allow IAG’s IP
address to access Internet and all security policies in FW are only
IAG as a Proxy Server
for IAG’s IP.
• Easy to deploy without changing exiting network topology.
• Multiple proxy methods, such as Http, Https, Socks4, Socks5 , FTP
etc. ES ES

Sangfor Technologies CONFIDENTIAL Page 16


THANK YOU !

www.sangfor.com Sangfor Technologies Inc.

You might also like