Title: Secured Workflow
1Secured Workflow
- Bob Honour
- Systems Marketing Manager
- Email bob_honour_at_3com.com
- Office 44 1 442 438246
- Cell 44 7767 391866
2The Right Tool for the job!
3CHALLENGES YOU MAY BE FACING?
requiring 24/7 secure network operation
New business applications
all within new budget constraints
- Fast payback
- Value for money
- Easy to deploy
- LOBs
- Security
- Video
- Extending to Customersand Partners
4THE CIO CHALLENGE
- Be a business leader
- Improve effectiveness
- Strengthen competitiveness
- Demonstrate IT value add
Security
- Attacks number of attackers are increasing
- Threats tools gaining in sophistication
- Regulations, mobile devices IP applications
increase risks
Converged
- Move to Real Time Communications
- Enhanced Collaboration
- Perceived High Cost of Ownership
Networks
- All users having access to all services
- Quality of Service power for convergence
- Performance for the future
5The CIO Opportunity
- Imagine where
- Security threats are automatically addressed
- Media-rich collaboration happens at a click
- Networks enableBusiness Process Management
Secure
Converged
Networks
6NETWORK EVOLUTION
Head Office
HotSpot
HotSpot
UserMigration
Regional Offices
Branch Offices
HotSpot
HotSpot
Teleworkers/SOHO
7Ways to enable Effective Business
ProcessMEDIA-RICH COLLABORATION
Hi Lets bringin Kyle
Reduces cost, enhances business process,
strengthens customer interactions
8SECURING THE CONTENT
Client Software Applications
- Pop Up Blocker
- Spyware
- Adware
- Anti-Virus
- Personal FW
- Content Filter
- Spam Filter
- IPSec Client
- Citrix Client
1000s of users Unmanageable
- OS dependent
- Device dependent
- Updating nightmare
- Disparate solution set
The market does not need another endpoint
software security application to purchase,
configure, distribute, install, maintain, and
manage.
9WHERE WOULD YOU RATHER START ROLLING OUT ENDPOINT
POLICY ENFORCEMENT?
or here?
TippingPointIPS
10QUARANTINE AUTOMATIC PROTECTION
- Quarantine Process
- Client Authenticates via SMS
- SMS acts as Radius proxy, learns MAC/Switch/Port
from Switch via RADA
RADIUS
- SMS resolves IP to MAC
- MAC Address is placed into a blacklist and policy
set - SMS forces re-authentication of compromised
device - Device is contained within the set policy at the
access switch ingress port
2
SMS
4
5
Safe Zone
1
Data Center
3
6
TippingPoint IPS
7
Access
Clients
Breach to Containment in under 5 seconds
11END TO END SOLUTIONS FROM A SINGLE VENDOR
Converged
Secure
WAN
12Summary
- 3Coms Secure Converged Networks provide
- Integrated business security
- Investment protection through real-time
application awareness - Scaleable performance
- High availability, less downtime
- Reduced total cost of ownership
- Meet todays and tomorrows Business Process
Application demands
13Thank You