SonicWALL Webinar – You’re Registered!

SonicWALL Webinar – You’re Registered!

Thank You for registering for the PTS/SonicWALL Webinar. You will receive an email with webinar login credentials (check your SPAM folder if you don’t receive it within 30 minutes).

Cyber threats are becoming more devious.
Are you prepared?

PTS/SonicWALL Webinar:
Thursday, December 8, 2016
9:30 a.m. – 10:30 a.m. ET

Webinar Agenda
Peter Sacco, PTS Data Center Solutions: Introduction
SonicWALL: Cyber Threats are Becoming More Devious

Do you find yourself regularly worrying if you’ve done a thorough job at vetting your cyber-defense system? Is it really doing its job and keeping up with evolving threats and capacity demands?

Attend this webinar to learn what differentiates leading next-generation firewalls and walk away with a greater understanding of key performance indicators essential to the success of your network security strategy.

Join us to explore:

  • What is driving next-generation firewall (NGFW) deployment in the enterprise?
  • Key performance indicators of an effective NGFW implementation
  • 2016 NSS Labs independent test results of Dell SonicWALL NGFW platform

Learn ways to prevent surprise cyber attacks.
Get a detailed assessment of your organization’s current vulnerabilities.

The process is simple:

  1. Install a SonicWALL next-generation firewall behind your installed firewall.
  2. Run a detailed SonicWALL Application Risk Management (SWARM) Report to assess your current firewall.
  3. Get credit when you replace your old firewall with SonicWALL.

To learn more about PTS Solutions, contact us, or visit:

SonicWALL Webinar

SonicWALL Webinar

Cyber threats are becoming more devious.
Are you prepared?

Register for PTS/SonicWALL Webinar:
Thursday, December 8, 2016
9:30 a.m. – 10:30 a.m. ET

Webinar Agenda
Peter Sacco, PTS Data Center Solutions: Introduction
SonicWALL: Cyber Threats are Becoming More Devious

Do you find yourself regularly worrying if you’ve done a thorough job at vetting your cyber-defense system? Is it really doing its job and keeping up with evolving threats and capacity demands?

Attend this webinar to learn what differentiates leading next-generation firewalls and walk away with a greater understanding of key performance indicators essential to the success of your network security strategy.

Join us to explore:

  • What is driving next-generation firewall (NGFW) deployment in the enterprise?
  • Key performance indicators of an effective NGFW implementation
  • 2016 NSS Labs independent test results of Dell SonicWALL NGFW platform

Learn ways to prevent surprise cyber attacks.
Get a detailed assessment of your organization’s current vulnerabilities.

The process is simple:

  1. Install a SonicWALL next-generation firewall behind your installed firewall.
  2. Run a detailed SonicWALL Application Risk Management (SWARM) Report to assess your current firewall.
  3. Get credit when you replace your old firewall with SonicWALL.

Registration is CLOSED

To learn more about PTS Solutions, contact us, or visit:

Cyber Threat Assessment Request

Cyber Threat Assessment Request

Gauge Your Current Security, Productivity and Performance

Request Cyber Threat Assessment

Validate the current state of your Network Security effectiveness, better understand your employee productivity/application usage, and monitor your true Network Performance requirements with expert guidance.

After registering for this program, a PTS consultant will monitor key indicators within your network. You will receive a Cyber Threat Assessment Report after several days of gathering information, divided into three primary sections:

  • Security and Threat Prevention – Learn more about which application vulnerabilities are attacking your network, which malware/botnets were detected and even pinpoint “at risk” devices within your network.
  • User Productivity – Discover which peer to peer, social media, instant messaging and other application subcategories are being utilized in your network.
  • Network Utilization and Performance – Find out more about your throughput, session and bandwidth requirements during peak hours.

Register for your Free Cyber Threat Assessment by filling out the form.
You will also receive an excerpt from a cyber threat assessment sample report.

To learn more about PTS recommended Network Security and Unified Threat Management for enterprise network security, contact us or visit:

Unified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

To learn more about PTS consulting services to support Data Center Consulting, Data Center Management, and Enterprise IT Consulting, contact us or visit:

btn_contact

lt_arrow Back to Network Security Solutions Page

Cyber Threat Assessment Request Received

Cyber Threat Assessment Request Received

Thank you for requesting your Free Cyber Threat Assessment. A PTS Representative will be contacting you shortly to discuss the details. Also, you were emailed a link to view an excerpt of a sample Cyber Threat Assessment Report (PDF).

To learn more about PTS recommended Network Security and Unified Threat Management for enterprise network security, contact us or visit:

Unified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

To learn more about PTS consulting services to support Data Center Consulting, Data Center Management, and Enterprise IT Consulting, contact us or visit:

btn_contact

lt_arrow Back to Network Security Solutions Page

Network Security Solutions

Network Security Solutions

btn_contactUnified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

SonicWALL Network Security Appliances
SonicWALL Network Security Appliances

Network security starts with authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name (I.e. the password which is something you ‘know’), this is sometimes termed one factor authentication. With two factor authentication something you ‘have’ is also used (E.g. a security token or ‘dongle’, an ATM card, or your mobile phone), or with three factor authentication something you ‘are’ is also used (E.g. a fingerprint or retinal scan).

Fortinet-Product-Family
Fortinet Product Family

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (I.e. suspicious) content or behavior and other anomalies to protect resources. Individual events occurring on the network may be logged for audit purposes and for later high level analysis.

Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network security industry as a comprehensive approach to network security management.

The advantages of unified security lies in the fact that rather than administering multiple systems that individually handle anti-virus, content filtering, intrusion prevention and spam filtering functions, organizations now have the flexibility to deploy a single UTM appliance that takes over all their functionality into a single rack mountable network appliance.

In theory, it is the evolution of the traditional firewall into an all-inclusive security product that has the ability to perform multiple security functions in one single appliance. The following diagram shows primary (blue) and secondary (red) threat protection provided by UTM devices:

Network-Security-Solutions-chevron

As an IT Consultancy, PTS Data Center Solutions provides traditional network security solutions (E.g. firewalls, VPNs) and integrated unified threat management solutions. With threat approaches becoming ever more complicated such as spear-phishing, new targets to attack as organizations begin to leverage cloud computing approaches, and requirements changing for SAS-70 compliance, to name just a few areas, PTS is prepared to support clients with sophisticated threat detection and threat mitigation techniques.

To learn more about PTS recommended Network Security and Unified Threat Management for enterprise network security, contact us or visit:

Unified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

To learn more about PTS consulting services to support Data Center Consulting, Data Center Management, and Enterprise IT Consulting, contact us or visit:

Fortinet Network Security Solutions

btn_contact btn_videobtn_demos

fortinet_01Fortinet delivers a complete range of products that enable network managers to control, monitor, and operate networks simply and powerfully.

Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated IT threat landscape. They are a leading provider of network security appliances and the market leader in Unified Threat Management, or UTM. Fortinet’s sole focus is on IT security innovation and developing new solutions that help our customers stay ahead of emerging threats. Through products and subscription services, Fortinet provides broad, integrated and high performance protection against dynamic security threat while simplifying the IT security infrastructure for enterprises, service providers and government entities worldwide. As a result, many of the world’s largest and most successful organizations rely on Fortinet.

fortinet_02

 

Data Center Consulting Data Center Design and Engineering Data Center Products Data Center Construction Data Center Commissioning Data Center Implementation Data Center Monitoring and Control Data Center Operations and Maintenance

Features & Benefits

FEATURES BENEFITS
Accelerated, high performance unified threat management. Offers a high performance Unified Threat Management (UTM) solution based on a proprietary technology platform, FortiASICs, and FortiOS.
High quality security functionality. A broad set of integrated, high quality security functions enables the most sophisticated and demanding end customers to avoid the shortcomings of a traditionally fragmented security point product infrastructure.
Lower total cost of ownership. By consolidating security functionality, reducing network complexity, integrating high performance capabilities and centralizing management functions, the UTM solution is designed to lower our end customers’ total cost of ownership compared to multiple point products.
Superior flexibility and ease of deployment. The UTM solution enables end-customers to activate additional security functions and subscription services on an on-demand basis as their security needs evolve.
Dedicated, real-time security intelligence. Through subscription services, a FortiGuard Global Threat Research Team of over 100 professionals is able to provide real time security intelligence 24 hours a day, seven days a week and 365 days a year by enabling rapid updates to our end-customers’ security products.
Broad, end-to-end security protection. Offers a broad range of appliances and software to help end-customers defend against a myriad of security threats throughout the organization.

 

fortinet_04

Fortinet’s comprehensive portfolio of security gateways and complementary products offers a powerful blend of ASIC-accelerated performance, integrated multi-threat protection, and constantly-updated, in-depth threat intelligence. This unique combination delivers the highest level of network, content, and application security for enterprises of all sizes, managed service providers, and telecommunications carriers, while reducing total cost of ownership and providing a flexible, scalable path for expansion.

FortiGate: Unified Threat Management

Delivers comprehensive protection against sophisticated network, content, and application-level threats without degrading performance or availability.

  • Large Enterprise/Service Provider: Up to 182 Gbps firewall throughput
  • Enterprise: Up to 44 Gbps firewall throughput
  • SOHO/SMB: Up to 500 Mbps firewall throughput
FortiGate 3950B
FortiGate 3950B
FortiGate 5140
FortiGate 5140

FortiManager: Centralized Management

Effectively manage any size Fortinet security infrastructure, from a few devices to thousands of appliances and end-point security agents.

  • Manages up to 4,000 Fortinet network devices
fortinet_07
FortiAnalyzer 2000B

 FortiAnalyzer: Centralized Analysis and Reporting

Centralized logging, analyzing, and reporting from multiple Fortinet devices, as well as vulnerability assessments and event correlation.

  • Analyzes up to 5,000 logs/second

FortiMail: Secure Messaging

Advanced antispam and antivirus filtering capabilities, with extensive quarantine and archiving capabilities.

  • Provides antispam and AV filtering of up to 1.1 million messages/hour
fortinet_08
FortiCarrier 3810A

FortiCarrier: Service Provider

Extend FortiGate integrated security protection to critical applications across a service provider’s IP network.

  • Delivers up to 182 Gbps firewall throughput
fortinet_09
FortiWeb 1000B

FortiWeb: Application Firewall

Web application and XML firewalls to protect, balance, and accelerate web applications, databases, and the information exchanged between them.

  • Inspects up to 22,000 HTTP transactions/second
FortiDB 2000B
FortiDB 2000B

FortiDB: Database Security

Delivers vulnerability assessment, monitoring and auditing capabilities to harden databases and track the flow of information within them.

  • Protects up to 60 database instances

FortiScan: Vulnerability Management

Provides end-point vulnerability management, asset compliance evaluation, patch management remediation, auditing and reporting.

  • Scans up to 2,000 agents up to 60 database instances
FortiSwitch 1000
FortiSwitch 1000

FortiSwitch: Gigabit Switching

Delivers wire speed, resilient, scalable, ultra-low latency fabrics with Gigabit Ethernet (GbE) and 10 GbE switching platforms.

  • Delivers up to 2.9 Tbps switch throughput
FortiAP
FortiAP

FortiAPFortiAP: Secure Wireless Access

Enables comprehensive, proven threat management and policy enforcement for wireless and wired networks.

  • Integrated WLAN protection, managed from a single console

fortinet_13FortiClient & FortiMobile: Remote Security

FortiClient PC™ and FortiClient Mobile™ provide comprehensive, dynamic security for personal computers, mobile laptops, and smartphones.

  • Extends Fortinet’s security expertise to endpoint devices

To learn more about PTS recommended Network Security and Unified Threat Management for enterprise network security, contact us or visit:

Unified Threat Management (in alphabetical order)

Firewalls (in alphabetical order)

Spam Filtering (in alphabetical order)

To learn more about PTS consulting services to support Data Center Consulting, Data Center Management, and Enterprise IT Consulting, contact us or visit:

 

Fortinet

 btn_contact btn_demos

fortinet_01Fortinet is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2009 Fortune Global 100. Fortinet’s flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet’s broad product line goes beyond UTM to help secure the extended enterprise – from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world. To learn more, please visit www.fortinet.com.

  • Fortinet Firewall Product Family Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated IT threat landscape. They are a leading provider of network security appliances and the market leader in Unified Threat Management, or UTM.