sourcefire ngips對比入侵防禦新思維_第1頁
sourcefire ngips對比入侵防禦新思維_第2頁
sourcefire ngips對比入侵防禦新思維_第3頁
sourcefire ngips對比入侵防禦新思維_第4頁
sourcefire ngips對比入侵防禦新思維_第5頁
已閱讀5頁,還剩4頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

AGILE

SECURITY?:Security

for

the

Real

World入侵防禦新思維Garen

LingRegional

Manager“If

the

attackers

know

more

than

you

doMartiFounder

&

CTO,

Soabout

your

network,the

battle

is

lost.”n

RoeschurcefireGaren

LingAgile

Security

for

the

RealWorldSourcefire

Leadership

and

Recognition"For

the

past

four

years,

Sourcefirehas

consistently

achieved

excellentresults

in

security

effectivenessbased

on

our

real-world

evaluationsof

exploit

evasions,

threat

block

rateand

protection

capabilities.”Vikram

Phatak,

CTO

NSS

Labs,

Inc.99%

detection

&protection34Gbps

inspected

throughput60M

concurrent

connections$15

TCO

/

protected

MbpsLeadership*#1

in

detectionClass

leader

in

performanceClass

leader

for

TCO100%

evasion

free“Networks

looking

to

update

theirdefenses

with

a

Next-GenerationFirewall

would

do

well

to

considerSourcefire's

entry

into

the

NGFWmarket

as

a

solid

contender.”Bob

Walder

NSS

Labs,

Inc.Ratings*99%

protection10Gbps

inspected

throughput15M

concurrent

connections$33

TCO

/

protected

MbpsLeadership*

Ratings*#1

in

detection#1

in

performance#1

in

vulnerability

coverage100%

evasion

freeNSS

Labs,

“Network

IPS

2010

Comparative

Test

Results,”

December

2010

NSS

Labs,

“Network

IPS

Product

Analysis

Sourcefire

3D8260

v4.10,”

April2012NSS

Labs,

“Next-Generation

Firewall

Product

Analysis

Sourcefire”

October2012*What

Makes

Our

NGIPS

Different?Total

Network

VisibilityPassive,

real-time

visibility

of

applications,

users,

content,hosts,

attacks,

and

moreControl

Without

CompromiseAchieve

granular

network

and

application

access

controlwithout

compromising

threat

preventionIntelligent

Security

AutomationLeverage

rich

contextual

awareness

to

automate

key

securityfunctions,

including

impact

assessment

and

policy

tuningUnparalleled

Performance

&

ScalabilityPurpose-built

appliances

with

FirePOWER?

technologyNSS

Labs

Results

Summary

-

IPSIPS

Methodology

v6.2

(2012)SourcefireFirePOWER8260McAfee

NSPM-8000HP

SecurityTP-6100NJuniper

SRX

3600IBMSecurityGX7800Protection98.90%34Gbps(20

Gbps)60

M*$1595%91.1%88.8%77.5

%Real

WorldIPS12.3

Gbps10

Gbps3.7Gbps11.4

GbpsThroughput(10

Gbps)(8

Gbps)(10

Gbps)(20

Gbps)ConcurrentConnections5M15

M1.2

M15

MTCO(per

Mbps

Protected)$31$36$81$44Sourcefire

ConfidentialInternal

Use

OnlyNSS

Labs

Results

Summary

-NGFWSourcefireCheck

PointPANSonicwallStonesoftProtection98.9%86.3%91.2%94.8%93.9%RealWorldThroughput10Gbps2.6Gbps3.8Gbps16.2Gbps1.6GbpsVendor

Rating10Gbps17Gbps2Gbps30Gbps1GbpsConcurrentConnections15,000,000413,0001,040,14810,000,0001,055,000NGFW

Methodologyv4.0

(2012)Key

FeaturesSourcefireIntel

McAfeeHP

TippingPointDetection

Rate

(NSS

Labs)99%95%91%Max

Inspected

Throughput68Gbps12.3Gbps10GbpsIntegrated

Fail

OpenAll

SensorsLow

End

SensorsLow

End

SensorsCustom

Rules

/

Signatures

LimitedLimitedPacket

Capture

(Forensic)Default

-

ONPartialDefault

-

OFFPassive

Network

Discovery

Insightix,

ePO,

Foundstone-Mobile

Device

Identification

Enterprise

Mobility

Mgmt-Impact

Assessment

--Automated

IPS

Tuning

--User

Identity

Tracking

ePO,

NUBA

(Securify)-Network

Behavior

Analysis

NTBA

(Endeavor)-Security

Intelligence

(C&C,Botnets,

Spam,

etc)

GTIIpTrustFile

Identification

and

Blocking

GTI

(File

Reputation

only)-Application

Control(Control

License)Firewall

Enterprise

(SC)LimitedFirewall

Access

Control(Control

License)Firewall

Enterprise

(SC)-URL

Filtering(Subscription)Webwasher

(SC)-Adv

Malware

Protection(AMP

Subscription)LimitedLimitedSecuring

Virtualized

Network

Reflex

SystemsReflex

SystemsExcellent

Value各家IPS功能比較Key

IPS

CapabilitiesSourcefireMcAfeeHPIBMCiscoJuniperInline

IPS模式與Passive

IDS模式

Reports,

Alerts

&

Dashboards

使用以弱點為基礎規(guī)則

少數(shù)

少數(shù)少數(shù)客制化規(guī)則/特徵

-

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論