What Happens At The Edge Of Your Network
-
Upload
garland-technology -
Category
Technology
-
view
308 -
download
1
description
Transcript of What Happens At The Edge Of Your Network
![Page 1: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/1.jpg)
What Happens At The EdgeOf Your Network?
![Page 2: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/2.jpg)
Just like a house has a foundation to hold it up, as well as a roof to keep the rain, sleet, and snow from
damaging your possessions, your network’s core is the “dumb muscle” forwarding packets. But the network
edge is where all of the action takes place.
![Page 3: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/3.jpg)
That action – from next-generation filtering and monitoring to Web applications and beyond – is
also where breaches occur.
![Page 4: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/4.jpg)
14% is the rate at which threat alerts have grown, year over year.
![Page 5: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/5.jpg)
21% of CWE threat categories are attributedto buffer errors – the largest category.
![Page 6: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/6.jpg)
91% of total threats and compromisescome from Java exploits.
![Page 7: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/7.jpg)
100% of business networks(analyzed by Cisco) have traffic to
websites hosting malware.
![Page 8: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/8.jpg)
50,000 network intrusionsare detected every day.
![Page 9: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/9.jpg)
4.5 billion emails are blocked every day.
Statistics provided by the Cisco 2014 Annual Security Report
![Page 10: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/10.jpg)
Protection begins at the edge:Surrounding The Brains Of Your Network
![Page 11: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/11.jpg)
In the LAN, WAN or datacenter, not only do edge devices perform more functions than any other layer, but their jobs also require far more intelligence.
![Page 12: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/12.jpg)
With intrusion detection and prevention as well as other critically important security applications on the network
edge, it’s imperative that these in-line tools do not go down.
![Page 13: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/13.jpg)
Oversubscription and subsequent downtimeis a costly side effect of
running multiple in-line appliances.
![Page 14: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/14.jpg)
From a monetary perspective, an hour of downtime costs the average business $163,674. But from a security
standpoint, without the ability for monitoring tools to do their jobs, the cost of threats on your network is indefinite.
![Page 15: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/15.jpg)
An edge connector is the most formidable way to mitigate the risks.
![Page 16: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/16.jpg)
Strength OfThe EdgeLens™ –the edge connector
![Page 17: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/17.jpg)
The EdgeLens™ device accesses anddirects traffic from one or more
network segments to many in-line andpassive security and monitoring tools.
![Page 18: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/18.jpg)
The filtering and load-balancing capabilitiesswap out tools when needed to ensure that all
monitoring applications are capable of doing theirjob to protect your network and business.
![Page 19: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/19.jpg)
The EdgeLens™ (edge connector)enables confident use of multipletools with no downtime risks or
incomplete data access.
![Page 20: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/20.jpg)
What does the EdgeLens™ do for your network?
![Page 21: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/21.jpg)
Gain intelligent and optimized packet visibility and access to both in-band
and out-of-band tools.
![Page 22: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/22.jpg)
Enable real-time securityPOC evaluations with
no network impact.
![Page 23: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/23.jpg)
Shield monitoring devicesfrom intruders.
![Page 24: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/24.jpg)
Increase efficiency of in-band andout-of-band analytic tools.
![Page 25: What Happens At The Edge Of Your Network](https://reader036.fdocuments.net/reader036/viewer/2022062405/55866666d8b42ab91e8b45a5/html5/thumbnails/25.jpg)
Thank you for viewing this visualpresentation about the network edge and
edge connectors.
For more information or answers to yourquestions, contact us now.
Copyright 2014 © Garland Technology LLC. All Rights Reserved.