SlideShare a Scribd company logo
APSolute™ Application Delivery and Security Ein HowTo für NonStop Webservices   Michael Geigenscheder
CEO Challenge: Smart Productivity Competitive Business Requirements Time Product Info Transactions Web Enablement Intelligence – CRM & prioritization
Centralization & Web based Application  Web Enablement & Data Center Consolidation Higher Productivity Lower OPEX & CAPEX No Servers on Branches Anyone, Anywhere Anytime Access No Dedicated Client Side SW  Based on Standards
Application Delivery Challenges Costly Downtimes Increasing volumes of online businesses   activities   REGIONAL OFFICE BRANCH  OFFICE Firewall Web, Email, CRM ERP HEADQUARTERS Antivirus Gateway Router
Application Delivery Challenges Poor Performance Growing distance to end users  Protocol “chattiness” Richer content   Varying access speeds Encrypted traffic (SSL) Costly Downtimes Increasing volumes of online businesses   activities   REGIONAL OFFICE BRANCH  OFFICE Firewall Web, Email, CRM ERP HEADQUARTERS Antivirus Gateway Router
Application Delivery Challenges Poor Performance Growing distance to end users  Protocol “chattiness” Richer content   Varying access speeds Encrypted traffic (SSL) Increased Security Threat  Vulnerable Web based applications Growing sophistication of applications attacks & network attacks (DoS) Zero day attacks   Internal attacks  Costly Downtimes Increasing volumes of online businesses   activities   REGIONAL OFFICE BRANCH  OFFICE Firewall Web, Email, CRM ERP HEADQUARTERS Antivirus Gateway Router
The Professional Solution
APSolute™  Application Delivery REGIONAL OFFICE BRANCH  OFFICE FW-VPN Antivirus Gateway Web, Email, CRM, ERP HEADQUARTERS Routers
A P S olute  Front End Solutions Antivirus Anti Spam URL filter HEADQUARTERS REGIONAL OFFICE BRANCH  OFFICE Firewalls Web, Email, CRM, ERP Application Front End:   Optimize data center resources to ensure fast, reliable, secure application delivery Availability, Guaranteed  Performance, Accelerated Security, Assured   AppDirector + AppXcel Complete business continuity, transparent disaster recovery and application optimization
Front End Open Service Architecture  Web & Image Compression  Reverse Caching  SSL Offloading  TCP Multiplexing and Splitting TCP Optimization AppDirector   AppXcel  Server L3-L7 loadbalancing Integrated Global Load Balancing Health Monitoring QoS Bandwidth Management  Web servers
Integrated Security AppDirector  AppXcel  Router Client Web  Front end Servers Hacker SSL Termination Web and XML  Application Firewall Access Control IPS for smart patch management Behavioral  DoS Shield
Network Intrusion Prevention Methods Content-based IPS Signature-based Protocol anomaly rules Single bullet, application layer attacks Rate-based IPS  Time based traffic thresholds Manual configurations  High level of expertise Attack mitigation (rate limit) Adaptive Behavioral IPS  Behavior analysis (zero-day) Self-learning Self-adjusting “ Hands-off” Radware’s Hybrid Approach Complementary Solutions ! Types of Solutions Available  PACKET
Multi Layer “Smart” Adaptive Filters  Zero-Day Worms Propagation Network DoS/DDoS Flood attacks  Clean Environment Intrusion Activities DefensePro  Pro-Active Security Architecture  Proactive Network-Based Behavioral Analysis  Proactive User-Based Behavioral Analysis  Stateful Content Based Protections
Multi Layer “Smart” Adaptive Filters  Worms Propagation Network DoS/DDoS Flood attacks  Intrusion Activities Network-based behavioral analysis  User-based behavioral analysis  Stateful Content based protections  Clean Environment
Effective Traffic Shaping  Prioritized Traffic 1 2 Queuing  3 4 Network Resources Guarantee Using BWM Rules Support for over 100 applications with CBQ, WFQ and wRED queuing algorithms, hierarchical bandwidth management and more P2P VoIP Web Mail… Bandwidth Management Rules Clean Environment VoIP Web  P2P Egress Traffic
Public Network Blocking Rules RT statistics Fuzzy Logic Engine Learning Footprint Lookup Attack Characteristics Source/Destination IP Source/Destination Port Packet size Type of Service  TTL (Time To Live) DNS Query  DNS ID Packet ID TCP sequence number Fragment offset  More … (up to 17) Initial filter is generated:   Packet ID  Degree of Attack = Low  (Positive Feedback) Filter Optimization:   Packet ID  AND  Source IP Filter Optimization:   Packet ID  AND  Source IP  AND  Packet size  Degree of Attack = High (Negative Feedback)  Filter Optimization:   Packet ID  AND  Source IP  AND  Packet size  AND  TTL  Degree of Attack = High  Degree of Attack = Low   Narrowest filters  Packet ID  Source IP Address Packet size TTL (Time To Live) 1 2 3 4 5 Attack’s footprints detection -  10 seconds PPS, Bandwidth, protocol types distribution[%], TCP flags (syn,fin,rst,..)distribution[%]; inbound-outbound traffic [ratio],…  LAN 10 0 Closed feedback Time [sec] Mitigation  optimization process Behavioral DoS System Modules  Inbound Traffic Outbound Traffic 18 Final Filter Start mitigation Initial Filter
Decision Making – Scenario 1 Rate-invariant  anomaly axis Attack area Suspicious  area Normal adapted area Attack Degree = 5 (Normal- Suspect) Legitimate mass-crowd   enter news site   Rate-based  anomaly axis Y-axis X-axis Z-axis Attack  Degree axis Abnormal rate of Syn packets… Normal TCP flags distribution
Decision Making – Scenario 2 Attack Degree = 10 (Attack) DNS Flood   Rate-invariant  anomaly axis Rate-based  anomaly axis Y-axis X-axis Z-axis Attack  Degree axis Attack area Suspicious  area Normal adapted area Abnormal  rate of DNS packets,… Abnormal  protocol distribution [%]
Multi-Layer Intrusion Prevention Client side vulnerabilities SIP IRC bots  Spyware Protocol Anomalies IP & TCP evasions IPv6 traffic Scanning SSL based attacks (*) Server based intrusions Web Vulnerabilities Mail server intrusions   FTP server intrusions SQL server intrusions  DNS server intrusions Worms & Viruses Trojans & Backdoors Horizontal & Vertical Scanning * Requires AppXcel Network behavioral based zero-day DoS protections  User/Hosts behavioral based zero day worm and bots protection Bi-directional scanning,   stateful content-based Intrusion Prevention
Integrated Security AppDirector  AppXcel  Router Client Web  Front end Servers Hacker SSL Termination Web and XML  Application Firewall Access Control IPS for smart patch management Behavioral  DoS Shield
Securing Web Application – The Need Protect browser-based applications from unknown exploits Ensure users perform only legal actions Ensure that new code is secured Application developers are not security  experts Application support team likely not original developers Require a tool for identifying & protecting security vulnerabilities  Process large volumes of traffic without compromising performance or security Protect and inspect encrypted (SSL) traffic
A P S olute Solution – Integrated WAF Automated Web Application Firewall protection without manual intervention Unknown application level exploits protection  Zero-day web-worm attacks protection
The Need to Protect Web Applications   The wide range of attack kinds indicates the severity of the problem.
Business Values of Integrated WAF Non - stop business operation Automatic adaptation to content changes Smooth failover and automatic bypass of faulty WAF  Streamlining business operation Cost effective scalability Acceleration of Web and SSL traffic Lowering deployment & operational cost Lowering cost of vulnerability fixes Less rack space Single-vendor relationship Common management interface
Centralized Security Reporting Monitor  all malicious activity, across the network, in real-time Customize reports , for executive to bit-level analysis & forensics Executive Report,  to provide network security summary
A P S olute  Access Solutions Anti Spam REGIONAL OFFICE BRANCH  OFFICE Firewalls Access Solution:   Optimize WAN link resources to ensure fast, reliable, secure application delivery Availability, Guaranteed  Performance, Accelerated Security, Assured   Antivirus URL filter HEADQUARTERS Linkproof Complete business continuity, transparent disaster recovery and  quality of service Web, Email, CRM, ERP
Multi WAN Solution Routers LinkProof Headquarter  Local Network Corporate  users ERP, CRM, email, Web servers Private Public Smart WAN link  optimization Link Health Monitoring QoS enforcement  Application Smart Routing  IPS & DoS protection Behavioral based Protection
APSolute™  Application Delivery REGIONAL OFFICE BRANCH  OFFICE FW-VPN Antivirus Gateway Web, Email, CRM, ERP HEADQUARTERS Routers 100% Availability Maximum  Performance Absolute Security
 

More Related Content

PDF
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PPT
GDP Product Presentation
PPT
Solera Networks
PPT
Bluecoat Packeshaper Presentation
PPT
Network Critical
PPT
Abaca: The World's Most Effective Spam Filter
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Telco service provider network analytics
GDP Product Presentation
Solera Networks
Bluecoat Packeshaper Presentation
Network Critical
Abaca: The World's Most Effective Spam Filter

What's hot (17)

PPTX
Cryptzone: What is a Software-Defined Perimeter?
PPTX
Vfm packetshaper presentation
PDF
F5 Web Application Security
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
PPTX
Spider & F5 Round Table - Application Centric Security
PDF
Novinky F5 pro rok 2018
PDF
PPTX
Why choose pan
PPTX
Palo Alto Networks PAN-OS 4.0 New Features
PPTX
Vfm bluecoat proxy sg solution with web filter and reporter
PPTX
F5 GOV Round Table - Application Centeric Security
PDF
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
PPTX
Fingerprinting healthcare institutions
PDF
SDP Glossary v2.0
PPTX
Palo Alto Networks authentication
PPTX
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
Cryptzone: What is a Software-Defined Perimeter?
Vfm packetshaper presentation
F5 Web Application Security
How to Overcome Network Access Control Limitations for Better Network Security
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
Spider & F5 Round Table - Application Centric Security
Novinky F5 pro rok 2018
Why choose pan
Palo Alto Networks PAN-OS 4.0 New Features
Vfm bluecoat proxy sg solution with web filter and reporter
F5 GOV Round Table - Application Centeric Security
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
Fingerprinting healthcare institutions
SDP Glossary v2.0
Palo Alto Networks authentication
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
Ad

Viewers also liked (6)

PDF
Radware - When It Comes to ADCs, Perception is Not Reality
PPTX
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
PDF
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
PPTX
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
PPTX
Consider Sophos - Security Made Simple
PPTX
Radware Cloud Security Services
Radware - When It Comes to ADCs, Perception is Not Reality
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Consider Sophos - Security Made Simple
Radware Cloud Security Services
Ad

Similar to 20070605 Radware (20)

PDF
Key Policy Considerations When Implementing Next-Generation Firewalls
PPTX
Palo alto safe application enablement
PDF
Marlabs cyber threat management
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
Nebezpecny Internet Novejsi Verze
PPTX
F5 - BigIP ASM introduction
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
PDF
Paetec Security Solutions
PDF
Paetec security solutions brochure
PPT
Information Security
PPTX
Vfm palo alto next generation firewall
PDF
Wl security-solutions
PDF
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
PPTX
Application visibility across the security estate the value and the vision ...
PPTX
Nightmares of a Penetration Tester ( How to protect your network)
PDF
Top 10 Network Security Solutions You Need to Know.pdf
PDF
Top 10 Network Security Solutions.pdf
PDF
Top 10 Network Security Solutions by Infosectrain
PDF
Watchguard security proposal 2012
PDF
“8th National Biennial Conference on Medical Informatics 2012”
Key Policy Considerations When Implementing Next-Generation Firewalls
Palo alto safe application enablement
Marlabs cyber threat management
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Nebezpecny Internet Novejsi Verze
F5 - BigIP ASM introduction
Partner Zymbian & Fortinet webinar on Web2.0 security
Paetec Security Solutions
Paetec security solutions brochure
Information Security
Vfm palo alto next generation firewall
Wl security-solutions
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
Application visibility across the security estate the value and the vision ...
Nightmares of a Penetration Tester ( How to protect your network)
Top 10 Network Security Solutions You Need to Know.pdf
Top 10 Network Security Solutions.pdf
Top 10 Network Security Solutions by Infosectrain
Watchguard security proposal 2012
“8th National Biennial Conference on Medical Informatics 2012”

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
A Presentation on Artificial Intelligence
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
A Presentation on Artificial Intelligence
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx

20070605 Radware

  • 1. APSolute™ Application Delivery and Security Ein HowTo für NonStop Webservices Michael Geigenscheder
  • 2. CEO Challenge: Smart Productivity Competitive Business Requirements Time Product Info Transactions Web Enablement Intelligence – CRM & prioritization
  • 3. Centralization & Web based Application Web Enablement & Data Center Consolidation Higher Productivity Lower OPEX & CAPEX No Servers on Branches Anyone, Anywhere Anytime Access No Dedicated Client Side SW Based on Standards
  • 4. Application Delivery Challenges Costly Downtimes Increasing volumes of online businesses activities REGIONAL OFFICE BRANCH OFFICE Firewall Web, Email, CRM ERP HEADQUARTERS Antivirus Gateway Router
  • 5. Application Delivery Challenges Poor Performance Growing distance to end users Protocol “chattiness” Richer content Varying access speeds Encrypted traffic (SSL) Costly Downtimes Increasing volumes of online businesses activities REGIONAL OFFICE BRANCH OFFICE Firewall Web, Email, CRM ERP HEADQUARTERS Antivirus Gateway Router
  • 6. Application Delivery Challenges Poor Performance Growing distance to end users Protocol “chattiness” Richer content Varying access speeds Encrypted traffic (SSL) Increased Security Threat Vulnerable Web based applications Growing sophistication of applications attacks & network attacks (DoS) Zero day attacks Internal attacks Costly Downtimes Increasing volumes of online businesses activities REGIONAL OFFICE BRANCH OFFICE Firewall Web, Email, CRM ERP HEADQUARTERS Antivirus Gateway Router
  • 8. APSolute™ Application Delivery REGIONAL OFFICE BRANCH OFFICE FW-VPN Antivirus Gateway Web, Email, CRM, ERP HEADQUARTERS Routers
  • 9. A P S olute Front End Solutions Antivirus Anti Spam URL filter HEADQUARTERS REGIONAL OFFICE BRANCH OFFICE Firewalls Web, Email, CRM, ERP Application Front End: Optimize data center resources to ensure fast, reliable, secure application delivery Availability, Guaranteed Performance, Accelerated Security, Assured AppDirector + AppXcel Complete business continuity, transparent disaster recovery and application optimization
  • 10. Front End Open Service Architecture Web & Image Compression Reverse Caching SSL Offloading TCP Multiplexing and Splitting TCP Optimization AppDirector AppXcel Server L3-L7 loadbalancing Integrated Global Load Balancing Health Monitoring QoS Bandwidth Management Web servers
  • 11. Integrated Security AppDirector AppXcel Router Client Web Front end Servers Hacker SSL Termination Web and XML Application Firewall Access Control IPS for smart patch management Behavioral DoS Shield
  • 12. Network Intrusion Prevention Methods Content-based IPS Signature-based Protocol anomaly rules Single bullet, application layer attacks Rate-based IPS Time based traffic thresholds Manual configurations High level of expertise Attack mitigation (rate limit) Adaptive Behavioral IPS Behavior analysis (zero-day) Self-learning Self-adjusting “ Hands-off” Radware’s Hybrid Approach Complementary Solutions ! Types of Solutions Available PACKET
  • 13. Multi Layer “Smart” Adaptive Filters Zero-Day Worms Propagation Network DoS/DDoS Flood attacks Clean Environment Intrusion Activities DefensePro Pro-Active Security Architecture Proactive Network-Based Behavioral Analysis Proactive User-Based Behavioral Analysis Stateful Content Based Protections
  • 14. Multi Layer “Smart” Adaptive Filters Worms Propagation Network DoS/DDoS Flood attacks Intrusion Activities Network-based behavioral analysis User-based behavioral analysis Stateful Content based protections Clean Environment
  • 15. Effective Traffic Shaping Prioritized Traffic 1 2 Queuing 3 4 Network Resources Guarantee Using BWM Rules Support for over 100 applications with CBQ, WFQ and wRED queuing algorithms, hierarchical bandwidth management and more P2P VoIP Web Mail… Bandwidth Management Rules Clean Environment VoIP Web P2P Egress Traffic
  • 16. Public Network Blocking Rules RT statistics Fuzzy Logic Engine Learning Footprint Lookup Attack Characteristics Source/Destination IP Source/Destination Port Packet size Type of Service TTL (Time To Live) DNS Query DNS ID Packet ID TCP sequence number Fragment offset More … (up to 17) Initial filter is generated: Packet ID Degree of Attack = Low (Positive Feedback) Filter Optimization: Packet ID AND Source IP Filter Optimization: Packet ID AND Source IP AND Packet size Degree of Attack = High (Negative Feedback) Filter Optimization: Packet ID AND Source IP AND Packet size AND TTL Degree of Attack = High Degree of Attack = Low Narrowest filters Packet ID Source IP Address Packet size TTL (Time To Live) 1 2 3 4 5 Attack’s footprints detection - 10 seconds PPS, Bandwidth, protocol types distribution[%], TCP flags (syn,fin,rst,..)distribution[%]; inbound-outbound traffic [ratio],… LAN 10 0 Closed feedback Time [sec] Mitigation optimization process Behavioral DoS System Modules Inbound Traffic Outbound Traffic 18 Final Filter Start mitigation Initial Filter
  • 17. Decision Making – Scenario 1 Rate-invariant anomaly axis Attack area Suspicious area Normal adapted area Attack Degree = 5 (Normal- Suspect) Legitimate mass-crowd enter news site Rate-based anomaly axis Y-axis X-axis Z-axis Attack Degree axis Abnormal rate of Syn packets… Normal TCP flags distribution
  • 18. Decision Making – Scenario 2 Attack Degree = 10 (Attack) DNS Flood Rate-invariant anomaly axis Rate-based anomaly axis Y-axis X-axis Z-axis Attack Degree axis Attack area Suspicious area Normal adapted area Abnormal rate of DNS packets,… Abnormal protocol distribution [%]
  • 19. Multi-Layer Intrusion Prevention Client side vulnerabilities SIP IRC bots Spyware Protocol Anomalies IP & TCP evasions IPv6 traffic Scanning SSL based attacks (*) Server based intrusions Web Vulnerabilities Mail server intrusions FTP server intrusions SQL server intrusions DNS server intrusions Worms & Viruses Trojans & Backdoors Horizontal & Vertical Scanning * Requires AppXcel Network behavioral based zero-day DoS protections User/Hosts behavioral based zero day worm and bots protection Bi-directional scanning, stateful content-based Intrusion Prevention
  • 20. Integrated Security AppDirector AppXcel Router Client Web Front end Servers Hacker SSL Termination Web and XML Application Firewall Access Control IPS for smart patch management Behavioral DoS Shield
  • 21. Securing Web Application – The Need Protect browser-based applications from unknown exploits Ensure users perform only legal actions Ensure that new code is secured Application developers are not security experts Application support team likely not original developers Require a tool for identifying & protecting security vulnerabilities Process large volumes of traffic without compromising performance or security Protect and inspect encrypted (SSL) traffic
  • 22. A P S olute Solution – Integrated WAF Automated Web Application Firewall protection without manual intervention Unknown application level exploits protection Zero-day web-worm attacks protection
  • 23. The Need to Protect Web Applications The wide range of attack kinds indicates the severity of the problem.
  • 24. Business Values of Integrated WAF Non - stop business operation Automatic adaptation to content changes Smooth failover and automatic bypass of faulty WAF Streamlining business operation Cost effective scalability Acceleration of Web and SSL traffic Lowering deployment & operational cost Lowering cost of vulnerability fixes Less rack space Single-vendor relationship Common management interface
  • 25. Centralized Security Reporting Monitor all malicious activity, across the network, in real-time Customize reports , for executive to bit-level analysis & forensics Executive Report, to provide network security summary
  • 26. A P S olute Access Solutions Anti Spam REGIONAL OFFICE BRANCH OFFICE Firewalls Access Solution: Optimize WAN link resources to ensure fast, reliable, secure application delivery Availability, Guaranteed Performance, Accelerated Security, Assured Antivirus URL filter HEADQUARTERS Linkproof Complete business continuity, transparent disaster recovery and quality of service Web, Email, CRM, ERP
  • 27. Multi WAN Solution Routers LinkProof Headquarter Local Network Corporate users ERP, CRM, email, Web servers Private Public Smart WAN link optimization Link Health Monitoring QoS enforcement Application Smart Routing IPS & DoS protection Behavioral based Protection
  • 28. APSolute™ Application Delivery REGIONAL OFFICE BRANCH OFFICE FW-VPN Antivirus Gateway Web, Email, CRM, ERP HEADQUARTERS Routers 100% Availability Maximum Performance Absolute Security
  • 29.