SlideShare a Scribd company logo
Azlan Security Portfolio
Gianandrea Daverio
Security Business Unit Manager
E-Mail gdaverio@techdata.it

1

Confidential

S
olutionsfor www.azlan.coms
your S c
uc es
Summary
Network Firewalls
Virtual Private Networking
Network-Based Intrusion Prevention
Network-Based Vulnerability Management
SSL-Based Application Gateways
Application Traffic Management
Application Level Switching
Core & Edge Routing
Authentication, Authorization & Accounting
Network Access Control
E-mail Filtering & Spam Prevention
Web Content Filtering
Enterprise Back-up
End-Point Security & Virus Protection
Host-Based Security & Virus Protection

2
Network Firewalls

3
Virtual Private Networking

4
Network-Based Intrusion Prevention

5
Vulnerability Management

6
SSL-Based Application Gateway

7
Application Traffic Management

8
Application Level Switching

9
Core & Edge Routing

10
Authentication, Authorization, Accounting

11
Network Access Control

12
Mail Filtering & Spam Prevention

13
Web Content Filtering

14
Enterprise Back-up

15
End-Point Security

16
Host-Based Security

17
Thank you for your attention

18

Confidential

S
olutionsfor www.azlan.coms
your S c
uc es

More Related Content

PDF
Web security 2012
PDF
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
PPTX
Steven Porter Seville | Ideas about Computer clouding
PPTX
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
PPTX
Mastering Next Gen SIEM Use Cases (Part 2)
PDF
Cisco connect winnipeg 2018 anatomy of an attack
PDF
Cgi Trap
PDF
Web Security
Web security 2012
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Steven Porter Seville | Ideas about Computer clouding
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Mastering Next Gen SIEM Use Cases (Part 2)
Cisco connect winnipeg 2018 anatomy of an attack
Cgi Trap
Web Security

What's hot (20)

PPTX
Tech Demo: Take the Ransom Out of Ransomware
PPTX
Mastering Next Gen SIEM Use Cases (Part 1)
PDF
Anatomy of an Attack
PPTX
Cloudfest 2018 - Secure Cloud Servers in a Nutshell. Quick overview of thre...
PPTX
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
PDF
Anatomy Of An Attack
PPTX
The Nitty Gritty of Website Security
PDF
Palestra Jeferson Propheta - Wanna Cry more
PDF
How to avoid your website from keep getting hacked
PDF
mcafee-10-steps-infographic-d2
PDF
Remote Workforces Secure by Barracuda
PDF
How to get recover from a hacked website
PPT
Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organiza...
PDF
Cyberdefense in depth with validy technology
PDF
OFFICE 365 SECURITY
PDF
Data Center Security Challenges
PDF
Secure Web Gateway Ds Lr[1]
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PPTX
Believe It Or Not SSL Attacks
PDF
OWASP Top 10 2017
Tech Demo: Take the Ransom Out of Ransomware
Mastering Next Gen SIEM Use Cases (Part 1)
Anatomy of an Attack
Cloudfest 2018 - Secure Cloud Servers in a Nutshell. Quick overview of thre...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Anatomy Of An Attack
The Nitty Gritty of Website Security
Palestra Jeferson Propheta - Wanna Cry more
How to avoid your website from keep getting hacked
mcafee-10-steps-infographic-d2
Remote Workforces Secure by Barracuda
How to get recover from a hacked website
Nagios Conference 2012 - Jared Bird - Providing Value Throughout the Organiza...
Cyberdefense in depth with validy technology
OFFICE 365 SECURITY
Data Center Security Challenges
Secure Web Gateway Ds Lr[1]
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Believe It Or Not SSL Attacks
OWASP Top 10 2017
Ad

Viewers also liked (17)

PPTX
Information Security in a Compliance World
PDF
Ovca partner techtraining
DOCX
Crossfade cold
PDF
Projeto crowdsourcing - Notificações pelo telegram
DOCX
Usaha parcel
PDF
Atel Value Proposition
PPTX
Information Security Assessment Offering
PDF
Instalar o zabbix proxy3 no pfsense
PPT
Risk assessment on information security
PPTX
Image presentation
KEY
Doritos powerpoint
PDF
Xenesys Security Portfolio
PDF
GFI OiS Data Security Proposition
PDF
Xenesys IT Security Offering
PDF
Italgo Information Security Governance
DOCX
mujadalah
PPTX
Postman
Information Security in a Compliance World
Ovca partner techtraining
Crossfade cold
Projeto crowdsourcing - Notificações pelo telegram
Usaha parcel
Atel Value Proposition
Information Security Assessment Offering
Instalar o zabbix proxy3 no pfsense
Risk assessment on information security
Image presentation
Doritos powerpoint
Xenesys Security Portfolio
GFI OiS Data Security Proposition
Xenesys IT Security Offering
Italgo Information Security Governance
mujadalah
Postman
Ad

Similar to Azlan Security Offering (20)

PPTX
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PDF
Security in the cloud protecting your cloud apps
PPTX
Risico op digitale bedreigingen maximaal verminderen - Bijdrage ASP4all voor ...
PPT
20070605 Radware
PPT
Information Security
PPTX
Dissecting ssl threats
PPTX
3rd Party Cyber Security: Manage your ecosystem!
PPTX
SonicWALL - Skytek - VnPro.pptx
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PPTX
Steve Porter : cloud Computing Security
PDF
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
PPTX
DNS Security, is it enough?
PPTX
Corporate Security Issues and countering them using Unified Threat Management...
PDF
How to Gain Visibility into Encrypted Threats
PPT
C:\fakepath\wg xcs emailsecurity 170 370 570
PPT
XCS - Watchguard
PDF
Web Application Firewall Presentation .pdf
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
Security in the cloud protecting your cloud apps
Risico op digitale bedreigingen maximaal verminderen - Bijdrage ASP4all voor ...
20070605 Radware
Information Security
Dissecting ssl threats
3rd Party Cyber Security: Manage your ecosystem!
SonicWALL - Skytek - VnPro.pptx
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Steve Porter : cloud Computing Security
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
DNS Security, is it enough?
Corporate Security Issues and countering them using Unified Threat Management...
How to Gain Visibility into Encrypted Threats
C:\fakepath\wg xcs emailsecurity 170 370 570
XCS - Watchguard
Web Application Firewall Presentation .pdf
Estratégia de segurança da Cisco (um diferencial para seus negócios)
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Azlan Security Offering