2
SonicWALL Application Intelligence and Control Partner Brief FIREWALL Application Intelligence, Control and Visualization Misuse of applications such as instant messaging, chat services, peer-to-peer (P2P) applications, social networking sites, and streaming video can signicantly degrade network performance and impact business productivity. Further complicating matters, many of these applications share ports with common protocols such as HTTP and HTTPS, thereby reducing trac visibility and opening up additional channels for potential security breaches and viruses, Trojans and other malware. To counter these threats and regain visibility into network trac, network inspection must be elevated to the application layer. SonicWALL® Application Intelligence and Control extends the protection and functionality of SonicWALL rewalls beyond blocking traditional malware threats and intrusion prevention to include intelligent trac management of applications. This extended capability provides application bandwidth management, access controls, data leakage prevention, restrictions on the transfer of specic les and documents, and much more. Application Intelligence and Control is both comprehensive and easy to use, identifying a continuously growing base of over 3,000 unique applications uses. The Application Intelligence and Control Service is available as part of the SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention Service as well as the SonicWALL Comprehensive Gateway Security Suite (CGSS) on the TZ 210, NSA and E-Class NSA Series rewalls. The SonicWALL Reassembly-Free Deep Packet Inspection engine is capable of inspecting hundreds of thousands of connections simultaneously across all 65,535 ports equally, with nearly zero latency and without stream size limitations. Administrators must also visualize application trac to control network use properly and to adjust network policy based on critical observations. With SonicOS 5.8, the SonicWALL Application Flow Monitor is now a standard feature on all SonicWALL rewalls from the TZ 210 and up and provides real-time visualization of all network trac. Included are graphs of applications, ingress and egress bandwidth, Web sites visited and all user activity. When the Application Flow Monitor is paired with a subscription including Application Intelligence and Control, partners and administrators will be able to win back control of the network with granular control of applications and users. Value Proposition for Your Business Deliver a richer level of security to your clients by augmenting malware protection and intrusion prevention with application bandwidth management, access controls, and data leakage prevention Better position yourself as a trusted advisor by leveraging the new application visualization capabilities to identify emerging threats or security concerns Reduce time to resolution with the new network trouble shooting and visualization features Increase professional services opportunities with the deeper level of application control and protection Improve the depth of reporting and visibility of network trac for managed services clients Achieve higher levels of client satisfaction through superior security, improved network control, and speedier problem resolution Value Propos itions for Your Clients Put the power back into the hands of IT administrat ors with new levels of network management and granular policy control of applications and users Delicately balance IT’s needs f or security and data protection with the diverse application needs of today’s users Prioritize mission critical applications over distracting, unproductive, or bandwidth-hogging applications Prevent data leakage, while ensuring compliance with key legal and privacy obligations Ensure high levels of employee productivity and satisfaction by guaranteeing bandwidth and QoS required for excellence on the job Identify and stop emerging threats or dangerous user behavior before major breaches or impacts can occur Manage policies by pre-dened, categories (such as social media or gaming), individual applications, or even users and groups Competitive Advantages Dierentiate your professional or managed service oering with higher level of intelligence and network visibility Develop unique reporting features for your managed service oering Achieve the highest levels of client satisfaction through speedier problem resolution and network management Provide and condently commit to Software Level Agreements for network uptime and resilience

SonicWALL Application Intelligence Partner Brief

Embed Size (px)

Citation preview

8/8/2019 SonicWALL Application Intelligence Partner Brief

http://slidepdf.com/reader/full/sonicwall-application-intelligence-partner-brief 1/2

SonicWALL Application Intelligence and ControlPartner Brief

F IREWALL Application Intelligence, Control and Visualization

Misuse of applications such as instant messaging, chat services, peer-to-peer (P2P) applications, social networking sites, and streaming video

can significantly degrade network performance and impact business productivity. Further complicating matters, many of these applications

share ports with common protocols such as HTTP and HTTPS, thereby reducing traffic visibility and opening up additional channels for

potential security breaches and viruses, Trojans and other malware. To counter these threats and regain visibility into network traffic, network 

inspection must be elevated to the application layer.

SonicWALL® Application Intelligence and Control extends the protection and functionality of SonicWALL firewalls beyond blocking

traditional malware threats and intrusion prevention to include intelligent traffic management of applications. This extended capability

provides application bandwidth management, access controls, data leakage prevention, restrictions on the transfer of specific files and

documents, and much more. Application Intelligence and Control is both comprehensive and easy to use, identifying a continuously growingbase of over 3,000 unique applications uses. The Application Intelligence and Control Service is available as part of the SonicWALL Gateway

Anti-Virus, Anti-Spyware and Intrusion Prevention Service as well as the SonicWALL Comprehensive Gateway Security Suite (CGSS) on the TZ

210, NSA and E-Class NSA Series firewalls. The SonicWALL Reassembly-Free Deep Packet Inspection engine is capable of inspecting hundreds

of thousands of connections simultaneously across all 65,535 ports equally, with nearly zero latency and without stream size limitations.

Administrators must also visualize application traffic to control network use properly and to adjust network policy based on critical

observations. With SonicOS 5.8, the SonicWALL Application Flow Monitor is now a standard feature on all SonicWALL firewalls from the TZ 210

and up and provides real-time visualization of all network traffic. Included are graphs of applications, ingress and egress bandwidth, Web sites

visited and all user activity. When the Application Flow Monitor is paired with a subscription including Application Intelligence and Control,

partners and administrators will be able to win back control of the network with granular control of applications and users.

Value Proposition for Your Business

■ Deliver a richer level of security to your clients by augmenting malware protection and intrusion prevention with application bandwidthmanagement, access controls, and data leakage prevention

■ Better position yourself as a trusted advisor by leveraging the new application visualization capabilities to identify emerging threats or

security concerns

■ Reduce time to resolution with the new network trouble shooting and visualization features

■ Increase professional services opportunities with the deeper level of application control and protection

■ Improve the depth of reporting and visibility of network traffic for managed services clients

■ Achieve higher levels of client satisfaction through superior security, improved network control, and speedier problem resolution

Value Propositions for Your Clients

■ Put the power back into the hands of IT administrators with new levels of network management and granular policy control of applications and users

■ Delicately balance IT’s needs for security and data protection with the diverse application needs of today’s users

■ Prioritize mission critical applications over distracting, unproductive, or bandwidth-hogging applications

■ Prevent data leakage, while ensuring compliance with key legal and privacy obligations

■ Ensure high levels of employee productivity and satisfaction by guaranteeing bandwidth and QoS required for excellence on the job

■ Identify and stop emerging threats or dangerous user behavior before major breaches or impacts can occur

■ Manage policies by pre-defined, categories (such as social media or gaming), individual applications, or even users and groups

Competitive Advantages

■ Differentiate your professional or managed service offering with higher level of intelligence and network visibility

■ Develop unique reporting features for your managed service offering

■ Achieve the highest levels of client satisfaction through speedier problem resolution and network management

■ Provide and confidently commit to Software Level Agreements for network uptime and resilience

8/8/2019 SonicWALL Application Intelligence Partner Brief

http://slidepdf.com/reader/full/sonicwall-application-intelligence-partner-brief 2/2

Page 2SonicWALL Application Intelligence Partner Brief 

SonicWALL, Inc.

2001 Logic Drive, San Jose, CA 95124  

 T +1 408.745.9600  F +1 408.745.9300 

www.sonicwall.com

SonicWALL’s line-up of dynamic security solutions

NETWORK

SECURITY

WEB AND E-MAIL

SECURITY

POLICY AND

MANAGEMENT

BACKUP

 AND RECOVERY

©2010 SonicWALL and the SonicWALL logo is registered trademarks of SonicWALL, Inc. Dynamic Security For The Global Network is a trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of

their respective companies. Specifications and descriptions subject to change without notice. 10/10 SW 1076

SECURE

REMOTE ACCESS

Intelligence

■ Reassembly-Free Deep Packet Inspection™

■ Identify and Categorize Application Traffic by Source and Destination

■ Identify and Categorize by Application

(not just Port and Protocol)■ Identify and Categorize by User/Group

(not just IP)

Control

■ Intelligence-based Policy Enforcement

■ Application and Content Control

■ Industry-leading 3,000+ Application

■ Application-level Bandwidth

Management

Visualization

■ View Network Threats and Trends in Real-time

■ View Application Traffic by Users

■ View Application Bandwidth Usage

■ View URL Domain Access

Application Visualization

Real-time graphs of applications, ingress and egress bandwidth, Web sites visited and all user activity enables administrators to modify application rules toconform to network policies.