HCSS Session 1
HCSS Session 1
HCSS Session 1
Integrative Cybersecurity
Visionary. AI-powered. Accessible.
Breadth
Diverse Enterprise WFH Campus Mobile Branches/ Data centers/ loT/Edge
Pop-ups Hybrid clouds
Locations
<<<<<<
<<<<<<
1.9 Billion
New malware variants Ransomware attacks
in 2022 in 2022 Records exposed
between 2005-2022
30%
plan to increase Delay in patching vulnerabilities 59%
cybersecurity spending
30% 29%
Lack of incident response plans 57%
25% 24% 24% 24% in 2023 Poorly configured cloud services 56%
23% 23%
22% Overreliance on legacy identity/authentication approaches 46%
Rapidly evolving
infrastructure Cyber
Resilience
Fast changing
threat landscape
Coverage Control Consolidation
+
Complete coverage, Adaptive defense, Reduces complexity Business
Increasing regardless of the putting the enterprise in and cost through Continuity
complexity & cost environment control consolidation
Application Delivery
Next Generation Controller
Firewall
CloudEdge
CloudHive Enterprise Network Intrusion
Network
Control
prevention Cloud Workloads
CloudArmour
Workgroup Workgroup
WAF
Server Breach
Detection System
Next Generation
Data Center Firewall
Application NGFW
CloudEdge
Delivery Controller
Coverage
Intrusion IP URL Cloud Botnet C2
Prevention Reputation Anti-Spam Anti-Virus
Filtering Sandbox Prevention
Control
Complete protection again every attack surface of the modern enterprise
Consolidation
Coverage
Big Data Analysis Platform
C&C Detection Abnormal Traffic Hidden Tunnels Attack Chain Ransomware/Mining ……… Threat Intelligence
Control Distributed Real-time Computing Framework Search Engine For Massive Logs AI/ ML Algorithms
Consolidation
Meta Data Syslog
Threat Info Syslog NetFlow Enforcement Sysmon
NetFlow 3rd party logs
CloudEdge/
BDS NGFW IDPS WAF ….. Agent Security Logs
CloudHive
Zero Trust starts here Before they attack you Wherever they run
Universal Adaption to
Infrastructure Expansion from
Zero Trust Network Access
SMB to Enterprise to
Carrier/ISPs, from Edge to Cloud X Series Data Center Firewall
Behavior Malware
Detection Detection
Playbook Module
StoneShield Ransomware
Intrusion Attacks
Sandbox Threat Intelligence Action Network Security Platform Action
Unknown Threat
Crypto Mining Device Action
IPS
Intrusion Attacks
Botnet Attack IP Domain
Anti-Virus
Malware
URL Filtering Work
DGA Policy IP Block Email
Threat Event Order
Threat Automated
URL File
Anti-Spam
Threat Event
Internal Scan Attack
Correlation Threat
IP Reputation
Abnormal Behavior Playbook Flow
Suspicious File
Botnet C&C Prevention
Transfer
Analytics Response
NGFW CloudArmour
BDS ADC vADC
DCFW CloudHive
1800+ 35%+ 3
Employees Worldwide Employees in R&D R&D Centers in
across 20+ countries US & China
9 Years in the Gartner Magic XDR Growth and Innovation Leader NGFW Growth and Innovation Leader
Quadrant for Network Firewalls in Frost Radar 2023 Report in Frost Radar 2023 Report
Hillstone Networks
The world first AI-Powered Next- AI-Powered Breach iSource XDR Platform
Generation Firewall Detection System
NGFW Capabilities
Traditional Firewalls
Founder by One of the first 100G First vendor to CloudEdge, first virtual 1T Data Center AI-powered 3.5T Data
Netscreen firewall platform in release an AI- NGFW supporting major Firewall Platform XDR Solution Center
Veterans the industry based firewall public clouds and NFV Firewall Proprietary
Platform Chipset
Innovation
FPGA
ASIC
SECoC
2006 2008 2010 2013 2014 2015 2016 2017 2018 2019 2021 2022 2023 Future
AI
Threat Detection
Threat Intelligence
Security Operations
Managed Services
One of the first 360G fully distributed CloudHive, one of the first AI-based NDR Secure SD-WAN CWPP Solution: ZTNA Ai in Security
vendor released firewall architecture solutions to support Solution Solution CloudArmour
multicore firewall Openstack & Vmware
Gartner. Forrester.
Hillstone
Market Guide for Network Hillstone The Microsegmentation Micro-
Detection and Response NDR Solutions Landscape, Q2 2024
Published 29 March 2024 - ID G00784755 - 21 min read
Forrester’s Overview Of 23 Vendors
segmentation And more...
The network detection and response market continues to grow and expand to hybrid network scenarios
with IaaS deployments. Security and risk management leaders should reprioritize NDR as
Overview
(March 2024) (April 2024)
By David Holmes with Joseph Blankenship, Lok Sze Sung, and Michael Belden
Integrative
Cybersecurity
Delivering successful deployments with Maximizing customer’s cyber security
established and proven technology return on investment through better TCO