Sangfor NGAF Introduction 8.0.5 Final
Sangfor NGAF Introduction 8.0.5 Final
Sangfor NGAF Introduction 8.0.5 Final
Application Firewall
1
Attacks Bypass Traditional Protection
2
Shortage of Cybersecurity Professionals is the #1 Concern for CSOs
51% of respondents
claimed their
organization had a
problematic
shortage of
cybersecurity skills
3
Shortage of People & Shortage of Time
Vulnerability
Assessment
Process Alerts
Trouble Tickets
Log File Reviews
Security
Events Threat
Correlation
Maintenance
Management
Research IOC on TI
4
Ideal Protection
Intelligent
Efficacy* Understand business
Able to stop all assets and risks.
threats, known, Protection for
unknown and zero- networks,
day. applications and
users.
Simplify
Simplify IT security
operation.
Easy to use and
understand.
Quick to discover
issues.
Fast response.
*“ef·fi·ca·cy” ˈefəkəsē/
noun
1.the ability to produce a desired or intended result. 5
Sangfor NGAF
Prevention against Unknown Threats: Protect Business Assets Simplified Security Operation
Converged security Asset Discovery Superior Visibility
AI-Based Malware Inspection Vulnerability Assessment Unmatched Reporting
Security Context WAF Guidance, wizard, alert
6
Stop Unknown Threats
7
Converged Security
9
Sangfor Engine Zero
Coverage
Both known and zero-day attacks.
Efficacy
In recent tests our malware detection rate scored the
highest in terms of accuracy among other vendors.
Fast
Extremely efficient, utilizing very few resources while
efficiently providing malware inspection on the
network gateway with very little performance impact.
10
Neural-X
11
12
Unknown Threat Detection: Sangfor Cloud Sandbox
13
Protect Business Assets
14
Discover, Scan & Protect
Real-Time Scan
• Asset Discovery
• Vulnerability Assessment
Proactive Protection
• Application Hiding
• Virtual Patching
• Identify Weak passwords
15
Proven Success Protecting Web Applications
Scanning Prevents port/server scanning
Web Application
Process Prevents app vulnerability scanning Servers
Weak password protection
Anti-brute force attack
Core URL protection
Website structure anti-scanning
Web Crawler defense
Logging Engine
18
Full Network Security Visibility
Visibility of Assets
• Identify core business system assets (examples:
application software, users, devices, and content)
Visibility of Threats and Risks
• Identify vulnerabilities and risks to business assests.
Visiblity of User Behavior
• Distinguish between common and uncommon user
behavior, identify potential risks and respond to
threats in real-time.
• Easy distinguish between legitimate users and
malicious users accessing services
19
Reporting for Different Purpose
Simplified Daily Operation Step by Step Incident Response Valuable Report to MGMT Team
20
In-Depth Threat Analysis
1. View current security status
2. Comprehensive analysis of network trends
3. Analysis of application servers prone to critical or high-risk vulnerabilities & attacks
4. Solutions for existing issues
Timely analysis of
severity ranking of
potential risks
22
Summary
Prevention against Unknown Threats: Protect Business Assets Simplified Security Operation
Converged security Asset Discovery Superior Visibility
AI-Based Malware Inspection Vulnerability Assessment Unmatched Reporting
Security Context WAF Guidance, wizard, alert
23
THANK YOU !