Download PDF version Contact company

SonicWall, a pioneer in physical, virtual and cloud-focused cybersecurity solutions, is emphasising the return of customer choice for securing and scaling a mix of cloud, hybrid and traditional environments.

Too many times organisations have been forced to change the way they operate in order to secure access to their networks, data, devices and people,” said SonicWall President and CEO Bill Conner. “We’ve been busy innovating cloud and virtual solutions that help organisations secure complex blends of networks, including virtual, hybrid, cloud and on-premises deployments.”

Core cloud solution

SonicWall’s growing virtual, cloud and hybrid offerings leverage the best of the company’s boundless cybersecurity approach to return deployment choices to the customer while solving real-world use cases faced by SMBs, enterprises, governments and MSSPs. SonicWall’s core cloud solution offerings:

  • Solve security and connectivity challenges for cloud-native and hybrid environments.
  • Secure access to cloud and on-premises applications and virtualised workloads through modern zero-trust capabilities.
  • Protect increasingly distributed and remote workforces through powerful virtualised security layers and zero-touch capabilities.
  • Simplify threat detection and response by unifying security events and analytics in a single cloud-based dashboard, allowing easy visualisation and management of high-risk alerts.

Robust hybrid networks

SonicWall’s cloud innovation is driven by the need to solve complex security challenges

The modern IT environment is rife with complexity that drives security and connectivity challenges, which can be further complicated when organisations require hybrid environments comprised of physical, virtual and SaaS offerings, and private and public cloud solutions,” said IDC Research Director Chris Rodriguez.

Cybersecurity vendors that support these deployment options add tremendous financial and operational flexibility for their customers, and are also well suited for organisations that are in different stages of their cloud journey.” SonicWall’s cloud innovation is driven by the need to solve complex security and connectivity challenges by delivering power, flexibility and choice to customers and partners. SonicWall has collaborated with organisations worldwide to build some of the most secure and robust hybrid networks.

Adopting cloud transformation

The University of Pisa connects and secures a wide and distributed network of systems, users, applications and services to ensure our institution can provide the highest levels of on-campus and remote learning,” said University of Pisa CIO Antonio Cisternino. “It’s imperative that we’re able to use the same trusted security controls, regardless of how we deploy them. Through their growing range of virtual, cloud and hybrid offerings, SonicWall gives us that choice and flexibility without sacrificing the security standards we require to protect and enable students, faculty and staff.”

SonicWall ensures organisations are able to set their own deployment paths

SonicWall ensures organisations are able to set their own deployment paths and cloud migration timelines — not forcing them into a rigid vendor-first approach. By providing cloud-based (e.g., virtual firewall and VPN), as-a-service (e.g., ZTNA, FWaaS) and on-premises (e.g., firewalls, VPN) options, SonicWall empowers customers to deploy what works for their architecture — and adopt cloud transformation at their pace.

Cloud-hosted applications

These real-world hybrid environments are secured using a cohesive mix of virtual, cloud and on-premises offerings, including SonicWall NSv virtual firewalls, Cloud Edge Secure Access zero-trust security, appliance-free SMA virtual private networks (VPN), and Cloud App Security to protect SaaS applications.

Organisations are able to further scale and extend distributed environments by simultaneously deploying security across multiple locations — with minimal IT support — using Zero-Touch Deployment capabilities. With the influx of work-from-home access, companies require a simple and secure way of connecting their workforce to resources they need — wherever they’re located. SonicWall embraces zero-trust security as a tenet of cybersecurity in a perimeter-less, cloud-first reality. SonicWall helps organisations easily and quickly connect remote users to on-premises resources, cloud-hosted applications, branch offices and public clouds.

Wireless access points

SonicWall Cloud Edge Secure Access — the company’s zero-trust network access (ZTNA) offering

In as few as 15 minutes, SonicWall Cloud Edge Secure Access — the company’s zero-trust network access (ZTNA) offering — quickly scales security beyond the perimeter through modern zero-trust principles. This results in logical trust zones that authenticate every user, device and location for secure access to only the specific services and resources they require.

New in SonicWall Capture Security Center 3.0, Unified Insights brings analytics from across SonicWall products, including physical and virtual firewalls, wireless access points, switches and endpoint security products into a single, customisable dashboard. This provides a central, easy-to-use location for monitoring environments and troubleshooting incidents, eliminating the need to multi-task across different consoles.

Private cloud infrastructure

Paired with SonicWall Analytics, Capture Security Center 3.0 can transform large volumes of data (spanning tens of thousands of firewall nodes) into actionable insights and defensive actions against hidden risks across networks, applications and users — all with the visibility, precision, speed and scale of the cloud.

Regardless of deployment strategy, SonicWall ensures organisations can identify and block both known and unknown cyberattacks across traditional networks, public and private cloud infrastructure, and virtual environments by seamlessly integrating SonicWall physical and virtual firewalls when and where it makes sense for your business. The foundation of this ecosystem integrates with SonicWall’s cloud-based Advanced Threat Protection (ATP) multi-engine sandbox service to stop advanced cyberattacks, including never-before-seen malware and ransomware.

Download PDF version Download PDF version

In case you missed it

How should the security industry promote diversity?
How should the security industry promote diversity?

Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

What are the challenges and benefits of mobile access control?
What are the challenges and benefits of mobile access control?

There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions?