#March's Highlights# Union Nifco' Story Sharing, NGAF Best Practices and more.
  

Sangfor Jojo Lv5Posted 2024-Mar-15 10:53



Dear Community Member,
Welcome to this edition of the Sangfor Community Newsletter, a curated collection of content designed to ignite your passion for Sangfor network security and cloud products, technologies, and solutions.
Let's take a look at the first issue of the newsletter.


#Success Stories Sharing | Union Nifco                                                                                       

Union Nifco Co., Ltd. (UNC) was faced with a major challenge in that all of its applications relied on eight physical servers protected only by firewalls and anti-virus measures, resulting in a ransomware attack that severely disrupted operations. To address this issue, UNC adopted Sangfor's comprehensive solution, which includes a hyper-converged infrastructure (HCI) to reduce data center footprint and increase efficiency, an anti-ransomware solution to enhance detection and defense against ransomware and other advanced attacks, and an Internet Access Gateway (IAG) to modernize its Internet access management system.

#The Latest Sangfor Products Release Notes                                                                  

1) Disk Capacity Shrinking: This feature allows for the isolation and replacement of normal SSDs and
HDDs along with the deletion of isolated SSDs and HDDs.
2) Low Latency Mode: The HCI cluster supports low latency mode deployment, enhancing VM network latency to below 10 microseconds. Read more >>


1) Automatic Inactivity for Imported Assets: Allows for imported assets to automatically become inactive.
2) Device Network Connectivity Test: A new feature to test device network connectivity.
3) Privilege Separation for SOAR Roles: Enhances security by separating privileges for SOAR (Security Orchestration, Automation, and Response) roles.
4) SIEM's Telemetry Logs: Adds a feature for SIEM (Security Information and Event Management) to collect telemetry logs, requiring at least 96GB RAM to enable this feature. Read more >>


#Sangfor Products Best Practices                                                                                      

The document outlines various scenarios where Sangfor's Network Secure technology is deployed to enhance network security and efficiency. It specifically addresses customer pain points such as the need for Layer-2 isolation to prevent unauthorized access and ensure data security, Layer-3 access to enable secure connectivity between different virtual systems, and the ability for virtual systems to access the internet through a public system without affecting each other. These technologies are applied in corporate networks to ensure secure, efficient, and isolated operations across different network segments, addressing critical security concerns and operational efficiency requirements.


The document details the best practice for configuring BGP over GRE over IPsec with SANGFOR Network Secure 8.0.85. It addresses the need for secure, scalable, and efficient routing configurations across distributed networks, solving customer pain points related to secure connectivity, network performance, and complex configurations in multi-site deployments.


In organizations that use SSL VPN technology, there may be a requirement for all SSL VPN users to access the internet through the company's network. The document guides how to achieve this configuration and offers recommendations to ensure optimal performance and security. By following the instructions and recommendations outlined in the document, network administrators and IT professionals can configure the SSL VPN Full Tunnel feature in either gateway mode or single-arm mode.

The document provides a guide on implementing TLS 1.3 decryption with SANGFOR Network Secure, focusing on enhancing security by allowing the decryption and inspection of TLS 1.3 encrypted traffic. This addresses customer pain points related to securing networks against advanced threats concealed within encrypted traffic, ensuring data protection and compliance with security policies by enabling visibility and control over encrypted data flows.



------ END ------

This topic contains more resources

You must log in to download or view the file. Not registered yet? Register

x
Medic Lv1Posted 2024-Mar-16 12:08
  
very good bulleting
Prosi Lv3Posted 2024-Mar-16 04:39
  
Thank you for the newsletter
Enrico Vanzetto Lv4Posted 2024-Mar-15 23:19
  
HI, nice success story
Newbie517762 Lv5Posted 2024-Mar-15 15:03
  
Thank you for your valuable information.