Dell SonicWALL provides a broad range of intelligent network security and data protection solutions including next generation firewalls, secure remote access, and email security that empower you to secure, control, and scale your network. Our dedicated threats research team collaboratively gathers, analyzes, and vets cross vector threat information for more than one million sensors around the world with same day and zero day detection.
Here's how it works. Threat protection is a continuous process that can be broken into four steps-- collection, classification, countermeasure creation, and protection. Dell SonicWALL collects multiple types of data. In 1999, Dell SonicWALL cultivated a dedicated in-house threats research team to continuously collect threat data.
The team now spans our broad product portfolio and threat data is cross pollinated between the product lines. For example, IP reputation data gathered from email security appliances is shared with next generation firewalls. And threat information from the extensive base of firewall deployments feed into the email security line. This cross pollination approach provides more security coverage than would be available otherwise.
Threat data is gathered from several sources, including more than one million Dell SonicWALL sensors located around the globe that monitor traffic for emerging threats. We participate in more than a dozen industry collaboration efforts, such as the Microsoft MAPP program. So our researchers receive new verified threats before the general public. We actively engage in numerous threat research communities so our in-house team is supplied with ample information and samples. And we support and collaborate with private freelance researchers around the globe that uncover unique samples of uncommon attacks and vulnerabilities for our team.
Once collected, data samples are then analyzed, verified, and classified by our team. New intelligence, samples, and traffic captures are continuously dissected and carefully analyzed by Dell SonicWALL threats researchers. Our researchers utilize a variety of proprietary tools, such as simulation environments to remove false positives and efficiently and accurately verify whether a threat actually exists.
Our team also collaborates with industry leading security research firms and vendors to ensure threats are accurately verified. Once verified, the Dell SonicWALL threats teams classify the data into categories, such as Trojans, exploits, viruses, and so on. Each verified classified threat then receives a signature or other identifier created by our team to enable real time countermeasures.
Signatures are a unique data pattern that the deep packet inspection engine compares against real time traffic to identify or block a malicious file or traffic. Countermeasures undergo regression testing, and then are checked for false positives before being rolled out to our customers automatically. Which leads us to step four, protection.
New on box signatures and updated countermeasures are automatically and transparently sent out to firewalls with current security services subscriptions. These security updates are deployed throughout the day as needed and take effect immediately without reboots or network interruptions. In addition to signatures on the box, Dell SonicWALLs have real time access to more than 10 million signatures in the cloud.
Our cloud AV service acts as an extension to the security intelligence on board the appliance and is continuously updated 24 hours a day, seven days a week, delivering an extra layer of protection that keeps our customers safe from suspicious files. Collection, classification, countermeasure creation, and protection-- our dedicated threats research team uses this four step process every day, around the globe, and around the clock to ensure our customers receive the highest level of protection possible. If you are interested in learning more about our security services subscription for continuous threat protection, contact your local Dell SonicWALL partner or sales representative today.