Deep Dive Into SonicWall Security at the SonicWall World 2015 Software User Forum

During my 14 years with SonicWall Security (formerly SonicWall), I’ve never seen a greater need for powerful network security, and the SonicWall World Software User Forum provides a great opportunity for you to mingle with some of the most powerful minds in security today.

We’re excited to finally be able to host a dedicated security customer forum at this event. We’ve had a fantastic year and we can’t wait to show you our new lineup of SonicWall TZ Series firewalls, new SonicWall Secure Mobile Access (SMA) appliances and a few yet-to-be-released products. Some of the break-out sessions that I’m especially looking forward to are: Strategic Direction & Vision, SonicWall Next-Generation Firewall Technology overview, and How to make your network security future ready and, of course, the top secret band that will be performing.

Register for the SonicWall Security Track at the SonicWall World Software User Forum 2015 and learn how to address these security challenges head-on with direct access to engineers and experts for the security products you depend on every day. Some of the highlights include:

  • Learn practical methods for getting the most out of your SonicWall device
  • Get a sneak peak at the newest tech
  • Participate in hands-on tech labs

Experience the visionary keynotes from our leaders and industry experts in the SonicWall World 2015 general sessions Explore the SonicWall World Solution Showcase with partner and product demos highlighting the innovation and cutting-edge technology in mobility, cloud, big data, networking and more. Plus, enjoy the music of our secret special band at the Opening Night concert.

Take advantage of the Buy One Get One offer today. If you purchase one pass to the SonicWall World Software User Forum, we will include one additional pass at no extra cost for a colleague.

And here are more good reasons to not to miss out on SonicWall’s annual conference:

  • Attend 13 in-depth, security-specific sessions including:
    • Technology and roadmap deep dive for SonicWall next-gen firewalls
    • Advanced SonicOS management best practices
    • Advanced SuperMassive deployment best practices
    • Global Management System (GMS) as an enterprise firewall management console
    • Creating an enterprise “Clean VPN” solution using SonicWall products

There will be interactive discussions and access for you to speak to SonicWall product engineers, experts and executives. They will shed light on product direction and roadmaps for SonicWall products.

During my tenure, I’ve met many of you in-person, and I look forward to seeing you again. For those of you I haven’t met, I hope you will register for the event and join me for a handful of truly informational days at the Software User Forum.

It’s all yours from Oct. 20 through Oct. 22
at the Hilton Hotel in Austin, Texas.
Come help us paint the town blue!
(SonicWall blue, please)

SonicWall Security Helping Partners Close Gaps to Reduce Risk

Recently, I was privileged to spend three days at the SonicWall Security Peak Performance EMEA conference in Berlin, meeting and talking with more than 300 SonicWall  partners and customers from across Europe. Security is very much top of mind for our partners, and we know from the results of a SonicWall survey conducted ahead of the conference that advanced persistent threats are a chief concern for a majority of their customers.

Our partners have told us that security and innovation are number one and number two on every customer’s list, but they believe that only a tiny percentage of those customers are protected against today’s threats, which can result in the devastating loss of IP, productivity and customer data.

As cybercrime becomes ever more sophisticated, organizations must take the appropriate steps to protect the company, their customers and employees. At the same time, they need a dynamic IT environment that can support current trends such as mobility, cloud and SaaS. At SonicWall , we’re committed to ensuring our partners’ success by equipping them to help customers close security gaps, reduce complexity and mitigate risk by extending end-to-end security that both enables the business and protects from ever-evolving, sophisticated threats.

Events like SonicWall Peak Performance EMEA reflect SonicWall’s commitment to our partners and to building channel momentum around security solutions. Keynotes and general sessions, plus deep dive breakout sessions led by our security experts, armed partners at the conference with the most up-to-date knowledge of our security products, and a view of innovative security development planned for the future. We have almost 1,000 security specialists at SonicWall , and philosophically, they wake up every morning to team with a partner. And that scale is a major difference between us and some of our competitors.

In talking with partners at Peak Performance EMEA, it was clear they were fired up about our security strategy, and understood what it meant when we showed them specific integrations and how we can make those work for them. For example, when SonicWall’s Secure Mobile Access solution is combined with SonicWall’s Enterprise Mobility Container, we can enforce the company’s data loss prevention policy at the edge, ensuring the intellectual property contained within sensitive data does not leak.

The channel is showing tremendous enthusiasm and continuing to grow. Last year, SonicWall Software achieved 60 percent growth through the channel in EMEA, and that momentum is set to continue. With SonicWall’s end-to-end connected security strategy, we expand our security footprint and equip our partners to provide greater value to customers beyond what they may initially request. Partners are able to leverage our complementary security solutions, and, what’s more, can take advantage of new opportunities for sales, adding value through their advanced security expertise. SonicWall’s channel program continues to grow and develop, enabling our partners to benefit from access to our impressive customer network, and helping them build potentially lucrative relationships. The survey of partners attending Peak Performance showed, alarmingly, that respondents believe only three percent of organizations are adequately prepared for an attack. Although this statistic is frightening, it also demonstrates the business opportunities still available.

Via our advanced competency training courses in security, partners can build their expertise and specialize in security, helping them to corner this growing market. Last year saw a 41 percent rise in the number of EMEA partners achieving security certification ““ and, as our partners are reporting an average year-over-year revenue growth of 37 percent, it’s great to see the channel is benefiting from working with SonicWall .

We’re protecting over a million customers every day. In their capacity as advisors helping customers manage security, our partners play a critical role. Our goal is to ensure their success by giving them opportunities to leverage the knowledge and tools in the SonicWall Security arsenal, so their customers benefit from security solutions that both protect their organizations from threats, and enable them to succeed.

SonicWall Security Peak Performance North America is August 30 ““ September 2 in Las Vegas. I encourage partners to register for this event, visit”¦www.SonicWall peakperformance.com

Security Wins Big at Interop in Las Vegas

Las Vegas welcomed thousands of technology professionals last week for the annual Interop IT show to discover the most current and cutting-edge technology innovations and strategies to drive their organizations’ success. SonicWall Security participated in force, launching the new SonicWall TZ firewall line and demonstrating our innovative enterprise computing, networking and security product portfolios.

A highlight of the event for the SonicWall team was participating in the coveted Interop Best of Show awards. We were honored to have the SonicWall Secure Remote Access (SRA) series receive the prestigious “Best of Interop 2015 Security Winner” award.

Part of the SonicWall Secure Mobile Access solution, the (SRA) series appliances provide mobile and remote workers using smart phones, tablets or laptops “” whether managed or unmanaged “” with policy-enforced SSL VPN access to mission-critical applications, data and resources without compromising security. iOS, Android, Kindle Fire, Windows, and Mac OS X smartphones, tablets and laptops can securely access allowed network resources and data, including shared folders, client-server applications, intranet sites, email, and remote and virtual desktop services, all from a single gateway. Interested in learning more about how SonicWall Secure Mobile Access can held enable mobile productivity without compromising security for your business? Read our Ebook.

SonicWall Security and SonicWall Channel Partners: A Two-Way Street to Greater Security

As part of the SonicWall Network Security Group, we strive to expand the reach of SonicWall Security solutions across the globe using many tools of communication. Our mission is to get our top rated, most effective security solutions into every large, medium and small network across the planet. Part of our strategy to do that is working with excellent security VARs. VARs are absolutely key to customers deploying great security. VARs are often the trusted security advisors for companies of all sizes. We are honored to partner with as many top quality trusted security advisors, like Jason Hill of Exertis VAD Solutions pictured below, to protect as many customers as possible.

To transfer crucial knowledge, and to gain knowledge in return, we run Peak Performance events (our Partner Security Conference). SonicWall Security EMEA Peak Performance in Berlin just finished, and I had the opportunity to present and hear from our partners. To state the obvious, security changes FAST. Way, way too fast to assume everyone can keep up with it easily. And it is too complex to assume all information can be communicated in short emails, marketing blurbs, or webinars. Sometimes, information has to be transferred eyeball to eyeball. Don’t get me wrong. All those other forms of content are REQUIRED but sometimes, there is an extra effort needed.

That extra effort is face-to-face communications. And to my subtle point above (“. . . and to gain crucial knowledge”), we run SonicWall Security Peak Performance not just to give information, but to GET it. Security is far too complex to assume we know everything. Our VARs protect so many customers and are experts in their field. This gives them unique perspectives on what is working and what is not. So knowledge transfer is a two-way street at Peak Performance. We provide tremendous amounts of knowledge coming from the experts representing everything from engineering to business. We covered the technical bits and bytes and the strategy. We communicate about the things we see affecting customers and we predict what will be the new vectors of attack going forward. And our VARs communicate what success and pains their customers are experiencing. They educate us on the state of reality, not the state of a marketing messaging. They are feet on the street and ears to the ground. Our VARs have essential insights that we need and that we consume.

Patrick Sweeney on stage speaking at SonicWall Security EMEA Peak Performance 2015 in Berlin

SonicWall Security Peak Performance therefore is not something that can be done as a webinar. Webinars are one-way streets for the most part. Peak Performances are two-way streets. They are essential for both the SonicWall Network Security Group and to the VARs that protect customers. All have to come ready to learn. All have to be ready to educate. And in that spirit, I want to say,”Thank You.” Thank you to all the VARs that came, those that listened, those that spoke, those that learned, and those that educated. I cannot tell you how much it motivates me and my entire team to get those three days with you. Sometimes the difference between good and great is hard to define. But sometimes it is easy to identify one thing that does have a material impact. Getting together at Peak has a material impact on making the world just a little bit safer for our customers. Thank you!

We invite you to check out SonicWall Security Peak Performance for North America Aug. 30 to Sept.2 in Las Vegas.

SonicWall Security Named Grand Trophy Winner

On April 20, 2015, Info Security Products Guide, the industry’s leading information security research and advisory guide, announced the winners for its 11th Annual Info Security 2015 Global Excellence Awards. These prestigious global awards recognize security and IT solutions that have a profound impact on the Security industry. More than 50 industry leaders including CISOs, executives, and industry analysts and experts from around the world participated in the selection of the winners for 72 security and IT product and service categories.

Today, we are thrilled to announce that Info Security Product Guide has honored SonicWall as the Grand Trophy Winner as well as the winner of 12 additional awards outlined in the table below. These recognitions validate the feedback we get from our customers.

 Info Security Products Guide 2015 Global Excellence Grand

For nearly two decades, SonicWall Security has created innovative products that have set and reset the standard for security. Our technologies have continued to lead the way with an advanced patented security architecture in addition to a best-in-class security research team enabling our customers to be future-ready. SonicWall’s industry experience, innovative technologies and technical excellence to solve security and compliance challenges have made us the vendor of choice for many leading Fortune 500 organizations across all sectors. Receiving these honors affirms our deep commitment to investing in ongoing research and development as well as our unique dedication to helping our customers experience a more secured future.

Category Award
Grand Trophy Winners SonicWall (2,500+ employees)
Firewalls GOLD Winner: SonicWall SuperMassive 9800
New Products & Services Silver Winner (2,500+ employees): SonicWall SuperMassive 9800
Integrated Security &
Unified Threat Management (UTM)
Bronze Winner: SonicWall TZ Series
IP Sec/SSL/VPN Bronze Winner: SonicWall Secure Mobile Access (SMA)
Network Security & Management Silver Winner: SonicWall Global Management System (GMS)
Email Security & Management Bronze Winner: SonicWall Hosted Email Security
Auditing Silver Winner: SonicWall ChangeAuditor
Best Security Software (New or Updated) Bronze Winner: SonicWall One Identity-as-a-Service
Cloud Security Bronze Winner: SonicWall Cloud Access Manager
Compliance Bronze Winner: SonicWall ChangeAuditor
Identity Management Bronze Winner: SonicWall One Identity Manager
Endpoint Security Bronze Winner: SonicWall KACE K1000

If you are an IT leader responsible for your organization’s information and network security, defining the company’s security defense program and vetting security technologies can be a trying experience, especially when available choices are often equivocal. In these circumstances, how often do you find yourself looking for credible third-party endorsements such as the Info Security Product Guide Global Excellence Awards for guidance and validation prior to making critical purchase decisions? Before buying additional security technologies, here are some key recommendations to consider.

  1. Develop an information and user risk profile and determine the security controls that will be needed to protect the business from internal and external threats.
  2. Perform a comprehensive threat and vulnerability analysis and identify all possible ways users and systems can be exploited by cyber criminals.
  3. Explicitly call out security requirements that can best remediate identified threats, risks and liabilities that require immediate attention.
  4. Accurately map the award-winning SonicWall products listed above to the appropriate use cases identified in step 1 through 3.
  5. Last but not least, begin layering multiple security technologies together so that you have more than one way of preventing and responding to various attack methods that a hacker may use to harm the organization.