Www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting www.cyberoam-iview.com.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
© 2010 Quick InfoTech Limited CONFIDENTIAL: For limited circulation only © 2008 MindTree Consulting© 2010 Quick InfoTech Private Limited CONFIDENTIAL:
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
BalaBit Shell Control Box
Which server is right for you? Get in Contact with us
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
11 Public Safety Recording – Sharing Resources Quality, Accountability, Reliability. and Performance for the Mission-critical Environment Western Regional.
A Product of HR Applicant Tracking System Online HR Solutions for seamless recruiting process management Copyright © ANGLER.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Citrix Partner Update The Citrix Delivery Centre.
CYBEROAM PARTNER PORTAL
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
New SonicWALL Security ESA 3300 & ESA 4300 Appliances For SonicWALL Sales and SonicWALL Partners Allen Schoonmaker Product Line Manager
Database Environments Assignment Two By Benjamin Turner Assignment Two By Benjamin Turner 8/24/2015.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
IBM OEM Storage Services Overview ENTERPRISE SERVICES.
(C) 2008 Clusterpoint(C) 2008 ClusterPoint Ltd. Empowering You to Manage and Drive Down Database Costs April 17, 2009 Gints Ernestsons, CEO © 2009 Clusterpoint.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialLisbon 1 For Cisco Partners…
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. For Internal Use Only SharePoint Insights (BETA)
Easily Organize Common Templates, Phrases, Statements and More to Quickly Reuse Within Microsoft Office 365 Using Dolphin Compose WHAT WE OFFER Replace.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. P.
© 2013 Manthan Software Services India Pvt. Ltd. iCLM – Intelligence driven Contracts Lifecycle Management Solution.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. P.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
UTM Content Security Gateway
InGenius Connector Enterprise Microsoft Dynamics CRM
What is the McAfee Compatible Solutions Center?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Unit# 5: Internet and Worldwide Web
Features Overview.
Presentation transcript:

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting 1.Cyberoam iView Overview 2.Cyberoam iView Appliance 3.Deployment Scenario 4.Open Source Downloads 5.Screen Shots Cyberoam iView - Intelligent Logging & Reporting

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam iView – An Overview

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Dupont’s confidential data stored in Electronic Data Library (EDL) server  Former DuPont research scientist stole proprietary technical information valued at $400 mn  Downloaded 22,000 abstracts  Viewed 16,700 PDF documents  Majority of compromised data irrelevant to employee’s areas of research  Stolen data covered DuPont’s technology and product lines  Few in R&D stage  Internal probe by Company revealed  Unusually high EDL usage  Huge volume of abstracts and reports accessed  Employee’s behavior discovered from database access logs Internal Threat

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  In 2007, Monster.com lost personal information of more than 1 million people  A Trojan horse, Infostealer.Monstres, stole records of people posting resumes on Monster.com  Personal details like name, address, home address, phone numbers and resume ID stolen  Details uploaded to a remote server under the control of attackers External Threat

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Verus, Inc. exposed an untold number of patient account information on the web  Company built and maintained Websites and services for hospitals nationwide  A Verus, Inc. employee forgot to restore a firewall after transferring data between servers  The company went out of business  About 90,000 patients involved in the breach External Threat

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Organizations require a complete security picture  Logging & Reporting tells the Who, What, When, Where and How of organization’s activities  Centralized logging & reporting delivers visibility across -  Devices  Systems & Solutions  Locations  Irrespective of vendor-specific devices or solutions  Security Information & Event Management (SIEM) Market  $1.1bn SIEM market by 2011  Rise of 19.3% CAGR through 2012 Need for Centralized Logging-Reporting

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Intelligent Logging and Reporting solution  Ability to log and report activities from various devices/vendors  Networking Devices  Security Solutions  Applications  Servers  Operating Systems  And more  Unique ability – Shows “Who is doing What”

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Log Management  Near real-time log retrieval  Archival and Search facility  Security Management  iView dashboard – Shows network attacks on single screen  Drill-down reports – 3 rd level drill-down for attack details  Identity-based logging and reporting – Pinpoints the user  Reports Features of Cyberoam iView

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Compliance Management  Reduces compliance costs  Single click access to reports - Simplified compliance management  Easy visibility into access by users  Forensic Analysis  Reconstructing sequence of events in a security breach  Reporting stands in the face of legal scrutiny Features of Cyberoam iView

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting Security Benefits  Centralized control  Identifies attacks based on –  Attack Reports (Type of Reports)  Deviation from norm in access or usage of resources  Allows quick investigation and determination of cause of breach Compliance Benefits  Access and Usage logs of  Activity in critical applications, databases  Data transmitted to external entities  Enables setting user identity-based thresholds for acceptable use Benefits of Cyberoam iView

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam iView Appliance

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Custom built appliance for Cyberoam iView logging and reporting  High Capacity Terabyte storage  Data Redundancy - RAID Technology  Hardened OS for security against attacks and system downtime  Fine-tuned software optimized for hardware and high capacity  Central reporting and storage for logs from multiple devices Appliance Features

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Custom built Hardware  Enables better stability and performance  Turnkey Logging & Reporting Solution  Save Time & Cost for deployment  Single point of contact for Support  Terabytes of storage space  Meets compliance needs  Long-term reporting/archiving needs in Enterprises  Data Redundancy  Faster data retrieval, event investigation  Storage reliability  Safety of logs, reports in case of disk failure  Reliable support through telephone, chat and  8x5 and 24x7 support  Annual Maintenance Contracts Appliance Benefits - Customers

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Custom built Hardware  Enables better stability and performance  Turnkey Logging & Reporting Solution  Save Time & Cost for deployment  Single point of contact for Support  Provide Value for money to Customers  Addition of Independent Logging & Archival solution to the partner offering  Out of box support for multiple network devices like Linux, Squid, Cisco, Fortinet, Sonicwall etc  Support for any Syslog enabled device  Turnkey offering for Multi appliance deals along with central reporting Appliance Benefits - Partners

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Logging-reporting for –  All security solutions in their portfolio  New network devices that are added continuously  Expanded portfolio & sales potential  Upsell to existing customer base with multiple security solutions or devices  Add new customers  Meet MSSP needs  Target the Compliance driven market  Added revenues and profitability  Cyberoam support in meeting sales objectives Appliance Benefits - Partners

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CR-iVU Series Intelligent Logging & Reporting SpecificationsCR-iVU 25CR-iVU 100CR-iVU 200 Total Hard Drive Capacity500GB/R11.5 TB/R53TB/R5 RAID storage ManagementYesYes (1,5) Number of Hard Drives 2 (500 GB)4 (500 GB)4 (1 TB) RAM 1 GB2 GB4 GB Events per Second (EPS) Devices Recommended

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Integration with Vendors/Devices

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Firewall  Linux Iptables / Netfilter firewall  UTMs  Cyberoam  Fortigate  SonicWall  Cisco  HTTP proxy  Squid  Any System with Syslog Support Devices Supported

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Deployment Scenario

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting Cyberoam iView integrated with multiple devices & locations

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting  Free to download from Sourceforge.net   High number of downloads  Total Downloads till date– Open Source Downloads

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Screenshots

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Main Dashboard Gives At-a-glance View of Organization’s Security Scenario

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Multiple Traffic Reports on a Single Screen

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You User Identity-based In-Depth Reporting

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you