Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Confidential Information Disclosure Movable Storage · Instant Message · P2P Dialup · Printout Security Challenge of Computerized Corporation Stealing.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
IP-guard
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved.
CYBEROAM PARTNER PORTAL
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
SP2 Mikael Nystrom. Agenda Översikt Installation.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
eScan Total Security Suite with Cloud Security
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Tim Vander Kooi Systems
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Module 1: Installing and Upgrading to Exchange Server 2003.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
Module 7: Fundamentals of Administering Windows Server 2008.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Configuring Data Protection Chapter 12 powered by dj.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Module 2: Installing Exchange Server Overview Introduction to the Exchange Server 2007 Server Roles Installing Exchange Server 2007 Completing the.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Planning File and Print Services Lesson 5. File Services Role The File Services role and the other storage- related features included with Windows Server.
Introduction to Barracuda IM Firewall
Module 9: Preparing to Administer a Server
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
2016 Citrix presentation.
Security Challenge form Computerized Corporation
Infrastructure, Data Center & Managed Services
Unit 27: Network Operating Systems
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
An Introduction to Computer Networking
PpT宝藏制作最新科技模版设计图案.
Security Challenge of Computerized Corporation
Bethesda Cybersecurity Club
Module 9: Preparing to Administer a Server
Designing IIS Security (IIS – Internet Information Service)
Comodo Dome Data Protection
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam - Endpoint Data Protection

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Agenda of Presentation About Elitecore Technologies EPDP Components Licensing Product Walk-Thru

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. About Elitecore Technologies  Established in 1999  400+ Employees  ISO 9001:2000 certified company  Backed by World’s Largest Private Equity Group ($90bn)  Sales, Distribution Channel & Customers across 75+ countries  Communication - Networks – Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam - Endpoint Data Protection

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. EPDP Components o EPDP Server HDD capacity requirement formula –Avg. log size : 5MB/User (8 hours) –Example: Logging enabled for 400 users for 2 weeks(400u*5MB)*14days=28GB minimum reserved free HDD space. Recommended HardwarePentium IV 2GHZ/512MB Memory/50GB HDD space DatabaseSQL Server 2000 SP4 or above / SQL Server 2005 SP1 or above MSDE SP4 / SQL Server 2005 Express OSWin2000 SP4/XP SP2/2003 SP1/Vista & Win 7 (32-bit)

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. EPDP Components (cont..) o EPDP Console o EPDP Agent Recommended Hardware Pentium III 1GHZ/256MB Memory/4 GB HDD space DatabaseNA OSWin2000 SP4/XP/2003/2008/Vista & Win 7 (32-bit) Recommended Hardware Pentium III 500 MHZ/128MB Memory/1 GB HDD space DatabaseNA OSWin 2000/XP/2003/2008/Vista & Win 7 (32-bit)

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. 1.Device Management o Access policy for storage devices, communication devices, dialup connection, USB device, network devices etc. 2.Application Control o Application access policy for virtually any application residing on a user’s machine. 3.Asset Management o Inventory management. o Patch management. o Vulnerability management. o Remote software deployment. Licensing Modules

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. 4.Data Protection & Encryption o Document Control. o Encryption over Removable Devices. o Control. o IM Control. o Printer Control. o Shadow Copy. Note: Pricing is based on per user licensing. Licensing Modules (cont..)

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Agent Installation methods Direct InstallationManual installation of agent using “agent install generator”. Remote InstallerPush agents on user’s machine using inbuilt remote installer utility. Admin access to the machine required. Logon Script Implementation Push agents from domain controller using login scripts.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Product Walk-Through

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Console Login & Dashboard

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Role based administration

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Computer/User level policies Computer level policies are applicable to all users logging in from the computer. o Cyberoam EPDP scans all the user logins once a computer is visible in the console. o All the users will then be visible in the ‘Users’ tab. o Admin can assign different policies for each user logging in from the same machine. o Some features are not available in user based policies.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Logging is enabled by default for everyone. Default Policy

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Sample Events Log Logging of basic events along with time stamps o system startup/shutdown o login/logoff o dialups o patches applied o software deployed. Application logs showing application name, start/stop time along with time stamps.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Logging of shared resources accessed on the computer by other users/computers. Logs creating, accessing, modifying, renaming, copying, moving, deleting, restoring, uploading of documents over fixed disk, floppy disk, CD-ROM, removable & network disks. Sample Events Log (cont..)

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Logs showing all documents, images printed along with the printer used (i.e. local, network, shared or virtual) & the time stamp. Sample Events Log (cont..) Logging of removable storage plugged in/out on the computer

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Sample Events Log (cont..) Hardware & Software change log.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Audit Log Cyberoam EPDP records the policy changes made at the computer/user level, group level or at the network level.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Monitoring Logs (Instant Message) Logs chat conversations of various messengers like Yahoo, MSN, ICQ, QQ, Skype etc. Instant Messaging (IM) Logs Chat conversation logs File upload, download Search on  Content of chat conversation  UserId/Nickname

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Monitoring Logs ( s) Logs incoming/outgoing SMTP, POP3, Exchange s & outgoing Lotus, Webmail s. logs content, attachment Protocols: SMTP/POP3 Applications – Exchange, Lotus Notes Webmail – Hotmail, Yahoo Mail Search by  Application, sender/recipient  Subject & Attachment – File name, extension, size

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Basic Policy 1.Basic The administrator can regulate the computer operation rights of a user. It helps restrict the end user not to easily change the system settings preventing them from performing malicious activity.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Basic Policy 2.Device control policy Allows the administrator to block storage, communication, dial in, USB & network level devices.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Basic Policy 3.Application control policy Allows the administrator to limit the use of unwanted applications. Application grouping: Tools  Classes Management  Applications

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Advanced Policy 1. Policy policy prevents data leaked via s. It can control outgoing s based on sender, recipient, subject line, attachment type, size etc.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Advanced Policy 2.IM File IM policy is used to control the communications over instant messengers. The administrator can monitor/control files transferred via IM preventing data leakage through IM channels.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. 2.IM File (cont..) Monitoring files by taking a backup of the files tranfferred over IM

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Advanced Policy 3.Printing Policy Printing policy is used to control the use of different kinds of printers such as local, shared, network and virtual printers to prevent information leakage. Printing policy to block access to all printers Printing policy to allow access to network printer only. Enable ‘Record Mode’ to log the image or doc that is being printed. All recorded images can be viewed from Event Logs  Printing

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Advanced Policy 4.Removable storage policy To prevent information leakage through removable devices, System administrator can apply removable-storage policy and assign different rights to removable storages. Also, the files can be encrypted when writing to the removable storages, only authorized agents can decrypt the files. Removable storage grouping: Tools  Classes Management  Applications

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Advanced Policy 4.Removable storage policy (Encryption) The files can be encrypted when writing to the removable storages, only authorized agents can decrypt the files. Contents of the original file to be copied to the USBContents of the encrypted file when opened from the USB

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Advanced Policy 4.Removable storage policy (Disk Encryption) To prevent data leakage through removable storage, one can encrypt the entire USB disk. Thereafter, any files copied to the USB would be encrypted. Only authorized agents with ‘decrypt when reading’ rights would be able to view the original content. Removable storage grouping: Tools  Classes Management  Removable StorageFor Disk Encryption plug the USB on the Cyberoam EPDP Server

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Asset Management 1.Asset Management Cyberoam’s Asset Management module for Windows enables organizations to simplify tracking of their hardware and software asset location, configuration, version tracking, and historical information, allowing streamlined IT infrastructure management.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Asset Management 2.Patch Management End Point Data Protection Solution frequently checks for Windows operating system patches. It automatically downloads, distributes, and installs the patches if one is found, to the machines on which the agents are installed.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Asset Management 3.Vulnerability Management Vulnerability check function automatically scans the internal network computers and process analysis to help System administrator to check and trace the vulnerability problems. Follow the resulting suggestion to take timely response measures to enhance the security of all internal computers.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Asset Management 4.Deployment Management System administrator can install software, run an application, and deploy files to agent through Endpoint Data Protection console. Software can be installed to the agent by simply creating a deploy task.

Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Thank You Contact us on Thank You