Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Identity-based Unified Threat Management
1 Effective, secure and reliable hosted security and continuity solution.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introducing Quick Heal Terminator.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Cyberoam Complete Network Security for Banks. Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
ShareTech 2015 Next-Gen UTM.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
IS3220 Information Technology Infrastructure Security
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Securing Information Systems
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Barracuda Firewall The Next-Generation Firewall for Everyone
Complete Network Security for Banks
Web Content Security Unlock the Power of the Web
UTM Content Security Gateway
TMG Client Protection 6NPS – Session 7.
Barracuda Firewall The Next-Generation Firewall for Everyone
Critical Security Controls
Using Internet Layer 8 Reporting
Customized Solutions to your needs
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
Check Point Connectra NGX R60
Cloud Security for Endpoints
Complete Network Security for Banks
Presentation transcript:

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Agenda of Presentation  About Elitecore Technologies  Cyberoam UTM  Cyberoam Credentials/ Awards/ Accreditations

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Established in 1999  400+ Employees  ISO 9001:2000 certified company  Backed by World’s Largest Private Equity Group ($90bn)  Sales, Distribution Channel & Customers across 75+ countries  Communication - Networks – Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution About Elitecore Technologies

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Internal threats  Identity theft  Data loss  Data deletion  Data modification External threats  Worms  Malicious code  Virus  Malware Social Engineering threats  Spam  Phishing  Pharming  Data theft  DoS attacks  Hacking USER Attack on Organization User – The Weakest Security Link

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 8 Technology – Security around the User -Treats User-Identity as the 8th Layer in Network stack -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity-based security policies  Identifies traffic by username even in case of dynamic IP Layer 8 – The Human Layer indicates a feature unique to Cyberoam

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security User

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Cyberoam’s Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 – The Human Layer

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM- Identity-based Security  Integrated security over single platform  Layer 8 penetrates through each security module

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Intrusion Prevention Policies Anti-Malware Anti-Spam Web Filtering Layer 7 Controls Bandwidth Management & QoS Instant Messaging Archiving & Control Internet Surfing Quota Internet Access Time Internet Data Quota Cyberoam Audits Identity - based Logs + Reports MAC Id Session Id Cyberoam Layer 8 Advantage

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SecurityConnectivityProductivity Organizational Concerns  Network security  Content Security  Administrative Security  Business Continuity  Network Availability  Future-ready connectivity  Employee productivity  IT resource optimization  Administrator productivity

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES SECURITY Network SecurityContent SecurityAdministrative Security  Firewall  IPS  Wireless security  Anti-Malware  Anti-Spam  HTTPS Content security  Next-Gen UI  iView- Logging & Reporting

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Stateful Inspection Firewall (Fusion Technology) SECURITY » Network Security » Firewall -Interface for achieving Unified Security  Identity-based policies enable security, connectivity, productivity Fusion Technology

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Intrusion Prevention System signatures - broadest security cover -Internet Threat Response Team  Regular Signature updates -Quick protection against latest vulnerabilities -IPS Policy Tuner  Allows multiple IPS policies  Granular control over IPS policies -Unnecessary alerts -Reduced traffic latency -Improved performance SECURITY » Network Security » IPS

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Cyberoam IPS + Layer 8 Technology  Identity-based IPS policies per user or group  Identity-based alerts and reports -Visibility into applications – User, Source, Destination, Usage -Overview of threat status – Top alerts, top attackers, top victims SECURITY » Network Security » IPS

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Wireless (WLAN) Security -High performance, integrated security over WLAN  Secures wireless networks to the extent of wired networks -Supports n wireless standard -Layer 8 over WLAN  Identity-based policies in dynamic IP environment  MAC-based filtering  Supports IP-address pool -Enhances security SECURITY » Network Security » Wireless security

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Gateway Anti-Malware -4 million+ signatures -Bi-directional scanning of web & -Self-service Virus Quarantine -Reduced window of vulnerability  Broadest security cover against all malware -Scans  HTTP, FTP, SMTP, POP3  HTTPS, IMAP  Instant Messenger traffic -Layer 8 Impact  Identity-based virus reports -Instant visibility into attacker/victim  Identity-based Quarantine policies SECURITY » Content Security » Anti-Malware indicates feature offered only by top-rated UTMs

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam  Gateway Anti-Spam -IP Reputation Filtering  Blocks 85% of incoming messages at gateway -Saves bandwidth -Near 98% spam detection -False Positive rate of 1 in a million  Reduces fear of losing business s - Self-Service quarantine area

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -User-based Spam Digest  Frees administrator time & management -Manage recipients  Data leakage prevention and archiving -Scanning with Recurrent Pattern Detection (RPD) technology  Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 SECURITY » Content Security » Anti-Spam -Virus Outbreak Detection (VOD) for zero-hour protection -Scans SMTP, POP3, IMAP traffic

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam -RPD Technology -Most outbreaks last only a few hours -Cyberoam identifies outbreaks real-time -Signature-based Anti-Spam take time to release signatures -Users remain unprotected till Anti-Spam is updated -Too late to battle out the initial peak of attack

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  HTTPS/SSL Content Security -Scans SSL traffic for virus & malware -Controls File upload over SSL -Reports files uploaded via SSL -Stops HTTPS/SSL as a medium for  Data Leakage  Malware Propagation SECURITY » Content Security » HTTPS Content Security indicates feature offered only by top-rated UTMs

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Next-Gen UI -Web 2.0 technology advantages -Easy navigation, custom controls, intuitive interface  Fewer security errors - Increases security  Enhances administrative productivity  Shorter learning curves -Unified Security  Rules for all security features from firewall page SECURITY » Administrative Security » Next-Gen UI

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Cyberoam iView – On-Appliance Logging & Reporting -Ability to log and report activities -LAYER 8 - Identity-based logging and reporting – Pinpoints the user -Security Management  iView dashboard- Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  Reports -Log Management -Compliance Management  HIPAA, PCI DSS, GLBA, and more -Forensic Analysis SECURITY » Administrative Security » iView- Logging & Reporting

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES CONNECTIVITY Business ContinuityNetwork AvailabilityFuture-ready connectivity  Multiple Link Management  High Availability  VPN  3G/WiMAX modem support  IPv6

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Multi-Link Management -Automated Load balancing assures ROI/investment  Support for more than 2 ISP links  Supports Wireless WAN (3G USB modems) CONNECTIVITY » Business Continuity » Multiple Link Management 3G

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CONNECTIVITY » Business Continuity » Multiple Link Management -Link Failover  Supports multiple failover conditions  Monitors link availability of multiple WAN connections  Transfers traffic from a failed link to a working link -Maximizes business up-time -Optimizes link utilization for business continuity  Active-Active Auto Link Failover  Active-Passive Auto Link Failover  Support for more than 2+ ISP links  Supports WWAN for failover

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Layer 8 Policy-based Routing  Routes traffic based on: -Source IP addresses -Protocols -Users  Assures Quality of Service for key users and applications CONNECTIVITY » Business Continuity » Multiple Link Management

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  ICSA Labs Certified Active Active High Availability -Maximizes network uptime -Reduces single-point-of-failure -Ensures continuous Cyberoam security -Ensures business continuity CONNECTIVITY » Business Continuity » High Availability

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Virtual Private Network (VPN) -Anywhere, any device secure remote connectivity -Supports  IPSec, L2TP, PPTP technologies  SSL-VPN -Client-type independent Web access mode -Application access mode -Client mode  Threat Free Tunneling (TFT) Technology  Scans traffic entering VPN tunnel for: -Malware -Spam -Inappropriate content -Intrusion attempts -Maintains secure endpoint and network environments CONNECTIVITY » Network Availability » VPN

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  3G/WiMAX – USB Modem Support -High-speed wireless WAN (WWAN) -Wide ISP support -All gateway security features available  Can function as a main or failover link CONNECTIVITY » Network Availability » 3G/WiMAX modem support 3G

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization  Content Filtering  IM controls  Bandwidth Management  Traffic Discovery  Layer 7 Administrator Productivity  Next-Gen UI

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  IPv6  ‘IPv6 Ready’ gold logo -Cyberoam identifies and processes IPv6 traffic  Third-party validation -International Testing Program with rigorous test cases  IPv6 compliance to become mandatory in government and other enterprises -Driven by diplomatic initiatives CONNECTIVITY » Future-ready connectivity » IPv6

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Content Filtering -Industry’s most comprehensive URL database  82+ categories  44 million+ URLs -On-appliance web category database  Faster access  Surfing pattern privacy -Controls access to HTTP & HTTPS hosted websites  Increases productivity Productivity » Employee Productivity » Content Filtering

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Controls that are difficult to bypass  Blocks Google cache pages  Search keyword reports  Blocks embedded URLs  Detects/Blocks Third Party Proxy and Tunneling software -Controls access to Instant Messengers, P2P -Controls Data Leakage  Blocks files from uploading to web pages  Blocks file transfer through Instant Messengers Productivity » Employee Productivity » Content Filtering

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  IM Controls -Identity-based controls for Yahoo messenger and Windows Live Messenger -Scans malware -Logs and controls  Access  Conversation  File transfer  Voice/Webcam Productivity » Employee Productivity » IM controls

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Best of Breed Bandwidth Management/QoS -Application and Identity-based bandwidth allocation -Category wise Bandwidth management -Restrict Bandwidth usage for a combination of source, destination and service/service group -Schedule-based bandwidth allocation -Committed and burstable bandwidth Productivity » IT Resource Optimization » Bandwidth Management

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Traffic Discovery -Real-time visibility into bandwidth utilization by user, protocol, application -Provides visibility of unproductive usage of resources and threat incidence Productivity » IT Resource Optimization » Traffic Discovery

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 7 -Offers visibility and management over Application Layer 7 -Allows control over application, user, time and bandwidth  Essential for Cloud Computing -Bandwidth Management assures availability of business- critical applications -Controls bandwidth costs Productivity » IT Resource Optimization » Layer 7

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security VoIP Bit Torrent CRM ERP IM Application Web mail Internet Medium Quality High Quality Low Quality Application Layer 7 Visibility

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Multi-core Technology -High Security without compromising on performance -Multi-core processors  Parallel processing of Cyberoam security features -Real-time, Unified Security  Higher Throughputs -High-speed memory access to signatures  Security against advanced threats Cyberoam Architecture

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Extensible Security Architecture (ESA) -Ability to adapt to future security needs -Ability to support feature enhancements in future -Ready for future upgrades Vs ASIC Cyberoam Architecture

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Central Console

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Centralized controls and security management over remote networks  Reduces operational complexity and deployment time  Minimizes errors and lowers administration cost  Enables the MSSPs to have different personnel for managing different customer deployments  Ease of use with view of multiple devices and network status at a glance Cyberoam Central Console

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SSL VPN

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Supports remote access VPN users and site-to-site VPN connections  Accommodates between 50 to 1000 concurrent users  Policy-based resource access control  Zero-client administration  Flexibility in purchasing remote security solutions: -Virtual appliance mode -Dedicated appliance mode SSL VPN

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Dedicated SSL VPN appliance Deployment

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual SSL VPN Deployment Diagram

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Available as Open Source software and as Appliance  Ability to log and report activities from various devices/ vendors  Log Management -Near real-time log retrieval -Archival and Search facility  Security Management -iView dashboard – Shows network attacks on single screen Reports  Compliance Management -Reduces compliance costs -Single click access to reports - Simplified compliance management -Easy visibility into access by users Cyberoam iView

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Forensic Analysis -Reconstructing sequence of events in a security breach -Reporting stands in the face of legal scrutiny  Benefits -Security Benefits  Centralized control  Identifies attacks based on – -Attack Reports (Type of Reports) -Deviation from norm in access or usage of resources  Allows quick investigation and determination of cause of breach Cyberoam iView

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Compliance Benefits  Access and Usage logs of -Activity in critical applications, databases -Data transmitted to external entities  Enables setting user identity-based thresholds for acceptable use -Productivity Benefits  Shows deviation in resource consumption -Financial Benefits  Low capital requirements  Low technical manpower requirements Cyberoam iView

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam - Endpoint Data Protection

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Endpoint protection: -Across geographic locations -Centralized controls -Regulatory and Security compliance  Cyberoam Endpoint Data Protection suite -Data Protection & Encryption  Prevents data leakage through: - attachments -Web mail -Instant Messengers -Printed files  Encrypts files/device while writing data to removable devices  Document back-up prevents accidental/malicious data deletion Cyberoam - Endpoint Data Protection

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Device Management  Protects data by controlling data over: -USB device -Storage device -Network device -Communication Interface device -Others -Application Control  Protects data by controlling unauthorized/indiscriminate use of applications -Enhances employee productivity -Prevents legal liabilities, network outages Cyberoam - Endpoint Data Protection

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Asset Management  Offers IT infrastructure management  Automates and centralizes  Allows remote software installations  Meets security compliance requirements Cyberoam - Endpoint Data Protection

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Appliance Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other Appliances  Cyberoam Central Console -CCC 15 -CCC 50 -CCC 100 -CCC 200  SSL VPN Appliance -CR-SSL-800 -CR-SSL CR-SSL-2400  Cyberoam iView -CR-iVU25

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam CRi UTM Appliance Range  Large Enterprises -CR 1500i -CR 1000i -CR 500ia  Small to Medium Enterprises -CR 300i -CR 200i -CR 100ia -CR 50ia  Remote Offices -CR 35ia -CR 25ia -CR 15i

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Subscription Model

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Identity-based Firewall  VPN  Free SSL-VPN  Bandwidth Management  Multiple Link Management  On Appliance Reporting  Basic Anti-Spam (RBL Service) Basic Appliance

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)  Gateway Anti-spam Subscription  Web & Application Filtering Subscription  Intrusion Prevention System (IPS)  24 x 7 Tech Support & Warranty Bundled Subscriptions

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Bundled Subscriptions  TVS (Total Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Gateway Anti-spam Subscription -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 , phone and chat Tech Support  SVS (Security Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 , phone and chat Tech Support Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Emerging Vendor of the Year Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year Award in the Network Security Market

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SC Magazine Five Star Rating – Four Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch”  “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i  “console is well organized and intuitive to navigate”  “flexible and very powerful”  “this appliance is a good value for almost any size environment”.

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best Integrated Security Appliance Best Security Solution for Education Best Unified Security Tomorrow’s Technology Today , 2008 Finalist Network Middle East Award 2008 Finalist Channel Middle East Award VAR Editor’s Choice for Best UTM (2007) Finalist Global Excellence in Network Security Solution ZDNET Asia- IT Leader Of the Year Emerging Vendor of the Year for Network Security SMB Product of the Year 2008 – Best Content Filtering Awards

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele (Cont’d)

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Middle East Clientele

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Thank You