Www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.............................................................................................................................................................

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Introducing Quick Heal Terminator.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Barracuda Web Application Firewall
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
Course 201 – Administration, Content Inspection and SSL VPN
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Cyberoam NG series: Future-ready Security
Future is Ready. Are You?. A Glimpse into the Future of networks…
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Future-Ready Security
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyberoam Complete Network Security for Banks. Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
ShareTech 2015 Next-Gen UTM.
Exploring the Network.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Computer Security By Duncan Hall.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Web Content Security Unlock the Power of the Web
Securing Information Systems
Web Content Security Unlock the Power of the Web
Barracuda Web Filtering Service
Real-time protection for web sites and web apps against ATTACKS
Presentation transcript:

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Harvard and Oxford Universities Hacked by D35m0nd142 Oxford University’s Begbroke Science Park website contained a vulnerability that allowed the hacker to access and leak information on their database. In the case of Harvard University, D35m0nd142 found a cross-site scripting (XSS) vulnerability on one of their webpages. Harvard and Oxford Universities Hacked by D35m0nd142 Oxford University’s Begbroke Science Park website contained a vulnerability that allowed the hacker to access and leak information on their database. In the case of Harvard University, D35m0nd142 found a cross-site scripting (XSS) vulnerability on one of their webpages. October 2012 NullCrew Leaks User Details from University of Leeds Website The hackers leaked database details, but also over 100 addresses, password hashes and usernames. NullCrew Leaks User Details from University of Leeds Website The hackers leaked database details, but also over 100 addresses, password hashes and usernames. Security in Educational Institutes

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Security in Educational Institutes The 2012 Global State of Information Security Survey, PwC 43% Education/Non-profit organizations in Europe have faced security incidents in the past 12 months 43% Education/Non-profit organizations in Europe have faced security incidents in the past 12 months 23% Education/Non-profit organizations in Europe are unaware about any security incident occurred 23% Education/Non-profit organizations in Europe are unaware about any security incident occurred

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Security in Educational Institutes Symantec Intelligence Report, November 2012 Spam rates Top 5 Verticals Source Phishing rates Top 5 Verticals Source Virus rates Top 5 Verticals Source

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Security Concerns of Educational Institutes “Students view harmful websites (violence, porn), access Bit Torrent and P2P applications for heavy/unauthorized downloads, and use proxy to bypass web controls” “Virus infected network leads to slower network performance and choked bandwidth.” “In shared working environments, students sometimes download inappropriate content to play pranks on the student who uses the same computer next.” “Uncomfortable pop-ups/ images spring up, leading to embarrassment, especially in presence of female faculty and students. “ “Students and faculty use bandwidth for unproductive surfing, leading to critical applications by key users being left with inadequate bandwidth.” “ Highest security within limited budget becomes tricky.”

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Challenge 1  Risk of virus, spam, spyware, adware infecting the network - Embarrassing pop-ups - Network slow-down  Unproductive/unauthorized downloads like games, videos - Bandwidth Choking - Inadequate bandwidth for key users and critical applications - Copyright and legal liabilities  Non-Academic activities  Non-compliance to regulatory requirements (such as CIPA, PCI) Access to Inappropriate Web Content & Applications

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Challenge 2  Lack of knowledge on who is doing what - Difficult to identify users engaged in non-academic surfing - Most security solutions identify the IP address and not actual users  Investigative and forensic analysis become difficult in case of wrongful usage of network  No real-time visibility into user activity in network Identifying users in shared computing environment

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Challenge 3  Embarrassing pop-ups  Network slow-down - Bandwidth Shortage - Bandwidth unavailable to critical applications and users - Productivity loss due to interrupted access to important resources  Loss of business-critical data  Institute network may be used to broadcast virus or as a botnet Virus, Spam and Spyware Spam

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Challenge 4 Wi-Fi, BYOD and Virtualization Server Virtualization Desktop Virtualization Protect students, staff and datacenter in virtual environment Protect students using cloud based collaboration applications Laptops and tablets are used in colleges, universities and schools Inability to trace user specific activity due to Dynamic IP environment Risk of Wi-Fi: Eavesdropping, Interception, Modification of data in transit Service disruption, Bandwidth loss

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Challenge 5  Security of websites from hackers/hacktivists  Hackers target - Servers (database server, server, etc.) - Vulnerabilities in web facing applications  Possible risk scenarios: - Hacked student database - Grades tampering - Leaked question papers - Stolen login passwords Security of Institute’s data centers/information assets We are anonymous Hackers leak 120,000 student records in raid on world’s top unis Harvard and Oxford Universities Hacked by D35m0nd142 NullCrew Leaks User Details from University of Leeds Website

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved What solutions we need?

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Technologies We Need  An integrated Gateway-level Security on a single platform  Reduced TCO (Total Cost of Operations) - Consolidated security - Lower CapEx, OpEx - Reduced cost of training & support

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved We need to control access to websites & applications  Web & Content Filtering - Blocks and inspects HTTPS sites & Google Cached pages - Control Google search by specific keywords  Application Control - Block unwanted applications like Proxy, P2P, Games, Chat, etc.  YouTube for Schools - Allows access to selected educational content - Blocks inappropriate & peripheral content such as ads, comments & links

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved We need to prioritize applications with Application Visibility & Control Medium Quality High Quality Low Quality School Management System Web mail P2P Chat CMS LMS TurnItIn Collaboration tools Internet Control over

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Needs an Identity-based AAA Audits Identity–based Logs + Reports Compliance Reports Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Authenticates User Name IP Address MAC Id Session Id Control over user network activities Who can connect to the network Who can access what What have they accessed Control over user network activities Who can connect to the network Who can access what What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions Faculty Student Management Users

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved On-appliance Logging and Reporting  In-depth reports - Real time visibility into user and network activities - Identifying attackers/victims for quick corrective actions  Security & Compliance management - HIPAA, GLBA, SOX, PCI, FISMA  Forensic Analysis capability Compliance Reports Dual Dashboard - Traffic & Security Dashboard Application Reports

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Threat Protection Protection from Virus, Spam and Spyware  Anti-Virus & Anti-Spyware -Bi-directional scanning: Web & -Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic -4 million+ signatures  Anti-Spam (Inbound/Outbound) -Scans SMTP, POP3, IMAP traffic -Scanning with Recurrent Pattern Detection (RPD TM ) technology -Virus outbreak detection for zero-hour protection Intrusion Protection  Intrusion Prevention System -Protection of servers (database server, server, etc.) -Identity-based IPS policies per user or group signatures - broadest security cover  Web Application Firewall -Protection of websites and web servers from hackers -Prevents hackers from exploiting Web-Application Vulnerabilities (OWASP TOP10, etc.)

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Security in Wi-Fi & BYOD Scenarios  High performance, integrated security over WLAN  Identity-based policies in Dynamic IP environment  Identity-based AAA over personal devices in institute network

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Ensure security of Virtual environment Securing Virtual Datacenter Office in a box Security in a box (for multiple locations) Note: UTM, CCC and iView are also available as hardware appliances. Complete Virtual Security solution

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Education Clients “As a School, it remains our primary responsibility to ensure that our students are not exposed to any obscene material over the Web. I chose Cyberoam because of its excellent pricing and Technical Support, and because its performance is second to none of the others.“ Mr. Mike Slater Network Manager Darrick Wood School, Orpington, UK “The Cyberoam appliance has put everyone’s minds at ease now that our children are protected from harmful Internet sites. We can also tell the parents with confidence that their children are protected from such content. All this was achieved at a fraction of Websense’s cost and minimal operating effort” Mr. Dale Moncrief Chief IT Administrator, Valley Christian Academy Aurora, Ohio, USA TestimonialsUK Clients Global Clients

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Education Clients “As a School, it remains our primary responsibility to ensure that our students are not exposed to any obscene material over the Web. I chose Cyberoam because of its excellent pricing and Technical Support, and because its performance is second to none of the others.“ Mr. Mike Slater Network Manager Darrick Wood School, Orpington, UK “The Cyberoam appliance has put everyone’s minds at ease now that our children are protected from harmful Internet sites. We can also tell the parents with confidence that their children are protected from such content. All this was achieved at a fraction of Websense’s cost and minimal operating effort” Mr. Dale Moncrief Chief IT Administrator, Valley Christian Academy Aurora, Ohio, USA TestimonialsPhilippine Clients

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved Question and Answer