Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
IP-guard
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Barracuda Networks Steve Scheidegger Commercial Account Manager
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Cyberoam Complete Network Security for Banks. Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Training on ManageEngine Desktop Central
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Dell Connected Security Solutions Simplify & unify.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Take Control of Your Contracts with Dolphin 365, a Companion Product to Microsoft Office 365 That Leverages Your Investment and Reduces Risk OFFICE 365.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 7. Identifying Assets and Activities to Be Protected
Complete Network Security for Banks
Critical Security Controls
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Unit 27: Network Operating Systems
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Security Challenge of Computerized Corporation
Complete Network Security for Banks
Presented by ©2018|Solution Powered by Velox| Ver
Agenda The current Windows XP and Windows XP Desktop situation
Microsoft Data Insights Summit
COMPLETE BUSINESS TEXTING SOLUTION
IT Management, Simplified
Presentation transcript:

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Need for Data Protection

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Medical records of 741 patients lost by a hospital 60% corporate data lies unprotected on endpoints Lost USBs Lost Multimedia Discs Wrong Attachment Lost iPods Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Bank employee accidentally sent sensitive customer details to wrong address 12,500 handheld devices forgotten at the back of taxis every 6 months in UK 9000 USB sticks found in people's pockets at the local dry cleaners in UK

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy What Places Data At Risk? Applications Web, Mail, IM, P2P, Printing, FTP Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Insiders Unauthorized transfer of sensitive data; Malware-laden for information access; Sensitive data sent to wrong person Data At Risk Intellectual property related to R&D Business plans, RFP / Tender quotes Product launch dates and roadmap Customer data Malicious Unintentional

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Average cost of security breach - $202 per record lost Total cost per incident averages $6.6 million Immediate Need – End Point Data Protection Cost of Data At Risk

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Protect your Data. Protect your Assets.

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Comprehensive End Point Data Protection Suite Modules Data Protection & Encryption Device Management Application Control Asset Management

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Benefits Enhanced protection to all your Endpoints Across geographic locations Centralized controls Regulatory and Security Compliance Rapid installation Easy to use Maintains security with flexibility Clear ROI

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Data Protection & Encryption

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Prevent Data Leakage – Attachments  Control data shared as attachment in s  Send customized warning message to user and alert to administrator

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Record Data Shared over Webmails  Record content of Webmail such as Yahoo, Gmail & Msn

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Prevent Data Leakage - Attachments over Instant Messengers Attachment:.doc NOT ALLOWED File name: confident NOT ALLOWED Size: > 2 MB  Control data shared as attachment over Instant Messengers  Send customized warning message to user and alert to administrator.exe.jpg

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Before deleting Operation Modify Delete Fixed Floppy CD rom Removable Network Unknown.jpg.doc Before modifying Before copying/cut to Before copying/cut from Mode of Transfer File Name/Extn. Back up Read Document Prevent Accidental / Malicious Deletion of Data Selective Action & Back-up of Document Control operations over a document and its mode of transfer Back up files before specific actions

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server Prevent Data Leakage through Printed Files Copy of Printed File Saved in Database Server Control access to printers in the system Save shadow copy of printed file

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Encrypt entire device Attachment:.xls Attachment:.doc Attachment:.jpg Decrypt before reading Encrypt selected files Data Sharing Through Removable Devices Encrypt all/selected files while writing to removable device Decrypt files while reading from a removable device only in organization network - Data in your lost USB device cannot be decrypted and is safe Encrypts Data, Blocks Data Sharing

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Record Chat Sessions even for SKYPE Chat session logs Back up server

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Device Management

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Protect your Data by controlling data over device Allow only authorized devices Device Management Storage Device Communication Interface Device USB Device Network Devices Others Dial Floppy, CD, Burning device, Tape, Removable device Serial ports, parallel ports, modems, Bluetooth Dial-up connection USB keyboard, mouse, modem, storage, hard disk, others Wireless LAN adapter, PnP adapter, Virtual LAN adapter Audio equipment, Virtual CDROM, any new device

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Application Control

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Protect your Data by Controlling Applications Prevent data loss through unauthorized/indiscriminate use of applications Granular, policy-based application controls - Protect sensitive data & enhance employee productivity - Prevent legal liability, network outages IM tools Entertainment (MP3, MP4, MPEG) Pirated software Screensavers Password crackers

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Asset Management Protect your Assets

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Need for End Point Asset Management  Organizations exposed to higher levels of threats  Distributed offices  Rise in malware attacks  Tracking Hardware & Software assets  Management of hardware/software inventory  Sophisticated attacks – Targeting vulnerabilities  Need for timely patch implementation across –  Hundreds or thousands of devices  Geographic locations  Immediate need - Centralized, automated asset management

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Fighting Threats with Asset Management Protect your Assets Seamless IT infrastructure management Simplifies tracking of IT asset allocation, configuration, version, historical information Control over hardware, software costs Automates and centralizes Patch management Install Software Remotely Silently or in user-interactive mode Meets security compliance requirements Rapid and correct installation of patches Handling bug fixes across network, geographies

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy About Cyberoam

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Products Cyberoam UTM Cyberoam iView (Open source Logging & Reporting) Cyberoam Central Console (Centralized Management) Cyberoam SSL VPN appliance

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam CRi Network Security Appliances Large Enterprises CR 1500i CR 1000i CR 500i Small to Medium Enterprises CR 200i CR 300i CR 100ia Small Offices - Remote Offices CR 50ia CR 35ia CR 25ia CR 15i

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam Credentials  Awards  Gartner Positions Cyberoam as a Visionary in Magic Quadrant  Finalist in SC Magazine Awards 2009 for Best SME Security  Finalist in PC Pro Awards 2009  Emerging Vendor of the Year 2008 by Frost & Sullivan  IT Leader of the Year Award by ZDNet Asia  Channel's Favorite Security Company Award 2008 by VAR India  Certifications  Checkmark  ICSA Labs for Firewall  ICSA Labs for Firewalls with Active-Active HA capability  Member of VPNC

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy  Established in 1999  Team strength employees  Investment from global private equity firm The Carlyle Group  Domain – Communication, Networks, Security  Sales and distribution channel in over 75 countries  Product offering  Cyberoam  Cyberoam iView  Cyberoam End Point Data Protection  CRESTEL  EliteAAA  24online  24online Everywhere Elitecore Technologies

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Thank You Question / Answer Session Please visit us at

Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Thank You Please visit us at