Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Introducing Quick Heal Terminator.
BalaBit Shell Control Box
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
CYBEROAM PARTNER PORTAL
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
[Name / Title] [Date] Effective Threat Protection Strategies.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
ShareTech 2015 Next-Gen UTM.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Module 7: Fundamentals of Administering Windows Server 2008.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Implementing Microsoft Exchange Online with Microsoft Office 365
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Centralized Management for Barracuda Networks products
Using Internet Layer 8 Reporting
CONNECTING TO THE INTERNET
Securing the Network Perimeter with ISA 2004
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Cloud Security for Endpoints
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data Protection Presented by: Shailesh Mecwan, Manager - Channel sales (Europe) Comprehensive Network Security CYBEROAM

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Agenda of Presentation  Why MSSP?  Drivers of MSSP business  Customer s’ criteria  Challenges of MSSP  How can Cyberoam help?  What is Cyberoam?  Cyberoam product range  Business Model  Questions and Answers

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  MSS market in Europe = USD 2.1 billion (in 2010)  Expected compound annual growth rate = 14 % Why get into Managed Security Services business in Europe?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Drivers for employing Managed Security Services (MSS) Source: Forrester Research

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer’s criteria to evaluate MSSPs  Ability of the MSSP to present their coverage of services -Comprehensive Security Management  Depth of Security Expertise  Help in taking decisions in real-time  Quality of Service -Delivery Capabilities -SLA’s  Cost  Compliance Requirements

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges of MSSP  Providing best quality of services to clients with least effort and cost -Provide higher coverage of managed security services -Centralized control of client network’s security  Policy setting, Modification, Monitoring Performance, Reacting to situations in time, Pro-active security management  Have a system that -Is simple to configure and manage -helps meet the SLA’s -Help customers to display compliance  Ability to offer flexible security plans to clients

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You How can Cyberoam help?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Stockholm Berlin Prague Group: Customer2 Cyberoam deployment scenario for MSSPs Vilnius Warsaw Paris Group: Customer1 MSSP Network Customer Appliances Boston Dubai New York Group: Customer3

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Internal threats  Identity theft  Data loss  Data deletion  Data modification External threats  Worms  Malicious code  Virus  Malware Social Engineering threats  Spam  Phishing  Pharming  Data theft  DoS attacks  Hacking USER Attack on Organization User – The Weakest Security Link

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You User Layer 8 – The Human Layer  Layer 8 Technology – Security around the User -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity-based security policies  Identifies traffic by username even in case of dynamic IP indicates a feature unique to Cyberoam

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Reduced complexity -All-in-one approach simplifies product selection, integration and support  Easy to deploy -Customers, VARs, VADs, MSSPs can easily install and maintain the products  Remote Management -Remote sites may not have security professionals – requires plug-and- play appliance for easy installation and management  Better Man Power Management -Reduction in dependency and number of high end skilled Human resources  Managed Services -Security requirements & day to day operations can be outsourced to MSSPs Benefits of UTM Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Ancy Richard Internet Corporate LAN DHCP Administrator  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address Steve Identity-based security in DHCP environment

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Cyberoam’s Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 – The Human Layer

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Gateway Integrated security over single platform  Layer 8 penetrates through each security module  Reduced TCO (Total Cost of Operations) -Best Quality of Security features -Lower expenditure -Ease of Management -Reduced cost of training and support -Ability to upgrade to future threats -Security subscriptions as needs grow Cyberoam UTM- Identity-based Security

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Know who is doing what in your Network with Cyberoam’s Layer 8 Technology Know who is doing what in your Network with Cyberoam’s Layer 8 Technology

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Cyberoam Audits Identity - based Logs + Reports Compliance Reports MAC Id Session Id Cyberoam Layer 8 Advantage

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam UTM solves Organizational Concerns

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam UTM Product Range SMEEnterprisesSmall Offices 15wi, 15i, 25ia, 25wi, 35ia, 35wi 50ia, 100ia, 200i, 300i500ia, 750ia, 1000ia, 1500ia

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Cyberoam Central Console is an centralized integrated management and monitoring appliance allows to manage multiple, dispersed Cyberoam UTM Installations.  Cyberoam Central Console helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam Installations centrally. Cyberoam Central Console (CCC Series)

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Boston Dubai New York Group: Customer2 Boston Dubai New York Group: Customer1 MSSP Network Customer Appliances Boston Dubai New York Group: Customer3 Virtual CCC deployment for MSSPs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Benefits of Virtual CCC appliances -Eliminates need for dedicated hardware -Use existing VMware environment -Simplifies future upgrades -Reduces cost of ownership Virtual CCC Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Server-basedWorkstation-based Virtual Workstation Application Server, Server

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC - Easy, instant security policy enforcement  Simplified security management -Centralized policy creation and implementation for Cyberoam UTM features like Firewall, IPS etc.  Leads to uniform adoption of security practices across offices  Establish policies based on work-profiles across offices -Subscription and signature updates for Cyberoam UTM features like Gateway Anti-virus, Anti-Spam etc. -Protection against zero-hour threats

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Ease and flexibility of management  Easy grouping of Cyberoam UTM appliances -Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions -Dynamic views in CCC help in managing, searching and sorting appliances -Customizable and multiple dashboards

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Security against misuse of administrator privileges  Role-based administration privileges -For CCC appliance -Individual Cyberoam appliances -Groups of Cyberoam UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs & alerts for organization-wide security visibility  Logs and views of administrator actions as well as dispersed UTM appliances -Instant security visibility -Supports regulatory compliance -Investigative analysis -Keeping track of historical activity  alerts -Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits etc. -Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count etc.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC Features & Benefits

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Use existing virtual environment to host CCC –VMware-based Virtual CCC appliances  Virtual CCC for VMware Server –CCC VMS 15, CCC VMS 50, CCC VMS 100, CCC VMS 200  Virtual CCC for VMware Workstation –CCC VMW 15, CCC VMW 50, CCC VMW 100, CCC VMW 200 Virtual CCC Appliance Product Range

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You iView - Cyberoam’s Logging and Reporting Tool  MSSPs can aggregate the reports of various customers  Free (Open Source)  Aggregation of logs and data from multiple CR appliances as well as competitor appliances, Squid, Access Gateway etc  Centralized storage of reports and log data  View reports of specific devices  Application Usage Reports  User-wise web surfing reports  Real-time Monitoring and Alerting  Over Drilldown Reports  Reports in HTML, PDF, & CSV formats & Alerts  Web 2.0 GUI and Reporting interface  Role based user access of iView

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You iView - Compliance Reports  PCI (Payment Card Industry)  HIPPA (Health Insurance Portability and Accountability Act)  GLBA (Gramm-Leach-Bliley Act)  SOX (Sarbanes-Oxley Act)  FISMA (Federal Information Security Management Act)

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Business Model

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Business Model 100% Channel focused company  Quick product support  Better margin  Access to Sales Leads  Lead locking facility  Marketing support  Access to comprehensive Knowledgebase  Technical and Sales training (free of cost)  Access to market development funds  Access to Cyberoam Partner Portal

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Q&A If any??

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you! Phone: (24X7)* Skype: shailesh.elitecore