Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. The Cyberoam Product Line The Present & The Future Notice: This.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Firewall Slides by John Rouda
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You What’s new in CyberoamOS Ver Build 304 Unified.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Chapter 7: Using Windows Servers to Share Information.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
ShareTech 2015 Next-Gen UTM.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
EarthLink Server Management and Monitoring Updated August 6, 2015.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Vantage Report 3.0 Product Sales Guide
Web Application Firewall (WAF) RSA ® Conference 2013.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Managed Security Vikas Khanduri CCIE#13516,CCSP,CCDP,CCNP,MCSE.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Module 7: Advanced Application and Web Filtering.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Security fundamentals Topic 10 Securing the network perimeter.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Instantly Deliver and Track Training to Learners Anytime, Around the World and on Any Device Within Your Office 365 Environment with LMS365 OFFICE 365.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Security fundamentals
BUILD SECURE PRODUCTS AND SERVICES
TMG Client Protection 6NPS – Session 7.
Barracuda Web Filtering Service
Securing the Network Perimeter with ISA 2004
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
What’s New in Fireware v12.1.1
Cybersecurity Strategy
Check Point Connectra NGX R60
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. The Cyberoam Product Line The Present & The Future Notice: This presentation contains confidential information, intended for private circulation only. Please do not circulate.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Agenda of Presentation A Glimpse at 2010 The Way Forward – 2011

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. A Glimpse at 2010

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. A Glimpse at 2010  Key Highlights -Cyberoam’s Version X Firmware -Wireless UTM Appliance range (CR15wi, 25wi, 35wi) for SOHO/ SMB -CR500ia, CR750ia UTM appliances for Mid Enterprise Segment -Terabyte capacity appliances for Logging-Reporting -Virtual SSL VPN Appliances -24x7 dedicated partner portal

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.  Awards & Accomplishments  Partner Programs, Events, Promotional Offers, Product Reviews A Glimpse at 2010 Recognized as Visionary in the UTM MQ 2010 Recognized as ‘Security Innovator’ (The only vendor to receive this recognition in 2010) And many more..

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. The Way Forward

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. RSA 2011 Conference RSA Event  Hear Cyberoam speak at the RSA 2011 Conference -Speaker: Abhilash Sonwane -Time: Tuesday, February 15 02:30 PM -Location: Red Room 102  RSA -Feb 14 – 18, Booth: # 723 -Location: Moscone Convention Center, SF

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam 2011 Website

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. New Look Cyberoam Website Revamp 2011

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Communicating Cyberoam USP and Key Messages Cyberoam Website Revamp 2011 And also internal banners…

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam 2011 Website Goals Cyberoam Website Revamp 2011  Simple & Easy Navigation  Relevant & Up-to-date content -Helps increase visitor’s stay on website  Focus on converting Website Visitors to Prospects  Whitepapers on -Layer 8 Technology -Threat-Free Tunneling Technology -Extensible Security Architecture -Security-Connectivity-Productivity

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. New Cyberoam UTM Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Launched in February 2011 New Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Throughput in MbpsCR 1000iCR 1000ia Firewall VPN AV IPS UTM Concurrent Sessions750,0001,200,000 10/100 Ethernet Ports-- 10/100/1000 Ethernet Ports1012 Disk Storage80 GB160 GB USB Ports22 Cyberoam CR 1000ia New Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam CR 1000ia New Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Throughput in MbpsCR 1500iCR 1500ia Firewall VPN AV IPS UTM Concurrent Sessions 1,000,0001,500,000 10/100 Ethernet Ports -- 10/100/1000 Ethernet Ports 1020 Disk Storage 80 GB160 GB USB Ports 22 Cyberoam CR 1500ia New Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam CR 1500ia New Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. New Appliances to be Launched in Subsequent Quarters Future Appliance Roadmap  Strengthening the Enterprise UTM Range  CR2500ia – Late Q Firewall Throughput – upto15,000 mbps -UTM Throughput – 1500 mbps

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. UTM Features under Development

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Latest Release for Version X (released Jan 2011) Miscellaneous  Features & Enhancements -4-Eye Authentication Support -VPN Connection Wizard -Web & FTP Detail Report with Time Stamp -Time Stamp for Anti-Virus, Anti-Spam, IPS and Mail Usage reports -Filter HTTP Traffic based on MIME Header -Multiple NTP Server support -Support for DHCP Custom Options and more …

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Key Features in the Pipeline Miscellaneous  Common Criteria Certification – EAL4+ - Q  Virtual Firewall Domain Support – Q  Enhanced Support for Multiple Languages (Internationalization of Cyberoam UTM) – Q2 / Q  FQDN Host Support – Q  Country based Access Rules – Q  Mixed mode Deployment – Q  Total Throughput/CPS Enhancement (ongoing)  VPN logging & reporting  VPN hardware acceleration – 750ia and Above  NTLM Authentication – Q  Rogue wireless detection  DNS Proxy

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Web Application Firewall – Cyberoam UTM Subscription

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Web Application Firewall - Overview Web Application Firewall  Objective of Offering -About 35% of Cyberoam customers have hosted websites protected by Cyberoam -Provide enhanced protection to Customers and a business opportunity to Cyberoam partners  Overview -Web-based applications published on the Internet  Traditional Firewalls and IPS not enough  Traditional firewalls cannot determine if a properly addressed packet contains a threat -‘OWASP Top 10 web-application vulnerabilities’ to be addressed for security and certification needs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Web Application Firewall – Need and the Market Web Application Firewall  Need of the Web Application Firewall -That can protect websites and web-based applications from hackers -Protects against OWASP Top 10 web-application vulnerabilities -Protect the web face of the organization and save time post incident  Market Forecast -To reach USD million in 2013 showing a CAGR of 24.6% over the period from Source: TechNavio

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Web Application Firewall Drivers Web Application Firewall  Compliance Management -PCI DSS, HIPAA, California Security Breach Information Act (SB- 1386), Japan's Personal Information Protection Law, Gramm-Leach- Bliley Act (GLBA), Basel II  Loss of reputation  Loss of revenue, customer and financial data.  Brand, trade secrets, Intellectual property.  Cyber-terrorism for the Government vertical

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam’s Web Application Firewall Web Application Firewall  WAF over the Cyberoam UTM appliances -A Subscription module  Inspect any incoming/outgoing data before it reaches/leaves the web server  Offer protection against OWASP Top 10 Web application vulnerabilities like -SQL injection, cross-site scripting, OS command injection, session hijacking, buffer overflows etc.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Outbound Spam protection for Service Providers UTM Subscription

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Outbound Spam – A major concern for Service Providers Outbound Spam protection for Service Providers  Rapidly growing problem for service providers like -Web hosting companies -SaaS providers -Internet access service providers -Free service providers -Onsite managed service providers  Sources of Outbound Spam -Zombies -Compromised Accounts -Malicious use of accounts

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Current solutions are not effective Outbound Spam protection for Service Providers  Use of standard inbound spam technologies in reverse -Unable to identify locally generated pattern -Unable to identify or track spammer  Blocking of Port 25 for outbound  Blocking entire ranges of IP addresses  Manual handling by the internal abuse team

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Consequences of Outbound Spam Outbound Spam protection for Service Providers  Significantly higher costs of providing service -Hire active service team to answer customer calls -Abuse team that manually solves problems -Risk of not meeting SLA’s  Corporate reputation can be damaged -Disgruntled and dissatisfied customers -Public broadcasting of spam by IP addresses of service providers  Blacklisted IPs  Chances of IPs getting blacklisted due to broadcasting of spam  Remediation efforts are poor, resulting in disgruntled customers -Customer service teams/abuse team or blocking IP addresses do no address the real nuisance of spam  Waste of Internet Bandwidth -Bandwidth crunch

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Antispam solution – Architecture Outbound Spam protection for Service Providers Sample s Service Provider Gateway Service Provider Outbound Zombie addresses Response team SenderID Tracking DB Outbound Spam Engine Spam Signature Cache Query Classification RFC 822 s Classification Spam, Bulk, Suspected Sample s Global Detection Center

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam’s Outbound Spam Protection Solution provides.. Outbound Spam protection for Service Providers  Real-time classification allowing fast detection and blocking of outbound spam.  Detection of locally-generated outbound spam as well as outbound spam that is part of a global outbreak. -Spotlight on a regional traffic: looking to detect local patterns with smaller amounts of traffic -Local RPD optimized to reduce false positives when looking at low volume patterns. -Local RPD detects local patterns as they occur. -Pattern samples are sent to Detection Center for further analysis.  Identification of spammers, and not just the spam, whether they be compromised accounts, zombies, or legitimate accounts used by spammers to send unsolicited s.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Enabling Partners as Managed Service Providers

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Enabling Partners as Managed Service Providers  MSSP Market -North America market: ~ $ 2.3 billion -High growth market  Traditional MSSP approach -MSSPs themselves spend on creating their own Security Services Operations Center (SOC) -Challenge of establishing entire infrastructure  Do not want to become an MSSP -How do you support your customers today? -Am sure we want things to be simpler than what they are today!

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Enabling Partners as Managed Service Providers  Objective of Service -Enable Partners to  Offer Post-Sale Support to customers  Move up the value chain  Become Managed Security Service Providers (MSSPs)  How will it work? -Central Service Management portal -Training and Certification for partners to ensure Partner ability and skills

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Central Service Management Portal Enabling Partners as Managed Service Providers  Cyberoam will provide Cyberoam Hosted Central Console (CHCC) infrastructure -To establish a data center hosting managed security services in the Cloud -Web portal enabling Cyberoam distributors/partners/resellers to provide Security Services to their customers. -Customer Account Management - Monitor and manage appliances using this portal

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. The Workflow Enabling Partners as Managed Service Providers

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Central Management Service Enablement Enabling Partners as Managed Service Providers  Technical Assistance : Chat, Ticket support  Network Monitoring & Alerts  Subscriptions Tracking  Configuration Backup Support  Patch Management  Reporting -Infrastructure Reports -URL Filter Reports -Vulnerability Reports -Firewall – System Logs & User Activity Logs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Training & Certification Enabling Partners as Managed Service Providers  Education with Training, Certification to ensure ability, skills  To ensure ability and skills on continual basis -Certification with one year validity and renewal with examination

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Central Management Service Plan Enabling Partners as Managed Service Providers Value Added Service for Cyberoam Resellers Service Rendered at No Charge to Partners Launch in: Q3-2011

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Sales & Service Relationship

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Hosted Central Console Account Hierarchy Enabling Partners as Managed Service Providers Where, Admin1, 2, Admin A1, A2, Admin B1, B2 and Admin C1, C2 are appliance administrators

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Central Management Service - Goals Enabling Partners as Managed Service Providers  Benefit to Partners -Increase in business revenue with an opportunity to move up the value chain without infrastructure investment -Strengthening relationship with Cyberoam and clients that Partners manage -Centrally manage distributed client deployments of Cyberoam UTM -Serve customers at lesser cost -Revenue Opportunity -Get timely: technical assistance, alerts, subscriptions tracking, patch management, reports and more -Reduced need to visit customer site for any support issue

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam Central Management Service - Goals Enabling Partners as Managed Service Providers  Benefit to Cyberoam -Strengthening relationship with partners -Reduced support calls -Faster Resolution of customer issues with personalized services

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Enabling Secure Home

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Secure Home Internet Appliance  The Internet is becoming a dangerous place for minors  1 in 5 children sexually solicited online  Only 18% of the most serious incidents are actually reported  Only 1/3 of the households with Internet access are proactively protecting their children!  Risks minors face when online: -Victim of child pornography -Victim of sexual abuse -Drugs and alcohol abuse -Intimidation, Annoyance & Harassment -Financial and personal information going out -Hackers & Crackers -Viruses & Worms Need for Home – Some Facts

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Need for Home – Some Statistics Secure Home Internet Appliance  32 percent of teens clear the browser history to hide what they do online from their parents. (Harris Interactive-McAfee 10/2008)  63 percent of teens said they know how to hide what they do online from their parents. (Harris Interactive-McAfee 10/2008)  11 percent have unlocked/disabled/ parental/filtering controls. (Harris Interactive-McAfee 10/2008)  52 percent of teens have given out personal information online to someone they don't know offline  Home network moving towards 1+ Computers & beyond computers  Guest Access required

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Limitations of existing Solutions Secure Home Internet Appliance  Software Parental Controls -Complex to configure and maintain -Most computer-savvy minors find ways around the software -Kids are having personal Desktops and Laptops  Kids want no software on my computer! -Difficult to install and manage as Internet Access today is not limited to Computers  OS based Parental Controls -Today, Internet access is using computers, iPAD, iPhone and more having different OS

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Need for Hack-proof Internet Security at Home Secure Home Internet Appliance  Nearly one-in-three adults worldwide report that someone has hacked into their computer  Worldwide reports show that Q Approximately 339,000 zombies were activated daily, almost 30,000 more per day than in the previous quarter  Limitations with Existing Solutions -Existing routers provide protection from unauthorized attempts only with a Firewall -Software Firewall/IPS only for Microsoft OS -Do you really turn it on? -Follow the UTM

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Gateway Anti-Virus at Home Secure Home Internet Appliance  Nearly 90% of the computers across the world are infected with virus or malware  What about bots and phone home malware?  Existing Anti-Virus solutions -Limited to Microsoft -What about Hand Held devices? -Follow the UTM approach

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Today’s Home Routers Secure Home Internet Appliance  Focusing on Connectivity  Security?  Productivity? Taking the UTM to homes

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Secure Home Internet Appliance: Codenamed Cyberoam NetGenie Secure Home Internet Appliance  Wireless Home Router / Gateway / AP market -Worldwide market in 2010: 1.8 billion USD -High growth market  What is Cyberoam NetGenie? -Secure Wireless Router for Safe Internet Surfing for Your Family  Protect your Home Network from Viruses & Hackers  Ensure Safe Surfing with Parental Controls  Share internet connectivity with multiple users, internet access devices  Easy set-up that allows you to go online in minutes Source: IDC

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam NetGenie Secure Home Internet Appliance  Target Segment - Families with kids and/or multiple computers, SOHO  Appliance Features: -Hardware  Router: Wifi (802.11n /b /g) + 3 Ethernet ports -Phase 1  Firewall  Parental Controls - In Cloud Content Filtering & Application Control Service  Anti-Virus, IPS & Application Control -Phase 2  ADSL  VPN for SOHO  USB – Shared connectivity from USB modem / data card  Phase 3  On Cloud Configuration & Reporting

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Questions?!?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. THANK YOU