Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified.

Slides:



Advertisements
Similar presentations
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Advertisements

Internet Filtering Requirements: CIPA and PA 212.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
What does it mean for school districts?. Protecting Children in the 21 st Century Act Signed into law by Congress in October 2008 Extension of Child Internet.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Jana Dixon Dawson Educational Cooperative
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Children’s Internet Protection Act Requirements Dave Dixon, Data Systems Analyst August 2014.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
CIPA Hearing Presented to The Board of Education September 16, 2014.
CIPA (Children’s Internet Protection Act) Helping You Succeed Schools and Libraries Division Washington, DC Newark Atlanta Chicago Orlando.
Laws and Rules That Govern Internet Safety Ashley Martin.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Centralized Logging and Reporting for Managed Security Services Providers.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
© 2015 CT State Library. All rights reserved. 2 Contacts Maria Bernier E-rate Coordinator CT State Library Scott Taylor.
OFFICE 365 APP BUILDER PROFILE: Druva
Web Content Security Unlock the Power of the Web
Presented to The Board of Education September 20, 2016
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Presented to The Board of Education September 6, 2011
Children’s Internet Protection Act (CIPA)
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Threat Management Gateway
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Presented to The Board of Education September 19, 2017
Presentation transcript:

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified Threat ManagementCyberoam Central Console (CCC)SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam UTM ensures CIPA Compliance

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Agenda of Presentation  What is CIPA?  Who needs to comply & why ?  CIPA Requirements  How Cyberoam UTM ensures CIPA compliance ?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use What is Children’s Internet Protection Act – CIPA?  CIPA is a Federal Law  Implementation rules issued by FCC (Federal Communications Commission)  Law enacted to address concerns about access to offensive content over the Internet on school and library computers

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Who needs to comply & Why ?  Any School or School District or Library that -Receives or wants to be eligible for E-rate funding for Internet Access or Internal Connections  CIPA enables schools, school districts or libraries to be eligible for E-rate funding program.  E-rate funding is a program that makes certain communications technology more affordable for schools and libraries.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use CIPA Requirements  Internet Safety Policy that includes Technology Protection measures that blocks or filters internet access to material that is: -Obscene, Child Pornography, Harmful to Minors, Inappropriate and -Secure s, chat room or any other form of direct electronic communications -Block unauthorized access (including hacking and unlawful activities) -Unauthorized disclosure of personal information of minors -Measures restricting access to harmful materials -Audits Cyberoam UTM satisfies the above requirements of CIPA and offers much more..

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Need of CIPA Compliance Solution  Requirement of solution that can -Ensure CIPA compliance  Implement and maintain compliance -Helps comply with least effort and cost input -Provide compliance reports in shortest time

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM ensures CIPA Compliance  Cyberoam UTM provides integrated Security over single platform  Cyberoam UTM features that ensure CIPA Compliance are  Web Filtering  Application Visibility & Control (for Application Filtering)  IM Archiving & Controls  Bandwidth Management  On-Appliance Reporting  Real Time Traffic Discovery  Cyberoam’s Layer 8 Technology (Identity based approach) apply to all UTM features  Inbuilt CIPA Compliance Policy

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Identity based Security Policy Controls  Unique Identity based Cyberoam Firewall available on UTM (integrated with all other security features)  No need of blanket policies  Admin can define the policies based on combination of Username, IP Address, Mac Address  Identity based Authentication, Authorization, Audits over single security device  Admin can create work profile based groups

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Know who is doing what in your Network with Cyberoam’s Layer 8 Technology Know who is doing what in your Network with Cyberoam’s Layer 8 Technology

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filtering feature  Industry’s most comprehensive URL database  44 million+ URLs in 82+ categories  Block, Control & Monitor website access of specific Users or Group  Blocks un-needed websites / categories  Blocks and inspect  HTTPS websites, Google Cached pages  All known proxies such as Ultrasurf etc  Enforce ‘Safe Search’ feature of Search Engines to filter inappropriate keywords  Educate healthy-usage policy by providing customized messages on blocked websites  On-appliance web category database  Surfing Pattern Privacy Premium

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filtering feature Unhealthy sites surfing

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Web Categories (82+)

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filter with Built-in CIPA Policy Implement CIPA policies with one click

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filter with Built-in CIPA Policy

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Safe Search Enforcement in Web Filter

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Google Search Report Filter Report on Keywords, Users, Time

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Application Visibility & Control Feature  Block unwanted applications  P2P (like Bit-Torrent), Anonymous Proxies  Games, Instant Messengers, Social Networking and many more  Allows control over combination of  Application, User, Time and Bandwidth  Bandwidth Management assures availability of critical applications

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Application Visibility and Control Username / IP Address Blocks over Applications

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use IM Archiving & Control feature User-specific and Group Level controls Archive Communication Control communication medium (chat, video, voice, file transfer)  Controls for Yahoo Messenger and Windows Live Messenger  User and Group specific Control over each IM communication mode  Control access, Chat, Voice, Webcam, File Transfer  Logs chat communications  Block use of specific keywords and regular expressions over chat  Filter chat logs based on user, time, IP, keyword to identify suspect in case of an incident  Scans malware

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam’s Granular Internet Access Controls Internet Bandwidth control Duration control Schedule Control Reporting Apply these controls on Students, Faculty Above controls can be applied to - Website, Instant Messaging, Applications Mark

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use  No Additional Purchase needed of hardware / service to access reports  iView: Cyberoam’s On-Appliance Logging and Reporting tool offers -Logs & Reports -Identity based reports  Pinpoints the exact user for the incident drill down reports -Helps in Security Incident Management, Compliance Management, Forensic Analysis -Real time Log Management for Security Incidents  Alerts on unauthorized attempts  Traffic Discovery feature -Real-time visibility into bandwidth utilization by user, protocol, application On-Appliance Reporting

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Top Web Users

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use User Based Web Surfing Reports

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Blocked Attempts Report Top Denied Categories

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Application Groups Report

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Search Engine Results

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM  Integrated Security over single platform  Identity based approach with Cyberoam’s Layer 8 Technology  Interface for achieving Unified Security Controls  Reduced TCO (Total Cost of Operations) -Best Quality of Security features -Lower expenditure -Ease of Management -Reduced cost of training and support -Future Ready with IPv6 -Ability to upgrade to future threats -Security subscriptions as needs grow

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM Features  Firewall  Intrusion Prevention System  Virtual Private Network (VPN)  Anti-Virus & Anti-Spyware  Anti-Spam  3G / WiMax Connectivity  Multiple Link Management  WLAN Security  Web Filtering  Application Filtering & Management  IM Archiving & Controls  Bandwidth Management  On-Appliance Reporting  Traffic Discovery

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Indicative Client List

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Testimonials “Cyberoam’s Identity based security gave us granular controls, resulting in complete visibility for student activities and their web surfing pattern. Cyberoam security made our institute CIPA compliant by ensuring the safety and security of our students.” “Implementing Cyberoam’s UTM was a major cornerstone of Pascack Valley’s ability to comply with CIPA regulations, a crucial step in maintaining eligibility for E-Rate technology funding assistance” Mr. Willie PICO District Network Administrator Pascack Valley Regional School District, USA “We need a simple solution to our content filtering dilemma. A content filtering solution is a mandatory requirement to meet CIPA compliance. The bevy of features in Cyberoam was an unexpected but welcome bonus” “The Cyberoam appliance has put everyone’s minds at ease now that our children are protected from harmful Internet sites. We can also tell the parents with confidence that their children are protected from such content. All this was achieved at a fraction of Websense’s cost and minimal operating effort” Mr. Dale Moncrief Chief IT Administrator, Valley Christian Academy Aurora, Ohio, USA

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM Product Range SMEEnterprisesSmall Offices 15wi, 15i, 25wi, 25ia, 35wi, 35ia 50ia, 100ia, 200i, 300i500ia, 750ia, 1000i, 1500i

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified FirewallVPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium IPv6 Ready Member of Internet Watch Foundation

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam Visionary in the Gartner UTM MQ 2010

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam is the only Network UTM vendor to receive this recognition this year Cyberoam recognized as ‘Security Innovator’ SC Magazine Industry Recognition

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use SC Magazine Five Star Rating – Seven Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch”  “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i  “console is well organized and intuitive to navigate”  “flexible and very powerful”  “this appliance is a good value for almost any size environment”.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use THANK YOU