Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introducing Quick Heal Terminator.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
|ESDS SOFTWARE SOLUTION PVT. LTD.| Enterprise Datacenter Management Suite.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
All-In-One Security Overview The most benefits for your dollar, period.
Unified Logs and Reporting for Hybrid Centralized Management
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam: Channel’s Most Preferred UTM Player Cyberoam: Channel’s.
CYBEROAM PARTNER PORTAL
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Norman SecureSurf Protect your users when surfing the Internet.
Product Demo. Terminal Services Log By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Technology.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You What’s new in CyberoamOS Ver Build 304 Unified.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Barracuda Load Balancer Server Availability and Scalability.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
WORLDTECH SOLUTIONS IT Infrastructure Optimization & Management Solutions.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Module 7: Fundamentals of Administering Windows Server 2008.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
1 Management Information Systems NYC Human Resources Administration Richard Siemer – Deputy Commissioner MIS.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
Centralized Management for Barracuda Networks products
2016 Citrix presentation.
Virtualization & Security real solutions
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Healthcare Cloud Security Stack for Microsoft Azure
Cloud Security for Endpoints
Healthcare Cloud Security Stack for Microsoft Azure
Presentation transcript:

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central Console (CCC) Hardware Appliance

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Agenda of Presentation  Need for Centralized Security Management  About Cyberoam Central Console (CCC)  How Cyberoam Central Console (CCC) Helps?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Need for Centralized Security Management

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges – Large enterprises with distributed networks  Security challenges -Zero hour threats at weakest points of entry, the remote and branch offices  Includes Viruses, worms, Trojans, blended threats, phishing, pharming  Lack of qualified technical manpower to handle threats delays effective response -Inadequate controls and visibility into remote network activity leads to poor governance -Possible misuse of remote administrator privileges

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges – Large enterprises with distributed networks  Productivity challenges -Higher costs in deploying, upgrading and managing multiple network security devices -Inability to pursue single, uniform security policy across branch offices  Inconsistency in applying IT Security practices across locations  Reduces response time against new threats  Can’t check individual devices for connectivity status, managing subscriptions etc. -Inability to push work profile-based policies to remote locations  E.g. Internet access policy, web surfing trends, corporate bandwidth policy

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges – MSSPs  MSSPs face same set of challenges as enterprises + additional issues due to -Managing various clients having different security needs  Flexibility desired to build custom policies for different clients in quick time  Pro-active approach to avoid threats and vulnerabilities  Ability to offer flexible security plans to clients as per -Subscriptions modules -Licensing modules -Range of security solutions  Quality of Service -Delivery Capabilities -SLA’s

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You About Cyberoam Central Console (CCC)

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  CCC is for centralized, integrated management and monitoring of Cyberoam UTM devices -Offers complete control over distributed networks from head office (H.O.) or Security Operations Center (S.O.C.) of MSSPs  Available as -Hardware CCC Appliances -Virtual CCC Appliances About Cyberoam Central Console (CCC)

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000 -Support up to 1000 Cyberoam UTM appliances CCC Hardware Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Use existing virtual environment to host CCC –VMware-based Virtual CCC appliances  Virtual CCC for VMware Server –CCC VMS 15, CCC VMS 50, CCC VMS 100, CCC VMS 200  Virtual CCC for VMware Workstation –CCC VMW 15, CCC VMW 50, CCC VMW 100, CCC VMW 200 Virtual CCC Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Server-basedWorkstation-based Virtual Workstation Application Server, Server

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Benefits of Virtual CCC appliances –Eliminates need for dedicated hardware –Use existing VMware environment –Simplifies future upgrades –Reduces cost of ownership Virtual CCC Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC deployment for Managed Security Service Providers Cyberoam UTM Appliance MSSP NetworkCustomer Appliances Group: Customer1 Boston Mumbai Dubai Group: Customer2 London Mumbai Sydney Group: Customer3 US Brazil Dubai Group: Customer4 NZ Mumbai Kenya OR CCC

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC deployment for Enterprises Cyberoam UTM Appliance Corporate Head Office Branch Offices Boston Mumbai Dubai New York OR CCC

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You How Cyberoam Central Console (CCC) Helps

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC - Easy, instant security policy enforcement  Simplified security management -Centralized policy creation and implementation for Cyberoam UTM features like Firewall, IPS etc.  Leads to uniform adoption of security practices across offices  Establish policies based on work-profiles across offices -Subscription and signature updates for Cyberoam UTM features like Gateway Anti-virus, Anti-Spam etc. -Protection against zero-hour threats

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Easy, instant security policy enforcement Add UTM appliances Grouping of UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Configure UTM appliance from CCC CCC – Easy, instant security policy enforcement

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Easy, instant security policy enforcement Update configuration of UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Ease and flexibility of management  Easy grouping of Cyberoam UTM appliances -Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions -Dynamic views in CCC help in managing, searching and sorting appliances -Customizable and multiple dashboards

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Group of UTM Appliances CCC – Ease and flexibility of management Based on GeographyBased on Appliance ModelsBased on Client

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Security against misuse of administrator privileges  Role-based administration privileges -For CCC -Individual Cyberoam UTM appliances -Groups of Cyberoam UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Security against misuse of administrator privileges CCC accessAccess to group of UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs & alerts for organization-wide security visibility  Logs and views of administrator actions as well as dispersed UTM appliances -Instant security visibility -Supports regulatory compliance -Investigative analysis -Keeping track of historical activity  alerts -Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits etc. -Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count etc.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility CCC Logs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility Alert configuration

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility Alert

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC Features & Benefits

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Q&A If any??

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you!