Download presentation
Presentation is loading. Please wait.
Published byMalik Hille Modified over 9 years ago
1
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM
2
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Agenda of Presentation About Elitecore Technologies Cyberoam UTM Cyberoam Credentials/ Awards/ Accreditations
3
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Established in 1999 400+ Employees ISO 9001:2000 certified company Backed by World’s Largest Private Equity Group ($90bn) Sales, Distribution Channel & Customers across 75+ countries Communication - Networks – Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution About Elitecore Technologies
4
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security
5
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Internal threats Identity theft Data loss Data deletion Data modification External threats Worms Malicious code Virus Malware Social Engineering threats Spam Phishing Pharming Data theft DoS attacks Hacking USER Attack on Organization User – The Weakest Security Link
6
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Layer 8 Technology – Security around the User -Treats User-Identity as the 8th Layer in Network stack -Network security decisions based on Usernames and IP Addresses Control Who is doing What in the network Allows creation of User Identity-based security policies Identifies traffic by username even in case of dynamic IP Layer 8 – The Human Layer indicates a feature unique to Cyberoam
7
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security User
8
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam’s Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 – The Human Layer
9
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM- Identity-based Security Integrated security over single platform Layer 8 penetrates through each security module
10
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Intrusion Prevention Policies Anti-Malware Anti-Spam Web Filtering Layer 7 Controls Bandwidth Management & QoS Instant Messaging Archiving & Control Internet Surfing Quota Internet Access Time Internet Data Quota Cyberoam Audits Identity - based Logs + Reports MAC Id Session Id Cyberoam Layer 8 Advantage
11
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SecurityConnectivityProductivity Organizational Concerns Network security Content Security Administrative Security Business Continuity Network Availability Future-ready connectivity Employee productivity IT resource optimization Administrator productivity
12
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES SECURITY Network SecurityContent SecurityAdministrative Security Firewall IPS Wireless security Anti-Malware Anti-Spam HTTPS Content security Next-Gen UI iView- Logging & Reporting
13
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Stateful Inspection Firewall (Fusion Technology) SECURITY » Network Security » Firewall -Interface for achieving Unified Security Identity-based policies enable security, connectivity, productivity Fusion Technology
14
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Intrusion Prevention System -3500+ signatures - broadest security cover -Internet Threat Response Team Regular Signature updates -Quick protection against latest vulnerabilities -IPS Policy Tuner Allows multiple IPS policies Granular control over IPS policies -Unnecessary alerts -Reduced traffic latency -Improved performance SECURITY » Network Security » IPS
15
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Cyberoam IPS + Layer 8 Technology Identity-based IPS policies per user or group Identity-based alerts and reports -Visibility into applications – User, Source, Destination, Usage -Overview of threat status – Top alerts, top attackers, top victims SECURITY » Network Security » IPS
16
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Wireless (WLAN) Security -High performance, integrated security over WLAN Secures wireless networks to the extent of wired networks -Supports 802.11n wireless standard -Layer 8 over WLAN Identity-based policies in dynamic IP environment MAC-based filtering Supports IP-address pool -Enhances security SECURITY » Network Security » Wireless security
17
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Gateway Anti-Malware -4 million+ signatures -Bi-directional scanning of web & email -Self-service Virus Quarantine -Reduced window of vulnerability Broadest security cover against all malware -Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic -Layer 8 Impact Identity-based virus reports -Instant visibility into attacker/victim Identity-based Quarantine policies SECURITY » Content Security » Anti-Malware indicates feature offered only by top-rated UTMs
18
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam Gateway Anti-Spam -IP Reputation Filtering Blocks 85% of incoming messages at gateway -Saves bandwidth -Near 98% spam detection -False Positive rate of 1 in a million Reduces fear of losing business emails - Self-Service quarantine area
19
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -User-based Spam Digest Frees administrator time & management -Manage Email recipients Data leakage prevention and archiving -Scanning with Recurrent Pattern Detection (RPD) technology Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 SECURITY » Content Security » Anti-Spam -Virus Outbreak Detection (VOD) for zero-hour protection -Scans SMTP, POP3, IMAP traffic
20
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam -RPD Technology -Most outbreaks last only a few hours -Cyberoam identifies outbreaks real-time -Signature-based Anti-Spam take time to release signatures -Users remain unprotected till Anti-Spam is updated -Too late to battle out the initial peak of attack
21
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security HTTPS/SSL Content Security -Scans SSL traffic for virus & malware -Controls File upload over SSL -Reports files uploaded via SSL -Stops HTTPS/SSL as a medium for Data Leakage Malware Propagation SECURITY » Content Security » HTTPS Content Security indicates feature offered only by top-rated UTMs
22
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Next-Gen UI -Web 2.0 technology advantages -Easy navigation, custom controls, intuitive interface Fewer security errors - Increases security Enhances administrative productivity Shorter learning curves -Unified Security Rules for all security features from firewall page SECURITY » Administrative Security » Next-Gen UI
23
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView – On-Appliance Logging & Reporting -Ability to log and report activities -LAYER 8 - Identity-based logging and reporting – Pinpoints the user -Security Management iView dashboard- Shows network attacks on single screen Drill-down reports – 3rd level drill-down for attack details 1000+ Reports -Log Management -Compliance Management HIPAA, PCI DSS, GLBA, and more -Forensic Analysis SECURITY » Administrative Security » iView- Logging & Reporting
24
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management
25
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES CONNECTIVITY Business ContinuityNetwork AvailabilityFuture-ready connectivity Multiple Link Management High Availability VPN 3G/WiMAX modem support IPv6
26
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Multi-Link Management -Automated Load balancing assures ROI/investment Support for more than 2 ISP links Supports Wireless WAN (3G USB modems) CONNECTIVITY » Business Continuity » Multiple Link Management 3G
27
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CONNECTIVITY » Business Continuity » Multiple Link Management -Link Failover Supports multiple failover conditions Monitors link availability of multiple WAN connections Transfers traffic from a failed link to a working link -Maximizes business up-time -Optimizes link utilization for business continuity Active-Active Auto Link Failover Active-Passive Auto Link Failover Support for more than 2+ ISP links Supports WWAN for failover
28
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Layer 8 Policy-based Routing Routes traffic based on: -Source IP addresses -Protocols -Users Assures Quality of Service for key users and applications CONNECTIVITY » Business Continuity » Multiple Link Management
29
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security ICSA Labs Certified Active Active High Availability -Maximizes network uptime -Reduces single-point-of-failure -Ensures continuous Cyberoam security -Ensures business continuity CONNECTIVITY » Business Continuity » High Availability
30
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual Private Network (VPN) -Anywhere, any device secure remote connectivity -Supports IPSec, L2TP, PPTP technologies SSL-VPN -Client-type independent Web access mode -Application access mode -Client mode Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for: -Malware -Spam -Inappropriate content -Intrusion attempts -Maintains secure endpoint and network environments CONNECTIVITY » Network Availability » VPN
31
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security 3G/WiMAX – USB Modem Support -High-speed wireless WAN (WWAN) -Wide ISP support -All gateway security features available Can function as a main or failover link CONNECTIVITY » Network Availability » 3G/WiMAX modem support 3G
32
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization Content Filtering IM controls Bandwidth Management Traffic Discovery Layer 7 Administrator Productivity Next-Gen UI
33
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security IPv6 ‘IPv6 Ready’ gold logo -Cyberoam identifies and processes IPv6 traffic Third-party validation -International Testing Program with 3000+ rigorous test cases IPv6 compliance to become mandatory in government and other enterprises -Driven by diplomatic initiatives CONNECTIVITY » Future-ready connectivity » IPv6
34
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Content Filtering -Industry’s most comprehensive URL database 82+ categories 44 million+ URLs -On-appliance web category database Faster access Surfing pattern privacy -Controls access to HTTP & HTTPS hosted websites Increases productivity Productivity » Employee Productivity » Content Filtering
35
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Controls that are difficult to bypass Blocks Google cache pages Search keyword reports Blocks embedded URLs Detects/Blocks Third Party Proxy and Tunneling software -Controls access to Instant Messengers, P2P -Controls Data Leakage Blocks files from uploading to web pages Blocks file transfer through Instant Messengers Productivity » Employee Productivity » Content Filtering
36
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security IM Controls -Identity-based controls for Yahoo messenger and Windows Live Messenger -Scans malware -Logs and controls Access Conversation File transfer Voice/Webcam Productivity » Employee Productivity » IM controls
37
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best of Breed Bandwidth Management/QoS -Application and Identity-based bandwidth allocation -Category wise Bandwidth management -Restrict Bandwidth usage for a combination of source, destination and service/service group -Schedule-based bandwidth allocation -Committed and burstable bandwidth Productivity » IT Resource Optimization » Bandwidth Management
38
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Traffic Discovery -Real-time visibility into bandwidth utilization by user, protocol, application -Provides visibility of unproductive usage of resources and threat incidence Productivity » IT Resource Optimization » Traffic Discovery
39
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Layer 7 -Offers visibility and management over Application Layer 7 -Allows control over application, user, time and bandwidth Essential for Cloud Computing -Bandwidth Management assures availability of business- critical applications -Controls bandwidth costs Productivity » IT Resource Optimization » Layer 7
40
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security VoIP Bit Torrent CRM ERP IM Application Web mail Internet Medium Quality High Quality Low Quality Application Layer 7 Visibility
41
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Multi-core Technology -High Security without compromising on performance -Multi-core processors Parallel processing of Cyberoam security features -Real-time, Unified Security Higher Throughputs -High-speed memory access to signatures Security against advanced threats Cyberoam Architecture
42
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Extensible Security Architecture (ESA) -Ability to adapt to future security needs -Ability to support feature enhancements in future -Ready for future upgrades Vs ASIC Cyberoam Architecture
43
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Central Console
44
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Centralized controls and security management over remote networks Reduces operational complexity and deployment time Minimizes errors and lowers administration cost Enables the MSSPs to have different personnel for managing different customer deployments Ease of use with view of multiple devices and network status at a glance Cyberoam Central Console
45
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security
46
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SSL VPN
47
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Supports remote access VPN users and site-to-site VPN connections Accommodates between 50 to 1000 concurrent users Policy-based resource access control Zero-client administration Flexibility in purchasing remote security solutions: -Virtual appliance mode -Dedicated appliance mode SSL VPN
48
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Dedicated SSL VPN appliance Deployment
49
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual SSL VPN Deployment Diagram
50
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView
51
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Available as Open Source software and as Appliance Ability to log and report activities from various devices/ vendors Log Management -Near real-time log retrieval -Archival and Search facility Security Management -iView dashboard – Shows network attacks on single screen -1000+ Reports Compliance Management -Reduces compliance costs -Single click access to reports - Simplified compliance management -Easy visibility into access by users Cyberoam iView
52
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Forensic Analysis -Reconstructing sequence of events in a security breach -Reporting stands in the face of legal scrutiny Benefits -Security Benefits Centralized control Identifies attacks based on – -Attack Reports (Type of Reports) -Deviation from norm in access or usage of resources Allows quick investigation and determination of cause of breach Cyberoam iView
53
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Compliance Benefits Access and Usage logs of -Activity in critical applications, databases -Data transmitted to external entities Enables setting user identity-based thresholds for acceptable use -Productivity Benefits Shows deviation in resource consumption -Financial Benefits Low capital requirements Low technical manpower requirements Cyberoam iView
54
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management
55
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam - Endpoint Data Protection
56
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Endpoint protection: -Across geographic locations -Centralized controls -Regulatory and Security compliance Cyberoam Endpoint Data Protection suite -Data Protection & Encryption Prevents data leakage through: -Email attachments -Web mail -Instant Messengers -Printed files Encrypts files/device while writing data to removable devices Document back-up prevents accidental/malicious data deletion Cyberoam - Endpoint Data Protection
57
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Device Management Protects data by controlling data over: -USB device -Storage device -Network device -Communication Interface device -Others -Application Control Protects data by controlling unauthorized/indiscriminate use of applications -Enhances employee productivity -Prevents legal liabilities, network outages Cyberoam - Endpoint Data Protection
58
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Asset Management Offers IT infrastructure management Automates and centralizes Allows remote software installations Meets security compliance requirements Cyberoam - Endpoint Data Protection
59
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Appliance Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN
60
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other Appliances Cyberoam Central Console -CCC 15 -CCC 50 -CCC 100 -CCC 200 SSL VPN Appliance -CR-SSL-800 -CR-SSL-1200 -CR-SSL-2400 Cyberoam iView -CR-iVU25
61
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam CRi UTM Appliance Range Large Enterprises -CR 1500i -CR 1000i -CR 500ia Small to Medium Enterprises -CR 300i -CR 200i -CR 100ia -CR 50ia Remote Offices -CR 35ia -CR 25ia -CR 15i
62
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Subscription Model
63
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL Service) Basic Appliance
64
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) Gateway Anti-spam Subscription Web & Application Filtering Subscription Intrusion Prevention System (IPS) 24 x 7 Tech Support & Warranty Bundled Subscriptions
65
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Bundled Subscriptions TVS (Total Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Gateway Anti-spam Subscription -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 Email, phone and chat Tech Support SVS (Security Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 Email, phone and chat Tech Support Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
66
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review
67
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security 2008 - Emerging Vendor of the Year Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year Award in the Network Security Market
68
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium
69
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SC Magazine Five Star Rating – Four Times in a Row! April 2009 – Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i “Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i “console is well organized and intuitive to navigate” “flexible and very powerful” “this appliance is a good value for almost any size environment”.
70
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best Integrated Security Appliance Best Security Solution for Education Best Unified Security Tomorrow’s Technology Today 2007 2007, 2008 Finalist Network Middle East Award 2008 Finalist Channel Middle East Award VAR Editor’s Choice for Best UTM (2007) Finalist - 2008 Global Excellence in Network Security Solution ZDNET Asia- IT Leader Of the Year 2008 2008 Emerging Vendor of the Year for Network Security SMB Product of the Year 2008 – Best Content Filtering Awards
71
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele
72
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele (Cont’d)
73
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Middle East Clientele
74
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.