Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.............................................................................................................................................................

Similar presentations


Presentation on theme: "Www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................."— Presentation transcript:

1 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.............................................................................................................................................................

2 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Harvard and Oxford Universities Hacked by D35m0nd142 Oxford University’s Begbroke Science Park website contained a vulnerability that allowed the hacker to access and leak information on their database. In the case of Harvard University, D35m0nd142 found a cross-site scripting (XSS) vulnerability on one of their webpages. Harvard and Oxford Universities Hacked by D35m0nd142 Oxford University’s Begbroke Science Park website contained a vulnerability that allowed the hacker to access and leak information on their database. In the case of Harvard University, D35m0nd142 found a cross-site scripting (XSS) vulnerability on one of their webpages. October 2012 NullCrew Leaks User Details from University of Leeds Website The hackers leaked database details, but also over 100 email addresses, password hashes and usernames. NullCrew Leaks User Details from University of Leeds Website The hackers leaked database details, but also over 100 email addresses, password hashes and usernames. Security in Educational Institutes

3 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Security in Educational Institutes The 2012 Global State of Information Security Survey, PwC 43% Education/Non-profit organizations in Europe have faced security incidents in the past 12 months 43% Education/Non-profit organizations in Europe have faced security incidents in the past 12 months 23% Education/Non-profit organizations in Europe are unaware about any security incident occurred 23% Education/Non-profit organizations in Europe are unaware about any security incident occurred

4 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Security in Educational Institutes Symantec Intelligence Report, November 2012 Spam rates Top 5 Verticals Source Phishing rates Top 5 Verticals Source Virus rates Top 5 Verticals Source

5 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Security Concerns of Educational Institutes “Students view harmful websites (violence, porn), access Bit Torrent and P2P applications for heavy/unauthorized downloads, and use proxy to bypass web controls” “Virus infected network leads to slower network performance and choked bandwidth.” “In shared working environments, students sometimes download inappropriate content to play pranks on the student who uses the same computer next.” “Uncomfortable pop-ups/ images spring up, leading to embarrassment, especially in presence of female faculty and students. “ “Students and faculty use bandwidth for unproductive surfing, leading to critical applications by key users being left with inadequate bandwidth.” “ Highest security within limited budget becomes tricky.”

6 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Challenge 1  Risk of virus, spam, spyware, adware infecting the network - Embarrassing pop-ups - Network slow-down  Unproductive/unauthorized downloads like games, videos - Bandwidth Choking - Inadequate bandwidth for key users and critical applications - Copyright and legal liabilities  Non-Academic activities  Non-compliance to regulatory requirements (such as CIPA, PCI) Access to Inappropriate Web Content & Applications

7 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Challenge 2  Lack of knowledge on who is doing what - Difficult to identify users engaged in non-academic surfing - Most security solutions identify the IP address and not actual users  Investigative and forensic analysis become difficult in case of wrongful usage of network  No real-time visibility into user activity in network Identifying users in shared computing environment

8 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Challenge 3  Embarrassing pop-ups  Network slow-down - Bandwidth Shortage - Bandwidth unavailable to critical applications and users - Productivity loss due to interrupted access to important resources  Loss of business-critical data  Institute network may be used to broadcast virus or as a botnet Virus, Spam and Spyware Spam

9 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Challenge 4 Wi-Fi, BYOD and Virtualization Server Virtualization Desktop Virtualization Protect students, staff and datacenter in virtual environment Protect students using cloud based collaboration applications Laptops and tablets are used in colleges, universities and schools Inability to trace user specific activity due to Dynamic IP environment Risk of Wi-Fi: Eavesdropping, Interception, Modification of data in transit Service disruption, Bandwidth loss

10 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Challenge 5  Security of websites from hackers/hacktivists  Hackers target - Servers (database server, email server, etc.) - Vulnerabilities in web facing applications  Possible risk scenarios: - Hacked student database - Grades tampering - Leaked question papers - Stolen login passwords Security of Institute’s data centers/information assets We are anonymous Hackers leak 120,000 student records in raid on world’s top unis Harvard and Oxford Universities Hacked by D35m0nd142 NullCrew Leaks User Details from University of Leeds Website

11 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. What solutions we need?

12 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Technologies We Need  An integrated Gateway-level Security on a single platform  Reduced TCO (Total Cost of Operations) - Consolidated security - Lower CapEx, OpEx - Reduced cost of training & support

13 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. We need to control access to websites & applications  Web & Content Filtering - Blocks and inspects HTTPS sites & Google Cached pages - Control Google search by specific keywords  Application Control - Block unwanted applications like Proxy, P2P, Games, Chat, etc.  YouTube for Schools - Allows access to selected educational content - Blocks inappropriate & peripheral content such as ads, comments & links

14 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. We need to prioritize applications with Application Visibility & Control Medium Quality High Quality Low Quality School Management System Web mail P2P Chat CMS LMS TurnItIn Collaboration tools Internet Control over

15 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Needs an Identity-based AAA Audits Identity–based Logs + Reports Compliance Reports Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Authenticates User Name IP Address MAC Id Session Id Control over user network activities Who can connect to the network Who can access what What have they accessed Control over user network activities Who can connect to the network Who can access what What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions Faculty Student Management Users

16 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. On-appliance Logging and Reporting  In-depth reports - Real time visibility into user and network activities - Identifying attackers/victims for quick corrective actions  Security & Compliance management - HIPAA, GLBA, SOX, PCI, FISMA  Forensic Analysis capability Compliance Reports Dual Dashboard - Traffic & Security Dashboard Application Reports

17 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Threat Protection Protection from Virus, Spam and Spyware  Anti-Virus & Anti-Spyware -Bi-directional scanning: Web & Email -Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic -4 million+ signatures  Anti-Spam (Inbound/Outbound) -Scans SMTP, POP3, IMAP traffic -Scanning with Recurrent Pattern Detection (RPD TM ) technology -Virus outbreak detection for zero-hour protection Intrusion Protection  Intrusion Prevention System -Protection of servers (database server, email server, etc.) -Identity-based IPS policies per user or group -3500+ signatures - broadest security cover  Web Application Firewall -Protection of websites and web servers from hackers -Prevents hackers from exploiting Web-Application Vulnerabilities (OWASP TOP10, etc.)

18 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Security in Wi-Fi & BYOD Scenarios  High performance, integrated security over WLAN  Identity-based policies in Dynamic IP environment  Identity-based AAA over personal devices in institute network

19 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Ensure security of Virtual environment Securing Virtual Datacenter Office in a box Security in a box (for multiple locations) Note: UTM, CCC and iView are also available as hardware appliances. Complete Virtual Security solution

20 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Education Clients “As a School, it remains our primary responsibility to ensure that our students are not exposed to any obscene material over the Web. I chose Cyberoam because of its excellent pricing and Technical Support, and because its performance is second to none of the others.“ Mr. Mike Slater Network Manager Darrick Wood School, Orpington, UK “The Cyberoam appliance has put everyone’s minds at ease now that our children are protected from harmful Internet sites. We can also tell the parents with confidence that their children are protected from such content. All this was achieved at a fraction of Websense’s cost and minimal operating effort” Mr. Dale Moncrief Chief IT Administrator, Valley Christian Academy Aurora, Ohio, USA TestimonialsUK Clients Global Clients

21 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Education Clients “As a School, it remains our primary responsibility to ensure that our students are not exposed to any obscene material over the Web. I chose Cyberoam because of its excellent pricing and Technical Support, and because its performance is second to none of the others.“ Mr. Mike Slater Network Manager Darrick Wood School, Orpington, UK “The Cyberoam appliance has put everyone’s minds at ease now that our children are protected from harmful Internet sites. We can also tell the parents with confidence that their children are protected from such content. All this was achieved at a fraction of Websense’s cost and minimal operating effort” Mr. Dale Moncrief Chief IT Administrator, Valley Christian Academy Aurora, Ohio, USA TestimonialsPhilippine Clients

22 www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................. Question and Answer


Download ppt "Www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved............................................................................................................................................................."

Similar presentations


Ads by Google