Download presentation
Presentation is loading. Please wait.
1
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.
2
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management
3
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Need for Data Protection
4
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Medical records of 741 patients lost by a hospital 60% corporate data lies unprotected on endpoints Lost USBs Lost Multimedia Discs Wrong Email Attachment Lost iPods Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Bank employee accidentally sent sensitive customer details to wrong email address 12,500 handheld devices forgotten at the back of taxis every 6 months in UK 9000 USB sticks found in people's pockets at the local dry cleaners in UK
5
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy What Places Data At Risk? Applications Web, Mail, IM, P2P, Printing, FTP Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Insiders Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Data At Risk Intellectual property related to R&D Business plans, RFP / Tender quotes Product launch dates and roadmap Customer data Malicious Unintentional
6
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Average cost of security breach - $202 per record lost Total cost per incident averages $6.6 million Immediate Need – End Point Data Protection Cost of Data At Risk
7
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Protect your Data. Protect your Assets.
8
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Comprehensive End Point Data Protection Suite Modules Data Protection & Encryption Device Management Application Control Asset Management
9
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Benefits Enhanced protection to all your Endpoints Across geographic locations Centralized controls Regulatory and Security Compliance Rapid installation Easy to use Maintains security with flexibility Clear ROI
10
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Data Protection & Encryption
11
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Prevent Data Leakage – Email Attachments Control data shared as attachment in emails Send customized warning message to user and alert to administrator
12
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Record Data Shared over Webmails Record content of Webmail such as Yahoo, Gmail & Msn
13
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Prevent Data Leakage - Attachments over Instant Messengers Attachment:.doc NOT ALLOWED File name: confident NOT ALLOWED Size: > 2 MB Control data shared as attachment over Instant Messengers Send customized warning message to user and alert to administrator.exe.jpg
14
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Before deleting Operation Modify Delete Fixed Floppy CD rom Removable Network Unknown.jpg.doc Before modifying Before copying/cut to Before copying/cut from Mode of Transfer File Name/Extn. Back up Read Document Prevent Accidental / Malicious Deletion of Data Selective Action & Back-up of Document Control operations over a document and its mode of transfer Back up files before specific actions
15
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server Prevent Data Leakage through Printed Files Copy of Printed File Saved in Database Server Control access to printers in the system Save shadow copy of printed file
16
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Encrypt entire device Attachment:.xls Attachment:.doc Attachment:.jpg Decrypt before reading Encrypt selected files Data Sharing Through Removable Devices Encrypt all/selected files while writing to removable device Decrypt files while reading from a removable device only in organization network - Data in your lost USB device cannot be decrypted and is safe Encrypts Data, Blocks Data Sharing
17
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Record Chat Sessions even for SKYPE Chat session logs Back up server
18
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Device Management
19
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Protect your Data by controlling data over device Allow only authorized devices Device Management Storage Device Communication Interface Device USB Device Network Devices Others Dial Floppy, CD, Burning device, Tape, Removable device Serial ports, parallel ports, modems, Bluetooth Dial-up connection USB keyboard, mouse, modem, storage, hard disk, others Wireless LAN adapter, PnP adapter, Virtual LAN adapter Audio equipment, Virtual CDROM, any new device
20
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Application Control
21
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Protect your Data by Controlling Applications Prevent data loss through unauthorized/indiscriminate use of applications Granular, policy-based application controls - Protect sensitive data & enhance employee productivity - Prevent legal liability, network outages IM tools Entertainment (MP3, MP4, MPEG) Pirated software Screensavers Password crackers
22
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Asset Management Protect your Assets
23
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Need for End Point Asset Management Organizations exposed to higher levels of threats Distributed offices Rise in malware attacks Tracking Hardware & Software assets Management of hardware/software inventory Sophisticated attacks – Targeting vulnerabilities Need for timely patch implementation across – Hundreds or thousands of devices Geographic locations Immediate need - Centralized, automated asset management
24
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Fighting Threats with Asset Management Protect your Assets Seamless IT infrastructure management Simplifies tracking of IT asset allocation, configuration, version, historical information Control over hardware, software costs Automates and centralizes Patch management Install Software Remotely Silently or in user-interactive mode Meets security compliance requirements Rapid and correct installation of patches Handling bug fixes across network, geographies
25
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy About Cyberoam
26
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Products Cyberoam UTM Cyberoam iView (Open source Logging & Reporting) Cyberoam Central Console (Centralized Management) Cyberoam SSL VPN appliance
27
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam CRi Network Security Appliances Large Enterprises CR 1500i CR 1000i CR 500i Small to Medium Enterprises CR 200i CR 300i CR 100ia Small Offices - Remote Offices CR 50ia CR 35ia CR 25ia CR 15i
28
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam Credentials Awards Gartner Positions Cyberoam as a Visionary in Magic Quadrant Finalist in SC Magazine Awards 2009 for Best SME Security Finalist in PC Pro Awards 2009 Emerging Vendor of the Year 2008 by Frost & Sullivan IT Leader of the Year Award by ZDNet Asia Channel's Favorite Security Company Award 2008 by VAR India Certifications Checkmark ICSA Labs for Firewall ICSA Labs for Firewalls with Active-Active HA capability Member of VPNC
29
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Established in 1999 Team strength - 400+ employees Investment from global private equity firm The Carlyle Group Domain – Communication, Networks, Security Sales and distribution channel in over 75 countries Product offering Cyberoam Cyberoam iView Cyberoam End Point Data Protection CRESTEL EliteAAA 24online 24online Everywhere Elitecore Technologies
30
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Thank You Question / Answer Session Please visit us at www.secureone.com.my
31
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Thank You Please visit us at www.secureone.com.my
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.