Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan.

Similar presentations


Presentation on theme: "Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan."— Presentation transcript:

1 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan Manager - Channel sales (Europe) Unified Threat Management Cyberoam End Point Data Protection

2 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Agenda of Presentation  About Company  IT Security Facts  IT Projects Priorities in Enterprise  Organisation’s Concerns  Cyberoam Layer 8 Technology  Industry recognitions & Product Certifications  Product Range  Cyberoam Endpoint Data Protection  Cyberoam Business Model  Q&A

3 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Established in 1999  500+ Employees  ISO 9001:2000 certified  Backed by World’s Largest Private Equity Group ($90bn)  Sales, Distribution Channel across 85+ countries  Communication - Networks – Security Elitecore Technologies Pvt. Ltd.

4 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Unified Threat Management Cyberoam Central Console (CCC) Cyberoam End Point Data Protection Cyberoam Product Line

5 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Information Security Breaches Survey 2010 by PWC / InfoSecurity - Europe > 250 people staff<50 people staff

6 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security External ThreatsInternal Threats

7 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cost of Cyberoam Crime

8 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Source: Gartner 2010 IAM No. 1 security priority for 20% of organizations surveyed IAM, DLP, Anti-Virus, Firewalls and IPS among the top 5 security priorities for 2010 IT Project Priorities in Enterprises

9 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Concerns identified by Cyberoam during meeting with prospects and existing clients –Security Concerns –Productivity Concerns –Connectivity Concerns Organization's Concerns

10 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Lack of confidence in existing security system –Is my existing security system sufficient? –Is my data secure from network threats? Lack of Identity-based Visibility – Need to know who is doing what in network –Are users sending confidential data outside? –Are users taking away confidential data in flash drives, CDs, and more? Lack of Intelligent Reporting – Facilitates security, compliance and forensic analysis –Intelligent reports give information on Attempts to breach security Top applications used Top viruses, spam, and more User specific reports Security Concerns

11 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Lack of real-time visibility and controls against security threats –Delayed response to a security breach –Lack of proactive security against impending threats Lack of security over HTTPS/SSL medium –Inability to read, control and secure encrypted HTTPS/SSL traffic leads to Malware propagation Data leakage Lack of adequate endpoint security against malware and spam Security Concerns (contd.)

12 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Productivity loss through Instant Messengers –Lack of control over who is talking to whom –Lack of control to block specific words viz. business plans, confidential, in chat conversations to secure sensitive data –Lack of audit logs over IMs Bandwidth allocation / QoS to right person at right time –Lack of control over managing QoS for multiple applications Business critical applications (like ERP, VOIP etc) which need maximum priority Applications like Facebook, Web mail, Skype that need medium priority Unimportant applications like iTunes, YouTube that have least priority Productivity Concerns

13 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Lack of continuous connectivity Lack of security in communication over VPN connection Lack of ability to identify and process IPv6 traffic –Clients, especially Government organizations, need an IPv6-ready solution –How much time and money is required to support IPv6 traffic? Lost connectivity in case of link failure –Manually connecting to another link in case of link failure –Lack of intelligent failover detection and transferring traffic to a working link Lack of support to 3G/WiMax connectivity Connectivity Concerns

14 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security What is Solution ?

15 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

16 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM solves Organizational Concerns

17 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Numbers – Hard & Boring to remember! 192.168.1.2 172.16.13.123 10.12.111.213  Names - Used daily!!! 192.168.10.122 172.17.12.123 10.12.11.23 192.168.11.21 172.16.13.123 10.12.111.213 192.168.10.122 172.17.12.123 10.12.11.23 John Lisa Angelina Carl Patric Stefan Sophie Pam Albert Camile Simon Michael Chris Tony Megan Human approach in Security

18 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

19 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 8 Technology – Security around the User -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity-based security policies  Identifies traffic by username even in case of dynamic IP Layer 8 – The Human Layer indicates a feature unique to Cyberoam

20 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security User

21 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM- Identity-based Security  Integrated security over single platform  Layer 8 penetrates through each security module

22 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Industry Recognition & Product Certifications Industry Recognition & Product Certifications

23 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Product Certifications IPv6 Ready Checkmark Certification ICSA Labs Certified Firewall ICSA Labs certification for Active Active HA Internet Watch Foundation Member of VPN Consortium

24 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Industry Recognition Cyberoam speedily rises in the ‘Visionaries’ Quadrant of Gartner MQ Gartner

25 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam is the only Network UTM vendor to receive this recognition this year Cyberoam recognized as ‘Innovator’ SC Magazine Industry Recognition

26 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Industry Recognition Highest UTM Factory Revenues for Q3 2010 Recognizes Cyberoam as No. 1 UTM Appliance Vendor in India

27 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam CR35ia outshines competitors in SOHO UTM Group Test TechWorld Magazine Product Review: TechWorld Norway "Cyberoam "CR35ia is the best-in- test thanks to a combination of good performance and a straightforward & intuitive GUI management”

28 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SC Magazine Five Star Rating – Seven Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch” July 2007 – UTM Roundup Cyberoam CR250i  “flexible and very powerful”  “this appliance is a good value for almost any size environment”. July 2010 – UTM Group Test Cyberoam CR50ia  A Solid Product and the Price is Right  CR50ia is more than a Usual UTM

29 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Awards & Recognition

30 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM Product Range SMEEnterprisesSmall Offices 15wi, 15i, 25wi, 25ia, 35wi, 35ia 50ia, 100ia, 200i, 300i500ia, 750ia, 1000i, 1000ia, 1500i, 1500ia For 5 to 40 Users For 50 to 300 UsersFor 500 to 2000+ Users

31 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security What else?

32 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

33 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management

34 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Need for Data Protection

35 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Medical records of 741 patients lost by a hospital 60% corporate data lies unprotected on endpoints Lost USBs Lost Multimedia Discs Wrong Email Attachment Lost iPods Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Bank employee accidentally sent sensitive customer details to wrong email address 12,500 handheld devices forgotten at the back of taxis every 6 months in UK 9000 USB sticks found in people's pockets at the local dry cleaners in UK

36 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security What Places Data At Risk? Applications Web, Mail, IM, P2P, Printing, FTP Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Insiders Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Data At Risk Intellectual property related to R&D Business plans, RFP / Tender quotes Product launch dates and roadmap Customer data Malicious Unintentional

37 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Average cost of security breach - $202 per record lost Total cost per incident averages $6.6 million Immediate Need – End Point Data Protection Cost of Data At Risk

38 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam End Point Data Protection Protect your Data. Protect your Assets.

39 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam End Point Data Protection Comprehensive End Point Data Protection Suite Modules Data Protection & Encryption Device Management Application Control Asset Management

40 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam End Point Data Protection Benefits Enhanced protection to all your Endpoints Across geographic locations Centralized controls Regulatory and Security Compliance Rapid installation Easy to use Maintains security with flexibility Clear ROI

41 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Data Protection & Encryption

42 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Prevent Data Leakage – Email Attachments  Control data shared as attachment in emails  Send customized warning message to user and alert to administrator

43 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Record Data Shared over Webmails  Record content of Webmail such as Yahoo, Gmail & Msn

44 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Prevent Data Leakage - Attachments over Instant Messengers Attachment:.doc NOT ALLOWED File name: confident NOT ALLOWED Size: > 2 MB  Control data shared as attachment over Instant Messengers  Send customized warning message to user and alert to administrator.exe.jpg

45 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Before deleting Operation Modify Delete Fixed Floppy CD rom Removable Network Unknown.jpg.doc Before modifying Before copying/cut to Before copying/cut from Mode of Transfer File Name/Extn. Back up Read Document Prevent Accidental / Malicious Deletion of Data Selective Action & Back-up of Document Control operations over a document and its mode of transfer Back up files before specific actions

46 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server Prevent Data Leakage through Printed Files Copy of Printed File Saved in Database Server Control access to printers in the system Save shadow copy of printed file

47 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Encrypt entire device Attachment:.xls Attachment:.doc Attachment:.jpg Decrypt before reading Encrypt selected files Data Sharing Through Removable Devices Encrypt all/selected files while writing to removable device Decrypt files while reading from a removable device only in organization network - Data in your lost USB device cannot be decrypted and is safe Encrypts Data, Blocks Data Sharing

48 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Record Chat Sessions even for SKYPE Chat session logs Back up server

49 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Device Management

50 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Protect your Data by controlling data over device Allow only authorized devices Device Management Storage Device Communication Interface Device USB Device Network Devices Others Dial Floppy, CD, Burning device, Tape, Removable device Serial ports, parallel ports, modems, Bluetooth Dial-up connection USB keyboard, mouse, modem, storage, hard disk, others Wireless LAN adapter, PnP adapter, Virtual LAN adapter Audio equipment, Virtual CDROM, any new device

51 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Application Control

52 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Protect your Data by Controlling Applications Prevent data loss through unauthorized/indiscriminate use of applications Granular, policy-based application controls - Protect sensitive data & enhance employee productivity - Prevent legal liability, network outages IM tools Entertainment (MP3, MP4, MPEG) Pirated software Screensavers Password crackers

53 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Asset Management Protect your Assets

54 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Need for End Point Asset Management  Organizations exposed to higher levels of threats  Distributed offices  Rise in malware attacks  Tracking Hardware & Software assets  Management of hardware/software inventory  Sophisticated attacks – Targeting vulnerabilities  Need for timely patch implementation across –  Hundreds or thousands of devices  Geographic locations  Immediate need - Centralized, automated asset management

55 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Fighting Threats with Asset Management Protect your Assets Seamless IT infrastructure management Simplifies tracking of IT asset allocation, configuration, version, historical information Control over hardware, software costs Automates and centralizes Patch management Install Software Remotely Silently or in user-interactive mode Meets security compliance requirements Rapid and correct installation of patches Handling bug fixes across network, geographies

56 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Business Model

57 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Business Model 100% Channel focused company  Quick product support  Better margin  Access to Sales Leads  Lead locking facility  Marketing support  Access to comprehensive Knowledgebase  Technical and Sales training (free of cost)  Access to market development funds

58 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Question/Answer Session

59 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Thank you! shailesh.mecwan@cyberoam.com Phone: +91-9974060355 (24X7)* Skype: shailesh.elitecore


Download ppt "Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan."

Similar presentations


Ads by Google