Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified.

Similar presentations


Presentation on theme: "Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified."— Presentation transcript:

1 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified Threat ManagementCyberoam Central Console (CCC)SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam UTM ensures CIPA Compliance

2 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Agenda of Presentation  What is CIPA?  Who needs to comply & why ?  CIPA Requirements  How Cyberoam UTM ensures CIPA compliance ?

3 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use What is Children’s Internet Protection Act – CIPA?  CIPA is a Federal Law  Implementation rules issued by FCC (Federal Communications Commission)  Law enacted to address concerns about access to offensive content over the Internet on school and library computers

4 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Who needs to comply & Why ?  Any School or School District or Library that -Receives or wants to be eligible for E-rate funding for Internet Access or Internal Connections  CIPA enables schools, school districts or libraries to be eligible for E-rate funding program.  E-rate funding is a program that makes certain communications technology more affordable for schools and libraries.

5 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use CIPA Requirements  Internet Safety Policy that includes Technology Protection measures that blocks or filters internet access to material that is: -Obscene, Child Pornography, Harmful to Minors, Inappropriate and -Secure emails, chat room or any other form of direct electronic communications -Block unauthorized access (including hacking and unlawful activities) -Unauthorized disclosure of personal information of minors -Measures restricting access to harmful materials -Audits Cyberoam UTM satisfies the above requirements of CIPA and offers much more..

6 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Need of CIPA Compliance Solution  Requirement of solution that can -Ensure CIPA compliance  Implement and maintain compliance -Helps comply with least effort and cost input -Provide compliance reports in shortest time

7 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM ensures CIPA Compliance  Cyberoam UTM provides integrated Security over single platform  Cyberoam UTM features that ensure CIPA Compliance are  Web Filtering  Application Visibility & Control (for Application Filtering)  IM Archiving & Controls  Bandwidth Management  On-Appliance Reporting  Real Time Traffic Discovery  Cyberoam’s Layer 8 Technology (Identity based approach) apply to all UTM features  Inbuilt CIPA Compliance Policy

8 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Identity based Security Policy Controls  Unique Identity based Cyberoam Firewall available on UTM (integrated with all other security features)  No need of blanket policies  Admin can define the policies based on combination of Username, IP Address, Mac Address  Identity based Authentication, Authorization, Audits over single security device  Admin can create work profile based groups

9 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Know who is doing what in your Network with Cyberoam’s Layer 8 Technology Know who is doing what in your Network with Cyberoam’s Layer 8 Technology

10 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filtering feature  Industry’s most comprehensive URL database  44 million+ URLs in 82+ categories  Block, Control & Monitor website access of specific Users or Group  Blocks un-needed websites / categories  Blocks and inspect  HTTPS websites, Google Cached pages  All known proxies such as Ultrasurf etc  Enforce ‘Safe Search’ feature of Search Engines to filter inappropriate keywords  Educate healthy-usage policy by providing customized messages on blocked websites  On-appliance web category database  Surfing Pattern Privacy Premium

11 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filtering feature Unhealthy sites surfing

12 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Web Categories (82+)

13 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filter with Built-in CIPA Policy Implement CIPA policies with one click

14 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Web Filter with Built-in CIPA Policy

15 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Safe Search Enforcement in Web Filter

16 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Google Search Report Filter Report on Keywords, Users, Time

17 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Application Visibility & Control Feature  Block unwanted applications  P2P (like Bit-Torrent), Anonymous Proxies  Games, Instant Messengers, Social Networking and many more  Allows control over combination of  Application, User, Time and Bandwidth  Bandwidth Management assures availability of critical applications

18 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Application Visibility and Control Username / IP Address Blocks over 5000+ Applications

19 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use IM Archiving & Control feature User-specific and Group Level controls Archive Communication Control communication medium (chat, video, voice, file transfer)  Controls for Yahoo Messenger and Windows Live Messenger  User and Group specific Control over each IM communication mode  Control access, Chat, Voice, Webcam, File Transfer  Logs chat communications  Block use of specific keywords and regular expressions over chat  Filter chat logs based on user, time, IP, keyword to identify suspect in case of an incident  Scans malware

20 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam’s Granular Internet Access Controls Internet Bandwidth control Duration control Schedule Control Reporting Apply these controls on Students, Faculty Above controls can be applied to - Website, Instant Messaging, Applications Mark

21 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use  No Additional Purchase needed of hardware / service to access reports  iView: Cyberoam’s On-Appliance Logging and Reporting tool offers -Logs & Reports -Identity based reports  Pinpoints the exact user for the incident -1000+ drill down reports -Helps in Security Incident Management, Compliance Management, Forensic Analysis -Real time Log Management for Security Incidents  Alerts on unauthorized attempts  Traffic Discovery feature -Real-time visibility into bandwidth utilization by user, protocol, application On-Appliance Reporting

22 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

23 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Top Web Users

24 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use User Based Web Surfing Reports

25 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Blocked Attempts Report Top Denied Categories

26 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Application Groups Report

27 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Search Engine Results

28 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM  Integrated Security over single platform  Identity based approach with Cyberoam’s Layer 8 Technology  Interface for achieving Unified Security Controls  Reduced TCO (Total Cost of Operations) -Best Quality of Security features -Lower expenditure -Ease of Management -Reduced cost of training and support -Future Ready with IPv6 -Ability to upgrade to future threats -Security subscriptions as needs grow

29 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM Features  Firewall  Intrusion Prevention System  Virtual Private Network (VPN)  Anti-Virus & Anti-Spyware  Anti-Spam  3G / WiMax Connectivity  Multiple Link Management  WLAN Security  Web Filtering  Application Filtering & Management  IM Archiving & Controls  Bandwidth Management  On-Appliance Reporting  Traffic Discovery

30 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Indicative Client List

31 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Testimonials “Cyberoam’s Identity based security gave us granular controls, resulting in complete visibility for student activities and their web surfing pattern. Cyberoam security made our institute CIPA compliant by ensuring the safety and security of our students.” “Implementing Cyberoam’s UTM was a major cornerstone of Pascack Valley’s ability to comply with CIPA regulations, a crucial step in maintaining eligibility for E-Rate technology funding assistance” Mr. Willie PICO District Network Administrator Pascack Valley Regional School District, USA “We need a simple solution to our content filtering dilemma. A content filtering solution is a mandatory requirement to meet CIPA compliance. The bevy of features in Cyberoam was an unexpected but welcome bonus” “The Cyberoam appliance has put everyone’s minds at ease now that our children are protected from harmful Internet sites. We can also tell the parents with confidence that their children are protected from such content. All this was achieved at a fraction of Websense’s cost and minimal operating effort” Mr. Dale Moncrief Chief IT Administrator, Valley Christian Academy Aurora, Ohio, USA

32 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam UTM Product Range SMEEnterprisesSmall Offices 15wi, 15i, 25wi, 25ia, 35wi, 35ia 50ia, 100ia, 200i, 300i500ia, 750ia, 1000i, 1500i

33 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified FirewallVPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium IPv6 Ready Member of Internet Watch Foundation

34 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam Visionary in the Gartner UTM MQ 2010

35 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Cyberoam is the only Network UTM vendor to receive this recognition this year Cyberoam recognized as ‘Security Innovator’ SC Magazine Industry Recognition

36 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review

37 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use SC Magazine Five Star Rating – Seven Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch”  “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i  “console is well organized and intuitive to navigate”  “flexible and very powerful”  “this appliance is a good value for almost any size environment”.

38 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use THANK YOU


Download ppt "Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified."

Similar presentations


Ads by Google