Download presentation
Presentation is loading. Please wait.
Published byGervais Henderson Modified over 9 years ago
1
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C VERSION X GETTING READY FOR 200X
2
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C AGENDA New Architecture & Firmware The Next Generation GUI Integrated iView Reporting Features
3
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C New Architecture & Firmware
4
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Version X – Firmware Architecture Introducing Light Weight CyberoamOS. Firmware based – No more bulky Upgrades. Multiple Firmware: Factory Default + Firmware of your choice. No more RMAs due to OS Corruption and Upgrade Corruption. Negligible chances of Database Corruption/inconsistencies. Extensible Architecture
5
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Salient Features of the NG GUI
6
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Accordion Menu & TABs for easy navigation of menu items
7
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Easy Access Top Panel
8
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Appliance Actions available on Dashboard – Reboot, Shutdown
9
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Static Status bar at bottom – Visible all the time
10
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Unsubscribed modules visibility on the menu itself
11
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Select Column Control, Direct Access from the Button
12
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Move column positions directly from select column control
13
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Filters on Manage Pages
14
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Filters on Manage Pages
15
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Pagination where ever required
16
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C No Java Script Pop Ups - Web 2.0 Pop UP
17
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Grouping control with search facility – easy to search objects and add it to a group
18
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Tabbed Data Entry control for Bulk Addition
19
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Informative Tooltip giving detail information on the policy attached – including Edit Option
20
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Informative Tooltip giving detailed information on the policy attached – including Edit Option
21
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C CR Custom Control – control with search functionality, and Add facility to add object from the control itself
22
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C CR Custom Control – control with search functionality, and Add facility to add object from the control itself
23
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Integrated iView Reporting
24
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Subscription free On-Appliance Reporting Real-time Monitoring and Alerting Over 1100+ Drilldown Reports Reports in HTML, MHTML, PDF, & CSV formats & Email Alerts Web 2.0 GUI and Reporting interface. iView (Cyberoam Aggregated Reporting & Logging Software)
25
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C
26
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C
27
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C
28
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C
29
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C IPv6 Ready
30
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C IPV4 Cyberoam – With IPv6 Ready Logo – Only 2
31
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C IPv6 Ready Only the 2 nd UTM IPv4 IPv6 tunneling IPv6 IPv4 tunneling
32
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C 3G & Wimax USB Modem Support
33
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C 3G & Wimax USB Card Connectivity
34
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Instant Messaging Logging & Control
35
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Instant Messaging Logging & Control Yahoo & Windows Live Messaging Control Who Communicates with Whom Control Webcam usage Control Voice Usage Individual as well as Group Control
36
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Control who can chat with whom Archive Communication Control communication medium (chat, video, voice) Data Protection Productivity Instant Messaging & Control
37
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Next Generation Layer 7 Firewall
38
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Port 443 Port 80 443 80 443 21 80 443 80 443 80 21 1 st Generation Firewalls
39
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C MailSkype MailWeb FTPWeb Bit Torrent Application Firewalls – CR Version 9
40
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C CRM ERP Sales force You Tube IM Application Web mail Casual Traffic Application FirewallCrowd of ApplicationsBandwidth Management Next Generation Firewalls – Version X
41
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C CRM ERP Sales force You Tube IM Application Web mail Casual Traffic Application FirewallCrowd of ApplicationsBandwidth Management Next Generation Firewalls
42
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Identity without IP
43
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Thin Client Support Windows Thin Client Support Windows Terminal Services Citrix Presentation Server Apply User Based Policies and Controls
44
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C SSL VPN Enhancements
45
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C SSL VPN Enhancements Application Access Mode within Web Browzer HTTP, HTTPS RDP Telnet, SSH FTP SSL VPN Client Save Password Auto Start VPN Connection
46
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Stability & Performance
47
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Stability & Performance Firmware based approach ~10 second Soft Reboot Time Fast GUI Access Extensible Architecture vs ASIC Preparing for upcoming threats HTTP Proxy Enhancements for HTTP 1.1 protocol Extensive Logging and Log Viewer for Instant Troubleshooting Getting ready for the Enterprise.
48
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C … And Much More
49
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C …And Much More Role Based Access Control Multiple Authentication Support for User External Authentication for Administrator Customer My Account Revamp HTTP DDoS attack protection Naming Firewall Rules for easy troubleshooting HTTP & FTP scanning over custom ports
50
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C …And Much More Inline Captive Portal HTTPS Super Enhanced Packet Capture Log & Log Viewer VLAN over WAN Support for MD5 Authentication for RIP & OSPF Enhanced IPS Actions Drop Connection Drop Attack Source
51
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Version X Summary
52
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Security Productivity Connectivity Application Control SSL (HTTPS) Scanning Instant Messaging Control Firmware based Approach Usable GUI Performance 3G Support IPv6 Ready SSL VPN Application Access Mode
53
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.