Cyber o Am Ut M Presentation
Cyber o Am Ut M Presentation
Cyber o Am Ut M Presentation
Q.2. Would you settle for Plain Security if you had the choice of Identity-based security?
Q. 3. Are your remote offices as secure as the Head Office? At what cost?
Lost iPods
12,500 handheld devices forgotten at the back of
taxis every 6 months in UK
Removable Devices
USBs, CDs/DVDs, MP3,
Digital cameras
Unintentional
Malicious
Insiders
Applications
Data At Risk
Intellectual property related to R&D Business plans, RFP / Tender quotes
Product launch dates and roadmap Customer data
Branches
Desktops
, Branch
Servers
Alternative
Channels
Branch User/Admins
Core-Banking
Application
WAN,
WAN,
Internet
Internet
OS, Database
Internet-Banking
ATM
Network Administrators
System Administrators
Cyberoam
Unified Threat
Management
What is Cyberoam?
1. Comprehensive Security with
Performance-Effectiveness-Granularity
Firewall-VPN-IPS
High-Availability &
Multiple Link Management
On-Appliance Reporting
2. Identity-based Security
3. Comprehensive Branch Office Security
Dimension 1
Firewall-VPN-IPS
Dimension 1
Certifications
ICSA certified Firewall
Checkmark certified Enterprise UTM
Interoperability with 3rd party VPN - VPNC certified
Benefits
Prevents file uploads and data leakage via IM
IPS signatures to prevent abnormal activity
Works on Layer 8 The Human layer
Allows users to carry their access rights anywhere in the network
Dimension 1
Dimension 1
Anti-Virus:
99 % Anti-Virus detection rate; Zero-hour protection
Virus Outbreak Detection Zero-hour protection
Anti-Spam:
98 % Spam detection rate Low False Positive
Scans SMTP, POP3, IMAP with Recurrent Pattern Detection (RPDTM)
Content-agnostic and language independent Image spam and emerging spam
Certification
Checkmark certified Anti-virus and Anti-spam
Dimension 1
Content Filtering
Dimension 1
Certifications
Checkmark certified Content Filtering
Network Products Guide award - 2008
Benefits
Prevents entry of malware through unrestricted surfing
Policies based on user identity
Prevents Data Leakage
Bandwidth Management
&
Multiple Link Management
Dimension 1
Dimension 1
Why Cyberoam?
Dimension - 2
Identity-based Security
Need-to-Use basis
User
Why Cyberoam?
Dimension - 3
Branch Office Security
Dimension 3
Why Cyberoam?
Branch Office Security
Comprehensive security
Branch user visibility and controls at HQ
Proven interoperability with 3rd party VPNs VPNC certified
WAN optimization at branches
Bandwidth efficiency
Simplified Operations No need for technical resource
Remote web-GUI management
Dimension 3
Secure Remote Access
IPSec & SSL VPN on UTM Appliance
Anywhere Secure Access to telecommuters, road warriors,
partners
Threat Free Tunneling Technology Scans endpoint for
malware
Clientless VPN
Full or limited access based on user work profile
High scalability
Easy to use and manage