CYBEROAM - PowerPoint PPT Presentation

1 / 31
About This Presentation
Title:

CYBEROAM

Description:

Before copying/cut to. Before copying/cut from. Mode of Transfer. File Name/Extn. Back up ... CR 50ia. CR 35ia. CR 25ia. CR 15i. Cyberoam Credentials. Awards ... – PowerPoint PPT presentation

Number of Views:2235
Avg rating:3.0/5.0
Slides: 32
Provided by: Elite4
Category:

less

Transcript and Presenter's Notes

Title: CYBEROAM


1
Cyberoam End Point Data Protection Protect your
Data. Protect your Assets.
2
Cyberoam for End Point Data Protection
1. Need for Data Protection 2. Data Protection
Encryption 3. Device Management 4. Application
Control 5. Asset Management
3
Need for Data Protection
4
60 corporate data lies unprotected on endpoints
Lost USBs
Medical records of 741 patients lost by a hospital
9000 USB sticks found in people's pockets at the
local dry cleaners in UK
Lost Multimedia Discs
Personal information of 11.1mn customers of
leading oil refinery (USA) found on streets
Wrong Email Attachment
Bank employee accidentally sent sensitive
customer details to wrong email address
Lost iPods
12,500 handheld devices forgotten at the back of
taxis every 6 months in UK
5
What Places Data At Risk?
Removable Devices
USBs, CDs/DVDs, MP3, Digital cameras
Unintentional
Malicious
Insiders
Applications
Unauthorized transfer of sensitive data
Malware-laden email for information access
Sensitive data sent to wrong person
Web, Mail, IM, P2P, Printing, FTP
Data At Risk
Business plans, RFP / Tender quotes
Intellectual property related to RD
Product launch dates and roadmap
Customer data
6
Cost of Data At Risk
  • Average cost of security breach - 202 per
    record lost
  • Total cost per incident averages 6.6 million
  • Immediate Need End Point Data Protection

7
Cyberoam End Point Data Protection
Protect your Data. Protect your Assets.
8
Cyberoam End Point Data Protection
  • Comprehensive End Point Data Protection Suite
  • Modules
  • Data Protection Encryption
  • Device Management
  • Application Control
  • Asset Management

9
Cyberoam End Point Data Protection
  • Benefits
  • Enhanced protection to all your Endpoints
  • Across geographic locations
  • Centralized controls
  • Regulatory and Security Compliance
  • Rapid installation
  • Easy to use
  • Maintains security with flexibility
  • Clear ROI

10
Data Protection Encryption
11
Prevent Data Leakage Email Attachments
  • Control data shared as attachment in emails
  • Send customized warning message to user and alert
    to administrator

12
Record Data Shared over Webmails
  • Record content of Webmail such as Yahoo, Gmail
    Msn

13
Prevent Data Leakage - Attachments over Instant
Messengers
Attachment .doc NOT ALLOWED
.jpg
.exe
File name confident NOT ALLOWED
Size gt 2 MB
  • Control data shared as attachment over Instant
    Messengers
  • Send customized warning message to user and alert
    to administrator

14
Prevent Accidental / Malicious Deletion of Data
Selective Action Back-up of Document
  • Control operations over a document and its mode
    of transfer
  • Back up files before specific actions

15
Prevent Data Leakage through Printed Files
Copy of Printed File Saved in Database Server
  • Control access to printers in the system
  • Save shadow copy of printed file

16
Data Sharing Through Removable Devices
Encrypts Data, Blocks Data Sharing
  • Encrypt all/selected files while writing to
    removable device
  • Decrypt files while reading from a removable
    device only in organization network
  • - Data in your lost USB device cannot be
    decrypted and is safe

17
Record Chat Sessions even for SKYPE
Back up server
18
Device Management
19
Protect your Data by controlling data over device
USB Device
USB keyboard, mouse, modem, storage, hard disk,
others
Storage Device
Floppy, CD, Burning device, Tape, Removable
device
Dial
Dial-up connection
Network Devices
Others
Wireless LAN adapter, PnP adapter, Virtual LAN
adapter
Audio equipment, Virtual CDROM, any new device
Communication Interface Device
Serial ports, parallel ports, modems, Bluetooth
  • Allow only authorized devices

20
Application Control
21
Protect your Data by Controlling Applications
  • Prevent data loss through unauthorized/indiscrimin
    ate use of applications
  • Granular, policy-based application controls
  • - Protect sensitive data enhance employee
    productivity
  • - Prevent legal liability, network outages

22
Asset Management Protect your Assets
23
Need for End Point Asset Management
  • Organizations exposed to higher levels of threats
  • Distributed offices
  • Rise in malware attacks
  • Tracking Hardware Software assets
  • Management of hardware/software inventory
  • Sophisticated attacks Targeting vulnerabilities
  • Need for timely patch implementation across
  • Hundreds or thousands of devices
  • Geographic locations
  • Immediate need - Centralized, automated asset
    management

24
Fighting Threats with Asset ManagementProtect
your Assets
  • Seamless IT infrastructure management
  • Simplifies tracking of IT asset allocation,
    configuration, version, historical information
  • Control over hardware, software costs
  • Automates and centralizes
  • Patch management
  • Install Software Remotely
  • Silently or in user-interactive mode
  • Meets security compliance requirements
  • Rapid and correct installation of patches
  • Handling bug fixes across network, geographies

25
About Cyberoam
26
  • Products
  • Cyberoam UTM
  • Cyberoam iView (Open source Logging Reporting)
  • Cyberoam Central Console (Centralized Management)

27
  • Cyberoam CRi Network Security Appliances
  • Large Enterprises
  • CR 1500i
  • CR 1000i
  • CR 500i
  • Small to Medium Enterprises
  • CR 200i
  • CR 300i
  • CR 100ia
  • Small Offices - Remote Offices
  • CR 50ia

28
Cyberoam Credentials
  • Awards
  • Gartner Positions Cyberoam as a Visionary in
    Magic Quadrant
  • Finalist in SC Magazine Awards 2009 for Best SME
    Security
  • Finalist in PC Pro Awards 2009
  • Emerging Vendor of the Year 2008 by Frost
    Sullivan
  • IT Leader of the Year Award by ZDNet Asia
  • Channel's Favorite Security Company Award 2008 by
    VAR India
  • Certifications
  • Checkmark
  • ICSA Labs for Firewall
  • ICSA Labs for Firewalls with Active-Active HA
    capability
  • Member of VPNC

29
Elitecore Technologies
  • Established  in 1999
  • Team strength - 400 employees
  • Investment from global private equity firm The
    Carlyle Group
  • Domain Communication, Networks, Security
  • Sales and distribution channel in over 75
    countries
  • Product offering
  • Cyberoam
  • Cyberoam iView
  • Cyberoam End Point Data Protection
  • CRESTEL
  • EliteAAA
  • 24online
  • 24online Everywhere

30
Thank You
Please visit us at www.secureone.com.my
31
Thank You
Thank You
Please visit us at www.secureone.com.my
Write a Comment
User Comments (0)
About PowerShow.com