Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved.

1 Cyberoam - Unified Threat Management End Point Data Pro...
Author: Guest
0 downloads 17 Views

1 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

2 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management

3 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Need for Data Protection

4 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Medical records of 741 patients lost by a hospital 60% corporate data lies unprotected on endpoints Lost USBs Lost Multimedia Discs Wrong Email Attachment Lost iPods Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Bank employee accidentally sent sensitive customer details to wrong email address 12,500 handheld devices forgotten at the back of taxis every 6 months in UK 9000 USB sticks found in people's pockets at the local dry cleaners in UK

5 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy What Places Data At Risk? Applications Web, Mail, IM, P2P, Printing, FTP Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Insiders Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Data At Risk Intellectual property related to R&D Business plans, RFP / Tender quotes Product launch dates and roadmap Customer data Malicious Unintentional

6 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Average cost of security breach - $202 per record lost Total cost per incident averages $6.6 million Immediate Need – End Point Data Protection Cost of Data At Risk

7 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Protect your Data. Protect your Assets.

8 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Comprehensive End Point Data Protection Suite Modules Data Protection & Encryption Device Management Application Control Asset Management

9 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam End Point Data Protection Benefits Enhanced protection to all your Endpoints Across geographic locations Centralized controls Regulatory and Security Compliance Rapid installation Easy to use Maintains security with flexibility Clear ROI

10 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Data Protection & Encryption

11 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Prevent Data Leakage – Email Attachments  Control data shared as attachment in emails  Send customized warning message to user and alert to administrator

12 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Record Data Shared over Webmails  Record content of Webmail such as Yahoo, Gmail & Msn

13 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Prevent Data Leakage - Attachments over Instant Messengers Attachment:.doc NOT ALLOWED File name: confident NOT ALLOWED Size: > 2 MB  Control data shared as attachment over Instant Messengers  Send customized warning message to user and alert to administrator.exe.jpg

14 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Before deleting Operation Modify Delete Fixed Floppy CD rom Removable Network Unknown.jpg.doc Before modifying Before copying/cut to Before copying/cut from Mode of Transfer File Name/Extn. Back up Read Document Prevent Accidental / Malicious Deletion of Data Selective Action & Back-up of Document Control operations over a document and its mode of transfer Back up files before specific actions

15 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server PrinterPrinter TypeSelected files/Extn. Attachment:.xls Attachment:.doc Shared Local Network Virtual Database Server Prevent Data Leakage through Printed Files Copy of Printed File Saved in Database Server Control access to printers in the system Save shadow copy of printed file

16 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Encrypt entire device Attachment:.xls Attachment:.doc Attachment:.jpg Decrypt before reading Encrypt selected files Data Sharing Through Removable Devices Encrypt all/selected files while writing to removable device Decrypt files while reading from a removable device only in organization network - Data in your lost USB device cannot be decrypted and is safe Encrypts Data, Blocks Data Sharing

17 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Record Chat Sessions even for SKYPE Chat session logs Back up server

18 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Device Management

19 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Protect your Data by controlling data over device Allow only authorized devices Device Management Storage Device Communication Interface Device USB Device Network Devices Others Dial Floppy, CD, Burning device, Tape, Removable device Serial ports, parallel ports, modems, Bluetooth Dial-up connection USB keyboard, mouse, modem, storage, hard disk, others Wireless LAN adapter, PnP adapter, Virtual LAN adapter Audio equipment, Virtual CDROM, any new device

20 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Application Control

21 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Protect your Data by Controlling Applications Prevent data loss through unauthorized/indiscriminate use of applications Granular, policy-based application controls - Protect sensitive data & enhance employee productivity - Prevent legal liability, network outages IM tools Entertainment (MP3, MP4, MPEG) Pirated software Screensavers Password crackers

22 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Asset Management Protect your Assets

23 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Need for End Point Asset Management  Organizations exposed to higher levels of threats  Distributed offices  Rise in malware attacks  Tracking Hardware & Software assets  Management of hardware/software inventory  Sophisticated attacks – Targeting vulnerabilities  Need for timely patch implementation across –  Hundreds or thousands of devices  Geographic locations  Immediate need - Centralized, automated asset management

24 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Fighting Threats with Asset Management Protect your Assets Seamless IT infrastructure management Simplifies tracking of IT asset allocation, configuration, version, historical information Control over hardware, software costs Automates and centralizes Patch management Install Software Remotely Silently or in user-interactive mode Meets security compliance requirements Rapid and correct installation of patches Handling bug fixes across network, geographies

25 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy About Cyberoam

26 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Products Cyberoam UTM Cyberoam iView (Open source Logging & Reporting) Cyberoam Central Console (Centralized Management) Cyberoam SSL VPN appliance

27 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam CRi Network Security Appliances Large Enterprises CR 1500i CR 1000i CR 500i Small to Medium Enterprises CR 200i CR 300i CR 100ia Small Offices - Remote Offices CR 50ia CR 35ia CR 25ia CR 15i

28 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam Credentials  Awards  Gartner Positions Cyberoam as a Visionary in Magic Quadrant  Finalist in SC Magazine Awards 2009 for Best SME Security  Finalist in PC Pro Awards 2009  Emerging Vendor of the Year 2008 by Frost & Sullivan  IT Leader of the Year Award by ZDNet Asia  Channel's Favorite Security Company Award 2008 by VAR India  Certifications  Checkmark  ICSA Labs for Firewall  ICSA Labs for Firewalls with Active-Active HA capability  Member of VPNC

29 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy  Established in 1999  Team strength - 400+ employees  Investment from global private equity firm The Carlyle Group  Domain – Communication, Networks, Security  Sales and distribution channel in over 75 countries  Product offering  Cyberoam  Cyberoam iView  Cyberoam End Point Data Protection  CRESTEL  EliteAAA  24online  24online Everywhere Elitecore Technologies

30 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Thank You Question / Answer Session Please visit us at www.secureone.com.my

31 Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.comCopyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Thank You Please visit us at www.secureone.com.my