Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.

1 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our ...
Author: Malik Hille
0 downloads 14 Views

1 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM

2 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Agenda of Presentation  About Elitecore Technologies  Cyberoam UTM  Cyberoam Credentials/ Awards/ Accreditations

3 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Established in 1999  400+ Employees  ISO 9001:2000 certified company  Backed by World’s Largest Private Equity Group ($90bn)  Sales, Distribution Channel & Customers across 75+ countries  Communication - Networks – Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution About Elitecore Technologies

4 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

5 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Internal threats  Identity theft  Data loss  Data deletion  Data modification External threats  Worms  Malicious code  Virus  Malware Social Engineering threats  Spam  Phishing  Pharming  Data theft  DoS attacks  Hacking USER Attack on Organization User – The Weakest Security Link

6 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 8 Technology – Security around the User -Treats User-Identity as the 8th Layer in Network stack -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity-based security policies  Identifies traffic by username even in case of dynamic IP Layer 8 – The Human Layer indicates a feature unique to Cyberoam

7 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security User

8 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Cyberoam’s Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 – The Human Layer

9 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM- Identity-based Security  Integrated security over single platform  Layer 8 penetrates through each security module

10 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Intrusion Prevention Policies Anti-Malware Anti-Spam Web Filtering Layer 7 Controls Bandwidth Management & QoS Instant Messaging Archiving & Control Internet Surfing Quota Internet Access Time Internet Data Quota Cyberoam Audits Identity - based Logs + Reports MAC Id Session Id Cyberoam Layer 8 Advantage

11 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SecurityConnectivityProductivity Organizational Concerns  Network security  Content Security  Administrative Security  Business Continuity  Network Availability  Future-ready connectivity  Employee productivity  IT resource optimization  Administrator productivity

12 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES SECURITY Network SecurityContent SecurityAdministrative Security  Firewall  IPS  Wireless security  Anti-Malware  Anti-Spam  HTTPS Content security  Next-Gen UI  iView- Logging & Reporting

13 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Stateful Inspection Firewall (Fusion Technology) SECURITY » Network Security » Firewall -Interface for achieving Unified Security  Identity-based policies enable security, connectivity, productivity Fusion Technology

14 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Intrusion Prevention System -3500+ signatures - broadest security cover -Internet Threat Response Team  Regular Signature updates -Quick protection against latest vulnerabilities -IPS Policy Tuner  Allows multiple IPS policies  Granular control over IPS policies -Unnecessary alerts -Reduced traffic latency -Improved performance SECURITY » Network Security » IPS

15 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Cyberoam IPS + Layer 8 Technology  Identity-based IPS policies per user or group  Identity-based alerts and reports -Visibility into applications – User, Source, Destination, Usage -Overview of threat status – Top alerts, top attackers, top victims SECURITY » Network Security » IPS

16 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Wireless (WLAN) Security -High performance, integrated security over WLAN  Secures wireless networks to the extent of wired networks -Supports 802.11n wireless standard -Layer 8 over WLAN  Identity-based policies in dynamic IP environment  MAC-based filtering  Supports IP-address pool -Enhances security SECURITY » Network Security » Wireless security

17 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Gateway Anti-Malware -4 million+ signatures -Bi-directional scanning of web & email -Self-service Virus Quarantine -Reduced window of vulnerability  Broadest security cover against all malware -Scans  HTTP, FTP, SMTP, POP3  HTTPS, IMAP  Instant Messenger traffic -Layer 8 Impact  Identity-based virus reports -Instant visibility into attacker/victim  Identity-based Quarantine policies SECURITY » Content Security » Anti-Malware indicates feature offered only by top-rated UTMs

18 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam  Gateway Anti-Spam -IP Reputation Filtering  Blocks 85% of incoming messages at gateway -Saves bandwidth -Near 98% spam detection -False Positive rate of 1 in a million  Reduces fear of losing business emails - Self-Service quarantine area

19 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -User-based Spam Digest  Frees administrator time & management -Manage Email recipients  Data leakage prevention and archiving -Scanning with Recurrent Pattern Detection (RPD) technology  Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 SECURITY » Content Security » Anti-Spam -Virus Outbreak Detection (VOD) for zero-hour protection -Scans SMTP, POP3, IMAP traffic

20 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam -RPD Technology -Most outbreaks last only a few hours -Cyberoam identifies outbreaks real-time -Signature-based Anti-Spam take time to release signatures -Users remain unprotected till Anti-Spam is updated -Too late to battle out the initial peak of attack

21 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  HTTPS/SSL Content Security -Scans SSL traffic for virus & malware -Controls File upload over SSL -Reports files uploaded via SSL -Stops HTTPS/SSL as a medium for  Data Leakage  Malware Propagation SECURITY » Content Security » HTTPS Content Security indicates feature offered only by top-rated UTMs

22 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Next-Gen UI -Web 2.0 technology advantages -Easy navigation, custom controls, intuitive interface  Fewer security errors - Increases security  Enhances administrative productivity  Shorter learning curves -Unified Security  Rules for all security features from firewall page SECURITY » Administrative Security » Next-Gen UI

23 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Cyberoam iView – On-Appliance Logging & Reporting -Ability to log and report activities -LAYER 8 - Identity-based logging and reporting – Pinpoints the user -Security Management  iView dashboard- Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  1000+ Reports -Log Management -Compliance Management  HIPAA, PCI DSS, GLBA, and more -Forensic Analysis SECURITY » Administrative Security » iView- Logging & Reporting

24 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

25 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES CONNECTIVITY Business ContinuityNetwork AvailabilityFuture-ready connectivity  Multiple Link Management  High Availability  VPN  3G/WiMAX modem support  IPv6

26 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Multi-Link Management -Automated Load balancing assures ROI/investment  Support for more than 2 ISP links  Supports Wireless WAN (3G USB modems) CONNECTIVITY » Business Continuity » Multiple Link Management 3G

27 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CONNECTIVITY » Business Continuity » Multiple Link Management -Link Failover  Supports multiple failover conditions  Monitors link availability of multiple WAN connections  Transfers traffic from a failed link to a working link -Maximizes business up-time -Optimizes link utilization for business continuity  Active-Active Auto Link Failover  Active-Passive Auto Link Failover  Support for more than 2+ ISP links  Supports WWAN for failover

28 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Layer 8 Policy-based Routing  Routes traffic based on: -Source IP addresses -Protocols -Users  Assures Quality of Service for key users and applications CONNECTIVITY » Business Continuity » Multiple Link Management

29 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  ICSA Labs Certified Active Active High Availability -Maximizes network uptime -Reduces single-point-of-failure -Ensures continuous Cyberoam security -Ensures business continuity CONNECTIVITY » Business Continuity » High Availability

30 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Virtual Private Network (VPN) -Anywhere, any device secure remote connectivity -Supports  IPSec, L2TP, PPTP technologies  SSL-VPN -Client-type independent Web access mode -Application access mode -Client mode  Threat Free Tunneling (TFT) Technology  Scans traffic entering VPN tunnel for: -Malware -Spam -Inappropriate content -Intrusion attempts -Maintains secure endpoint and network environments CONNECTIVITY » Network Availability » VPN

31 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  3G/WiMAX – USB Modem Support -High-speed wireless WAN (WWAN) -Wide ISP support -All gateway security features available  Can function as a main or failover link CONNECTIVITY » Network Availability » 3G/WiMAX modem support 3G

32 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization  Content Filtering  IM controls  Bandwidth Management  Traffic Discovery  Layer 7 Administrator Productivity  Next-Gen UI

33 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  IPv6  ‘IPv6 Ready’ gold logo -Cyberoam identifies and processes IPv6 traffic  Third-party validation -International Testing Program with 3000+ rigorous test cases  IPv6 compliance to become mandatory in government and other enterprises -Driven by diplomatic initiatives CONNECTIVITY » Future-ready connectivity » IPv6

34 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Content Filtering -Industry’s most comprehensive URL database  82+ categories  44 million+ URLs -On-appliance web category database  Faster access  Surfing pattern privacy -Controls access to HTTP & HTTPS hosted websites  Increases productivity Productivity » Employee Productivity » Content Filtering

35 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Controls that are difficult to bypass  Blocks Google cache pages  Search keyword reports  Blocks embedded URLs  Detects/Blocks Third Party Proxy and Tunneling software -Controls access to Instant Messengers, P2P -Controls Data Leakage  Blocks files from uploading to web pages  Blocks file transfer through Instant Messengers Productivity » Employee Productivity » Content Filtering

36 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  IM Controls -Identity-based controls for Yahoo messenger and Windows Live Messenger -Scans malware -Logs and controls  Access  Conversation  File transfer  Voice/Webcam Productivity » Employee Productivity » IM controls

37 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Best of Breed Bandwidth Management/QoS -Application and Identity-based bandwidth allocation -Category wise Bandwidth management -Restrict Bandwidth usage for a combination of source, destination and service/service group -Schedule-based bandwidth allocation -Committed and burstable bandwidth Productivity » IT Resource Optimization » Bandwidth Management

38 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Traffic Discovery -Real-time visibility into bandwidth utilization by user, protocol, application -Provides visibility of unproductive usage of resources and threat incidence Productivity » IT Resource Optimization » Traffic Discovery

39 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 7 -Offers visibility and management over Application Layer 7 -Allows control over application, user, time and bandwidth  Essential for Cloud Computing -Bandwidth Management assures availability of business- critical applications -Controls bandwidth costs Productivity » IT Resource Optimization » Layer 7

40 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security VoIP Bit Torrent CRM ERP IM Application Web mail Internet Medium Quality High Quality Low Quality Application Layer 7 Visibility

41 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Multi-core Technology -High Security without compromising on performance -Multi-core processors  Parallel processing of Cyberoam security features -Real-time, Unified Security  Higher Throughputs -High-speed memory access to signatures  Security against advanced threats Cyberoam Architecture

42 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Extensible Security Architecture (ESA) -Ability to adapt to future security needs -Ability to support feature enhancements in future -Ready for future upgrades Vs ASIC Cyberoam Architecture

43 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Central Console

44 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Centralized controls and security management over remote networks  Reduces operational complexity and deployment time  Minimizes errors and lowers administration cost  Enables the MSSPs to have different personnel for managing different customer deployments  Ease of use with view of multiple devices and network status at a glance Cyberoam Central Console

45 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

46 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SSL VPN

47 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Supports remote access VPN users and site-to-site VPN connections  Accommodates between 50 to 1000 concurrent users  Policy-based resource access control  Zero-client administration  Flexibility in purchasing remote security solutions: -Virtual appliance mode -Dedicated appliance mode SSL VPN

48 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Dedicated SSL VPN appliance Deployment

49 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual SSL VPN Deployment Diagram

50 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView

51 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Available as Open Source software and as Appliance  Ability to log and report activities from various devices/ vendors  Log Management -Near real-time log retrieval -Archival and Search facility  Security Management -iView dashboard – Shows network attacks on single screen -1000+ Reports  Compliance Management -Reduces compliance costs -Single click access to reports - Simplified compliance management -Easy visibility into access by users Cyberoam iView

52 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Forensic Analysis -Reconstructing sequence of events in a security breach -Reporting stands in the face of legal scrutiny  Benefits -Security Benefits  Centralized control  Identifies attacks based on – -Attack Reports (Type of Reports) -Deviation from norm in access or usage of resources  Allows quick investigation and determination of cause of breach Cyberoam iView

53 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Compliance Benefits  Access and Usage logs of -Activity in critical applications, databases -Data transmitted to external entities  Enables setting user identity-based thresholds for acceptable use -Productivity Benefits  Shows deviation in resource consumption -Financial Benefits  Low capital requirements  Low technical manpower requirements Cyberoam iView

54 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

55 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam - Endpoint Data Protection

56 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Endpoint protection: -Across geographic locations -Centralized controls -Regulatory and Security compliance  Cyberoam Endpoint Data Protection suite -Data Protection & Encryption  Prevents data leakage through: -Email attachments -Web mail -Instant Messengers -Printed files  Encrypts files/device while writing data to removable devices  Document back-up prevents accidental/malicious data deletion Cyberoam - Endpoint Data Protection

57 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Device Management  Protects data by controlling data over: -USB device -Storage device -Network device -Communication Interface device -Others -Application Control  Protects data by controlling unauthorized/indiscriminate use of applications -Enhances employee productivity -Prevents legal liabilities, network outages Cyberoam - Endpoint Data Protection

58 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Asset Management  Offers IT infrastructure management  Automates and centralizes  Allows remote software installations  Meets security compliance requirements Cyberoam - Endpoint Data Protection

59 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Appliance Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN

60 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other Appliances  Cyberoam Central Console -CCC 15 -CCC 50 -CCC 100 -CCC 200  SSL VPN Appliance -CR-SSL-800 -CR-SSL-1200 -CR-SSL-2400  Cyberoam iView -CR-iVU25

61 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam CRi UTM Appliance Range  Large Enterprises -CR 1500i -CR 1000i -CR 500ia  Small to Medium Enterprises -CR 300i -CR 200i -CR 100ia -CR 50ia  Remote Offices -CR 35ia -CR 25ia -CR 15i

62 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Subscription Model

63 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Identity-based Firewall  VPN  Free SSL-VPN  Bandwidth Management  Multiple Link Management  On Appliance Reporting  Basic Anti-Spam (RBL Service) Basic Appliance

64 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)  Gateway Anti-spam Subscription  Web & Application Filtering Subscription  Intrusion Prevention System (IPS)  24 x 7 Tech Support & Warranty Bundled Subscriptions

65 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Bundled Subscriptions  TVS (Total Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Gateway Anti-spam Subscription -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 Email, phone and chat Tech Support  SVS (Security Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 Email, phone and chat Tech Support Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

66 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review

67 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security 2008 - Emerging Vendor of the Year Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year Award in the Network Security Market

68 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium

69 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SC Magazine Five Star Rating – Four Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch”  “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i  “console is well organized and intuitive to navigate”  “flexible and very powerful”  “this appliance is a good value for almost any size environment”.

70 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best Integrated Security Appliance Best Security Solution for Education Best Unified Security Tomorrow’s Technology Today 2007 2007, 2008 Finalist Network Middle East Award 2008 Finalist Channel Middle East Award VAR Editor’s Choice for Best UTM (2007) Finalist - 2008 Global Excellence in Network Security Solution ZDNET Asia- IT Leader Of the Year 2008 2008 Emerging Vendor of the Year for Network Security SMB Product of the Year 2008 – Best Content Filtering Awards

71 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele

72 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele (Cont’d)

73 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Middle East Clientele

74 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Thank You