www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Our Products
Unified Threat Management Cyberoam Central Console (CCC) SSL VPN
Data Protection & Encryption
Device Management
Application Control
Asset Management
Cyberoam – Endpoint Data Protection
Comprehensive Network Security
CYBEROAM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Agenda of PresentationAgenda of Presentation
About Elitecore Technologies Cyberoam USP UTM Cyberoam Credentials/ Awards/ Accréditations
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Established in 1999 400+ Employees ISO 9001:2000 certified company Backed by World’s Largest Private Equity Group ($90bn)
Sales, Distribution Channel & Customers across 75+ countries Communication - Networks – Security
- Cyberoam - Network to Endpoint Security- CRESTEL - Telecommunication OSS BSS- EliteAAA - Telecommunication - 24online - Bandwidth Management Solution
About Elitecore TechnologiesAbout Elitecore Technologies
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Internal threats Identity theft Data loss Data deletion Data modification
External threats Worms Malicious code Virus Malware
Social Engineeringthreats
Spam Phishing Pharming
Data theft DoS attacks Hacking
USER
Attack on Organization
User – The Weakest Security Link
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Layer 8 Technology – Security around the User- Network security decisions based on Usernames and
IP Addresses Control Who is doing What in the network Allows creation of User Identity-based security policies Identifies traffic by username even in case of dynamic IP
Layer 8 – The Human LayerLayer 8 – The Human Layer
indicates a feature unique to Cyberoam
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
UserUser
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam’s Layer 8 Technology adds SPEED to security- Offers instant visibility into source of attacks- Identifies attackers/victims with usernames- Allows immediate remediation to restore security or enables
proactive security- Quickly and easily configure and manage policies based on
users
Layer 8 – The Human LayerLayer 8 – The Human Layer
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam UTM- Identity-based Security
Integrated security over single platform
Layer 8 penetrates through each security module
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Security Connectivity Productivity
Organizational Concerns
Network security
Content Security
Administrative Security
Business Continuity
Network Availability
Future-ready connectivity
Employee productivityIT resource optimizationAdministrator productivity
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam UTM solves Organizational Concerns
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam Product walk thru
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM ASSURES SECURITY
Network Security Content Security Administrative Security
Firewall IPS Wireless security
Anti-Malware Anti-Spam HTTPS Content
security
Next-Gen UI iView- Logging &
Reporting
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Stateful Inspection Firewall (Fusion Technology)
SECURITY » Network Security » Firewall
- Interface for achieving Unified Security Identity-based policies enable security,
connectivity, productivity
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Other UTMs
User Login
Cyberoam Authenticates
• User• IP Address• MAC Id• Session Id
Cyberoam Authorizes
• Access Time • Internet Quota• Security Policies• Web Filtering• Layer 7 Controls• QoS• IM Controls
Cyberoam Audits
• Identity - based Logs + Reports
• MAC Id• Session Id
Cyberoam Layer 8 Advantage
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Identity
+
Security
+
Connectivity
+
Productivity
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IP Less Identity- Layer-8 Identity over Thin Client / Terminal Server- Windows Terminal Server- Citrix XenServer- All user based policies to terminal servers- Not limited to just Content Filtering- Authenticates and filters all TCP applications
SECURITY » Content Security » Anti-Malware
Terminal Server
XenServer
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Intrusion Prevention System- Cyberoam IPS + Layer 8 Technology
Identity-based IPS policies per user or group Identity-based alerts and reports
- Visibility into applications usage - User, Source, Destination, Usage
- Overview of threat status - Top alerts, top attackers, top victims
3500+ signatures – broadest security cover Internet Threat Response Team Allows multiple IPS policies
SECURITY » Network Security » IPS
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
(Alex)
(Alex)
(Nancy)
(Nancy)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Wireless (WLAN) Security- High performance, integrated
security over WLAN Secures wireless networks to
the extent of wired networks
- Supports 802.11n wireless standard
- Multiple Virtual Access Points- Layer 8 over WLAN
Identity-based policies in dynamic IP environment
MAC-based filtering Supports IP-address pool
- Enhances security
SECURITY » Network Security » Wireless security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Gateway Anti-Malware - 4 million+ signatures- Bi-directional scanning of web & email- Self-service Virus Quarantine- Reduced window of vulnerability
Broadest security cover against all malware
- Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic
- Layer 8 Impact Identity-based virus reports
- Instant visibility into attacker/victim Identity-based Quarantine policies
SECURITY » Content Security » Anti-Malware
indicates feature offered only by top-rated UTMs
Anti-Virus
Anti-Spyware
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SECURITY » Content Security » Anti-Spam
Gateway Anti-Spam- IP Reputation Filtering
Blocks 85% of incoming messages at gateway- Saves bandwidth
- Near 98% spam detection- False Positive rate of 1 in a million
Reduces fear of losing business emails
- Self-Service quarantine area- User-based Spam Digest
Frees administrator time & management- Manage Email recipients
Data leakage prevention and archiving
Premium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Scanning with Recurrent Pattern Detection (RPD) technology Content-agnostic, multi-language security against all spam types
viz. pdf, excel, mp3
SECURITY » Content Security » Anti-Spam
- Virus Outbreak Detection (VOD) for zero-hour protection- Scans SMTP, POP3, IMAP traffic
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SECURITY » Content Security » Anti-Spam
- RPD Technology- Most outbreaks last only a few hours- Cyberoam identifies outbreaks real-time- Signature-based Anti-Spam take time to release signatures
- Users remain unprotected till Anti-Spam is updated - Too late to battle out the initial peak of attack
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Email Management:
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
HTTPS/SSL Content Security- Scans SSL traffic for virus & malware- Controls File upload over SSL- Reports files uploaded via SSL- Stops HTTPS/SSL as a medium for
Data Leakage Malware Propagation
SECURITY » Content Security » HTTPS Content Security
indicates feature offered only by top-rated UTMs
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Next-Gen UI- Web 2.0 technology advantages- Easy navigation, custom controls, intuitive interface
Fewer security errors - Increases security Enhances administrative productivity Shorter learning curves
- Unified Security Rules for all security features from firewall page
SECURITY » Administrative Security » Next-Gen UI
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam iView – On-Appliance Logging & Reporting- Ability to log and report activities- LAYER 8 - Identity-based logging and reporting –
Pinpoints the user- Security Management
iView dashboard- Shows network attacks on single screen Drill-down reports – 3rd level drill-down for attack details 1000+ Reports
- Log Management- Compliance Management
HIPAA, PCI DSS, GLBA, and more
- Forensic Analysis
SECURITY » Administrative Security » iView- Logging & Reporting
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
Logs & Events
Identity
Logging Reporting
ComplianceManagement
ForensicAnalysis
Data Protection
Security Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
User Dashboard
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Combined Report
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Attacks
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Denied Categories
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Categories
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Web Users
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Search Engine – Google Search Results
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Spam Recipients
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM ASSURES CONNECTIVITY
Business Continuity Network Availability Future-ready connectivity
Multiple Link Management
High Availability
VPN 3G/WiMAX
modem support
IPv6
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Multi-Link Management- Automated Load balancing assures ROI/investment
Support for more than 2 ISP links Supports Wireless WAN (3G USB modems, Wimax)
CONNECTIVITY » Business Continuity » Multiple Link Management
- Link Failover Supports multiple failover conditions Monitors link availability of multiple WAN connections Transfers traffic from a failed link to a working link
- Maximizes business up-time- Optimizes link utilization for business continuity
Active-Active Auto Link Failover Active-Passive Auto Link Failover Support for more than 2+ ISP links Supports WWAN for failover
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Layer 8 Policy-based Routing
Routes traffic based on:- Source IP addresses - Protocols- Users
Assures Quality of Service for key users and applications
CONNECTIVITY » Business Continuity » Multiple Link Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Active-Active gateway load balancing
Sales Dept. Finance Dept.Dev. Dept.
Failover Link
ISP1 (MPLS)(10 mbps)
ISP2 (ADSL)(5 mbps)
ISP3 (3G)(1 mbps)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Policy Based Routing
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
ICSA Labs Certified High Availability- Supports
• Active – Active• Active - Passive
- Maximizes network uptime - Reduces single-point-of-failure - Ensures continuous Cyberoam security- Ensures business continuity
CONNECTIVITY » Business Continuity » High Availability
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity- Supports
IPSec, L2TP, PPTP technologies SSL-VPN
- Client-type independent Web access mode- Application access mode- Client mode
Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for:
- Malware- Spam- Inappropriate content - Intrusion attempts
- Maintains secure endpoint and network environments
CONNECTIVITY » Network Availability » VPN
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SSL VPN User Portal
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SSL VPN User Portal
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IPv6 (Future Ready Connectivity) ‘IPv6 Ready’ gold logo
- Cyberoam identifies and processes IPv6 traffic
Third-party validation- International Testing Program with
3000+ rigorous test cases IPv6 compliance to become
mandatory in government and other enterprises
- Driven by diplomatic initiatives
CONNECTIVITY » Future-ready connectivity » IPv6
IPV4
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM ASSURES PRODUCTIVITY
Employee Productivity
IT Resource Optimization
Content Filtering IM controls
Bandwidth Management
Traffic Discovery Layer 7
Administrator Productivity
Next-Gen UI
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Content Filtering
- Industry’s most comprehensive URL database
82+ categories 44 million+ URLs
- On-appliance web category database Faster access Surfing pattern privacy
- Controls access to HTTP & HTTPS hosted websites
Increases productivity
Productivity » Employee Productivity » Content Filtering
Premium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Controls that are difficult to bypass
Filters Web 2.0 content Blocks Google cache pages Search keyword reports Blocks embedded URLs Detects/Blocks Third Party Proxy
and Tunneling software- Controls Data Leakage
Blocks files from uploading to web pages
Blocks file transfer through Instant Messengers
Productivity » Employee Productivity » Content Filtering
Premium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Web Categories (82+)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Identity Based PoliciesIdentity Based Policies
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Control who can chat with whom
Archive Communication
Control communication medium(chat, video, voice, file transfer)
Data Protection
Productivity
Instant Messaging & Control
Productivity / Employee Productivity / IM controls
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Controls- Identity-based controls for Yahoo messenger and Windows Live
Messenger- Scans malware- Logs and controls
Access Conversation File transfer Voice/Webcam
Productivity » Employee Productivity » IM controls
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Controls for Yahoo MSG:
Data Leak Protection (File Transfer Control)Who can chat with whom!Logging of Chat Conversations
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Controls for MSN & Windows Messenger:
Logging of Chat ConversationsWho can chat with whom!Logging of Chat Conversations
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Data Loss Prevention regular expression (RegEx):- Detect specific data including:
- Social Security Numbers (SSN)- Credit Card Numbers (CCN)- ABN Routing Numbers
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Audit Logs:
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Best of Breed Bandwidth Management/QoS
- Application and Identity-based bandwidth allocation- Category wise Bandwidth management- Restrict Bandwidth usage for a combination of source,
destination and service/service group - Schedule-based bandwidth allocation- Committed and burstable bandwidth
Productivity » IT Resource Optimization » Bandwidth Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Application based bandwidth management:
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Traffic Discovery- Real-time visibility into bandwidth utilization by user,
protocol, application- Provides visibility of unproductive usage of resources
and threat incidence
Productivity » IT Resource Optimization » Traffic Discovery
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Traffic Discovery:
Live Traffic Analysis including Bandwidth, Data Transfer Connection InformationLive traffic filtering by Application, User, IP AddressFilter traffic for specific applicationTraffic Filtering by Firewall Rule-ID, IP Address, Port etc.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Layer 7- Offers visibility and management over Application Layer 7
- Allows control over
• Who (User)
• When (Time)
• What (Application)
• How (Bandwidth) Essential for Cloud Computing
- Assures availability of business-critical applications
- Controls bandwidth costs
Productivity » IT Resource Optimization » Layer 7
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CRM ERPSalesforce
YouTubeIM
ApplicationWebmail
CasualTraffic
Application Firewall Crowd of Applications Bandwidth Management
Cyberoam Application Firewall
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CRM
ERP
Salesforce
YouTube
IM Application
Webmail
CasualTraffic
Application Firewall Crowd of Applications Bandwidth Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Identity based Technology - The Reason
Username / IP AddressApplication Based Control.
Controls over 5000+ Applications
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Summary
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Human Approach
• Numbers – Hard & Boring to remember! 192.168.1.2
172.16.13.123
10.12.111.213
Names - Used daily!!!19
2.16
8.10
.122
172.
17.1
2.12
3
10.1
2.11
.23
192.168.11.21172.16.13.12310.12.111.213
192.168.10.122172.17.12.123
10.12.11.23
John
Lisa
AngelinaCarlPatricStefan SophiePam
AlbertCamileS
imon
Mic
hael
Chr
is
TonyMegan
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Extensible Security Architecture (ESA)
- Ability to adapt to future security needs- Ability to support feature enhancements in future - Ready for future upgrades Vs ASIC
Cyberoam ArchitectureCyberoam Architecture
Multi-core Technology- Multi-core processors
Parallel processing of Cyberoam security features
- Real-time, Unified Security Higher Throughputs
- High-speed memory access to signatures Security against advanced threats
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam Credentials
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”
Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight
IDC ReviewIDC Review
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam ranks 5th in“Completeness of Vision”
Gartner ranks Cyberoam as a “Visionary” in July 2009 Magic Quadrant for SMB Multifunction FirewallsGartner ranks Cyberoam as a “Visionary” in July 2009 Magic Quadrant for SMB Multifunction Firewalls
FortinetSonicwall
WatchGuard
Astaro
Cyberoam
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Astaro x
Checkpoint x
Cisco x
Cyberoam x
eSoft
Fortinet x
IBM x
NetAsq x
Secure Computing x
Sonicwall x
StillSecure x
Untangle x
Watchguard x
Strong Positive
RATING
Strong Negative
Caution Promising Positive
Gartner Market Scope (Q2 2008) SMB Multifunction FirewallsGartner Market Scope (Q2 2008) SMB Multifunction Firewalls
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
2008 - Emerging Vendor of the Year2008 - Emerging Vendor of the Year
Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year
Award in the Network Security Market
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam CertificationsCyberoam Certifications
Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP
UTM Level 5: Cyberoam holds a unique & complete UTM certification
ICSA Certified Firewall
VPNC Certified for Basic VPN & AES Interoperability
ICSA Certified High-Availability
PremiumPremium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SC Magazine Five Star Rating – Five Times in a Row!SC Magazine Five Star Rating – Five Times in a Row!
April 2009 – Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“
December 2008 – Product review Cyberoam CR100i“Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”
March 2008 – UTM Roundup Cyberoam CR1000i “Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”.
July 2007 – UTM Roundup Cyberoam CR250i “console is well organized and intuitive to navigate” “flexible and very powerful” “this appliance is a good value for almost any size environment”.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Best Integrated SecurityAppliance Best Security Solution forEducation Best Unified Security
Tomorrow’s TechnologyToday 2007
2007, 2008 FinalistNetwork MiddleEast Award2008 Finalist ChannelMiddle East Award
VAR Editor’s Choice for Best UTM (2007)
Finalist - 2008 GlobalExcellence inNetwork SecuritySolution
ZDNET Asia- IT Leader Of the Year 2008
2008 Emerging Vendor of the Year for Network Security
SMB Product of the Year
2008 – Best Content Filtering
AwardsAwards
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Partial ClientelePartial Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Partial ClientelePartial Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam maximizes Return Over Investment. We are fully satisfied with Cyberoam Unified Threat Management solution.” Mr. Avnesh JainSr. Manager, Information SystemsHero Honda Motors Limited
TestimonialsTestimonials
“Since its deployment, unlike FortiGate, Cyberoam has been able to give wire speed performance. We soon plan to invest more in Cyberoam appliances to protect our other operations. The most important quality of Cyberoam is its unobtrusive businessfriendly wire-speed security. Cyberoam All-in-One solution is running very well and can change people’s mind about the performance of UTM solutions” Mr. Vo Remy Manager, IT Department, Societe Generale Viet Finance, Vietnam
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“We purchased few appliances to start with and monitored them. We soon came to a conclusion that Cyberoam UTM was a robust appliance and that the post-sales support is prompt. VisionTech Systems, Cyberoam’s channel partners ensures that we have continuous support. Today, after purchasing twenty appliances from them, our opinion about them still remains unchanged. We intend to continue deploying Cyberoam UTM appliances on our other constructions sites in future.”
TestimonialsTestimonials
“Through Cyberoam we have gained in efficiency, quality control and now we focus on users rather than IP addresses, which is more logical when addressing security concerns. We actually got what we were promised on paper. The security policies have been easy to configure” Mr.Thierry ManginDirectro of Information Systems, Baccarat Crystal, France
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“We find Cyberoam UTM a dependable solution. It amply takes care of our primary productivity need. En route, it also bridges security our to productivity requirements. Cyberoam is productivity promoting, business friendly security” Mr.Leonides Tolentino, Sr. Manager, MISCDO-Foodsphere, Philippines
TestimonialsTestimonials
“The Cyberoam team has set an extremely high bar for vendors that I deal with on all levels of business. The responsiveness, impeccable follow-up and willingness to adjust as dynamically as our requests was uncanny. Cyberoam’s customer service should be a model. From sales to support, I could not ask for a more desirable experience. The product’s power matches the providers experience and support. Stellar! Five Star! Speechless! ” Mr. Courtney SwanagainIBusiness Strategist,Swanagain Elite Enterprises, USA
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam CRi UTM Appliance Range
Large Enterprises- CR 1500i- CR 1000i- CR 500ia
Small to Medium Enterprises- CR 300i- CR 200i- CR 100ia- CR 50ia
Remote Offices- CR 35ia- CR 25ia- CR 15i- CR 15wi
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL
Service)
Basic ApplianceBasic Appliance Bundled SubscriptionsBundled Subscriptions
Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)
Gateway Anti-spam Subscription Web & Application Filtering
Subscription Intrusion Prevention System (IPS) 24 x 7 Tech Support & Warranty
Subscription Model
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Bundled SubscriptionsBundled Subscriptions
TVS (Total Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)- Gateway Anti-spam- Web & Application Filtering- Intrusion Prevention System (IPS)- 8 x 5 Email, phone and chat Tech Support
SVS (Security Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)- Web & Application Filtering- Intrusion Prevention System (IPS)- 8 x 5 Email, phone and chat Tech Support
Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Question/Answer Session
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Thank you!
Top Related