cyberoam - unified threat management end point data protection cyberoam 2009 © elitecore...

30
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

Upload: noreen-daniels

Post on 17-Jan-2016

224 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam – End Point Data ProtectionProtect your Data. Protect your Assets.

Page 2: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam for End Point Data Protection

1. Need for Data Protection

2. Data Protection & Encryption

3. Device Management

4. Application Control

5. Asset Management

Page 3: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Need for Data Protection

Page 4: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Medical records of 741 patients lost by a hospital

60% corporate data lies unprotected on endpoints

Lost USBs

Lost Multimedia Discs

Wrong Email Attachment

Lost iPods

Personal information of 11.1mn customers of leading oil refinery (USA) found on streets

Bank employee accidentally sent sensitive customer details to wrong email address

12,500 handheld devices forgotten at the back of taxis every 6 months in UK

9000 USB sticks found in people's pockets at the local dry cleaners in UK

Page 5: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

What Places Data At Risk?

ApplicationsWeb, Mail, IM, P2P, Printing, FTP

Removable DevicesUSBs, CDs/DVDs, MP3,

Digital cameras

InsidersUnauthorized transfer of sensitive data;

Malware-laden email for information access; Sensitive data sent to wrong person

Data At Risk• Intellectual property related to R&D • Business plans, RFP / Tender quotes

• Product launch dates and roadmap • Customer data

MaliciousUnintentional

Page 6: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

• Average cost of security breach - $202 per record lost • Total cost per incident averages $6.6 million

Immediate Need – End Point Data Protection

Cost of Data At Risk

Page 7: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam End Point Data Protection

Protect your Data. Protect your Assets.

Page 8: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam End Point Data Protection

• Comprehensive End Point Data Protection Suite

• Modules

• Data Protection & Encryption• Device Management• Application Control• Asset Management

Page 9: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam End Point Data Protection

Benefits

• Enhanced protection to all your Endpoints

• Across geographic locations• Centralized controls• Regulatory and Security Compliance

• Rapid installation

• Easy to use

• Maintains security with flexibility

• Clear ROI

Page 10: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Data Protection & Encryption

Page 11: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Prevent Data Leakage – Email Attachments

Control data shared as attachment in emails Send customized warning message to user and alert to administrator

Page 12: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Record Data Shared over Webmails

Record content of Webmail such as Yahoo, Gmail & Msn

Page 13: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Prevent Data Leakage - Attachments over Instant Messengers

Attachment:

.doc NOT ALLOWED

File name: confident NOT ALLOWED

Size: > 2 MB

Control data shared as attachment over Instant Messengers Send customized warning message to user and alert to administrator

.exe

.jpg

Page 14: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Before deleting

Operation

Modify

Delete

Fixed

Floppy

CD rom

Removable

Network

Unknown

.jpg

.doc

Before modifying

Before copying/cut to

Before copying/cut from

Mode of Transfer

File Name/Extn.

Back up

Read

Document

Prevent Accidental / Malicious Deletion of Data

Selective Action & Back-up of Document

• Control operations over a document and its mode of transfer• Back up files before specific actions

Page 15: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

PrinterPrinter Type Selected files/Extn.

Attachment:.xls

Attachment:.doc

Shared

Local

Network

Virtual

Database Server

PrinterPrinter Type Selected files/Extn.

Attachment:.xls

Attachment:.doc

Shared

Local

Network

Virtual

Database Server

Prevent Data Leakage through Printed Files

Copy of Printed File Saved in Database Server

• Control access to printers in the system• Save shadow copy of printed file

Page 16: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Encrypt entire device

Attachment:.xls

Attachment:.doc

Attachment:.jpg

Decrypt before reading

Encrypt selected files

Data Sharing Through Removable Devices

• Encrypt all/selected files while writing to removable device• Decrypt files while reading from a removable device only in organization network

• - Data in your lost USB device cannot be decrypted and is safe

Encrypts Data, Blocks Data Sharing

Page 17: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Record Chat Sessions even for SKYPE

Chat session

logs

Back up server

Page 18: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Device Management

Page 19: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Protect your Data by controlling data over device

• Allow only authorized devices

Device Management

Storage Device

Communication Interface Device

USB Device

Network Devices Others

Dial Floppy, CD, Burning device, Tape, Removable device

Serial ports, parallel ports, modems, Bluetooth

Dial-up connection

USB keyboard, mouse, modem, storage, hard disk, others

Wireless LAN adapter, PnP adapter, Virtual LAN adapter

Audio equipment, Virtual CDROM, any new device

Page 20: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Application Control

Page 21: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Protect your Data by Controlling Applications

• Prevent data loss through unauthorized/indiscriminate use of applications• Granular, policy-based application controls

- Protect sensitive data & enhance employee productivity

- Prevent legal liability, network outages

IM tools

Entertainment(MP3, MP4, MPEG)

Pirated software Screensavers

Password crackers

Page 22: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Asset ManagementProtect your Assets

Page 23: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Need for End Point Asset Management

Organizations exposed to higher levels of threats Distributed offices Rise in malware attacks

Tracking Hardware & Software assets Management of hardware/software inventory

Sophisticated attacks – Targeting vulnerabilities Need for timely patch implementation across –

Hundreds or thousands of devices Geographic locations

Immediate need - Centralized, automated asset management

Page 24: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Fighting Threats with Asset ManagementProtect your Assets

• Seamless IT infrastructure management

• Simplifies tracking of IT asset allocation, configuration, version, historical information

• Control over hardware, software costs

• Automates and centralizes

• Patch management

• Install Software Remotely

• Silently or in user-interactive mode

• Meets security compliance requirements

• Rapid and correct installation of patches• Handling bug fixes across network, geographies

Page 25: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

About Cyberoam

Page 26: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Products

• Cyberoam UTM• Cyberoam iView (Open source Logging & Reporting)• Cyberoam Central Console (Centralized Management)

Page 27: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam CRi Network Security Appliances

• Large Enterprises • CR 1500i• CR 1000i• CR 500i

• Small to Medium Enterprises • CR 200i• CR 300i• CR 100ia

• Small Offices - Remote Offices • CR 50ia• CR 25i• CR 15i

Page 28: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam Credentials

Awards Gartner Positions Cyberoam as a Visionary in Magic Quadrant Finalist in SC Magazine Awards 2009 for Best SME Security Finalist in PC Pro Awards 2009 Emerging Vendor of the Year 2008 by Frost & Sullivan IT Leader of the Year Award by ZDNet Asia Channel's Favorite Security Company Award 2008 by VAR India

Certifications Checkmark ICSA Labs for Firewall ICSA Labs for Firewalls with Active-Active HA capability Member of VPNC

Page 29: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Established  in 1999 Team strength - 400+ employees Investment from global private equity firm The Carlyle Group Domain – Communication, Networks, Security Sales and distribution channel in over 75 countries Product offering

Cyberoam Cyberoam iView Cyberoam End Point Data Protection CRESTEL EliteAAA 24online 24online Everywhere

Elitecore Technologies

Page 30: Cyberoam - Unified Threat Management End Point Data Protection Cyberoam  2009 © Elitecore Technologies Ltd. All Rights Reserved

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Thank You Thank You