cyberoam - unified threat management end point data protection cyberoam 2009 © elitecore...
TRANSCRIPT
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam – End Point Data ProtectionProtect your Data. Protect your Assets.
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam for End Point Data Protection
1. Need for Data Protection
2. Data Protection & Encryption
3. Device Management
4. Application Control
5. Asset Management
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Need for Data Protection
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Medical records of 741 patients lost by a hospital
60% corporate data lies unprotected on endpoints
Lost USBs
Lost Multimedia Discs
Wrong Email Attachment
Lost iPods
Personal information of 11.1mn customers of leading oil refinery (USA) found on streets
Bank employee accidentally sent sensitive customer details to wrong email address
12,500 handheld devices forgotten at the back of taxis every 6 months in UK
9000 USB sticks found in people's pockets at the local dry cleaners in UK
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
What Places Data At Risk?
ApplicationsWeb, Mail, IM, P2P, Printing, FTP
Removable DevicesUSBs, CDs/DVDs, MP3,
Digital cameras
InsidersUnauthorized transfer of sensitive data;
Malware-laden email for information access; Sensitive data sent to wrong person
Data At Risk• Intellectual property related to R&D • Business plans, RFP / Tender quotes
• Product launch dates and roadmap • Customer data
MaliciousUnintentional
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
• Average cost of security breach - $202 per record lost • Total cost per incident averages $6.6 million
Immediate Need – End Point Data Protection
Cost of Data At Risk
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam End Point Data Protection
Protect your Data. Protect your Assets.
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam End Point Data Protection
• Comprehensive End Point Data Protection Suite
• Modules
• Data Protection & Encryption• Device Management• Application Control• Asset Management
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam End Point Data Protection
Benefits
• Enhanced protection to all your Endpoints
• Across geographic locations• Centralized controls• Regulatory and Security Compliance
• Rapid installation
• Easy to use
• Maintains security with flexibility
• Clear ROI
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Data Protection & Encryption
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Prevent Data Leakage – Email Attachments
Control data shared as attachment in emails Send customized warning message to user and alert to administrator
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Record Data Shared over Webmails
Record content of Webmail such as Yahoo, Gmail & Msn
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Prevent Data Leakage - Attachments over Instant Messengers
Attachment:
.doc NOT ALLOWED
File name: confident NOT ALLOWED
Size: > 2 MB
Control data shared as attachment over Instant Messengers Send customized warning message to user and alert to administrator
.exe
.jpg
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Before deleting
Operation
Modify
Delete
Fixed
Floppy
CD rom
Removable
Network
Unknown
.jpg
.doc
Before modifying
Before copying/cut to
Before copying/cut from
Mode of Transfer
File Name/Extn.
Back up
Read
Document
Prevent Accidental / Malicious Deletion of Data
Selective Action & Back-up of Document
• Control operations over a document and its mode of transfer• Back up files before specific actions
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
PrinterPrinter Type Selected files/Extn.
Attachment:.xls
Attachment:.doc
Shared
Local
Network
Virtual
Database Server
PrinterPrinter Type Selected files/Extn.
Attachment:.xls
Attachment:.doc
Shared
Local
Network
Virtual
Database Server
Prevent Data Leakage through Printed Files
Copy of Printed File Saved in Database Server
• Control access to printers in the system• Save shadow copy of printed file
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Encrypt entire device
Attachment:.xls
Attachment:.doc
Attachment:.jpg
Decrypt before reading
Encrypt selected files
Data Sharing Through Removable Devices
• Encrypt all/selected files while writing to removable device• Decrypt files while reading from a removable device only in organization network
• - Data in your lost USB device cannot be decrypted and is safe
Encrypts Data, Blocks Data Sharing
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Record Chat Sessions even for SKYPE
Chat session
logs
Back up server
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Device Management
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Protect your Data by controlling data over device
• Allow only authorized devices
Device Management
Storage Device
Communication Interface Device
USB Device
Network Devices Others
Dial Floppy, CD, Burning device, Tape, Removable device
Serial ports, parallel ports, modems, Bluetooth
Dial-up connection
USB keyboard, mouse, modem, storage, hard disk, others
Wireless LAN adapter, PnP adapter, Virtual LAN adapter
Audio equipment, Virtual CDROM, any new device
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Application Control
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Protect your Data by Controlling Applications
• Prevent data loss through unauthorized/indiscriminate use of applications• Granular, policy-based application controls
- Protect sensitive data & enhance employee productivity
- Prevent legal liability, network outages
IM tools
Entertainment(MP3, MP4, MPEG)
Pirated software Screensavers
Password crackers
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Asset ManagementProtect your Assets
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Need for End Point Asset Management
Organizations exposed to higher levels of threats Distributed offices Rise in malware attacks
Tracking Hardware & Software assets Management of hardware/software inventory
Sophisticated attacks – Targeting vulnerabilities Need for timely patch implementation across –
Hundreds or thousands of devices Geographic locations
Immediate need - Centralized, automated asset management
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Fighting Threats with Asset ManagementProtect your Assets
• Seamless IT infrastructure management
• Simplifies tracking of IT asset allocation, configuration, version, historical information
• Control over hardware, software costs
• Automates and centralizes
• Patch management
• Install Software Remotely
• Silently or in user-interactive mode
• Meets security compliance requirements
• Rapid and correct installation of patches• Handling bug fixes across network, geographies
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
About Cyberoam
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Products
• Cyberoam UTM• Cyberoam iView (Open source Logging & Reporting)• Cyberoam Central Console (Centralized Management)
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam CRi Network Security Appliances
• Large Enterprises • CR 1500i• CR 1000i• CR 500i
• Small to Medium Enterprises • CR 200i• CR 300i• CR 100ia
• Small Offices - Remote Offices • CR 50ia• CR 25i• CR 15i
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Cyberoam Credentials
Awards Gartner Positions Cyberoam as a Visionary in Magic Quadrant Finalist in SC Magazine Awards 2009 for Best SME Security Finalist in PC Pro Awards 2009 Emerging Vendor of the Year 2008 by Frost & Sullivan IT Leader of the Year Award by ZDNet Asia Channel's Favorite Security Company Award 2008 by VAR India
Certifications Checkmark ICSA Labs for Firewall ICSA Labs for Firewalls with Active-Active HA capability Member of VPNC
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Established in 1999 Team strength - 400+ employees Investment from global private equity firm The Carlyle Group Domain – Communication, Networks, Security Sales and distribution channel in over 75 countries Product offering
Cyberoam Cyberoam iView Cyberoam End Point Data Protection CRESTEL EliteAAA 24online 24online Everywhere
Elitecore Technologies
Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam
www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy
Thank You Thank You