www.cyberoam.com © copyright 2010 elitecore technologies ltd. all rights reserved. comprehensive...

Download Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management

If you can't read please download the document

Upload: malik-hille

Post on 14-Dec-2015

219 views

Category:

Documents


3 download

TRANSCRIPT

  • Slide 1

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam Endpoint Data Protection Comprehensive Network Security CYBEROAM Slide 2 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Agenda of Presentation About Elitecore Technologies Cyberoam UTM Cyberoam Credentials/ Awards/ Accreditations Slide 3 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Established in 1999 400+ Employees ISO 9001:2000 certified company Backed by Worlds Largest Private Equity Group ($90bn) Sales, Distribution Channel & Customers across 75+ countries Communication - Networks Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution About Elitecore Technologies Slide 4 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Slide 5 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Internal threats Identity theft Data loss Data deletion Data modification External threats Worms Malicious code Virus Malware Social Engineering threats Spam Phishing Pharming Data theft DoS attacks Hacking USER Attack on Organization User The Weakest Security Link Slide 6 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Layer 8 Technology Security around the User -Treats User-Identity as the 8th Layer in Network stack -Network security decisions based on Usernames and IP Addresses Control Who is doing What in the network Allows creation of User Identity-based security policies Identifies traffic by username even in case of dynamic IP Layer 8 The Human Layer indicates a feature unique to Cyberoam Slide 7 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security User Slide 8 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoams Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 The Human Layer Slide 9 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM- Identity-based Security Integrated security over single platform Layer 8 penetrates through each security module Slide 10 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Intrusion Prevention Policies Anti-Malware Anti-Spam Web Filtering Layer 7 Controls Bandwidth Management & QoS Instant Messaging Archiving & Control Internet Surfing Quota Internet Access Time Internet Data Quota Cyberoam Audits Identity - based Logs + Reports MAC Id Session Id Cyberoam Layer 8 Advantage Slide 11 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SecurityConnectivityProductivity Organizational Concerns Network security Content Security Administrative Security Business Continuity Network Availability Future-ready connectivity Employee productivity IT resource optimization Administrator productivity Slide 12 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES SECURITY Network SecurityContent SecurityAdministrative Security Firewall IPS Wireless security Anti-Malware Anti-Spam HTTPS Content security Next-Gen UI iView- Logging & Reporting Slide 13 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Stateful Inspection Firewall (Fusion Technology) SECURITY Network Security Firewall -Interface for achieving Unified Security Identity-based policies enable security, connectivity, productivity Fusion Technology Slide 14 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Intrusion Prevention System -3500+ signatures - broadest security cover -Internet Threat Response Team Regular Signature updates -Quick protection against latest vulnerabilities -IPS Policy Tuner Allows multiple IPS policies Granular control over IPS policies -Unnecessary alerts -Reduced traffic latency -Improved performance SECURITY Network Security IPS Slide 15 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Cyberoam IPS + Layer 8 Technology Identity-based IPS policies per user or group Identity-based alerts and reports -Visibility into applications User, Source, Destination, Usage -Overview of threat status Top alerts, top attackers, top victims SECURITY Network Security IPS Slide 16 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Wireless (WLAN) Security -High performance, integrated security over WLAN Secures wireless networks to the extent of wired networks -Supports 802.11n wireless standard -Layer 8 over WLAN Identity-based policies in dynamic IP environment MAC-based filtering Supports IP-address pool -Enhances security SECURITY Network Security Wireless security Slide 17 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Gateway Anti-Malware -4 million+ signatures -Bi-directional scanning of web & email -Self-service Virus Quarantine -Reduced window of vulnerability Broadest security cover against all malware -Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic -Layer 8 Impact Identity-based virus reports -Instant visibility into attacker/victim Identity-based Quarantine policies SECURITY Content Security Anti-Malware indicates feature offered only by top-rated UTMs Slide 18 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY Content Security Anti-Spam Gateway Anti-Spam -IP Reputation Filtering Blocks 85% of incoming messages at gateway -Saves bandwidth -Near 98% spam detection -False Positive rate of 1 in a million Reduces fear of losing business emails - Self-Service quarantine area Slide 19 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -User-based Spam Digest Frees administrator time & management -Manage Email recipients Data leakage prevention and archiving -Scanning with Recurrent Pattern Detection (RPD) technology Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 SECURITY Content Security Anti-Spam -Virus Outbreak Detection (VOD) for zero-hour protection -Scans SMTP, POP3, IMAP traffic Slide 20 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY Content Security Anti-Spam -RPD Technology -Most outbreaks last only a few hours -Cyberoam identifies outbreaks real-time -Signature-based Anti-Spam take time to release signatures -Users remain unprotected till Anti-Spam is updated -Too late to battle out the initial peak of attack Slide 21 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security HTTPS/SSL Content Security -Scans SSL traffic for virus & malware -Controls File upload over SSL -Reports files uploaded via SSL -Stops HTTPS/SSL as a medium for Data Leakage Malware Propagation SECURITY Content Security HTTPS Content Security indicates feature offered only by top-rated UTMs Slide 22 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Next-Gen UI -Web 2.0 technology advantages -Easy navigation, custom controls, intuitive interface Fewer security errors - Increases security Enhances administrative productivity Shorter learning curves -Unified Security Rules for all security features from firewall page SECURITY Administrative Security Next-Gen UI Slide 23 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView On-Appliance Logging & Reporting -Ability to log and report activities -LAYER 8 - Identity-based logging and reporting Pinpoints the user -Security Management iView dashboard- Shows network attacks on single screen Drill-down reports 3rd level drill-down for attack details 1000+ Reports -Log Management -Compliance Management HIPAA, PCI DSS, GLBA, and more -Forensic Analysis SECURITY Administrative Security iView- Logging & Reporting Slide 24 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iViews Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management Slide 25 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES CONNECTIVITY Business ContinuityNetwork AvailabilityFuture-ready connectivity Multiple Link Management High Availability VPN 3G/WiMAX modem support IPv6 Slide 26 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Multi-Link Management -Automated Load balancing assures ROI/investment Support for more than 2 ISP links Supports Wireless WAN (3G USB modems) CONNECTIVITY Business Continuity Multiple Link Management 3G Slide 27 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CONNECTIVITY Business Continuity Multiple Link Management -Link Failover Supports multiple failover conditions Monitors link availability of multiple WAN connections Transfers traffic from a failed link to a working link -Maximizes business up-time -Optimizes link utilization for business continuity Active-Active Auto Link Failover Active-Passive Auto Link Failover Support for more than 2+ ISP links Supports WWAN for failover Slide 28 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Layer 8 Policy-based Routing Routes traffic based on: -Source IP addresses -Protocols -Users Assures Quality of Service for key users and applications CONNECTIVITY Business Continuity Multiple Link Management Slide 29 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security ICSA Labs Certified Active Active High Availability -Maximizes network uptime -Reduces single-point-of-failure -Ensures continuous Cyberoam security -Ensures business continuity CONNECTIVITY Business Continuity High Availability Slide 30 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual Private Network (VPN) -Anywhere, any device secure remote connectivity -Supports IPSec, L2TP, PPTP technologies SSL-VPN -Client-type independent Web access mode -Application access mode -Client mode Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for: -Malware -Spam -Inappropriate content -Intrusion attempts -Maintains secure endpoint and network environments CONNECTIVITY Network Availability VPN Slide 31 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security 3G/WiMAX USB Modem Support -High-speed wireless WAN (WWAN) -Wide ISP support -All gateway security features available Can function as a main or failover link CONNECTIVITY Network Availability 3G/WiMAX modem support 3G Slide 32 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization Content Filtering IM controls Bandwidth Management Traffic Discovery Layer 7 Administrator Productivity Next-Gen UI Slide 33 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security IPv6 IPv6 Ready gold logo -Cyberoam identifies and processes IPv6 traffic Third-party validation -International Testing Program with 3000+ rigorous test cases IPv6 compliance to become mandatory in government and other enterprises -Driven by diplomatic initiatives CONNECTIVITY Future-ready connectivity IPv6 Slide 34 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Content Filtering -Industrys most comprehensive URL database 82+ categories 44 million+ URLs -On-appliance web category database Faster access Surfing pattern privacy -Controls access to HTTP & HTTPS hosted websites Increases productivity Productivity Employee Productivity Content Filtering Slide 35 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Controls that are difficult to bypass Blocks Google cache pages Search keyword reports Blocks embedded URLs Detects/Blocks Third Party Proxy and Tunneling software -Controls access to Instant Messengers, P2P -Controls Data Leakage Blocks files from uploading to web pages Blocks file transfer through Instant Messengers Productivity Employee Productivity Content Filtering Slide 36 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security IM Controls -Identity-based controls for Yahoo messenger and Windows Live Messenger -Scans malware -Logs and controls Access Conversation File transfer Voice/Webcam Productivity Employee Productivity IM controls Slide 37 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best of Breed Bandwidth Management/QoS -Application and Identity-based bandwidth allocation -Category wise Bandwidth management -Restrict Bandwidth usage for a combination of source, destination and service/service group -Schedule-based bandwidth allocation -Committed and burstable bandwidth Productivity IT Resource Optimization Bandwidth Management Slide 38 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Traffic Discovery -Real-time visibility into bandwidth utilization by user, protocol, application -Provides visibility of unproductive usage of resources and threat incidence Productivity IT Resource Optimization Traffic Discovery Slide 39 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Layer 7 -Offers visibility and management over Application Layer 7 -Allows control over application, user, time and bandwidth Essential for Cloud Computing -Bandwidth Management assures availability of business- critical applications -Controls bandwidth costs Productivity IT Resource Optimization Layer 7 Slide 40 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security VoIP Bit Torrent CRM ERP IM Application Web mail Internet Medium Quality High Quality Low Quality Application Layer 7 Visibility Slide 41 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Multi-core Technology -High Security without compromising on performance -Multi-core processors Parallel processing of Cyberoam security features -Real-time, Unified Security Higher Throughputs -High-speed memory access to signatures Security against advanced threats Cyberoam Architecture Slide 42 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Extensible Security Architecture (ESA) -Ability to adapt to future security needs -Ability to support feature enhancements in future -Ready for future upgrades Vs ASIC Cyberoam Architecture Slide 43 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Central Console Slide 44 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Centralized controls and security management over remote networks Reduces operational complexity and deployment time Minimizes errors and lowers administration cost Enables the MSSPs to have different personnel for managing different customer deployments Ease of use with view of multiple devices and network status at a glance Cyberoam Central Console Slide 45 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Slide 46 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SSL VPN Slide 47 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Supports remote access VPN users and site-to-site VPN connections Accommodates between 50 to 1000 concurrent users Policy-based resource access control Zero-client administration Flexibility in purchasing remote security solutions: -Virtual appliance mode -Dedicated appliance mode SSL VPN Slide 48 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Dedicated SSL VPN appliance Deployment Slide 49 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual SSL VPN Deployment Diagram Slide 50 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView Slide 51 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Available as Open Source software and as Appliance Ability to log and report activities from various devices/ vendors Log Management -Near real-time log retrieval -Archival and Search facility Security Management -iView dashboard Shows network attacks on single screen -1000+ Reports Compliance Management -Reduces compliance costs -Single click access to reports - Simplified compliance management -Easy visibility into access by users Cyberoam iView Slide 52 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Forensic Analysis -Reconstructing sequence of events in a security breach -Reporting stands in the face of legal scrutiny Benefits -Security Benefits Centralized control Identifies attacks based on -Attack Reports (Type of Reports) -Deviation from norm in access or usage of resources Allows quick investigation and determination of cause of breach Cyberoam iView Slide 53 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Compliance Benefits Access and Usage logs of -Activity in critical applications, databases -Data transmitted to external entities Enables setting user identity-based thresholds for acceptable use -Productivity Benefits Shows deviation in resource consumption -Financial Benefits Low capital requirements Low technical manpower requirements Cyberoam iView Slide 54 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iViews Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management Slide 55 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam - Endpoint Data Protection Slide 56 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Endpoint protection: -Across geographic locations -Centralized controls -Regulatory and Security compliance Cyberoam Endpoint Data Protection suite -Data Protection & Encryption Prevents data leakage through: -Email attachments -Web mail -Instant Messengers -Printed files Encrypts files/device while writing data to removable devices Document back-up prevents accidental/malicious data deletion Cyberoam - Endpoint Data Protection Slide 57 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Device Management Protects data by controlling data over: -USB device -Storage device -Network device -Communication Interface device -Others -Application Control Protects data by controlling unauthorized/indiscriminate use of applications -Enhances employee productivity -Prevents legal liabilities, network outages Cyberoam - Endpoint Data Protection Slide 58 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Asset Management Offers IT infrastructure management Automates and centralizes Allows remote software installations Meets security compliance requirements Cyberoam - Endpoint Data Protection Slide 59 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Appliance Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Slide 60 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other Appliances Cyberoam Central Console -CCC 15 -CCC 50 -CCC 100 -CCC 200 SSL VPN Appliance -CR-SSL-800 -CR-SSL-1200 -CR-SSL-2400 Cyberoam iView -CR-iVU25 Slide 61 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam CRi UTM Appliance Range Large Enterprises -CR 1500i -CR 1000i -CR 500ia Small to Medium Enterprises -CR 300i -CR 200i -CR 100ia -CR 50ia Remote Offices -CR 35ia -CR 25ia -CR 15i Slide 62 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Subscription Model Slide 63 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL Service) Basic Appliance Slide 64 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) Gateway Anti-spam Subscription Web & Application Filtering Subscription Intrusion Prevention System (IPS) 24 x 7 Tech Support & Warranty Bundled Subscriptions Slide 65 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Bundled Subscriptions TVS (Total Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Gateway Anti-spam Subscription -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 Email, phone and chat Tech Support SVS (Security Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 Email, phone and chat Tech Support Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis Slide 66 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator. Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review Slide 67 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security 2008 - Emerging Vendor of the Year Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year Award in the Network Security Market Slide 68 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium Slide 69 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SC Magazine Five Star Rating Four Times in a Row! April 2009 Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance also includes a solid web content filter and blocking for applications such as IM and P2P December 2008 Product review Cyberoam CR100i Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures March 2008 UTM Roundup Cyberoam CR1000i Fully loaded, with many great features packs a more serious punch can restrict or open internet access by bandwidth usage, surf time or data transfer. July 2007 UTM Roundup Cyberoam CR250i console is well organized and intuitive to navigate flexible and very powerful this appliance is a good value for almost any size environment. Slide 70 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best Integrated Security Appliance Best Security Solution for Education Best Unified Security Tomorrows Technology Today 2007 2007, 2008 Finalist Network Middle East Award 2008 Finalist Channel Middle East Award VAR Editors Choice for Best UTM (2007) Finalist - 2008 Global Excellence in Network Security Solution ZDNET Asia- IT Leader Of the Year 2008 2008 Emerging Vendor of the Year for Network Security SMB Product of the Year 2008 Best Content Filtering Awards Slide 71 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele Slide 72 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele (Contd) Slide 73 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Middle East Clientele Slide 74 www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Thank You