SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Securing You




                                Future-ready Security
                                    Justinas Valentukevičius
                                    Channel Manager Baltics


               Unified Threat
               Management




www.cyberoam.com                                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Agenda of Presentation

  Let’s meet - Brief introduction to Cyberoam

  Next generation firewall or maybe Next generation UTM

  Layer 8, WAF and other nice features in Cyberoam UTM

  Announcement of NG Series and Virtual UTM

  Technical live DEMO later today 15:15 PM




www.cyberoam.com                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



About Cyberoam

 Elitecore technologies founded in 1999

 Cyberoam UTM introduced in 2006 (Baltics in 2010)

 800+ Employees

 Sales, Distribution Channel and Customers across 110+ Countries

 Among the Top 3 UTM players in Gartner

 Patent Pending Identity-based Management


www.cyberoam.com                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Cyberoam’s Holistic IT Security Portfolio


                                           Unified Threat
Securing the IT network                    Management



Centralized security
management for remote
/branch offices & clients


Network Monitoring &                                                                                    & Open
Analysis                                                                                                Source




Virtual UTM (from
December 2012)


www.cyberoam.com                                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Cyberoam pagal Gartner

                                                                 2012
                                                       Magic Quadrant for Unified
                                                          Threat Management




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                        Evolution




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
                                                  Seriously, is it enough??




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Evolution of Network Security
Trends in Security

   Basic security began with firewalls
   As threats increased, other solutions were introduced
   Virus attacks rose in number and intensity
   Spam rose
   Slammer fueled the need for Intrusion Detection & Prevention
   High number of employees start accessing the Internet
   Connectivity to branches, partners and remote workers
   Blended threats emerge to exploit extensive Internet usage



                                                                         Average spam messages per day – the
                                                                         6FirewallsHit on Saturday, January
                                                                         Slammer employeesinfected with
                                                                                        enjoyed a monopoly until
                                                                         starting of the 21stbe view onlineviruses
                                                                           18.5business emails contained
                                                                             %
                                                                              1 systems
                                                                           25 % in 5 0030to century
                                                                        – 25, pornography year– Forrester
                                                                           IBM2003,
                                                                         Time spent deleting them – 2.8
                                                                            Initial Firewalls at work
                                                                           spyware by this were Stateless
                                                                         That’s a staggering cost of $281-$304
                                                                           Lost revenue spilled over halfway
                                                                           mintues. which could
                                                                         Firewallsnext weekin anot control are hit
                                                                        per  % percentlostsay they – 51.8the
                                                                         into70companies adult day will invest in
                                                                           65PC the
                                                                           Average time of          websites mts
                                                                          initiation of communication
                                                                         Emailcost of 9toolsand 5 more than
                                                                           anti-spywarethe bailout: pm
                                                                                   became am and upgrades
                                                                                            more prevalent
                                                                          Later Stateful became more prevalent
                                                                               between
                                                                           Total
                                                                         14 % spam recipients actually read
                                                                         $1 billion mails grew 5,000 % last year
                                                                           Phishing
                                                                         Pharmingpercent an employees'
                                                                              today, makes of entry
                                                                         Till 30-40 no accountability has
                                                                           spam
                                                                         been established advertised by spam
                                                                           4 % buy products is not business
                                                                               Internet activity
                                                                         21 % spam in Jan 2005 was porn
                                                                               related




www.cyberoam.com                                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




    Where are Networks moving to?

    • High speed Internet (Baltics among TOP countries)
    • More devices per user – More devices connecting to
      Internet (BYOD)
    • More web-applications being accessed
    • Increase in usage of data




www.cyberoam.com                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




What is usual here, in Baltics?

  Usually we are really well technologically
  educated and so we understand the need of
  Enterprise solutions – and we need the best !


  However…

  Usually we are relatively small in size

  Usually we are quite limited with our budget


WHAT WE ARE LOOKING FOR IS BEST TECHNOLOGY FOR
THE AFFORDABLE PRICE !

www.cyberoam.com                            © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                   Next generation security




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




      Gartner's Definition of the Next Generation Firewall (NGFW)

      “A wire-speed integrated network platform that performs deep inspection of
      traffic and blocking of attacks”.
      Next Generation Firewall indicates “the necessary evolution of a firewall”
      to deal with the changing IT environment in businesses and the consequent
      evolution in security threats posing to bring these very businesses down.




                                 NGFW created a buzz in security circles
                                 What is so different about them?




www.cyberoam.com                               © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


Next Generation Firewall                                       Cyberoam Next Generation UTM
                                                       FW with SI and integrated with IPS, VPN, Web/application
Standard first-generation firewall capabilities like   Filtering, IM Controls and Web Application Firewall
packet filtering, NAT, stateful protocol inspection    + Providing Anti Virus and Anti Spyware, Anti Spam,
and VPN capabilities                                   Bandwidth Management, Multi Link Management, HA
                                                       and On-appliance Reporting.
                                                       IPS tightly integrated with FW.
Integrated, rather than merely collocated,             Policy creation of multiple features in a single FW interface.
network intrusion prevention                           + All security modules are bound together keeping
                                                       User Identity as the base.
                                                       Granular application control
                                                       Real-time Visualization
Application awareness and full stack visibility
                                                       Secure Application Layer Vulnerabilities
                                                       Network Visibility based on users and not IP Addresses

Extra firewall intelligence                            Integration with AD, LDAP and RADIUS Servers.

                                                       Integrates hardware acceleration and automation into a wide
Support upgrade paths for integration of new           range of packet processing and application-specific
information feeds and new techniques to                functions
address future threats                                 + Virtual UTM series consolidates network security in
                                                       virtualized environments


     www.cyberoam.com                                             © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




 Cyberoam Unified Threat Management
  Gateway Integrated security
   over single platform
  Unique Identity-based Layer 8
   approach penetrates through
   each security module




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Human approach in Security


 • Numbers – Hard & Boring




                                                                                    192.168.10.122
                                                                                     172.17.12.123
                                                                                      10.12.11.23
   to remember!




                                   Names             - Used daily!!!



www.cyberoam.com                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



   Cyberoam Layer 8 AAA Advantage




                      Cyberoam                   Cyberoam                                        Cyberoam
                     Authenticates               Authorizes                                       Audits

User Login           • User Name              • Internet surfing quota         • Identity - based
                     • IP Address             • Schedule control                 Logs + Reports
                     • MAC Id                 • Security Policies              • Compliance Reports
                     • Session Id             • Web Filtering
                                              • Application Visibility & Control
                                              • QoS / Bandwidth Management
                                              • IM Controls




  www.cyberoam.com                                © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Fusion Technology driven SI Firewall
        - Interface for achieving Unified Security
                Rules for all security features from firewall page
                Identity-based policies enable security,
                 connectivity, productivity
        - Easy to configure with Next-Gen UI
                Easy navigation, custom controls, intuitive
                 interface
                   - Fewer security errors - Increases security
                   - Enhances administrative productivity
                   - Shorter learning curves


: Indicates a feature that is either unique to Cyberoam or it was
first introduced in the Industry by Cyberoam
www.cyberoam.com                                         © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Virtual Private Network (VPN)
    - Anywhere, any device secure remote connectivity
    - Supports
                IPSec, L2TP, PPTP technologies
                SSL-VPN
                   - Client-type independent Web access mode
                   - Application access mode
                   - Client mode
                Threat Free Tunneling (TFT) Technology
                Scans traffic entering VPN tunnel for:
                   -   Malware
                   -   Spam
                   -   Inappropriate content
                   -   Intrusion attempts
        - Maintains secure endpoint and network
          environments
www.cyberoam.com                                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Mobile VPN for iOS and Android devices

 Cyberoam’s Layer 8 Identity based security extended to mobile
  devices
 Securely connect your iPhone, iPad and Android devices to your
  corporate network through VPN

                        iOS                                   Android




                   IPSec VPN (New)                   L2TP VPN (New)
                      L2TP VPN
                      PPTP VPN

www.cyberoam.com                             © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Cyberoam CISCO VPN for iOS




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


SSL VPN user portal




  www.cyberoam.com                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Intrusion Prevention System
        - Layer 8 and IPS Tuner driven Cyberoam IPS
            Identity-based IPS policies per user or group
                Identity-based alerts and reports
                   - Visibility into applications usage
                        - User, Source, Destination, Usage
                   - Overview of threat status
                        - Top alerts, top attackers, top victims
                3500+ signatures – broadest security cover
                Internet Threat Response Team
                Allows multiple IPS policies




www.cyberoam.com                                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Gateway Anti-Malware
    - 4 million+ signatures
    - Bi-directional scanning of web & email
    - Self-service Virus Quarantine
    - Reduced window of vulnerability
                Broadest security cover against all malware                                               Anti-Virus


        - Scans
                HTTP, FTP, SMTP, POP3
                HTTPS, IMAP
                Instant Messenger traffic
        - Layer 8 Impact                                                                                 Anti-Spyware

                Identity-based virus reports
                   - Instant visibility into attacker/victim
                                                                         Indicates feature offered only by
                Identity-based Quarantine policies                                       top-rated UTMs

www.cyberoam.com                                          © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Gateway Anti-Spam
        - IP Reputation Filtering
                Blocks 85% of incoming messages at gateway                                                   Premium

                   - Saves bandwidth
        - Near 98% spam detection
        - False Positive rate of 1 in a million
                Reduces fear of losing business emails
        - Self-Service quarantine area
        - User-based Spam Digest
                Frees administrator time & management
        - Manage Email recipients
                Data leakage prevention and archiving



www.cyberoam.com                                 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Web Application Firewall Subscription
Firewalls/IPS cannot protect a web application from unknown threats


Cyberoam WAF Features include
       –     Positive protection model and No Signature Tables
       –     Intuitive website flow detector automatically
       adapts to website changes

       –     Protects against OWASP top
             10 vulnerabilities
       –     SSL Offloading
       –     Monitoring & Reporting




www.cyberoam.com                                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Cyberoam iView – On-Appliance Logging & Reporting
        - Ability to log and report activities
        - LAYER 8 - Identity-based logging and reporting –
          Pinpoints the user
        - Security Management
                iView dashboard- Shows network attacks on single screen
                Drill-down reports – 3rd level drill-down for attack details
                1000+ Reports
        - Log Management
        - Compliance Management
                HIPAA, PCI DSS, GLBA, and more
        - Forensic Analysis


www.cyberoam.com                                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Dual Dashboard – Traffic and Security Dashboard

 Traffic Dashboard




www.cyberoam.com                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Dual Dashboard – Traffic and Security Dashboard

 Security Dashboard




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Dual Dashboard – Traffic and Security Dashboard

 Security Dashboard




                                         N/A: Private IP              Others: Rest of records
www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Country Maps for Source/Destination Traffic

 Graphical overview of Data transfer and Risk level




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                    Web & Content Filtering

                      - Industry’s most comprehensive URL                                                   Premium

                        database
                            82+ categories
                            44 million+ URLs
                      - On-appliance web category database
                            Faster access
                            Surfing pattern privacy
                      - Controls access to HTTP & HTTPS
                        hosted websites
                            Increases productivity




www.cyberoam.com                          © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



                   Identity based Technology - The Reason


 Application Based Control.                            Username / IP Address




www.cyberoam.com                            © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



IM MANAGEMENT & CONTROL

                    Allow or block Skype
                    Control access to leading Instant Messengers
                     (Yahoo, Windows Live)
                        Control over Chat, Webcam, File Transfer
                    Log & monitor chat
                    Filter content over IM: Blacklist certain keywords or
                     regular expressions to prevent data leakage




www.cyberoam.com                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Best of Breed Bandwidth Management/QoS

        - Application and Identity-based bandwidth allocation
        - Category wise Bandwidth management
        - Restrict Bandwidth usage for a combination of source,
          destination and service/service group
        - Schedule-based bandwidth allocation
        - Committed and burstable bandwidth




www.cyberoam.com                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Identity Based Policies




www.cyberoam.com                         © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


Cyberoam UTM Product Range
  Enterprise
        -   CR 2500iNG
        -   CR 1500i
        -   CR 1000i
        -   CR 750ia
        -   CR 500ia

  SME
        -   CR 300i
        -   CR 200i
        -   CR 100ia
        -   CR 50ia

  Small offices
        -   CR 35ia
        -   CR 25ia
        -   CR 15i
        -   CR 15wi
 www.cyberoam.com                       © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


The Cyberoam NG Series and Virtualization



                                          Powerful Hardware

                                          Superior Quality
       Future-Ready
         Security                         Performance Leap

                                          Value for Money

                                          All-New Firmware




 www.cyberoam.com                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Cyberoam Certifications

                                                         Premium           Premium




                        Anti-Virus    Anti-Spyware   Anti-Spam     URL Filtering     Firewall            VPN              IPS/IDP

                       UTM Level 5: Cyberoam holds a unique & complete UTM certification




   ICSA Certified Firewall            IPv6             Member of           ICSA Certified                 VPNC Certified for Basic
                                     Ready           Internet Watch       High-Availability              VPN & AES Interoperability
                                                       Foundation




www.cyberoam.com                                                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Reviews and Awards




                                                                             Cyberoam CR35ia
                                                                          outshines competitors in
                                                                           SOHO UTM Group Test


www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                   THANK YOU !

                   Cyberoam Online Demo:
                   http://livedemo.cyberoam.com
                   (Username: guest, Password: guest)



                   Contact information:
                   Email: justinas.v@cyberoam.com
                   Skype: justinas.cyberoam
                   +370 615 43623



www.cyberoam.com                        © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Contenu connexe

Tendances

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayLiberteks
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 edenSec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden道成資訊股份有限公司
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureBaqar kazmi
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 

Tendances (17)

Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
Ccnsp
CcnspCcnsp
Ccnsp
 
CCNSP
CCNSPCCNSP
CCNSP
 
CCNSE
CCNSECCNSE
CCNSE
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 edenSec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product LineCornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
 

En vedette

FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Cyberoam cr300i
Cyberoam cr300iCyberoam cr300i
Cyberoam cr300ipuneet1990
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoamAcademy
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 

En vedette (8)

FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Amazon Network Security
Amazon Network SecurityAmazon Network Security
Amazon Network Security
 
Cyberoam cr300i
Cyberoam cr300iCyberoam cr300i
Cyberoam cr300i
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web services
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Similaire à DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM

Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Agora Group
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social EngineeringMike Murray
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanElliott Lowe
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 

Similaire à DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM (20)

Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Information security
Information securityInformation security
Information security
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from Finjan
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 

Plus de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Plus de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM

  • 1. Securing You Future-ready Security Justinas Valentukevičius Channel Manager Baltics Unified Threat Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 2. Securing You Agenda of Presentation  Let’s meet - Brief introduction to Cyberoam  Next generation firewall or maybe Next generation UTM  Layer 8, WAF and other nice features in Cyberoam UTM  Announcement of NG Series and Virtual UTM  Technical live DEMO later today 15:15 PM www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 3. Securing You About Cyberoam Elitecore technologies founded in 1999 Cyberoam UTM introduced in 2006 (Baltics in 2010) 800+ Employees Sales, Distribution Channel and Customers across 110+ Countries Among the Top 3 UTM players in Gartner Patent Pending Identity-based Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 4. Securing You Cyberoam’s Holistic IT Security Portfolio Unified Threat Securing the IT network Management Centralized security management for remote /branch offices & clients Network Monitoring & & Open Analysis Source Virtual UTM (from December 2012) www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 5. Securing You Cyberoam pagal Gartner 2012 Magic Quadrant for Unified Threat Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 6. Securing You Evolution www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 7. Securing You Seriously, is it enough?? www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 8. Securing You Evolution of Network Security Trends in Security  Basic security began with firewalls  As threats increased, other solutions were introduced  Virus attacks rose in number and intensity  Spam rose  Slammer fueled the need for Intrusion Detection & Prevention  High number of employees start accessing the Internet  Connectivity to branches, partners and remote workers  Blended threats emerge to exploit extensive Internet usage  Average spam messages per day – the  6FirewallsHit on Saturday, January  Slammer employeesinfected with enjoyed a monopoly until  starting of the 21stbe view onlineviruses 18.5business emails contained %  1 systems 25 % in 5 0030to century – 25, pornography year– Forrester IBM2003,  Time spent deleting them – 2.8 Initial Firewalls at work spyware by this were Stateless  That’s a staggering cost of $281-$304 Lost revenue spilled over halfway mintues. which could  Firewallsnext weekin anot control are hit per  % percentlostsay they – 51.8the  into70companies adult day will invest in 65PC the Average time of websites mts initiation of communication  Emailcost of 9toolsand 5 more than anti-spywarethe bailout: pm became am and upgrades more prevalent   Later Stateful became more prevalent between Total  14 % spam recipients actually read  $1 billion mails grew 5,000 % last year Phishing  Pharmingpercent an employees'  today, makes of entry  Till 30-40 no accountability has spam  been established advertised by spam 4 % buy products is not business Internet activity  21 % spam in Jan 2005 was porn related www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 9. Securing You www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 10. Securing You Where are Networks moving to? • High speed Internet (Baltics among TOP countries) • More devices per user – More devices connecting to Internet (BYOD) • More web-applications being accessed • Increase in usage of data www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 11. Securing You What is usual here, in Baltics? Usually we are really well technologically educated and so we understand the need of Enterprise solutions – and we need the best ! However… Usually we are relatively small in size Usually we are quite limited with our budget WHAT WE ARE LOOKING FOR IS BEST TECHNOLOGY FOR THE AFFORDABLE PRICE ! www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 12. Securing You Next generation security www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 13. Securing You Gartner's Definition of the Next Generation Firewall (NGFW) “A wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks”. Next Generation Firewall indicates “the necessary evolution of a firewall” to deal with the changing IT environment in businesses and the consequent evolution in security threats posing to bring these very businesses down. NGFW created a buzz in security circles What is so different about them? www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 14. Securing You Next Generation Firewall Cyberoam Next Generation UTM FW with SI and integrated with IPS, VPN, Web/application Standard first-generation firewall capabilities like Filtering, IM Controls and Web Application Firewall packet filtering, NAT, stateful protocol inspection + Providing Anti Virus and Anti Spyware, Anti Spam, and VPN capabilities Bandwidth Management, Multi Link Management, HA and On-appliance Reporting. IPS tightly integrated with FW. Integrated, rather than merely collocated, Policy creation of multiple features in a single FW interface. network intrusion prevention + All security modules are bound together keeping User Identity as the base. Granular application control Real-time Visualization Application awareness and full stack visibility Secure Application Layer Vulnerabilities Network Visibility based on users and not IP Addresses Extra firewall intelligence Integration with AD, LDAP and RADIUS Servers. Integrates hardware acceleration and automation into a wide Support upgrade paths for integration of new range of packet processing and application-specific information feeds and new techniques to functions address future threats + Virtual UTM series consolidates network security in virtualized environments www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 15. Securing You Cyberoam Unified Threat Management  Gateway Integrated security over single platform  Unique Identity-based Layer 8 approach penetrates through each security module www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 16. Securing You Human approach in Security • Numbers – Hard & Boring 192.168.10.122 172.17.12.123 10.12.11.23 to remember!  Names - Used daily!!! www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 17. Securing You Cyberoam Layer 8 AAA Advantage Cyberoam Cyberoam Cyberoam Authenticates Authorizes Audits User Login • User Name • Internet surfing quota • Identity - based • IP Address • Schedule control Logs + Reports • MAC Id • Security Policies • Compliance Reports • Session Id • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 18. Securing You  Fusion Technology driven SI Firewall - Interface for achieving Unified Security  Rules for all security features from firewall page  Identity-based policies enable security, connectivity, productivity - Easy to configure with Next-Gen UI  Easy navigation, custom controls, intuitive interface - Fewer security errors - Increases security - Enhances administrative productivity - Shorter learning curves : Indicates a feature that is either unique to Cyberoam or it was first introduced in the Industry by Cyberoam www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 19. Securing You  Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity - Supports  IPSec, L2TP, PPTP technologies  SSL-VPN - Client-type independent Web access mode - Application access mode - Client mode  Threat Free Tunneling (TFT) Technology  Scans traffic entering VPN tunnel for: - Malware - Spam - Inappropriate content - Intrusion attempts - Maintains secure endpoint and network environments www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 20. Securing You Mobile VPN for iOS and Android devices  Cyberoam’s Layer 8 Identity based security extended to mobile devices  Securely connect your iPhone, iPad and Android devices to your corporate network through VPN iOS Android IPSec VPN (New) L2TP VPN (New) L2TP VPN PPTP VPN www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 21. Securing You Cyberoam CISCO VPN for iOS www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 22. Securing You SSL VPN user portal www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 23. Securing You  Intrusion Prevention System - Layer 8 and IPS Tuner driven Cyberoam IPS Identity-based IPS policies per user or group  Identity-based alerts and reports - Visibility into applications usage - User, Source, Destination, Usage - Overview of threat status - Top alerts, top attackers, top victims  3500+ signatures – broadest security cover  Internet Threat Response Team  Allows multiple IPS policies www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 24. Securing You  Gateway Anti-Malware - 4 million+ signatures - Bi-directional scanning of web & email - Self-service Virus Quarantine - Reduced window of vulnerability  Broadest security cover against all malware Anti-Virus - Scans  HTTP, FTP, SMTP, POP3  HTTPS, IMAP  Instant Messenger traffic - Layer 8 Impact Anti-Spyware  Identity-based virus reports - Instant visibility into attacker/victim Indicates feature offered only by  Identity-based Quarantine policies top-rated UTMs www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 25. Securing You  Gateway Anti-Spam - IP Reputation Filtering  Blocks 85% of incoming messages at gateway Premium - Saves bandwidth - Near 98% spam detection - False Positive rate of 1 in a million  Reduces fear of losing business emails - Self-Service quarantine area - User-based Spam Digest  Frees administrator time & management - Manage Email recipients  Data leakage prevention and archiving www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 26. Securing You  Web Application Firewall Subscription Firewalls/IPS cannot protect a web application from unknown threats Cyberoam WAF Features include – Positive protection model and No Signature Tables – Intuitive website flow detector automatically adapts to website changes – Protects against OWASP top 10 vulnerabilities – SSL Offloading – Monitoring & Reporting www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 27. Securing You  Cyberoam iView – On-Appliance Logging & Reporting - Ability to log and report activities - LAYER 8 - Identity-based logging and reporting – Pinpoints the user - Security Management  iView dashboard- Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  1000+ Reports - Log Management - Compliance Management  HIPAA, PCI DSS, GLBA, and more - Forensic Analysis www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 28. Securing You Dual Dashboard – Traffic and Security Dashboard  Traffic Dashboard www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 29. Securing You Dual Dashboard – Traffic and Security Dashboard  Security Dashboard www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 30. Securing You Dual Dashboard – Traffic and Security Dashboard  Security Dashboard N/A: Private IP Others: Rest of records www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 31. Securing You Country Maps for Source/Destination Traffic  Graphical overview of Data transfer and Risk level www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 32. Securing You  Web & Content Filtering - Industry’s most comprehensive URL Premium database  82+ categories  44 million+ URLs - On-appliance web category database  Faster access  Surfing pattern privacy - Controls access to HTTP & HTTPS hosted websites  Increases productivity www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 33. Securing You Identity based Technology - The Reason Application Based Control. Username / IP Address www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 34. Securing You www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 35. Securing You IM MANAGEMENT & CONTROL  Allow or block Skype  Control access to leading Instant Messengers (Yahoo, Windows Live)  Control over Chat, Webcam, File Transfer  Log & monitor chat  Filter content over IM: Blacklist certain keywords or regular expressions to prevent data leakage www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 36. Securing You  Best of Breed Bandwidth Management/QoS - Application and Identity-based bandwidth allocation - Category wise Bandwidth management - Restrict Bandwidth usage for a combination of source, destination and service/service group - Schedule-based bandwidth allocation - Committed and burstable bandwidth www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 37. Securing You Identity Based Policies www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 38. Securing You Cyberoam UTM Product Range  Enterprise - CR 2500iNG - CR 1500i - CR 1000i - CR 750ia - CR 500ia  SME - CR 300i - CR 200i - CR 100ia - CR 50ia  Small offices - CR 35ia - CR 25ia - CR 15i - CR 15wi www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 39. Securing You The Cyberoam NG Series and Virtualization  Powerful Hardware  Superior Quality Future-Ready Security  Performance Leap  Value for Money  All-New Firmware www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 40. Securing You Cyberoam Certifications Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall IPv6 Member of ICSA Certified VPNC Certified for Basic Ready Internet Watch High-Availability VPN & AES Interoperability Foundation www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 41. Securing You Reviews and Awards Cyberoam CR35ia outshines competitors in SOHO UTM Group Test www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 42. Securing You THANK YOU ! Cyberoam Online Demo: http://livedemo.cyberoam.com (Username: guest, Password: guest) Contact information: Email: justinas.v@cyberoam.com Skype: justinas.cyberoam +370 615 43623 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 43. Securing You www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.