SlideShare une entreprise Scribd logo
1  sur  27
Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam Wi-Fi Appliance Comprehensive Network Security with Wi-Fi Access Point  for Small and Remote Offices
Topics ,[object Object],[object Object],[object Object],[object Object]
SOHO/SMB Dilemma – Wi-Fi vs. Wired networks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wi-Fi Security Risks for SOHO & SMB ,[object Object],[object Object],[object Object],[object Object]
Traditional Wi-Fi  vs  Cyberoam Wi-Fi
[object Object],[object Object],[object Object],Common Pre-Shared key Traditional Wi-Fi without user authentication Internet   Firewall / Router Employee Guest 1  Ex-Employee Guest 2 Guest 3 Wi-Fi Router ACME CORPORATION
Cyberoam Wi-Fi with user authentication Common  Pre-Shared  key Temporary User Access Temporary User Access Expires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User Name MAC ID IP Address Internet   Employee Layer 8 Technology CR15wi Network Guest 1  ACME CORPORATION
Cyberoam’s Layer 8 Advantage – Identity-based Controls Internet Tony Bandwidth control Duration / Quota control Schedule  Control Reporting Apply these controls on Employees as well as Guests CR 15wi
Traditional Wi-Fi without network segmentation Common Pre-Shared key ,[object Object],[object Object],[object Object],[object Object],Internet   Firewall - Router Wi-Fi Router Employee Guest Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Shared Network Drives Switch ACME CORPORATION
Cyberoam Wi-Fi allows Separate Guest and Employee Network Access CR15wi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet   Switch Employee Layer 8 Advantage   Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Guest Shared Network Drives ACME Guest ACME Employees
CR15wi Layer 8 Advantage   Multiple Virtual Access Points – 8 SSIDs for network segmentation ACME Marketing Internet   Switch Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Guest Shared Network Drives Engineering ACME Guest ACME Engineering Marketing
Cyberoam Wi-Fi Advantage
Cyberoam Wi-Fi Advantage Reduced TCO Enhanced Security
Cyberoam Wi-Fi Reduces TCO + + = CR 15wi Wi-Fi Router Other Network Security Devices ,[object Object],[object Object],[object Object],- Antivirus - Antispam - IPS - VPN and many more ,[object Object],[object Object],Firewall - Router
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Coverage Bandwidth Ability to fine-tune coverage with bandwidth
Cyberoam Wi-Fi Security Advantage ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Extend 1 Access Point to 8 Virtual Access Points
CR 15wi Specs
Cyberoam WiFi Appliance – CR 15wi  802.11 n/b/g (WEP, WPA, WPA2, 802.11i ,TKIP, AES, PSK,  802.1x EAP) Antenna Detachable 2x3 MIMO Access Points Up to 8 bssid Transmit Power (EIRP) 11n HT40 : +17dBm 11b CCK: +19dBm 11g OFDM:+17dBm Receiver Sensitivity - 65dBm at 300Mbps - 70dBm at 54Mpbs 10% PER - 86dBm at 11Mpbs 8% PER
CR 15wi GUI Preview
Configuring Wireless Access Point
Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Configuring Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
DHCP Server www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
DHCP Configuration Option
Thank You [email_address] www.cyberoam.com

Contenu connexe

Tendances

Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
Liberteks
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Maliha Ali
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 

Tendances (13)

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
CCNSP
CCNSPCCNSP
CCNSP
 
CCNSE
CCNSECCNSE
CCNSE
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

En vedette

En vedette (7)

Mobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMobile Device Strategy for Schools
Mobile Device Strategy for Schools
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
 
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
 
Xamarin Robotics
Xamarin RoboticsXamarin Robotics
Xamarin Robotics
 
Secure Business WiFi
Secure Business WiFiSecure Business WiFi
Secure Business WiFi
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it right
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 

Similaire à Wifi Security for SOHOs: Cyberoam UTM CR15wi

Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
gainspan
 
HotSpot de Planet WSG-500
HotSpot de Planet WSG-500HotSpot de Planet WSG-500
HotSpot de Planet WSG-500
Cartronic Group
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
Sen Nathan
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
hypknight
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 Presentation
Monark Goel
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point Australia
CalAnderson
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
SecurEdgeNetworks
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
Savvius, Inc
 

Similaire à Wifi Security for SOHOs: Cyberoam UTM CR15wi (20)

Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
 
HotSpot de Planet WSG-500
HotSpot de Planet WSG-500HotSpot de Planet WSG-500
HotSpot de Planet WSG-500
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 Presentation
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Wireless World
Wireless World Wireless World
Wireless World
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point Australia
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 

Dernier

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Dernier (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Wifi Security for SOHOs: Cyberoam UTM CR15wi

  • 1. Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam Wi-Fi Appliance Comprehensive Network Security with Wi-Fi Access Point for Small and Remote Offices
  • 2.
  • 3.
  • 4.
  • 5. Traditional Wi-Fi vs Cyberoam Wi-Fi
  • 6.
  • 7.
  • 8. Cyberoam’s Layer 8 Advantage – Identity-based Controls Internet Tony Bandwidth control Duration / Quota control Schedule Control Reporting Apply these controls on Employees as well as Guests CR 15wi
  • 9.
  • 10.
  • 11. CR15wi Layer 8 Advantage Multiple Virtual Access Points – 8 SSIDs for network segmentation ACME Marketing Internet Switch Accounting/ERP Software E.g. Tally, Quicken, PeachTree Guest Shared Network Drives Engineering ACME Guest ACME Engineering Marketing
  • 13. Cyberoam Wi-Fi Advantage Reduced TCO Enhanced Security
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Cyberoam WiFi Appliance – CR 15wi 802.11 n/b/g (WEP, WPA, WPA2, 802.11i ,TKIP, AES, PSK, 802.1x EAP) Antenna Detachable 2x3 MIMO Access Points Up to 8 bssid Transmit Power (EIRP) 11n HT40 : +17dBm 11b CCK: +19dBm 11g OFDM:+17dBm Receiver Sensitivity - 65dBm at 300Mbps - 70dBm at 54Mpbs 10% PER - 86dBm at 11Mpbs 8% PER
  • 21. CR 15wi GUI Preview
  • 23. Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 24. Configuring Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 25. DHCP Server www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 27. Thank You [email_address] www.cyberoam.com