SlideShare une entreprise Scribd logo
1  sur  13
PPT CONTENT
• Antivirus
• Kespersky antivirus
• Firewall
• Cyberoam Firewall
• Encryption
• Sophos Encryption
• Enterprise /Wifi Routers
• Aruba wifi routers
• IAS
• Difference bw Routers & Access point
• Google / Gmail admin console .
ANTIVIRUS
• Antivirus software is a program that actively searches for,
protects against, detects and removes viruses and malware,
such as trojans, adware and worms.
• An antivirus software checks every file that you download.
Whether it's a Word document, a ZIP file, a spreadsheet or
EXE file
• Antivirus software runs in the background, though, policing
everything
• If your antivirus software finds anything suspicious, it flags it
and lets you know. Then you can have the software
quarantine the virus or delete it.
KESPERSKY ANTIVIRUS
• Kaspersky Anti-Virus features include real-time protection,
detection and removal of viruses, trojans, worms, spyware,
adware, keyloggers, malicious tools and auto-dialers, as well
as detection and removal of rootkits. It also includes
instantaneous automatic updates via the "Kaspersky Security
Network" service.
• According to Kaspersky, "Kaspersky Security Network service
allows users of Kaspersky Lab security products from around
the world to help facilitate malware identification and reduce
the time it takes to provide protection against new (“in the
wild”) security risks targeting your computer.
FIREWALL
• In computing, a firewall is a network security system that
monitors and controls the incoming and outgoing
network traffic based on predetermined security rules.A
firewall typically establishes a barrier between a trusted,
secure internal network and untrusted outside network,
such as the Internet.
• Firewall appliances may also offer other functionality to
the internal network they protect, such as acting as a
DHCPor VPN server for that network.
CYBEROAM FIREWALL
• Cyberoam Technologies, a Sophos Company, is a global Network
Security appliances provider, with presence in more than 125
countries. The company offers User Identity-based network security
in its Firewalls/ Unified Threat Management appliances, allowing
visibility and granular control into users' activities in business
networks. For SOHO, SMB and large enterprise networks, this
ensures security built around the network user for protection against
APTs, insider threats, malware, hacker, and other sophisticated
network attacks.
• Cyberoam’s product range offers network security solution (Firewall
and UTM appliances), centralized security management (Cyberoam
Central Console appliances), centralized visibility (Cyberoam iView
), and Cyberoam NetGenie for home and small office networks.
ENCRYPTION
• In cryptography, encryption is the process of encoding a
message or information in such a way that only
authorized parties can access it. Encryption does not
itself prevent interference, but denies the intelligible
content to a would-be interceptor. In an encryption
scheme, the intended information or message, referred
to as plaintext, is encrypted using an encryption
algorithm – a cipher – generating ciphertext that can only
be read if decrypted. For technical reasons,
SOPHOS ENCRYPTION
• Sophos Group is a British security software and
hardware company. Sophos develops products for
communication endpoint, encryption, network security,
email security, mobile security and unified threat
management. Sophos is primarily focused on providing
security software to the mid market and pragmatic
enterprise from 100 to 5000 Seat organisations. Whilst
not a primary focus, Sophos also protects home users,
through a free anti virus software (Sophos Home)
intended to demonstrate product functionality.
WIFI ROUTERS
• A wireless router is the router found in a wireless local
area network (WLAN) for home and small office
networks. It enables Internet and local network access.
Typically, the wireless router is directly connected to a
wired or wireless WAN. Users connected to the wireless
router are able to access the LAN as well as the external
WAN, such as the Internet.
ARUBA ROUTERS
• Aruba, a Hewlett Packard Enterprise Company, is a
vendor of data networking solutions for enterprises and
businesses worldwide. Aruba Networks was founded in
2002 and is focused on bringing Wi-Fi wireless LAN
mobility solutions to enterprise networks.
IAS (INTERNET AUTHENTICATION SERVICE)
• Internet Authentication Service (IAS) is the Microsoft
implementation of a Remote Authentication Dial-in User
Service (RADIUS) server and proxy. IAS performs
centralized connection authentication, authorization,
accounting, and auditing (AAAA) for many types of
network access including wireless, authenticating switch,
and remote access dial-up and virtual private network
(VPN) connections
DIFFERENCE B/W ROUTERS & ACCESS POINT
• A Router is a device that routes packets across networks.
Thats all it does. If data from one computer is trying to get to
another computer that is not on the same logical network it
must be 'routed' to that network. Your home network is
different then your ISP's network thus a router is always the
last device that sits between you and your ISP.
• An Access Point is a device that allows other devices to
connect wirelessly. Its nothing more then an antenna. Access
points can be purchased on their own and plugged into a
wired switch or router to grant users wireless connectivity to
that device.
GOOGLE/GMAIL ADMIN CONSOLE
• The Google Admin Console is a management tool
provided by Google for G Suite administrators. It allows
administrators to maintain all their G Suite services from
one dashboard. With the Google Admin Console,
administrators can configure settings for G Suite, monitor
the usage of their domains, create user accounts, and
more.
• Some of the most common controls you will probably
use are Users, Groups, Admin Roles, Apps and Reports.
Other controls that are also included are Company
Profile, Domains, Billing, Security, Support, Migration,
Device Management, and App Engine Apps
THANK YOU
• MADE BY: SACHIN SHARMA

Contenu connexe

Tendances

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networkingtsmithnasd
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security Leo Welder
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeterTempered
 
home networking
home networkinghome networking
home networkingSudeb Das
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementFrans Bolk
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
Webinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesWebinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesToradex
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryptionAl Ewers
 
Go Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB AdapterGo Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB AdapterWicommFi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 

Tendances (20)

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
home networking
home networkinghome networking
home networking
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access Management
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
LAN Security
LAN Security LAN Security
LAN Security
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Webinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesWebinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux Devices
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
 
Go Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB AdapterGo Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB Adapter
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similaire à Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console

New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNanna Wang
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014Jeffrey Strobach
 
Network examples and network software
Network examples and network softwareNetwork examples and network software
Network examples and network softwareHifza Javed
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Tech Link Company's Profile
Tech Link Company's Profile Tech Link Company's Profile
Tech Link Company's Profile Omar Hussein
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochureIEI Integration Corp.
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
 

Similaire à Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console (20)

Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Find the key features of an advanced firewall
Find the key features of an advanced firewallFind the key features of an advanced firewall
Find the key features of an advanced firewall
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Wlan solu aag_brochure
Wlan solu aag_brochureWlan solu aag_brochure
Wlan solu aag_brochure
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014
 
Firewalls
FirewallsFirewalls
Firewalls
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Network examples and network software
Network examples and network softwareNetwork examples and network software
Network examples and network software
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Wlan - Infraestrutura
Wlan - InfraestruturaWlan - Infraestrutura
Wlan - Infraestrutura
 
Tech Link Company's Profile
Tech Link Company's Profile Tech Link Company's Profile
Tech Link Company's Profile
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 

Dernier

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Dernier (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console

  • 1. PPT CONTENT • Antivirus • Kespersky antivirus • Firewall • Cyberoam Firewall • Encryption • Sophos Encryption • Enterprise /Wifi Routers • Aruba wifi routers • IAS • Difference bw Routers & Access point • Google / Gmail admin console .
  • 2. ANTIVIRUS • Antivirus software is a program that actively searches for, protects against, detects and removes viruses and malware, such as trojans, adware and worms. • An antivirus software checks every file that you download. Whether it's a Word document, a ZIP file, a spreadsheet or EXE file • Antivirus software runs in the background, though, policing everything • If your antivirus software finds anything suspicious, it flags it and lets you know. Then you can have the software quarantine the virus or delete it.
  • 3. KESPERSKY ANTIVIRUS • Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers, malicious tools and auto-dialers, as well as detection and removal of rootkits. It also includes instantaneous automatic updates via the "Kaspersky Security Network" service. • According to Kaspersky, "Kaspersky Security Network service allows users of Kaspersky Lab security products from around the world to help facilitate malware identification and reduce the time it takes to provide protection against new (“in the wild”) security risks targeting your computer.
  • 4. FIREWALL • In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.A firewall typically establishes a barrier between a trusted, secure internal network and untrusted outside network, such as the Internet. • Firewall appliances may also offer other functionality to the internal network they protect, such as acting as a DHCPor VPN server for that network.
  • 5. CYBEROAM FIREWALL • Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, with presence in more than 125 countries. The company offers User Identity-based network security in its Firewalls/ Unified Threat Management appliances, allowing visibility and granular control into users' activities in business networks. For SOHO, SMB and large enterprise networks, this ensures security built around the network user for protection against APTs, insider threats, malware, hacker, and other sophisticated network attacks. • Cyberoam’s product range offers network security solution (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam NetGenie for home and small office networks.
  • 6. ENCRYPTION • In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can only be read if decrypted. For technical reasons,
  • 7. SOPHOS ENCRYPTION • Sophos Group is a British security software and hardware company. Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management. Sophos is primarily focused on providing security software to the mid market and pragmatic enterprise from 100 to 5000 Seat organisations. Whilst not a primary focus, Sophos also protects home users, through a free anti virus software (Sophos Home) intended to demonstrate product functionality.
  • 8. WIFI ROUTERS • A wireless router is the router found in a wireless local area network (WLAN) for home and small office networks. It enables Internet and local network access. Typically, the wireless router is directly connected to a wired or wireless WAN. Users connected to the wireless router are able to access the LAN as well as the external WAN, such as the Internet.
  • 9. ARUBA ROUTERS • Aruba, a Hewlett Packard Enterprise Company, is a vendor of data networking solutions for enterprises and businesses worldwide. Aruba Networks was founded in 2002 and is focused on bringing Wi-Fi wireless LAN mobility solutions to enterprise networks.
  • 10. IAS (INTERNET AUTHENTICATION SERVICE) • Internet Authentication Service (IAS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. IAS performs centralized connection authentication, authorization, accounting, and auditing (AAAA) for many types of network access including wireless, authenticating switch, and remote access dial-up and virtual private network (VPN) connections
  • 11. DIFFERENCE B/W ROUTERS & ACCESS POINT • A Router is a device that routes packets across networks. Thats all it does. If data from one computer is trying to get to another computer that is not on the same logical network it must be 'routed' to that network. Your home network is different then your ISP's network thus a router is always the last device that sits between you and your ISP. • An Access Point is a device that allows other devices to connect wirelessly. Its nothing more then an antenna. Access points can be purchased on their own and plugged into a wired switch or router to grant users wireless connectivity to that device.
  • 12. GOOGLE/GMAIL ADMIN CONSOLE • The Google Admin Console is a management tool provided by Google for G Suite administrators. It allows administrators to maintain all their G Suite services from one dashboard. With the Google Admin Console, administrators can configure settings for G Suite, monitor the usage of their domains, create user accounts, and more. • Some of the most common controls you will probably use are Users, Groups, Admin Roles, Apps and Reports. Other controls that are also included are Company Profile, Domains, Billing, Security, Support, Migration, Device Management, and App Engine Apps
  • 13. THANK YOU • MADE BY: SACHIN SHARMA