SlideShare una empresa de Scribd logo
1 de 53
www.cyberoam.com




                                                    Cyberoam USP

                                                                                                                       Presenter:
                                                                                                                       <Name>
                                                                                                                       <Position>, Cyberoam


                                                                             Our Products




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All RightsCopyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
                                                        © Reserved.                                                                       www.cyberoam.com
Cyberoam Introduction


            Technology Powerhouse

            450+ Employees

            Backed by World‟s Largest PE Investor ($156bn) – the Carlyle Group

            Sales, Distribution Channel and Customers across 125+ Countries

            Amongst the top 3 global players for UTM features

            Patent-pending Identity-based Management




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.        www.cyberoam.com
One stop shop: Cyberoam‟s Holistic Security Solutions



                 Network Security




              Centralized security
                 Management




            Network Monitoring &
                 Analysis




             Securing Home users




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Cyberoam UTM – Comprehensive Network Security




                                                                        Layer 8 security

                                                                                            Support for
                                                                                           3G/4G/WiMax




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                           www.cyberoam.com
Cyberoam UTMs offer…




                                                                         Gigabit Firewall Throughputs
                                                                         Powerful Hardware
                                                                         Superior Quality
                                                                         Value for Money
                                                                         Cyberoam OS




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                    www.cyberoam.com
Cyberoam Architecture




                               Powerful Hardware                         Intelligent Firmware

                    Multicore Gigahertz processors for                  Tight integration with
                     Nano second security processing                      Hardware
                    Gigabit Ports to integrate with                     Network & Crypto
                     Gigabit network                                      Acceleration
                    Faster, Next-Gen Memory and High
                     Capacity Storage for superior
                     performance
                    Industrial grade components to
                     withstand extreme environments




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                              www.cyberoam.com
Cyberoam Innovation: Layer 8 Security




                                                                        Cyberoam's Layer 8 Technology
                                                                        treats “User Identity” as the
                                                                        8th Layer in the protocol stack

                                                                        Cyberoam UTM offers security
                                                                        across Layer 2-Layer 8 using
                                                                        Identity-based policies




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                  www.cyberoam.com
AAA over single UTM appliance


                                                                        Identity-based AAA
                Users
                                                 Cyberoam                               Cyberoam                         Cyberoam
        Employees
                                                 Authenticates                          Authorizes                       Audits
                          Management             •   User Name                          • Internet surfing quota         • Identity–based
                                                 •   IP Address                         • Schedule control                 Logs + Reports
                                                 •   MAC Id                             • Security Policies              • Compliance
                                                 •   Session Id                         • Web Filtering                    Reports
                                                                                        • Application Visibility
                                                                                          & Control
                                                                                        • QoS / Bandwidth
       Customers
                                                                                          Management
                                                                                        • IM Controls
                            Partners




         Control user network activities                                 Ability to track the user
        • Who can connect to the network                                                                      Take quick network security
                                                                        activities; identify attackers
        • Who can access what                                                                                          decisions
        • What have they accessed
                                                                                   /victims




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                             www.cyberoam.com
Identity-based Security



   Corporate LAN



    DHCP
                                                                                  192.168.3.110
                                                                                  192.168.3.105
                                                                                  Steve
                                                                                  Richard
                                                                                                                    Internet
                                                                                  Ancy




                                                                           Applies security policies based on actual
                                                                            identity of users.
                                                                           User-specific rules for multiple users to
                                                                            share a common IP address
                       Administrator


© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                           www.cyberoam.com
Prioritize applications with Layer 7 and Layer 8 controls

              Internet                                                                 Cyberoam Appliance

       Application Traffic                               Visibility          Control                                  Manage Bandwidth

                                                                                                            Business Critical




                                                                                                            Socio business




                                                                                                            Non Critical


                                                                        Infected Applications Blocked

                                                                              worms          Spyware
                                                                                                            Undesirable




                                                                                          Logs & Reports

               Controls over applications based on User Identity, Time, Application and Bandwidth

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                           www.cyberoam.com
Granular classification of applications




                                    Category                            Risk Level      Characteristics              Technology
                                    File Transfer                       Very Low (1)    Excessive Bandwidth          Browser Based
                                    Gaming                              Low (2)
                                                                                        Prone to misuse              Client Server
                                    General Internet                    Medium (3)
                                    Instant Messenger                   High (4)        Transfer files               Network Protocol

                                    Infrastructure                      Very High (5)   Tunnel other apps            P2P
                                    Network Services
                                                                                        Widely used
                                    P2P
                                    Proxy and Tunnel                                    Loss of Productivity
                                    Remote Access                                       Can bypass firewall policy
                                    Streaming Media
                                    VoIP
                                    Mobile Applications
                                    Social Networking
                                    Web Mail
                                    And more…
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                      www.cyberoam.com
Granular classification of applications


          Proactive Protection model:
          Eliminates the need for manual intervention by administrators to update policies for new
          applications added to the list

                                                                        Select P2P
                                                                        Applications


                                                                        Set Action

                                                                        Block all future P2P applications without
                                                                        adding applications manually




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                 www.cyberoam.com
Instant Messaging Controls


       Control communication medium
       (chat, video, voice, file transfer)                                      Archive
                                                                             Communication




                                                                                                                  Data Protection




                     Control who can
                     chat with whom


                                                                                                                      Productivity
                                                                  Prevent data leakage
       Control loss of productivity                                                                         Forensic Analysis
                                                                  • Block specific keywords
       • Control access over chat, voice,                                                                   • IM audit logs
                                                                  • Block regular expressions (RegEx)
         video, file transfer                                                                               • Filter logs based on Users, IPs,
                                                                    e.g. social security no., credit card
       • Control who can chat with whom                                                                       Messages based on keywords
                                                                    no., ABN routing numbers

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                                www.cyberoam.com
On-appliance Logging & Reporting


           Real time visibility into user and network activities
           Traffic Discovery
                   - Real-time visibility into bandwidth utilization by user, protocol, application




                                                  Security                         Forensic
                                                 Management                        Analysis
                                                                         1200+
                                                                        Reports
                                                       Data                       Compliance
                                                    Protection                    Management




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                             www.cyberoam.com
Layer-8 User-based Reports




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Layer-8 User-based Reports




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard


                                                                        Traffic Dashboard




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                       www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard


                                                                        Security Dashboard




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                        www.cyberoam.com
Application Reports




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Compliance Reports




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Interactive World Traffic Map




                                  Interactive World Traffic Map for Source and Destination traffic


© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                www.cyberoam.com
Traffic Discovery




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Traffic Discovery




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Stateful Inspection Firewall

           Unified Security
           Application Firewall
                                                                                                       Security
           Identity-based Firewall                                                                    Policies
                                                                        Firewall Rule
           Layer 8 Geo-based Traffic Control                                                          Connectivity
                                                                                                       Policies
                   - Control incoming/outgoing traffic
                                                                                                       Productivity
                     from/to a specific country                                                        Policies

           FastPath Technology
                   - To improve processing speed and                     Unified Security
                     reduce CPU overhead                                   Rules for all security features
                                                                            from firewall page
                                                                           Easy navigation and increased
                                                                            administrative productivity




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                         www.cyberoam.com
Configure rules for all features from Firewall page




                                                                          Identity



                                                                             +

                                                                          Security

                                                                             +
                                                                        Productivity
                                                                             +
                                                                        Connectivity




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                  www.cyberoam.com
Threat Protection Features



                Intrusion Prevention System                                 Gateway Anti-Virus, Anti- spyware
                 - Layer 8 and IPS Tuner driven                              - 4 million+ signatures
                 - Identity-based IPS policies per user, group and           - Bi-directional scanning: Web & Email
                   IP address                                                - Self-service Virus Quarantine
                 - Allows multiple IPS policies                              - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and
                 - Identity-based alerts & reports                             IM traffic
                 - 4500+ signatures – broadest security cover                - Instant visibility into Attacker/Victim
                                                                                                 Cyberoam
                                                                                               Security Center



                Anti-Spam (Inbound/Outbound)                                DoS & DDoS Protection
                  - Three level scanning:                                    - Packet Rate Limit
                       IP Reputation filtering                              - Protection against flood attacks
                       Real-time Blackhole List (RBL)         Continuously updated via
                                                                                     - SYN Flood
                       Recurrent Pattern Detection (RPDTM) technology
                  -   ~98% spam detection         Cyberoam Security Center           - TCP Flood
                                                                                     - UDP Flood
                  -   Self-service Quarantine and Spam Digest                        - ICMP Flood
                  -   Scans SMTP, POP3, IMAP traffic                         - IPS Signature to prevent attacks
                  -   Virus outbreak detection for zero-hour protection      - Protocol Anomaly




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                    www.cyberoam.com
On-appliance Web Application Firewall (WAF)

           Firewalls/IPS cannot protect a web application from unknown threats


                                                                                                       WAF protection on Cyberoam UTM
                                                                                                        Protects web-apps and web servers
                                                                                                          from hackers
                                                                                                        Positive protection model and No
                                                                                                      Web &
                                                                  Traditional                             Signature Tables
                                                                                                    Application                  Database
                                                                   Firewall                             Intuitive website flow detector
                                                                                                      Server                      Server

                                                                        Cyberoam UTM offering
                                                                                                          Automatically adapts to website
                                                                           WAF protection                 changes
                                                                                                        Protects against OWASP top 10
                                                                                                          web-app vulnerabilities
                                                                                                        SSL Offloading
                                                                                                        Monitoring & Reporting
                                                                                                Organization's IT network
                                                         Unauthorized
                                                        access blocked




                     Cost Effective                                                                          Does not require any changes
                                                                               Easy to deploy
          No need to buy dedicated hardware                                                                             in setup
                         WAF



© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                                www.cyberoam.com
Virtual Private Network (VPN)


                                                                                        Embrace BYOD with mobile
           Support for IPSec, L2TP,                                                    VPN clients
            PPTP, SSL VPN                                                               Supported VPN Clients
           Threat Free Tunneling (TFT)                                                  MacOS
            Technology                                                                   iOS
                                                                                         Android Devices
                   - Scans VPN traffic for Malware, Spam,
                     Inappropriate content, Intrusion attempts                            iOS


           Advanced features for business
            continuity
                   - MPLS failover to VPN                                               IPSec VPN
                                                                                        L2TP VPN
                   - VPN failover                                                       PPTP VPN




                                                                        SSL VPN
                                                                         -Client less
                                                                                                            Android
                                                                        -License free                       L2TP VPN




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                        www.cyberoam.com
Web & Content Filtering

                                            Industry‟s most comprehensive URL database
                                                  44million+ URLs in 82+ categories

          Controls access to HTTP/HTTPS websites
                                                                                          Regular Web category
          Blocks Google Cache pages                                                             updates

          Blocks Embedded URLs                                                           Cyberoam Security Center

          Blocks Malware hosting sites
          Detects & Blocks Third Party Proxy and Tunneling sites
          Filters Web 2.0 content



                                                                          Proxy
                                                                          Proxy
                                                                         Allowed
                                                                         Malware
                                                                         Google
                                                                         Blocked
                                                                        Embedded
                                                                            Web
                                                                              &
                                                                          Website
                Internet                                                    Web
                                                                        Websites
                                                                         Websites
                                                                         hosting
                                                                           cache/
                                                                           URLs
                                                                             2.0
                                                                        Tunneling
                                                                           HTTP
                                                                             2.0
                                                                          HTTP/
                                                                            HTTP
                                                                           pages
                                                                           sites
                                                                          HTTPS
                                                                           sites
                                                                          HTTPS
                                                                          /HTTPS




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                            www.cyberoam.com
Web & Content Filtering

           Manage productivity by controlling access to unwanted sites
           On-appliance web category database
                    Faster access
                    Surfing pattern privacy
           Control Data Leakage
                    Blocks file uploads to web pages
           Helps meet regulatory compliance requirements
           Prevent productivity loss with identity-based approach
           Customize blocked messages to educate users on corporate
            policies

                                                                        “YouTube for Schools”
                                                                        for Educational Institutes
                                                                         Allows access to selected
                                                                          educational content
                                                                         Blocks all inappropriate, peripheral
                                                                          content such as ads, comments &
                                                                          links


© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                         www.cyberoam.com
Best of Breed Bandwidth Management / QoS

                                                                        User/Users                     Web
    Bandwidth policies tied with                                           User
                                                                          group
                                                                                     Firewall Rule
                                                                                                     Category
                                                                                                                Application




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                            www.cyberoam.com
Best of Breed Bandwidth Management / QoS

           Create a bandwidth policy on a combination of
                    User or User Group /Department
                    Application or Application Category
                    Web category
                    Allows great flexibility and real L2-L8 visibility and control
           Bandwidth sharing with priority
           Schedule-based bandwidth allocation

               Committed bandwidth                                          Burstable bandwidth
               • Allocate dedicated bandwidth                               • Share the unutilized bandwidth
                                                                                                           Marketing
                                                                            When                            Group
                                                                            user is not                     6mbps
                                                                            connected

                        CEO                 Manager            ERP System
                       5 mbps               2 mbps                 8 mbps


                                                                                    Manager   Employee 1     Employee 2
                                                                                     2mbps     3mbps
                                                                                                2mbps         3mbps
                                                                                                               2mbps


© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                             www.cyberoam.com
Business Continuity Features

           High Availability
                   - Active-Active & Active-Passive
                   - Reduces single-point-of-failure
                   - Maximizes network uptime
                   - Ensures continuous network security
           Multiple Link Management with Automated Load Balancing
                   - Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover
                     conditions
                             - Active-Active and Active-Passive Auto Link Failover
                             - Gateway failover over VPN

       Sales
       Dept.                                                                            ISP1           MPLS
                                                                                     (10 mbps)



       Dev.                                                                                             ISP2
       Dept.                                                                                         (5 mbps)


                                                                                      ISP3 (3G)
      Finance                                                                         (3 mbps)
       Dept.                                       Organization's IT network         Failover Link




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                           www.cyberoam.com
Business Continuity Features

          Layer 8 Policy-based Routing
                   - Routes traffic based on Source IP addresses, Protocols & Users
                   - Assures QoS for key users and applications




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                 www.cyberoam.com
Wireless (WLAN) Security

           High performance, integrated security over WLAN
                   - Secures wireless networks to the extent of wired networks
           Faster performance, broader coverage with 3x3 MIMO Technology
                   - Dual band support: 2.4 GHz or 5 GHz
           Multiple Virtual Access Points
           Layer 8 over WLAN
                   - Identity-based policies in dynamic IP environment
                   - MAC-based filtering
                   - Supports IP-address pool
                              Enhances security                                    Engineering
                                                                                                  Sales
                                                                        Marketing


                                                                                                              File server


                                                          Internet                                               ADS


                                                                                                              ERP




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                     www.cyberoam.com
Safeguard user privacy – 4-Eye Authentication

           Prevent the risk of IT administrator from misusing privilege of
            tracking user activities
           2 people: Authorizer and Administrator
                   - Authorizer consent required for the Administrator to view user-specific activities




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                          www.cyberoam.com
SMS (Text-based) Authentication

           Needed for hotspots, airports, hotels, corporate offices
           Default group can be created for guest users
           Sending Internet access credentials using SMS for guest users




                                                                        SMS for Guest users

                                                                                              Hotels




                    Airports


© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                  www.cyberoam.com
Cyberoam features assure Security, Connectivity, Productivity



                                Organizations cannot afford to compromise on any of these.
                                            The right SCP balance is essential!




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                        www.cyberoam.com
Customer Support System



                                                                                  Web
                                                                                 Support




                       • Support available across all time zones                  Chat
                                                                                 Support

                       • Global Support Excellence - ITIL compliance
                         (ISO 20000)                                    •   Appliance Registration and Upgrade
                                                                        •   Subscribe security features
                                                                        •          Email
                                                                            Create support tickets
                                                                        •         Support
                                                                            Request RMA




                                                                                 Phone
                                                                                 Support




                                                                               Knowledge
                                                                                  base

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                           www.cyberoam.com
Partner Support System




                                                                               Web
                                                                              Support




                          Region specific dedicated Technical Account            Chat
                                        Managers (TAM)                         Support
                                                                        • Ordering & Inventory management
                                                                        • Sales & Marketing tools &
                                                                          resources
                                                                        • Presales Support
                                                                        • Track Appliance/Subscription

                                                                               Email
                                                                              Support




                                                                            Knowledge
                                                                               base



© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                      www.cyberoam.com
Cyberoam UTM Product Range

        Hardware UTM appliances                                         Virtual UTM appliances



          Small and Remote Offices
          CR35wiNG, CR35iNG,
          CR25wiNG, CR25iNG,
          CR15wiNG, CR15iNG
                                                                        CRiV-1C, CRiV-2C, CRiV-4C,
                                                                        CRiV-8C, CRiV-12C
          Small and Medium Enterprises
          CR300i, CR200i,
          CR100iNG, CR50iNG



          Large Enterprises
          CR2500iNG
          CR1500ia, CR1500ia-10F,
          CR1000ia, CR1000ia-10F,
          CR750ia, CR750ia-1F/10F,
          CR500ia, CR500ia-1F/10F/RP,


© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                    www.cyberoam.com
Cyberoam Central Console (CCC)


            CCC is for centralized, integrated management and
             monitoring of Cyberoam UTM devices
               -     Offers complete control over distributed networks from
                     head office (H.O.) or Security Operations Center (S.O.C.)
                     of MSSPs
            Available as
               -     Hardware CCC Appliances, Virtual CCC Appliances
                                                                                               Mumbai
                                                                                          Branch Office

                    New York
                Branch Office

                                                                                                                       Boston
                                                                                                      Cyberoam         Branch Office
                                                                                                        UTM
                     Cyberoam
                       UTM


                                                                                 Dubai
                                                                                 Head Office
                                                 Cyberoam
                                                                                                            Cyberoam
                                                   UTM
                                                                                                              UTM




                                                                        Cyberoam Central Console (CCC)

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                            www.cyberoam.com
Cyberoam iView – Logging and Reporting


       Ability to log and report                                        Security
                                                                        Management
                                                                                               Forensic
                                                                                               Analysis
        activities from various
        devices/vendors
                                                                           Log           Compliance         Available as
                                                                        Management       Management          Open Source software
                                                                                                             Appliance

                                                                                    Identity

                                                                           Logging       Reporting




                                 Servers
                                                                                                                  Desktop systems

                                                                           Logs & Events



                               Firewalls                                                                               Applications



                                                         IDP / IPS                                          UTM
                                                                                                  Routers
                                                                         Switches

                Cyberoam iView‟s Logging & Reporting Facilitates Security, Compliance, Forensics
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                      www.cyberoam.com
CCC & iView product range

        CCC appliances                                                  iView – Logging & Reporting


          Hardware CCC appliances

          CCC1000, CCC500, CCC200,
          CCC100, CCC50, CCC15

                                                                                CR-iVU200
          Virtual CCC appliances                                                CR-iVU100
                                                                                CR-iVU25
          For VMware Server:
          CCC VMS 200, CCC VMS 100, CCC VMS 50, CCC VMS 15

          For VMware Workstation:
          CCC VMW 200, CCC VMW 100, CCC VMW 50, CCC VMW 15




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                       www.cyberoam.com
Training & Certification




                                                                         Developing competencies with Cyberoam UTM appliances

                                                                        CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP)

                                                                         CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)

                                                                                    CYBEROAM CERTIFIED TRAINER (CCT)




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                   www.cyberoam.com
Recognized as „Visionary‟ in the Gartner UTM MQ



                          2009                                                   2010                         2012
             Magic Quadrant for SMB                                     Magic Quadrant for Unified   Magic Quadrant for Unified
              Multifunction Firewalls                                     Threat Management            Threat Management




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                   www.cyberoam.com
Proven track record of Innovation



                                                                        Innovation: Go-to-market strategy in a global market
                                                                        that is quite crowded in its product space.
                                                                        Greatest strength: Product and support through most
                                                                        media 24/7.
                                                                        For Cyberoam, customer commitment means measuring,
                                                                        analyzing and responding to customer attitudes, needs
                                                                        and how customers view Cyberoam products.




                                                                        “One innovative solution to growth and extensibility
                                                                        requirements has been adding an abstraction layer – a
                                                                        sort of Layer 8 on the open systems interconnection
NASSCOM INNOVATION                                                      (OSI) model - that allows connection of names. This
    AWARD 2011                                                          could be users, domains and more. This allows greatly
                                                                        improved granularity of system administration.”




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                  www.cyberoam.com
Clientele Worldwide

                     BFSI                                               Manufacturing   Government




              Education                                           Pharma & Healthcare   Telecom & ISP




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                           www.cyberoam.com
Clientele Worldwide

                  Hotels                                                Retail & Services   IT/BPO & Media




                                                                             Others




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                               www.cyberoam.com
Product Certifications




                                                                                 Member of
                 ICSA Certified Firewall                  IPv6 Ready           Internet Watch
                                                                                 Foundation


                                                                                                            UTM Level 5:
                                                                                                    Cyberoam holds a unique &
                                                                                                    complete UTM certification




                                                                                                Firewall        VPN           Anti-Virus     Anti-Spyware
                     ICSA Certified                            VPNC Certified for Basic
                    High-Availability                         VPN & AES Interoperability
                                                                                                Premium          Premium              Premium




                                           EAL4+ Pending Approval
                                                                                                    Anti-Spam         URL Filtering          IPS/IDP




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.                                                                      www.cyberoam.com
Cyberoam Live Demo




         Link:
         http://demo.cyberoam.com

         Credentials:
         guest /guest


            Get a 30 day FREE Evaluation of
              Cyberoam Virtual appliance




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com
Thank you
    Contact: sales@cyberoam.com




© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.   www.cyberoam.com

Más contenido relacionado

La actualidad más candente

Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayLiberteks
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 edenSec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden道成資訊股份有限公司
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure MobilityCisco Canada
 

La actualidad más candente (17)

Ccnsp
CcnspCcnsp
Ccnsp
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
CCNSP
CCNSPCCNSP
CCNSP
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
CCNSE
CCNSECCNSE
CCNSE
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Cornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product LineCornerstone Networking & Security- Astaro Product Line
Cornerstone Networking & Security- Astaro Product Line
 
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 edenSec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
 

Destacado

Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Fajar Isnanto
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-TechsheetBaqar Kazmi
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionDavid Lapsley
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Cyberoam cr300i
Cyberoam cr300iCyberoam cr300i
Cyberoam cr300ipuneet1990
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefitsAnthony Daniel
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoamAcademy
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Benelux
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 

Destacado (19)

Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Afcomsat Profile 20101214
Afcomsat Profile 20101214Afcomsat Profile 20101214
Afcomsat Profile 20101214
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-Techsheet
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups Session
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Amazon Network Security
Amazon Network SecurityAmazon Network Security
Amazon Network Security
 
Cyberoam cr300i
Cyberoam cr300iCyberoam cr300i
Cyberoam cr300i
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web services
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 

Similar a Cyberoam Unified Threat Management

Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminarpatmisasi
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Amazon Web Services
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochurebakar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureBaqar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureBaqar Kazmi
 
Flash card Module 9- Manage Security Operation in Azure
Flash card  Module 9- Manage Security Operation in AzureFlash card  Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in AzureYoong Seng Lai
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochurebakar kazmi
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureBaqar kazmi
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
About Saitro - Mobile IP Networks
About Saitro - Mobile IP NetworksAbout Saitro - Mobile IP Networks
About Saitro - Mobile IP NetworksLuis Carlos Toledo
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to PracticeLiz Bradley
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...FaberLab
 

Similar a Cyberoam Unified Threat Management (20)

Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminar
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Flash card Module 9- Manage Security Operation in Azure
Flash card  Module 9- Manage Security Operation in AzureFlash card  Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Axxera Ppt
Axxera PptAxxera Ppt
Axxera Ppt
 
Axxera
AxxeraAxxera
Axxera
 
About Saitro - Mobile IP Networks
About Saitro - Mobile IP NetworksAbout Saitro - Mobile IP Networks
About Saitro - Mobile IP Networks
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to Practice
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Cyberoam Unified Threat Management

  • 1. www.cyberoam.com Cyberoam USP Presenter: <Name> <Position>, Cyberoam Our Products © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All RightsCopyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. © Reserved. www.cyberoam.com
  • 2. Cyberoam Introduction Technology Powerhouse 450+ Employees Backed by World‟s Largest PE Investor ($156bn) – the Carlyle Group Sales, Distribution Channel and Customers across 125+ Countries Amongst the top 3 global players for UTM features Patent-pending Identity-based Management © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 3. One stop shop: Cyberoam‟s Holistic Security Solutions Network Security Centralized security Management Network Monitoring & Analysis Securing Home users © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 4. © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 5. Cyberoam UTM – Comprehensive Network Security Layer 8 security Support for 3G/4G/WiMax © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 6. Cyberoam UTMs offer…  Gigabit Firewall Throughputs  Powerful Hardware  Superior Quality  Value for Money  Cyberoam OS © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 7. Cyberoam Architecture Powerful Hardware Intelligent Firmware  Multicore Gigahertz processors for  Tight integration with Nano second security processing Hardware  Gigabit Ports to integrate with  Network & Crypto Gigabit network Acceleration  Faster, Next-Gen Memory and High Capacity Storage for superior performance  Industrial grade components to withstand extreme environments © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 8. Cyberoam Innovation: Layer 8 Security Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 9. AAA over single UTM appliance Identity-based AAA Users Cyberoam Cyberoam Cyberoam Employees Authenticates Authorizes Audits Management • User Name • Internet surfing quota • Identity–based • IP Address • Schedule control Logs + Reports • MAC Id • Security Policies • Compliance • Session Id • Web Filtering Reports • Application Visibility & Control • QoS / Bandwidth Customers Management • IM Controls Partners Control user network activities Ability to track the user • Who can connect to the network Take quick network security activities; identify attackers • Who can access what decisions • What have they accessed /victims © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 10. Identity-based Security Corporate LAN DHCP 192.168.3.110 192.168.3.105 Steve Richard Internet Ancy  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address Administrator © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 11. Prioritize applications with Layer 7 and Layer 8 controls Internet Cyberoam Appliance Application Traffic Visibility Control Manage Bandwidth Business Critical Socio business Non Critical Infected Applications Blocked worms Spyware Undesirable Logs & Reports Controls over applications based on User Identity, Time, Application and Bandwidth © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 12. Granular classification of applications Category Risk Level Characteristics Technology File Transfer Very Low (1) Excessive Bandwidth Browser Based Gaming Low (2) Prone to misuse Client Server General Internet Medium (3) Instant Messenger High (4) Transfer files Network Protocol Infrastructure Very High (5) Tunnel other apps P2P Network Services Widely used P2P Proxy and Tunnel Loss of Productivity Remote Access Can bypass firewall policy Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 13. Granular classification of applications Proactive Protection model: Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Select P2P Applications Set Action Block all future P2P applications without adding applications manually © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 14. Instant Messaging Controls Control communication medium (chat, video, voice, file transfer) Archive Communication Data Protection Control who can chat with whom Productivity Prevent data leakage Control loss of productivity Forensic Analysis • Block specific keywords • Control access over chat, voice, • IM audit logs • Block regular expressions (RegEx) video, file transfer • Filter logs based on Users, IPs, e.g. social security no., credit card • Control who can chat with whom Messages based on keywords no., ABN routing numbers © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 15. On-appliance Logging & Reporting  Real time visibility into user and network activities  Traffic Discovery - Real-time visibility into bandwidth utilization by user, protocol, application Security Forensic Management Analysis 1200+ Reports Data Compliance Protection Management © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 16. Layer-8 User-based Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 17. Layer-8 User-based Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 18. Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 19. Dual Dashboard – Traffic & Security Dashboard Security Dashboard © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 20. Application Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 21. Compliance Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 22. Interactive World Traffic Map Interactive World Traffic Map for Source and Destination traffic © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 23. Traffic Discovery © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 24. Traffic Discovery © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 25. Stateful Inspection Firewall  Unified Security  Application Firewall Security  Identity-based Firewall Policies Firewall Rule  Layer 8 Geo-based Traffic Control Connectivity Policies - Control incoming/outgoing traffic Productivity from/to a specific country Policies  FastPath Technology - To improve processing speed and Unified Security reduce CPU overhead  Rules for all security features from firewall page  Easy navigation and increased administrative productivity © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 26. Configure rules for all features from Firewall page Identity + Security + Productivity + Connectivity © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 27. Threat Protection Features Intrusion Prevention System Gateway Anti-Virus, Anti- spyware - Layer 8 and IPS Tuner driven - 4 million+ signatures - Identity-based IPS policies per user, group and - Bi-directional scanning: Web & Email IP address - Self-service Virus Quarantine - Allows multiple IPS policies - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and - Identity-based alerts & reports IM traffic - 4500+ signatures – broadest security cover - Instant visibility into Attacker/Victim Cyberoam Security Center Anti-Spam (Inbound/Outbound) DoS & DDoS Protection - Three level scanning: - Packet Rate Limit  IP Reputation filtering - Protection against flood attacks  Real-time Blackhole List (RBL) Continuously updated via - SYN Flood  Recurrent Pattern Detection (RPDTM) technology - ~98% spam detection Cyberoam Security Center - TCP Flood - UDP Flood - Self-service Quarantine and Spam Digest - ICMP Flood - Scans SMTP, POP3, IMAP traffic - IPS Signature to prevent attacks - Virus outbreak detection for zero-hour protection - Protocol Anomaly © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 28. On-appliance Web Application Firewall (WAF)  Firewalls/IPS cannot protect a web application from unknown threats WAF protection on Cyberoam UTM  Protects web-apps and web servers from hackers  Positive protection model and No Web & Traditional Signature Tables Application Database Firewall  Intuitive website flow detector Server Server Cyberoam UTM offering Automatically adapts to website WAF protection changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting Organization's IT network Unauthorized access blocked Cost Effective Does not require any changes Easy to deploy No need to buy dedicated hardware in setup WAF © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 29. Virtual Private Network (VPN) Embrace BYOD with mobile  Support for IPSec, L2TP, VPN clients PPTP, SSL VPN Supported VPN Clients  Threat Free Tunneling (TFT)  MacOS Technology  iOS  Android Devices - Scans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attempts iOS  Advanced features for business continuity - MPLS failover to VPN IPSec VPN L2TP VPN - VPN failover PPTP VPN SSL VPN -Client less Android -License free L2TP VPN © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 30. Web & Content Filtering Industry‟s most comprehensive URL database 44million+ URLs in 82+ categories Controls access to HTTP/HTTPS websites Regular Web category Blocks Google Cache pages updates Blocks Embedded URLs Cyberoam Security Center Blocks Malware hosting sites Detects & Blocks Third Party Proxy and Tunneling sites Filters Web 2.0 content Proxy Proxy Allowed Malware Google Blocked Embedded Web & Website Internet Web Websites Websites hosting cache/ URLs 2.0 Tunneling HTTP 2.0 HTTP/ HTTP pages sites HTTPS sites HTTPS /HTTPS © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 31. Web & Content Filtering  Manage productivity by controlling access to unwanted sites  On-appliance web category database  Faster access  Surfing pattern privacy  Control Data Leakage  Blocks file uploads to web pages  Helps meet regulatory compliance requirements  Prevent productivity loss with identity-based approach  Customize blocked messages to educate users on corporate policies “YouTube for Schools” for Educational Institutes  Allows access to selected educational content  Blocks all inappropriate, peripheral content such as ads, comments & links © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 32. Best of Breed Bandwidth Management / QoS User/Users Web Bandwidth policies tied with User group Firewall Rule Category Application © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 33. Best of Breed Bandwidth Management / QoS  Create a bandwidth policy on a combination of  User or User Group /Department  Application or Application Category  Web category  Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Committed bandwidth Burstable bandwidth • Allocate dedicated bandwidth • Share the unutilized bandwidth Marketing When Group user is not 6mbps connected CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager Employee 1 Employee 2 2mbps 3mbps 2mbps 3mbps 2mbps © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 34. Business Continuity Features  High Availability - Active-Active & Active-Passive - Reduces single-point-of-failure - Maximizes network uptime - Ensures continuous network security  Multiple Link Management with Automated Load Balancing - Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions - Active-Active and Active-Passive Auto Link Failover - Gateway failover over VPN Sales Dept. ISP1 MPLS (10 mbps) Dev. ISP2 Dept. (5 mbps) ISP3 (3G) Finance (3 mbps) Dept. Organization's IT network Failover Link © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 35. Business Continuity Features  Layer 8 Policy-based Routing - Routes traffic based on Source IP addresses, Protocols & Users - Assures QoS for key users and applications © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 36. Wireless (WLAN) Security  High performance, integrated security over WLAN - Secures wireless networks to the extent of wired networks  Faster performance, broader coverage with 3x3 MIMO Technology - Dual band support: 2.4 GHz or 5 GHz  Multiple Virtual Access Points  Layer 8 over WLAN - Identity-based policies in dynamic IP environment - MAC-based filtering - Supports IP-address pool  Enhances security Engineering Sales Marketing File server Internet ADS ERP © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 37. Safeguard user privacy – 4-Eye Authentication  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator - Authorizer consent required for the Administrator to view user-specific activities © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 38. SMS (Text-based) Authentication  Needed for hotspots, airports, hotels, corporate offices  Default group can be created for guest users  Sending Internet access credentials using SMS for guest users SMS for Guest users Hotels Airports © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 39. Cyberoam features assure Security, Connectivity, Productivity Organizations cannot afford to compromise on any of these. The right SCP balance is essential! © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 40. Customer Support System Web Support • Support available across all time zones Chat Support • Global Support Excellence - ITIL compliance (ISO 20000) • Appliance Registration and Upgrade • Subscribe security features • Email Create support tickets • Support Request RMA Phone Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 41. Partner Support System Web Support Region specific dedicated Technical Account Chat Managers (TAM) Support • Ordering & Inventory management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Email Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 42. Cyberoam UTM Product Range Hardware UTM appliances Virtual UTM appliances Small and Remote Offices CR35wiNG, CR35iNG, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C Small and Medium Enterprises CR300i, CR200i, CR100iNG, CR50iNG Large Enterprises CR2500iNG CR1500ia, CR1500ia-10F, CR1000ia, CR1000ia-10F, CR750ia, CR750ia-1F/10F, CR500ia, CR500ia-1F/10F/RP, © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 43. Cyberoam Central Console (CCC)  CCC is for centralized, integrated management and monitoring of Cyberoam UTM devices - Offers complete control over distributed networks from head office (H.O.) or Security Operations Center (S.O.C.) of MSSPs  Available as - Hardware CCC Appliances, Virtual CCC Appliances Mumbai Branch Office New York Branch Office Boston Cyberoam Branch Office UTM Cyberoam UTM Dubai Head Office Cyberoam Cyberoam UTM UTM Cyberoam Central Console (CCC) © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 44. Cyberoam iView – Logging and Reporting  Ability to log and report Security Management Forensic Analysis activities from various devices/vendors Log Compliance Available as Management Management  Open Source software  Appliance Identity Logging Reporting Servers Desktop systems Logs & Events Firewalls Applications IDP / IPS UTM Routers Switches Cyberoam iView‟s Logging & Reporting Facilitates Security, Compliance, Forensics © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 45. CCC & iView product range CCC appliances iView – Logging & Reporting Hardware CCC appliances CCC1000, CCC500, CCC200, CCC100, CCC50, CCC15 CR-iVU200 Virtual CCC appliances CR-iVU100 CR-iVU25 For VMware Server: CCC VMS 200, CCC VMS 100, CCC VMS 50, CCC VMS 15 For VMware Workstation: CCC VMW 200, CCC VMW 100, CCC VMW 50, CCC VMW 15 © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 46. Training & Certification Developing competencies with Cyberoam UTM appliances CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP) CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE) CYBEROAM CERTIFIED TRAINER (CCT) © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 47. Recognized as „Visionary‟ in the Gartner UTM MQ 2009 2010 2012 Magic Quadrant for SMB Magic Quadrant for Unified Magic Quadrant for Unified Multifunction Firewalls Threat Management Threat Management © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 48. Proven track record of Innovation Innovation: Go-to-market strategy in a global market that is quite crowded in its product space. Greatest strength: Product and support through most media 24/7. For Cyberoam, customer commitment means measuring, analyzing and responding to customer attitudes, needs and how customers view Cyberoam products. “One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection NASSCOM INNOVATION (OSI) model - that allows connection of names. This AWARD 2011 could be users, domains and more. This allows greatly improved granularity of system administration.” © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 49. Clientele Worldwide BFSI Manufacturing Government Education Pharma & Healthcare Telecom & ISP © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 50. Clientele Worldwide Hotels Retail & Services IT/BPO & Media Others © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 51. Product Certifications Member of ICSA Certified Firewall IPv6 Ready Internet Watch Foundation UTM Level 5: Cyberoam holds a unique & complete UTM certification Firewall VPN Anti-Virus Anti-Spyware ICSA Certified VPNC Certified for Basic High-Availability VPN & AES Interoperability Premium Premium Premium EAL4+ Pending Approval Anti-Spam URL Filtering IPS/IDP © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 52. Cyberoam Live Demo Link: http://demo.cyberoam.com Credentials: guest /guest Get a 30 day FREE Evaluation of Cyberoam Virtual appliance © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
  • 53. Thank you Contact: sales@cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com