SlideShare una empresa de Scribd logo
1 de 27
Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam Wi-Fi Appliance Comprehensive Network Security with Wi-Fi Access Point  for Small and Remote Offices
Topics ,[object Object],[object Object],[object Object],[object Object]
SOHO/SMB Dilemma – Wi-Fi vs. Wired networks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wi-Fi Security Risks for SOHO & SMB ,[object Object],[object Object],[object Object],[object Object]
Traditional Wi-Fi  vs  Cyberoam Wi-Fi
[object Object],[object Object],[object Object],Common Pre-Shared key Traditional Wi-Fi without user authentication Internet   Firewall / Router Employee Guest 1  Ex-Employee Guest 2 Guest 3 Wi-Fi Router ACME CORPORATION
Cyberoam Wi-Fi with user authentication Common  Pre-Shared  key Temporary User Access Temporary User Access Expires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User Name MAC ID IP Address Internet   Employee Layer 8 Technology CR15wi Network Guest 1  ACME CORPORATION
Cyberoam’s Layer 8 Advantage – Identity-based Controls Internet Tony Bandwidth control Duration / Quota control Schedule  Control Reporting Apply these controls on Employees as well as Guests CR 15wi
Traditional Wi-Fi without network segmentation Common Pre-Shared key ,[object Object],[object Object],[object Object],[object Object],Internet   Firewall - Router Wi-Fi Router Employee Guest Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Shared Network Drives Switch ACME CORPORATION
Cyberoam Wi-Fi allows Separate Guest and Employee Network Access CR15wi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet   Switch Employee Layer 8 Advantage   Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Guest Shared Network Drives ACME Guest ACME Employees
CR15wi Layer 8 Advantage   Multiple Virtual Access Points – 8 SSIDs for network segmentation ACME Marketing Internet   Switch Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Guest Shared Network Drives Engineering ACME Guest ACME Engineering Marketing
Cyberoam Wi-Fi Advantage
Cyberoam Wi-Fi Advantage Reduced TCO Enhanced Security
Cyberoam Wi-Fi Reduces TCO + + = CR 15wi Wi-Fi Router Other Network Security Devices ,[object Object],[object Object],[object Object],- Antivirus - Antispam - IPS - VPN and many more ,[object Object],[object Object],Firewall - Router
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Coverage Bandwidth Ability to fine-tune coverage with bandwidth
Cyberoam Wi-Fi Security Advantage ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Extend 1 Access Point to 8 Virtual Access Points
CR 15wi Specs
Cyberoam WiFi Appliance – CR 15wi  802.11 n/b/g (WEP, WPA, WPA2, 802.11i ,TKIP, AES, PSK,  802.1x EAP) Antenna Detachable 2x3 MIMO Access Points Up to 8 bssid Transmit Power (EIRP) 11n HT40 : +17dBm 11b CCK: +19dBm 11g OFDM:+17dBm Receiver Sensitivity - 65dBm at 300Mbps - 70dBm at 54Mpbs 10% PER - 86dBm at 11Mpbs 8% PER
CR 15wi GUI Preview
Configuring Wireless Access Point
Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Configuring Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
DHCP Server www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
DHCP Configuration Option
Thank You [email_address] www.cyberoam.com

Más contenido relacionado

La actualidad más candente

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayLiberteks
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTMsharetech
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 

La actualidad más candente (13)

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
CCNSP
CCNSPCCNSP
CCNSP
 
CCNSE
CCNSECCNSE
CCNSE
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Destacado

Mobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMark S. Steed
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...Tokyo University of Science
 
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Mark S. Steed
 
Secure Business WiFi
Secure Business WiFiSecure Business WiFi
Secure Business WiFiKim Devins
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightRandle Stonier
 

Destacado (7)

Mobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMobile Device Strategy for Schools
Mobile Device Strategy for Schools
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
 
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
 
Xamarin Robotics
Xamarin RoboticsXamarin Robotics
Xamarin Robotics
 
Secure Business WiFi
Secure Business WiFiSecure Business WiFi
Secure Business WiFi
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it right
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 

Similar a Wifi Security for SOHOs: Cyberoam UTM CR15wi

Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technologygainspan
 
HotSpot de Planet WSG-500
HotSpot de Planet WSG-500HotSpot de Planet WSG-500
HotSpot de Planet WSG-500Cartronic Group
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networkshypknight
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 PresentationMonark Goel
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 
Wireless World
Wireless World Wireless World
Wireless World bhattsipl
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive Networks
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point AustraliaCalAnderson
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point SolutionSavvius, Inc
 

Similar a Wifi Security for SOHOs: Cyberoam UTM CR15wi (20)

Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
 
HotSpot de Planet WSG-500
HotSpot de Planet WSG-500HotSpot de Planet WSG-500
HotSpot de Planet WSG-500
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 Presentation
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Wireless World
Wireless World Wireless World
Wireless World
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point Australia
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Wifi Security for SOHOs: Cyberoam UTM CR15wi

  • 1. Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam Wi-Fi Appliance Comprehensive Network Security with Wi-Fi Access Point for Small and Remote Offices
  • 2.
  • 3.
  • 4.
  • 5. Traditional Wi-Fi vs Cyberoam Wi-Fi
  • 6.
  • 7.
  • 8. Cyberoam’s Layer 8 Advantage – Identity-based Controls Internet Tony Bandwidth control Duration / Quota control Schedule Control Reporting Apply these controls on Employees as well as Guests CR 15wi
  • 9.
  • 10.
  • 11. CR15wi Layer 8 Advantage Multiple Virtual Access Points – 8 SSIDs for network segmentation ACME Marketing Internet Switch Accounting/ERP Software E.g. Tally, Quicken, PeachTree Guest Shared Network Drives Engineering ACME Guest ACME Engineering Marketing
  • 13. Cyberoam Wi-Fi Advantage Reduced TCO Enhanced Security
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Cyberoam WiFi Appliance – CR 15wi 802.11 n/b/g (WEP, WPA, WPA2, 802.11i ,TKIP, AES, PSK, 802.1x EAP) Antenna Detachable 2x3 MIMO Access Points Up to 8 bssid Transmit Power (EIRP) 11n HT40 : +17dBm 11b CCK: +19dBm 11g OFDM:+17dBm Receiver Sensitivity - 65dBm at 300Mbps - 70dBm at 54Mpbs 10% PER - 86dBm at 11Mpbs 8% PER
  • 21. CR 15wi GUI Preview
  • 23. Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 24. Configuring Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 25. DHCP Server www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 27. Thank You [email_address] www.cyberoam.com