cyberoam layer8

Post on 19-Jan-2015

1.670 Views

Category:

Technology

9 Downloads

Preview:

Click to see full reader

DESCRIPTION

Pioneering Cyberoam's Layer 8 Identity Based UTM

TRANSCRIPT

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Pioneering Identity Based Technology

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Human Approach

• Numbers – Hard & Boring to remember! 192.168.1.2

172.16.13.123

10.12.111.213

Names - Used daily!!!TonyMegan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

- Identity theft- Data loss- Data deletion- Data modification

Internalthreats

- Worms- Malicious code- Virus- Malware

External threats

- Spam- Phishing- Pharming

Social Engineering threats

User

User – The Weakest Security Link

Organization

- Data theft- DoS attacks- Hacking

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Layer 8 Technology – Security around the User

- Treats User-Identity as the 8th Layer in Network stack

- Network security decisions based on Usernames and IP Addresses

Control Who is doing What in the network

Identifies traffic by username even in case of dynamic IP

Layer 8 – The Human LayerLayer 8 – The Human Layer

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Layer 8 Firewall

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based Technology

User

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based Security

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity based Technology - The Reason

Application Based Control.

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

The Reason - Illustrated

Tony

Access throughHTTP HTTPS

SMTP POP3 IMAP

During For

2010

Along with

With only

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based – Logging & Reporting

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Dashboard

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Top Web Users

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Top Mail Senders

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Top Denied Categories

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Search Keywords based on Users

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

IPS Logs

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Web Logs

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Anti-Spam

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Anti-Virus

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

IM logs

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Thank You

Live Demo – http://demo.cyberoam.com

Website – http://www.cyberoam.com

Thank You

top related