our products

74
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Rese Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM

Upload: platt

Post on 10-Jan-2016

36 views

Category:

Documents


2 download

DESCRIPTION

Cyberoam – Endpoint Data Protection. Application Control Asset Management. Data Protection & Encryption Device Management. CYBEROAM. Comprehensive Network Security. Our Products. Unified Threat Management. SSL VPN. Cyberoam Central Console (CCC). Agenda of Presentation. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Our ProductsUnified Threat Management

Cyberoam Central Console (CCC) SSL VPN

Data Protection & Encryption

Device Management

Application Control

Asset Management

Cyberoam – Endpoint Data Protection

Comprehensive Network Security

CYBEROAM

Page 2: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Agenda of PresentationAgenda of Presentation

About Elitecore Technologies

Cyberoam UTM

Cyberoam Credentials/ Awards/ Accreditations

Page 3: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Established in 1999

400+ Employees

ISO 9001:2000 certified company

Backed by  World’s Largest Private Equity Group ($90bn)

Sales, Distribution Channel & Customers across 75+ countries

Communication - Networks – Security

- Cyberoam - Network to Endpoint Security

- CRESTEL - Telecommunication OSS BSS

- EliteAAA - Telecommunication

- 24online - Bandwidth Management Solution

About Elitecore TechnologiesAbout Elitecore Technologies

Page 4: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Page 5: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Internal threats Identity theft Data loss Data deletion Data modification

External threats Worms Malicious code Virus Malware

Social Engineeringthreats Spam Phishing Pharming

Data theft DoS attacks Hacking

USER

Attack on Organization

User – The Weakest Security Link

Page 6: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Layer 8 Technology – Security around the User

- Treats User-Identity as the 8th Layer in Network stack

- Network security decisions based on Usernames and IP Addresses

Control Who is doing What in the network

Allows creation of User Identity-based security policies

Identifies traffic by username even in case of dynamic IP

Layer 8 – The Human LayerLayer 8 – The Human Layer

indicates a feature unique to Cyberoam

Page 7: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

UserUser

Page 8: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam’s Layer 8 Technology adds SPEED to security

- Offers instant visibility into source of attacks

- Identifies attackers/victims with usernames

- Allows immediate remediation to restore security or enables proactive security

- Quickly and easily configure and manage policies based on users

Layer 8 – The Human LayerLayer 8 – The Human Layer

Page 9: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam UTM- Identity-based Security

Integrated security over single platform

Layer 8 penetrates through each security module

Page 10: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Other UTMs

User Login

Cyberoam Authenticates

• User• IP Address• MAC Id• Session Id

Cyberoam Authorizes

• Intrusion Prevention Policies• Anti-Malware• Anti-Spam• Web Filtering• Layer 7 Controls• Bandwidth Management & QoS• Instant Messaging Archiving & Control• Internet Surfing Quota• Internet Access Time• Internet Data Quota

Cyberoam Audits

• Identity - based Logs + Reports

• MAC Id• Session Id

Cyberoam Layer 8 Advantage

Page 11: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Security Connectivity Productivity

Organizational Concerns

Network security Content SecurityAdministrative Security

Business Continuity

Network Availability

Future-ready connectivity

Employee productivity

IT resource optimization

Administrator productivity

Page 12: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CYBEROAM ASSURES SECURITY

Network Security Content Security Administrative Security

Firewall IPS Wireless security

Anti-Malware Anti-Spam HTTPS Content

security

Next-Gen UI iView- Logging &

Reporting

Page 13: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Stateful Inspection Firewall (Fusion Technology)

SECURITY » Network Security » Firewall

- Interface for achieving Unified Security

Identity-based policies enable security, connectivity, productivity

Fusion Technology

Page 14: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Intrusion Prevention System

- 3500+ signatures - broadest security cover

- Internet Threat Response Team Regular Signature updates

- Quick protection against latest vulnerabilities

- IPS Policy Tuner Allows multiple IPS policies

Granular control over IPS policies- Unnecessary alerts- Reduced traffic latency- Improved performance

SECURITY » Network Security » IPS

Page 15: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Cyberoam IPS + Layer 8 Technology Identity-based IPS policies per user or group

Identity-based alerts and reports - Visibility into applications – User, Source, Destination, Usage

- Overview of threat status – Top alerts, top attackers, top victims

SECURITY » Network Security » IPS

Page 16: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Wireless (WLAN) Security

- High performance, integrated security over WLAN Secures wireless networks to the extent of wired networks

- Supports 802.11n wireless standard

- Layer 8 over WLAN Identity-based policies in dynamic IP environment

MAC-based filtering

Supports IP-address pool

- Enhances security

SECURITY » Network Security » Wireless security

Page 17: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Gateway Anti-Malware

- 4 million+ signatures

- Bi-directional scanning of web & email

- Self-service Virus Quarantine

- Reduced window of vulnerability Broadest security cover against all malware

- Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic

- Layer 8 Impact Identity-based virus reports

- Instant visibility into attacker/victim

Identity-based Quarantine policies

SECURITY » Content Security » Anti-Malware

indicates feature offered only by top-rated UTMs

Page 18: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SECURITY » Content Security » Anti-Spam

Gateway Anti-Spam

- IP Reputation Filtering Blocks 85% of incoming messages at gateway

- Saves bandwidth

- Near 98% spam detection

- False Positive rate of 1 in a million Reduces fear of losing business emails

- Self-Service quarantine area

Page 19: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- User-based Spam Digest Frees administrator time & management

- Manage Email recipients Data leakage prevention and archiving

- Scanning with Recurrent Pattern Detection (RPD) technology Content-agnostic, multi-language security against all spam types

viz. pdf, excel, mp3

SECURITY » Content Security » Anti-Spam

- Virus Outbreak Detection (VOD) for zero-hour protection

- Scans SMTP, POP3, IMAP traffic

Page 20: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SECURITY » Content Security » Anti-Spam

- RPD Technology- Most outbreaks last only a few hours- Cyberoam identifies outbreaks real-time- Signature-based Anti-Spam take time to release signatures

- Users remain unprotected till Anti-Spam is updated - Too late to battle out the initial peak of attack

Page 21: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

HTTPS/SSL Content Security

- Scans SSL traffic for virus & malware

- Controls File upload over SSL

- Reports files uploaded via SSL

- Stops HTTPS/SSL as a medium for Data Leakage

Malware Propagation

SECURITY » Content Security » HTTPS Content Security

indicates feature offered only by top-rated UTMs

Page 22: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Next-Gen UI- Web 2.0 technology advantages- Easy navigation, custom controls, intuitive interface

Fewer security errors - Increases security Enhances administrative productivity Shorter learning curves

- Unified Security Rules for all security features from firewall page

SECURITY » Administrative Security » Next-Gen UI

Page 23: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam iView – On-Appliance Logging & Reporting

- Ability to log and report activities

- LAYER 8 - Identity-based logging and reporting – Pinpoints the user

- Security Management iView dashboard- Shows network attacks on single screen

Drill-down reports – 3rd level drill-down for attack details

1000+ Reports

- Log Management

- Compliance Management HIPAA, PCI DSS, GLBA, and more

- Forensic Analysis

SECURITY » Administrative Security » iView- Logging & Reporting

Page 24: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

Logs & Events

Identity

Logging Reporting

ComplianceManagement

ForensicAnalysis

Data Protection

Security Management

Page 25: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CYBEROAM ASSURES CONNECTIVITY

Business Continuity Network Availability Future-ready connectivity

Multiple Link Management

High Availability

VPN 3G/WiMAX

modem support

IPv6

Page 26: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Multi-Link Management- Automated Load balancing assures ROI/investment

Support for more than 2 ISP links Supports Wireless WAN (3G USB modems)

CONNECTIVITY » Business Continuity » Multiple Link Management

3G

Page 27: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CONNECTIVITY » Business Continuity » Multiple Link Management

- Link Failover Supports multiple failover conditions

Monitors link availability of multiple WAN connections

Transfers traffic from a failed link to a working link- Maximizes business up-time

- Optimizes link utilization for business continuity Active-Active Auto Link Failover

Active-Passive Auto Link Failover

Support for more than 2+ ISP links

Supports WWAN for failover

Page 28: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Layer 8 Policy-based Routing

Routes traffic based on:- Source IP addresses - Protocols- Users

Assures Quality of Service for key users and applications

CONNECTIVITY » Business Continuity » Multiple Link Management

Page 29: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

ICSA Labs Certified Active Active High Availability- Maximizes network uptime - Reduces single-point-of-failure - Ensures continuous Cyberoam security- Ensures business continuity

CONNECTIVITY » Business Continuity » High Availability

Page 30: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity- Supports

IPSec, L2TP, PPTP technologies SSL-VPN

- Client-type independent Web access mode- Application access mode- Client mode

Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for:

- Malware- Spam- Inappropriate content - Intrusion attempts

- Maintains secure endpoint and network environments

CONNECTIVITY » Network Availability » VPN

Page 31: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

3G/WiMAX – USB Modem Support

- High-speed wireless WAN (WWAN)

- Wide ISP support

- All gateway security features available Can function as a main or failover link

CONNECTIVITY » Network Availability » 3G/WiMAX modem support

3G

Page 32: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CYBEROAM ASSURES PRODUCTIVITY

Employee Productivity

IT Resource Optimization

Content Filtering IM controls

Bandwidth Management

Traffic Discovery Layer 7

Administrator Productivity

Next-Gen UI

Page 33: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IPv6 ‘IPv6 Ready’ gold logo

- Cyberoam identifies and processes IPv6 traffic

Third-party validation- International Testing Program with

3000+ rigorous test cases

IPv6 compliance to become mandatory in government and other enterprises

- Driven by diplomatic initiatives

CONNECTIVITY » Future-ready connectivity » IPv6

Page 34: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Content Filtering

- Industry’s most comprehensive URL database 82+ categories 44 million+ URLs

- On-appliance web category database Faster access Surfing pattern privacy

- Controls access to HTTP & HTTPS hosted websites Increases productivity

Productivity » Employee Productivity » Content Filtering

Page 35: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Controls that are difficult to bypass Blocks Google cache pages Search keyword reports Blocks embedded URLs Detects/Blocks Third Party Proxy and Tunneling software

- Controls access to Instant Messengers, P2P- Controls Data Leakage

Blocks files from uploading to web pages Blocks file transfer through Instant Messengers

Productivity » Employee Productivity » Content Filtering

Page 36: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IM Controls- Identity-based controls for Yahoo messenger and Windows Live

Messenger- Scans malware- Logs and controls

Access Conversation File transfer Voice/Webcam

Productivity » Employee Productivity » IM controls

Page 37: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Best of Breed Bandwidth Management/QoS

- Application and Identity-based bandwidth allocation- Category wise Bandwidth management- Restrict Bandwidth usage for a combination of source,

destination and service/service group - Schedule-based bandwidth allocation- Committed and burstable bandwidth

Productivity » IT Resource Optimization » Bandwidth Management

Page 38: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Traffic Discovery

- Real-time visibility into bandwidth utilization by user, protocol, application

- Provides visibility of unproductive usage of resources and threat incidence

Productivity » IT Resource Optimization » Traffic Discovery

Page 39: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Layer 7- Offers visibility and management over Application Layer 7

- Allows control over application, user, time and bandwidth Essential for Cloud Computing

- Bandwidth Management assures availability of business-critical applications

- Controls bandwidth costs

Productivity » IT Resource Optimization » Layer 7

Page 40: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

VoIPBitTorrentCRM ERPIM

ApplicationWebmail

Internet

Medium Quality

High Quality

Low Quality

Application Layer 7 Visibility

Page 41: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Multi-core Technology

- High Security without compromising on performance

- Multi-core processors Parallel processing of Cyberoam security features

- Real-time, Unified Security

Higher Throughputs

- High-speed memory access to signatures Security against advanced threats

Cyberoam ArchitectureCyberoam Architecture

Page 42: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Extensible Security Architecture (ESA)

- Ability to adapt to future security needs- Ability to support feature enhancements in future - Ready for future upgrades Vs ASIC

Cyberoam ArchitectureCyberoam Architecture

Page 43: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam Central Console

Page 44: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Centralized controls and security management over remote networks

Reduces operational complexity and deployment time

Minimizes errors and lowers administration cost

Enables the MSSPs to have different personnel for managing different customer deployments

Ease of use with view of multiple devices and network status at a glance

Cyberoam Central ConsoleCyberoam Central Console

Page 45: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Page 46: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SSL VPN

Page 47: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Supports remote access VPN users and site-to-site VPN connections

Accommodates between 50 to 1000 concurrent users

Policy-based resource access control

Zero-client administration

Flexibility in purchasing remote security solutions:

- Virtual appliance mode

- Dedicated appliance mode

SSL VPNSSL VPN

Page 48: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Dedicated SSL VPN appliance Deployment Dedicated SSL VPN appliance Deployment

Page 49: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Virtual SSL VPN Deployment Diagram Virtual SSL VPN Deployment Diagram

Page 50: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam iView

Page 51: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Available as Open Source software and as Appliance

Ability to log and report activities from various devices/ vendors

Log Management

- Near real-time log retrieval

- Archival and Search facility

Security Management- iView dashboard – Shows network attacks on single screen

- 1000+ Reports

Compliance Management- Reduces compliance costs

- Single click access to reports - Simplified compliance management

- Easy visibility into access by users

Cyberoam iViewCyberoam iView

Page 52: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Forensic Analysis- Reconstructing sequence of events in a security breach- Reporting stands in the face of legal scrutiny

Benefits- Security Benefits

Centralized control Identifies attacks based on –

- Attack Reports (Type of Reports) - Deviation from norm in access or usage of resources

Allows quick investigation and determination of cause of breach

Cyberoam iViewCyberoam iView

Page 53: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Compliance Benefits Access and Usage logs of

- Activity in critical applications, databases

- Data transmitted to external entities

Enables setting user identity-based thresholds for acceptable use

- Productivity Benefits Shows deviation in resource consumption

- Financial Benefits Low capital requirements

Low technical manpower requirements

Cyberoam iViewCyberoam iView

Page 54: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

Servers

Firewalls

IDP / IPS

Switches Routers

UTM

Applications

Desktop systems

Logs & Events

Identity

Logging Reporting

ComplianceManagement

ForensicAnalysis

Data Protection

Security Management

Page 55: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam - Endpoint Data Protection

Page 56: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Endpoint protection:

- Across geographic locations

- Centralized controls

- Regulatory and Security compliance Cyberoam Endpoint Data Protection suite

- Data Protection & Encryption Prevents data leakage through:

- Email attachments

- Web mail

- Instant Messengers

- Printed files

Encrypts files/device while writing data to removable devices Document back-up prevents accidental/malicious data deletion

Cyberoam - Endpoint Data ProtectionCyberoam - Endpoint Data Protection

Page 57: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Device Management Protects data by controlling data over:

- USB device

- Storage device

- Network device

- Communication Interface device

- Others

- Application Control Protects data by controlling unauthorized/indiscriminate use of

applications

- Enhances employee productivity

- Prevents legal liabilities, network outages

Cyberoam - Endpoint Data ProtectionCyberoam - Endpoint Data Protection

Page 58: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Asset Management

Offers IT infrastructure management

Automates and centralizes

Allows remote software installations

Meets security compliance requirements

Cyberoam - Endpoint Data ProtectionCyberoam - Endpoint Data Protection

Page 59: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Appliance Product Line

Unified Threat Management

Cyberoam Central Console (CCC)

SSL VPN

Page 60: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Other Appliances Cyberoam Central Console

- CCC 15

- CCC 50

- CCC 100

- CCC 200

SSL VPN Appliance- CR-SSL-800

- CR-SSL-1200

- CR-SSL-2400

Cyberoam iView- CR-iVU25

Page 61: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam CRi UTM Appliance Range

Large Enterprises- CR 1500i- CR 1000i- CR 500ia

Small to Medium Enterprises- CR 300i- CR 200i- CR 100ia- CR 50ia

Remote Offices- CR 35ia- CR 25ia- CR 15i

Page 62: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Subscription Model

Page 63: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL Service)

Basic ApplianceBasic Appliance

Page 64: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)

Gateway Anti-spam Subscription

Web & Application Filtering Subscription

Intrusion Prevention System (IPS)

24 x 7 Tech Support & Warranty

Bundled SubscriptionsBundled Subscriptions

Page 65: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Bundled SubscriptionsBundled Subscriptions

TVS (Total Value Subscription)- Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection

included)

- Gateway Anti-spam Subscription

- Web & Application Filtering Subscription

- Intrusion Prevention System (IPS)

- 8 x 5 Email, phone and chat Tech Support

SVS (Security Value Subscription)- Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection

included)

- Web & Application Filtering Subscription

- Intrusion Prevention System (IPS)

- 8 x 5 Email, phone and chat Tech Support

Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

Page 66: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”

Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight

IDC ReviewIDC Review

Page 67: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

2008 - Emerging Vendor of the Year2008 - Emerging Vendor of the Year

Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year

Award in the Network Security Market

Page 68: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam CertificationsCyberoam Certifications

Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP

UTM Level 5: Cyberoam holds a unique & complete UTM certification

ICSA Certified Firewall

VPNC Certified for Basic VPN & AES Interoperability

ICSA Certified High-Availability

PremiumPremium

Page 69: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SC Magazine Five Star Rating – Four Times in a Row!SC Magazine Five Star Rating – Four Times in a Row!

April 2009 – Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“

December 2008 – Product review Cyberoam CR100i“Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”

March 2008 – UTM Roundup Cyberoam CR1000i “Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”.

July 2007 – UTM Roundup Cyberoam CR250i “console is well organized and intuitive to navigate” “flexible and very powerful” “this appliance is a good value for almost any size environment”.

Page 70: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Best Integrated SecurityAppliance Best Security Solution forEducation Best Unified Security

Tomorrow’s TechnologyToday 2007

2007, 2008 FinalistNetwork MiddleEast Award2008 Finalist ChannelMiddle East Award

VAR Editor’s Choice for Best UTM (2007)

Finalist - 2008 GlobalExcellence inNetwork SecuritySolution

ZDNET Asia- IT Leader Of the Year 2008

2008 Emerging Vendor of the Year for Network Security

SMB Product of the Year

2008 – Best Content Filtering

AwardsAwards

Page 71: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Global Clientele

Page 72: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Global Clientele (Cont’d)

Page 73: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Middle East Clientele

Page 74: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Thank You