Our Products
description
Transcript of Our Products
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Our ProductsUnified Threat Management
Cyberoam Central Console (CCC) SSL VPN
Data Protection & Encryption
Device Management
Application Control
Asset Management
Cyberoam – Endpoint Data Protection
Comprehensive Network Security
CYBEROAM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Agenda of PresentationAgenda of Presentation
About Elitecore Technologies
Cyberoam UTM
Cyberoam Credentials/ Awards/ Accreditations
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Established in 1999
400+ Employees
ISO 9001:2000 certified company
Backed by World’s Largest Private Equity Group ($90bn)
Sales, Distribution Channel & Customers across 75+ countries
Communication - Networks – Security
- Cyberoam - Network to Endpoint Security
- CRESTEL - Telecommunication OSS BSS
- EliteAAA - Telecommunication
- 24online - Bandwidth Management Solution
About Elitecore TechnologiesAbout Elitecore Technologies
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Internal threats Identity theft Data loss Data deletion Data modification
External threats Worms Malicious code Virus Malware
Social Engineeringthreats Spam Phishing Pharming
Data theft DoS attacks Hacking
USER
Attack on Organization
User – The Weakest Security Link
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Layer 8 Technology – Security around the User
- Treats User-Identity as the 8th Layer in Network stack
- Network security decisions based on Usernames and IP Addresses
Control Who is doing What in the network
Allows creation of User Identity-based security policies
Identifies traffic by username even in case of dynamic IP
Layer 8 – The Human LayerLayer 8 – The Human Layer
indicates a feature unique to Cyberoam
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
UserUser
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam’s Layer 8 Technology adds SPEED to security
- Offers instant visibility into source of attacks
- Identifies attackers/victims with usernames
- Allows immediate remediation to restore security or enables proactive security
- Quickly and easily configure and manage policies based on users
Layer 8 – The Human LayerLayer 8 – The Human Layer
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam UTM- Identity-based Security
Integrated security over single platform
Layer 8 penetrates through each security module
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Other UTMs
User Login
Cyberoam Authenticates
• User• IP Address• MAC Id• Session Id
Cyberoam Authorizes
• Intrusion Prevention Policies• Anti-Malware• Anti-Spam• Web Filtering• Layer 7 Controls• Bandwidth Management & QoS• Instant Messaging Archiving & Control• Internet Surfing Quota• Internet Access Time• Internet Data Quota
Cyberoam Audits
• Identity - based Logs + Reports
• MAC Id• Session Id
Cyberoam Layer 8 Advantage
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Security Connectivity Productivity
Organizational Concerns
Network security Content SecurityAdministrative Security
Business Continuity
Network Availability
Future-ready connectivity
Employee productivity
IT resource optimization
Administrator productivity
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM ASSURES SECURITY
Network Security Content Security Administrative Security
Firewall IPS Wireless security
Anti-Malware Anti-Spam HTTPS Content
security
Next-Gen UI iView- Logging &
Reporting
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Stateful Inspection Firewall (Fusion Technology)
SECURITY » Network Security » Firewall
- Interface for achieving Unified Security
Identity-based policies enable security, connectivity, productivity
Fusion Technology
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Intrusion Prevention System
- 3500+ signatures - broadest security cover
- Internet Threat Response Team Regular Signature updates
- Quick protection against latest vulnerabilities
- IPS Policy Tuner Allows multiple IPS policies
Granular control over IPS policies- Unnecessary alerts- Reduced traffic latency- Improved performance
SECURITY » Network Security » IPS
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Cyberoam IPS + Layer 8 Technology Identity-based IPS policies per user or group
Identity-based alerts and reports - Visibility into applications – User, Source, Destination, Usage
- Overview of threat status – Top alerts, top attackers, top victims
SECURITY » Network Security » IPS
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Wireless (WLAN) Security
- High performance, integrated security over WLAN Secures wireless networks to the extent of wired networks
- Supports 802.11n wireless standard
- Layer 8 over WLAN Identity-based policies in dynamic IP environment
MAC-based filtering
Supports IP-address pool
- Enhances security
SECURITY » Network Security » Wireless security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Gateway Anti-Malware
- 4 million+ signatures
- Bi-directional scanning of web & email
- Self-service Virus Quarantine
- Reduced window of vulnerability Broadest security cover against all malware
- Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic
- Layer 8 Impact Identity-based virus reports
- Instant visibility into attacker/victim
Identity-based Quarantine policies
SECURITY » Content Security » Anti-Malware
indicates feature offered only by top-rated UTMs
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SECURITY » Content Security » Anti-Spam
Gateway Anti-Spam
- IP Reputation Filtering Blocks 85% of incoming messages at gateway
- Saves bandwidth
- Near 98% spam detection
- False Positive rate of 1 in a million Reduces fear of losing business emails
- Self-Service quarantine area
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- User-based Spam Digest Frees administrator time & management
- Manage Email recipients Data leakage prevention and archiving
- Scanning with Recurrent Pattern Detection (RPD) technology Content-agnostic, multi-language security against all spam types
viz. pdf, excel, mp3
SECURITY » Content Security » Anti-Spam
- Virus Outbreak Detection (VOD) for zero-hour protection
- Scans SMTP, POP3, IMAP traffic
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SECURITY » Content Security » Anti-Spam
- RPD Technology- Most outbreaks last only a few hours- Cyberoam identifies outbreaks real-time- Signature-based Anti-Spam take time to release signatures
- Users remain unprotected till Anti-Spam is updated - Too late to battle out the initial peak of attack
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
HTTPS/SSL Content Security
- Scans SSL traffic for virus & malware
- Controls File upload over SSL
- Reports files uploaded via SSL
- Stops HTTPS/SSL as a medium for Data Leakage
Malware Propagation
SECURITY » Content Security » HTTPS Content Security
indicates feature offered only by top-rated UTMs
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Next-Gen UI- Web 2.0 technology advantages- Easy navigation, custom controls, intuitive interface
Fewer security errors - Increases security Enhances administrative productivity Shorter learning curves
- Unified Security Rules for all security features from firewall page
SECURITY » Administrative Security » Next-Gen UI
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam iView – On-Appliance Logging & Reporting
- Ability to log and report activities
- LAYER 8 - Identity-based logging and reporting – Pinpoints the user
- Security Management iView dashboard- Shows network attacks on single screen
Drill-down reports – 3rd level drill-down for attack details
1000+ Reports
- Log Management
- Compliance Management HIPAA, PCI DSS, GLBA, and more
- Forensic Analysis
SECURITY » Administrative Security » iView- Logging & Reporting
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
Logs & Events
Identity
Logging Reporting
ComplianceManagement
ForensicAnalysis
Data Protection
Security Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM ASSURES CONNECTIVITY
Business Continuity Network Availability Future-ready connectivity
Multiple Link Management
High Availability
VPN 3G/WiMAX
modem support
IPv6
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Multi-Link Management- Automated Load balancing assures ROI/investment
Support for more than 2 ISP links Supports Wireless WAN (3G USB modems)
CONNECTIVITY » Business Continuity » Multiple Link Management
3G
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CONNECTIVITY » Business Continuity » Multiple Link Management
- Link Failover Supports multiple failover conditions
Monitors link availability of multiple WAN connections
Transfers traffic from a failed link to a working link- Maximizes business up-time
- Optimizes link utilization for business continuity Active-Active Auto Link Failover
Active-Passive Auto Link Failover
Support for more than 2+ ISP links
Supports WWAN for failover
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Layer 8 Policy-based Routing
Routes traffic based on:- Source IP addresses - Protocols- Users
Assures Quality of Service for key users and applications
CONNECTIVITY » Business Continuity » Multiple Link Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
ICSA Labs Certified Active Active High Availability- Maximizes network uptime - Reduces single-point-of-failure - Ensures continuous Cyberoam security- Ensures business continuity
CONNECTIVITY » Business Continuity » High Availability
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity- Supports
IPSec, L2TP, PPTP technologies SSL-VPN
- Client-type independent Web access mode- Application access mode- Client mode
Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for:
- Malware- Spam- Inappropriate content - Intrusion attempts
- Maintains secure endpoint and network environments
CONNECTIVITY » Network Availability » VPN
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
3G/WiMAX – USB Modem Support
- High-speed wireless WAN (WWAN)
- Wide ISP support
- All gateway security features available Can function as a main or failover link
CONNECTIVITY » Network Availability » 3G/WiMAX modem support
3G
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM ASSURES PRODUCTIVITY
Employee Productivity
IT Resource Optimization
Content Filtering IM controls
Bandwidth Management
Traffic Discovery Layer 7
Administrator Productivity
Next-Gen UI
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IPv6 ‘IPv6 Ready’ gold logo
- Cyberoam identifies and processes IPv6 traffic
Third-party validation- International Testing Program with
3000+ rigorous test cases
IPv6 compliance to become mandatory in government and other enterprises
- Driven by diplomatic initiatives
CONNECTIVITY » Future-ready connectivity » IPv6
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Content Filtering
- Industry’s most comprehensive URL database 82+ categories 44 million+ URLs
- On-appliance web category database Faster access Surfing pattern privacy
- Controls access to HTTP & HTTPS hosted websites Increases productivity
Productivity » Employee Productivity » Content Filtering
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Controls that are difficult to bypass Blocks Google cache pages Search keyword reports Blocks embedded URLs Detects/Blocks Third Party Proxy and Tunneling software
- Controls access to Instant Messengers, P2P- Controls Data Leakage
Blocks files from uploading to web pages Blocks file transfer through Instant Messengers
Productivity » Employee Productivity » Content Filtering
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Controls- Identity-based controls for Yahoo messenger and Windows Live
Messenger- Scans malware- Logs and controls
Access Conversation File transfer Voice/Webcam
Productivity » Employee Productivity » IM controls
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Best of Breed Bandwidth Management/QoS
- Application and Identity-based bandwidth allocation- Category wise Bandwidth management- Restrict Bandwidth usage for a combination of source,
destination and service/service group - Schedule-based bandwidth allocation- Committed and burstable bandwidth
Productivity » IT Resource Optimization » Bandwidth Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Traffic Discovery
- Real-time visibility into bandwidth utilization by user, protocol, application
- Provides visibility of unproductive usage of resources and threat incidence
Productivity » IT Resource Optimization » Traffic Discovery
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Layer 7- Offers visibility and management over Application Layer 7
- Allows control over application, user, time and bandwidth Essential for Cloud Computing
- Bandwidth Management assures availability of business-critical applications
- Controls bandwidth costs
Productivity » IT Resource Optimization » Layer 7
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
VoIPBitTorrentCRM ERPIM
ApplicationWebmail
Internet
Medium Quality
High Quality
Low Quality
Application Layer 7 Visibility
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Multi-core Technology
- High Security without compromising on performance
- Multi-core processors Parallel processing of Cyberoam security features
- Real-time, Unified Security
Higher Throughputs
- High-speed memory access to signatures Security against advanced threats
Cyberoam ArchitectureCyberoam Architecture
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Extensible Security Architecture (ESA)
- Ability to adapt to future security needs- Ability to support feature enhancements in future - Ready for future upgrades Vs ASIC
Cyberoam ArchitectureCyberoam Architecture
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam Central Console
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Centralized controls and security management over remote networks
Reduces operational complexity and deployment time
Minimizes errors and lowers administration cost
Enables the MSSPs to have different personnel for managing different customer deployments
Ease of use with view of multiple devices and network status at a glance
Cyberoam Central ConsoleCyberoam Central Console
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SSL VPN
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Supports remote access VPN users and site-to-site VPN connections
Accommodates between 50 to 1000 concurrent users
Policy-based resource access control
Zero-client administration
Flexibility in purchasing remote security solutions:
- Virtual appliance mode
- Dedicated appliance mode
SSL VPNSSL VPN
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Dedicated SSL VPN appliance Deployment Dedicated SSL VPN appliance Deployment
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Virtual SSL VPN Deployment Diagram Virtual SSL VPN Deployment Diagram
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam iView
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Available as Open Source software and as Appliance
Ability to log and report activities from various devices/ vendors
Log Management
- Near real-time log retrieval
- Archival and Search facility
Security Management- iView dashboard – Shows network attacks on single screen
- 1000+ Reports
Compliance Management- Reduces compliance costs
- Single click access to reports - Simplified compliance management
- Easy visibility into access by users
Cyberoam iViewCyberoam iView
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Forensic Analysis- Reconstructing sequence of events in a security breach- Reporting stands in the face of legal scrutiny
Benefits- Security Benefits
Centralized control Identifies attacks based on –
- Attack Reports (Type of Reports) - Deviation from norm in access or usage of resources
Allows quick investigation and determination of cause of breach
Cyberoam iViewCyberoam iView
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Compliance Benefits Access and Usage logs of
- Activity in critical applications, databases
- Data transmitted to external entities
Enables setting user identity-based thresholds for acceptable use
- Productivity Benefits Shows deviation in resource consumption
- Financial Benefits Low capital requirements
Low technical manpower requirements
Cyberoam iViewCyberoam iView
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
Servers
Firewalls
IDP / IPS
Switches Routers
UTM
Applications
Desktop systems
Logs & Events
Identity
Logging Reporting
ComplianceManagement
ForensicAnalysis
Data Protection
Security Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam - Endpoint Data Protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Endpoint protection:
- Across geographic locations
- Centralized controls
- Regulatory and Security compliance Cyberoam Endpoint Data Protection suite
- Data Protection & Encryption Prevents data leakage through:
- Email attachments
- Web mail
- Instant Messengers
- Printed files
Encrypts files/device while writing data to removable devices Document back-up prevents accidental/malicious data deletion
Cyberoam - Endpoint Data ProtectionCyberoam - Endpoint Data Protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Device Management Protects data by controlling data over:
- USB device
- Storage device
- Network device
- Communication Interface device
- Others
- Application Control Protects data by controlling unauthorized/indiscriminate use of
applications
- Enhances employee productivity
- Prevents legal liabilities, network outages
Cyberoam - Endpoint Data ProtectionCyberoam - Endpoint Data Protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
- Asset Management
Offers IT infrastructure management
Automates and centralizes
Allows remote software installations
Meets security compliance requirements
Cyberoam - Endpoint Data ProtectionCyberoam - Endpoint Data Protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Appliance Product Line
Unified Threat Management
Cyberoam Central Console (CCC)
SSL VPN
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Other Appliances Cyberoam Central Console
- CCC 15
- CCC 50
- CCC 100
- CCC 200
SSL VPN Appliance- CR-SSL-800
- CR-SSL-1200
- CR-SSL-2400
Cyberoam iView- CR-iVU25
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam CRi UTM Appliance Range
Large Enterprises- CR 1500i- CR 1000i- CR 500ia
Small to Medium Enterprises- CR 300i- CR 200i- CR 100ia- CR 50ia
Remote Offices- CR 35ia- CR 25ia- CR 15i
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Subscription Model
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL Service)
Basic ApplianceBasic Appliance
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)
Gateway Anti-spam Subscription
Web & Application Filtering Subscription
Intrusion Prevention System (IPS)
24 x 7 Tech Support & Warranty
Bundled SubscriptionsBundled Subscriptions
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Bundled SubscriptionsBundled Subscriptions
TVS (Total Value Subscription)- Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection
included)
- Gateway Anti-spam Subscription
- Web & Application Filtering Subscription
- Intrusion Prevention System (IPS)
- 8 x 5 Email, phone and chat Tech Support
SVS (Security Value Subscription)- Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection
included)
- Web & Application Filtering Subscription
- Intrusion Prevention System (IPS)
- 8 x 5 Email, phone and chat Tech Support
Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”
Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight
IDC ReviewIDC Review
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
2008 - Emerging Vendor of the Year2008 - Emerging Vendor of the Year
Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year
Award in the Network Security Market
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam CertificationsCyberoam Certifications
Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP
UTM Level 5: Cyberoam holds a unique & complete UTM certification
ICSA Certified Firewall
VPNC Certified for Basic VPN & AES Interoperability
ICSA Certified High-Availability
PremiumPremium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SC Magazine Five Star Rating – Four Times in a Row!SC Magazine Five Star Rating – Four Times in a Row!
April 2009 – Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“
December 2008 – Product review Cyberoam CR100i“Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”
March 2008 – UTM Roundup Cyberoam CR1000i “Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”.
July 2007 – UTM Roundup Cyberoam CR250i “console is well organized and intuitive to navigate” “flexible and very powerful” “this appliance is a good value for almost any size environment”.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Best Integrated SecurityAppliance Best Security Solution forEducation Best Unified Security
Tomorrow’s TechnologyToday 2007
2007, 2008 FinalistNetwork MiddleEast Award2008 Finalist ChannelMiddle East Award
VAR Editor’s Choice for Best UTM (2007)
Finalist - 2008 GlobalExcellence inNetwork SecuritySolution
ZDNET Asia- IT Leader Of the Year 2008
2008 Emerging Vendor of the Year for Network Security
SMB Product of the Year
2008 – Best Content Filtering
AwardsAwards
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Global Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Global Clientele (Cont’d)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Middle East Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Thank You