Title: CYBEROAM
1Cyberoam End Point Data Protection Protect your
Data. Protect your Assets.
2Cyberoam for End Point Data Protection
1. Need for Data Protection 2. Data Protection
Encryption 3. Device Management 4. Application
Control 5. Asset Management
3Need for Data Protection
460 corporate data lies unprotected on endpoints
Lost USBs
Medical records of 741 patients lost by a hospital
9000 USB sticks found in people's pockets at the
local dry cleaners in UK
Lost Multimedia Discs
Personal information of 11.1mn customers of
leading oil refinery (USA) found on streets
Wrong Email Attachment
Bank employee accidentally sent sensitive
customer details to wrong email address
Lost iPods
12,500 handheld devices forgotten at the back of
taxis every 6 months in UK
5What Places Data At Risk?
Removable Devices
USBs, CDs/DVDs, MP3, Digital cameras
Unintentional
Malicious
Insiders
Applications
Unauthorized transfer of sensitive data
Malware-laden email for information access
Sensitive data sent to wrong person
Web, Mail, IM, P2P, Printing, FTP
Data At Risk
Business plans, RFP / Tender quotes
Intellectual property related to RD
Product launch dates and roadmap
Customer data
6Cost of Data At Risk
- Average cost of security breach - 202 per
record lost - Total cost per incident averages 6.6 million
- Immediate Need End Point Data Protection
7Cyberoam End Point Data Protection
Protect your Data. Protect your Assets.
8Cyberoam End Point Data Protection
- Comprehensive End Point Data Protection Suite
- Modules
- Data Protection Encryption
- Device Management
- Application Control
- Asset Management
9Cyberoam End Point Data Protection
- Benefits
- Enhanced protection to all your Endpoints
- Across geographic locations
- Centralized controls
- Regulatory and Security Compliance
- Rapid installation
- Easy to use
- Maintains security with flexibility
- Clear ROI
10Data Protection Encryption
11Prevent Data Leakage Email Attachments
- Control data shared as attachment in emails
- Send customized warning message to user and alert
to administrator
12Record Data Shared over Webmails
- Record content of Webmail such as Yahoo, Gmail
Msn
13Prevent Data Leakage - Attachments over Instant
Messengers
Attachment .doc NOT ALLOWED
.jpg
.exe
File name confident NOT ALLOWED
Size gt 2 MB
- Control data shared as attachment over Instant
Messengers - Send customized warning message to user and alert
to administrator
14Prevent Accidental / Malicious Deletion of Data
Selective Action Back-up of Document
- Control operations over a document and its mode
of transfer - Back up files before specific actions
15Prevent Data Leakage through Printed Files
Copy of Printed File Saved in Database Server
- Control access to printers in the system
- Save shadow copy of printed file
16Data Sharing Through Removable Devices
Encrypts Data, Blocks Data Sharing
- Encrypt all/selected files while writing to
removable device - Decrypt files while reading from a removable
device only in organization network - - Data in your lost USB device cannot be
decrypted and is safe
17Record Chat Sessions even for SKYPE
Back up server
18Device Management
19Protect your Data by controlling data over device
USB Device
USB keyboard, mouse, modem, storage, hard disk,
others
Storage Device
Floppy, CD, Burning device, Tape, Removable
device
Dial
Dial-up connection
Network Devices
Others
Wireless LAN adapter, PnP adapter, Virtual LAN
adapter
Audio equipment, Virtual CDROM, any new device
Communication Interface Device
Serial ports, parallel ports, modems, Bluetooth
- Allow only authorized devices
20Application Control
21Protect your Data by Controlling Applications
- Prevent data loss through unauthorized/indiscrimin
ate use of applications - Granular, policy-based application controls
- - Protect sensitive data enhance employee
productivity - - Prevent legal liability, network outages
22Asset Management Protect your Assets
23Need for End Point Asset Management
- Organizations exposed to higher levels of threats
- Distributed offices
- Rise in malware attacks
- Tracking Hardware Software assets
- Management of hardware/software inventory
- Sophisticated attacks Targeting vulnerabilities
- Need for timely patch implementation across
- Hundreds or thousands of devices
- Geographic locations
- Immediate need - Centralized, automated asset
management
24Fighting Threats with Asset ManagementProtect
your Assets
- Seamless IT infrastructure management
- Simplifies tracking of IT asset allocation,
configuration, version, historical information - Control over hardware, software costs
- Automates and centralizes
- Patch management
- Install Software Remotely
- Silently or in user-interactive mode
- Meets security compliance requirements
- Rapid and correct installation of patches
- Handling bug fixes across network, geographies
25About Cyberoam
26- Products
-
- Cyberoam UTM
- Cyberoam iView (Open source Logging Reporting)
- Cyberoam Central Console (Centralized Management)
27- Cyberoam CRi Network Security Appliances
-
- Large Enterprises
- CR 1500i
- CR 1000i
- CR 500i
- Small to Medium Enterprises
- CR 200i
- CR 300i
- CR 100ia
- Small Offices - Remote Offices
- CR 50ia
28Cyberoam Credentials
- Awards
- Gartner Positions Cyberoam as a Visionary in
Magic Quadrant - Finalist in SC Magazine Awards 2009 for Best SME
Security - Finalist in PC Pro Awards 2009
- Emerging Vendor of the Year 2008 by Frost
Sullivan - IT Leader of the Year Award by ZDNet Asia
- Channel's Favorite Security Company Award 2008 by
VAR India - Certifications
- Checkmark
- ICSA Labs for Firewall
- ICSA Labs for Firewalls with Active-Active HA
capability - Member of VPNC
29Elitecore Technologies
- Established in 1999
- Team strength - 400 employees
- Investment from global private equity firm The
Carlyle Group - Domain Communication, Networks, Security
- Sales and distribution channel in over 75
countries - Product offering
- Cyberoam
- Cyberoam iView
- Cyberoam End Point Data Protection
- CRESTEL
- EliteAAA
- 24online
- 24online Everywhere
30Thank You
Please visit us at www.secureone.com.my
31Thank You
Thank You
Please visit us at www.secureone.com.my