cyberoam layer8
DESCRIPTION
Pioneering Cyberoam's Layer 8 Identity Based UTMTRANSCRIPT
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Pioneering Identity Based Technology
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Human Approach
• Numbers – Hard & Boring to remember! 192.168.1.2
172.16.13.123
10.12.111.213
Names - Used daily!!!TonyMegan
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
- Identity theft- Data loss- Data deletion- Data modification
Internalthreats
- Worms- Malicious code- Virus- Malware
External threats
- Spam- Phishing- Pharming
Social Engineering threats
User
User – The Weakest Security Link
Organization
- Data theft- DoS attacks- Hacking
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Layer 8 Technology – Security around the User
- Treats User-Identity as the 8th Layer in Network stack
- Network security decisions based on Usernames and IP Addresses
Control Who is doing What in the network
Identifies traffic by username even in case of dynamic IP
Layer 8 – The Human LayerLayer 8 – The Human Layer
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Layer 8 Firewall
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity Based Technology
User
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity Based Security
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity based Technology - The Reason
Application Based Control.
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
The Reason - Illustrated
Tony
Access throughHTTP HTTPS
SMTP POP3 IMAP
During For
2010
Along with
With only
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity Based – Logging & Reporting
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Dashboard
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity Based
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Top Web Users
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Top Mail Senders
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Top Denied Categories
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Search Keywords based on Users
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
IPS Logs
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Web Logs
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Anti-Spam
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Anti-Virus
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
IM logs
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Thank You
Live Demo – http://demo.cyberoam.com
Website – http://www.cyberoam.com
Thank You