310 likes | 516 Views
Cyberoam – End Point Data Protection Protect your Data. Protect your Assets. Cyberoam for End Point Data Protection. 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management. Need for Data Protection.
E N D
Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.
Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management
60% corporate data lies unprotected on endpoints Lost USBs Medical records of 741 patients lost by a hospital 9000 USB sticks found in people's pockets at the local dry cleaners in UK Lost Multimedia Discs Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Wrong Email Attachment Bank employee accidentally sent sensitive customer details to wrong email address Lost iPods 12,500 handheld devices forgotten at the back of taxis every 6 months in UK
What Places Data At Risk? Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Unintentional Malicious Insiders Applications Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Web, Mail, IM, P2P, Printing, FTP Data At Risk • Business plans, RFP / Tender quotes • Intellectual property related to R&D • Product launch dates and roadmap • Customer data
Cost of Data At Risk • Average cost of security breach - $202 per record lost • Total cost per incident averages $6.6 million • Immediate Need – End Point Data Protection
Cyberoam End Point Data Protection Protect your Data. Protect your Assets.
Cyberoam End Point Data Protection • Comprehensive End Point Data Protection Suite • Modules • Data Protection & Encryption • Device Management • Application Control • Asset Management
Cyberoam End Point Data Protection Benefits • Enhanced protection to all your Endpoints • Across geographic locations • Centralized controls • Regulatory and Security Compliance • Rapid installation • Easy to use • Maintains security with flexibility • Clear ROI
Prevent Data Leakage – Email Attachments • Control data shared as attachment in emails • Send customized warning message to user and alert to administrator
Record Data Shared over Webmails • Record content of Webmail such as Yahoo, Gmail & Msn
Prevent Data Leakage - Attachments over Instant Messengers Attachment: .doc NOT ALLOWED .jpg .exe File name: confident NOT ALLOWED Size: > 2 MB • Control data shared as attachment over Instant Messengers • Send customized warning message to user and alert to administrator
Document Operation Mode of Transfer File Name/Extn. Back up Fixed Before modifying Floppy Read Before copying/cut to CD rom .jpg Modify .doc Removable Before copying/cut from Delete Network Before deleting Unknown Prevent Accidental / Malicious Deletion of Data Selective Action & Back-up of Document • Control operations over a document and its mode of transfer • Back up files before specific actions
Printer Type Printer Type Selected files/Extn. Selected files/Extn. Printer Printer Attachment:.doc Attachment:.doc Local Local Attachment:.xls Attachment:.xls Shared Shared Network Network Virtual Virtual Database Server Database Server Prevent Data Leakage through Printed Files Copy of Printed File Saved in Database Server • Control access to printers in the system • Save shadow copy of printed file
Encrypt entire device Encrypt selected files Attachment:.doc Attachment:.xls Decrypt before reading Attachment:.jpg Data Sharing Through Removable Devices Encrypts Data, Blocks Data Sharing • Encrypt all/selected files while writing to removable device • Decrypt files while reading from a removable device only in organization network • - Data in your lost USB device cannot be decrypted and is safe
Chat session logs Record Chat Sessions even for SKYPE Back up server
Device Management Protect your Data by controlling data over device USB Device USB keyboard, mouse, modem, storage, hard disk, others StorageDevice Floppy, CD, Burning device, Tape, Removable device Dial Dial-up connection Network Devices Others Wireless LAN adapter, PnP adapter, Virtual LAN adapter Audio equipment, Virtual CDROM, any new device Communication Interface Device Serial ports, parallel ports, modems, Bluetooth • Allow only authorized devices
Entertainment (MP3, MP4, MPEG) Pirated software Screensavers Password crackers IM tools Protect your Data by Controlling Applications • Prevent data loss through unauthorized/indiscriminate use of applications • Granular, policy-based application controls • - Protect sensitive data & enhance employee productivity • - Prevent legal liability, network outages
Asset Management Protect your Assets
Need for End Point Asset Management • Organizations exposed to higher levels of threats • Distributed offices • Rise in malware attacks • Tracking Hardware & Software assets • Management of hardware/software inventory • Sophisticated attacks – Targeting vulnerabilities • Need for timely patch implementation across – • Hundreds or thousands of devices • Geographic locations • Immediate need - Centralized, automated asset management
Fighting Threats with Asset ManagementProtect your Assets • Seamless IT infrastructure management • Simplifies tracking of IT asset allocation, configuration, version, historical information • Control over hardware, software costs • Automates and centralizes • Patch management • Install Software Remotely • Silently or in user-interactive mode • Meets security compliance requirements • Rapid and correct installation of patches • Handling bug fixes across network, geographies
Products • Cyberoam UTM • Cyberoam iView (Open source Logging & Reporting) • Cyberoam Central Console (Centralized Management) • Cyberoam SSL VPN appliance
Cyberoam CRi Network Security Appliances • Large Enterprises • CR 1500i • CR 1000i • CR 500i • Small to Medium Enterprises • CR 200i • CR 300i • CR 100ia • Small Offices - Remote Offices • CR 50ia • CR 35ia • CR 25ia • CR 15i
Awards Gartner Positions Cyberoam as a Visionary in Magic Quadrant Finalist in SC Magazine Awards 2009 for Best SME Security Finalist in PC Pro Awards 2009 Emerging Vendor of the Year 2008 by Frost & Sullivan IT Leader of the Year Award by ZDNet Asia Channel's Favorite Security Company Award 2008 by VAR India Certifications Checkmark ICSA Labs for Firewall ICSA Labs for Firewalls with Active-Active HA capability Member of VPNC Cyberoam Credentials
Elitecore Technologies • Established in 1999 • Team strength - 400+ employees • Investment from global private equity firm The Carlyle Group • Domain – Communication, Networks, Security • Sales and distribution channel in over 75 countries • Product offering • Cyberoam • Cyberoam iView • Cyberoam End Point Data Protection • CRESTEL • EliteAAA • 24online • 24online Everywhere
Question / Answer Session Thank You Please visit us at www.secureone.com.my
Thank You Thank You Please visit us at www.secureone.com.my