1 / 31

Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

Cyberoam – End Point Data Protection Protect your Data. Protect your Assets. Cyberoam for End Point Data Protection. 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management. Need for Data Protection.

larue
Download Presentation

Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

  2. Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management

  3. Need for Data Protection

  4. 60% corporate data lies unprotected on endpoints Lost USBs Medical records of 741 patients lost by a hospital 9000 USB sticks found in people's pockets at the local dry cleaners in UK Lost Multimedia Discs Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Wrong Email Attachment Bank employee accidentally sent sensitive customer details to wrong email address Lost iPods 12,500 handheld devices forgotten at the back of taxis every 6 months in UK

  5. What Places Data At Risk? Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Unintentional Malicious Insiders Applications Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Web, Mail, IM, P2P, Printing, FTP Data At Risk • Business plans, RFP / Tender quotes • Intellectual property related to R&D • Product launch dates and roadmap • Customer data

  6. Cost of Data At Risk • Average cost of security breach - $202 per record lost • Total cost per incident averages $6.6 million • Immediate Need – End Point Data Protection

  7. Cyberoam End Point Data Protection Protect your Data. Protect your Assets.

  8. Cyberoam End Point Data Protection • Comprehensive End Point Data Protection Suite • Modules • Data Protection & Encryption • Device Management • Application Control • Asset Management

  9. Cyberoam End Point Data Protection Benefits • Enhanced protection to all your Endpoints • Across geographic locations • Centralized controls • Regulatory and Security Compliance • Rapid installation • Easy to use • Maintains security with flexibility • Clear ROI

  10. Data Protection & Encryption

  11. Prevent Data Leakage – Email Attachments • Control data shared as attachment in emails • Send customized warning message to user and alert to administrator

  12. Record Data Shared over Webmails • Record content of Webmail such as Yahoo, Gmail & Msn

  13. Prevent Data Leakage - Attachments over Instant Messengers Attachment: .doc NOT ALLOWED .jpg .exe File name: confident NOT ALLOWED Size: > 2 MB • Control data shared as attachment over Instant Messengers • Send customized warning message to user and alert to administrator

  14. Document Operation Mode of Transfer File Name/Extn. Back up Fixed Before modifying Floppy Read Before copying/cut to CD rom .jpg Modify .doc Removable Before copying/cut from Delete Network Before deleting Unknown Prevent Accidental / Malicious Deletion of Data Selective Action & Back-up of Document • Control operations over a document and its mode of transfer • Back up files before specific actions

  15. Printer Type Printer Type Selected files/Extn. Selected files/Extn. Printer Printer Attachment:.doc Attachment:.doc Local Local Attachment:.xls Attachment:.xls Shared Shared Network Network Virtual Virtual Database Server Database Server Prevent Data Leakage through Printed Files Copy of Printed File Saved in Database Server • Control access to printers in the system • Save shadow copy of printed file

  16. Encrypt entire device Encrypt selected files Attachment:.doc Attachment:.xls Decrypt before reading Attachment:.jpg Data Sharing Through Removable Devices Encrypts Data, Blocks Data Sharing • Encrypt all/selected files while writing to removable device • Decrypt files while reading from a removable device only in organization network • - Data in your lost USB device cannot be decrypted and is safe

  17. Chat session logs Record Chat Sessions even for SKYPE Back up server

  18. Device Management

  19. Device Management Protect your Data by controlling data over device USB Device USB keyboard, mouse, modem, storage, hard disk, others StorageDevice Floppy, CD, Burning device, Tape, Removable device Dial Dial-up connection Network Devices Others Wireless LAN adapter, PnP adapter, Virtual LAN adapter Audio equipment, Virtual CDROM, any new device Communication Interface Device Serial ports, parallel ports, modems, Bluetooth • Allow only authorized devices

  20. Application Control

  21. Entertainment (MP3, MP4, MPEG) Pirated software Screensavers Password crackers IM tools Protect your Data by Controlling Applications • Prevent data loss through unauthorized/indiscriminate use of applications • Granular, policy-based application controls • - Protect sensitive data & enhance employee productivity • - Prevent legal liability, network outages

  22. Asset Management Protect your Assets

  23. Need for End Point Asset Management • Organizations exposed to higher levels of threats • Distributed offices • Rise in malware attacks • Tracking Hardware & Software assets • Management of hardware/software inventory • Sophisticated attacks – Targeting vulnerabilities • Need for timely patch implementation across – • Hundreds or thousands of devices • Geographic locations • Immediate need - Centralized, automated asset management

  24. Fighting Threats with Asset ManagementProtect your Assets • Seamless IT infrastructure management • Simplifies tracking of IT asset allocation, configuration, version, historical information • Control over hardware, software costs • Automates and centralizes • Patch management • Install Software Remotely • Silently or in user-interactive mode • Meets security compliance requirements • Rapid and correct installation of patches • Handling bug fixes across network, geographies

  25. About Cyberoam

  26. Products • Cyberoam UTM • Cyberoam iView (Open source Logging & Reporting) • Cyberoam Central Console (Centralized Management) • Cyberoam SSL VPN appliance

  27. Cyberoam CRi Network Security Appliances • Large Enterprises • CR 1500i • CR 1000i • CR 500i • Small to Medium Enterprises • CR 200i • CR 300i • CR 100ia • Small Offices - Remote Offices • CR 50ia • CR 35ia • CR 25ia • CR 15i

  28. Awards Gartner Positions Cyberoam as a Visionary in Magic Quadrant Finalist in SC Magazine Awards 2009 for Best SME Security Finalist in PC Pro Awards 2009 Emerging Vendor of the Year 2008 by Frost & Sullivan IT Leader of the Year Award by ZDNet Asia Channel's Favorite Security Company Award 2008 by VAR India Certifications Checkmark ICSA Labs for Firewall ICSA Labs for Firewalls with Active-Active HA capability Member of VPNC Cyberoam Credentials

  29. Elitecore Technologies • Established  in 1999 • Team strength - 400+ employees • Investment from global private equity firm The Carlyle Group • Domain – Communication, Networks, Security • Sales and distribution channel in over 75 countries • Product offering • Cyberoam • Cyberoam iView • Cyberoam End Point Data Protection • CRESTEL • EliteAAA • 24online • 24online Everywhere

  30. Question / Answer Session Thank You Please visit us at www.secureone.com.my

  31. Thank You Thank You Please visit us at www.secureone.com.my

More Related