You are on page 1of 13

www.cyberoam.

com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Our Products
Unified Threat Management
SSL VPN
Data Protection & Encryption
Device Management
Application Control
Asset Management
Cyberoam - Endpoint Data Protection
Iuturekeady Network Secur|ty
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
The IT DiIemma The IT DiIemma
I am supposed to aIign
IT and Security
strategy with
business, but most of
my time goes into
soIving immediate
security probIems!!
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security issues evolve and will never disappear
Technology evolves, creating new issues
End User devices will evolve (more mobile)
These issues cannot be avoided
eing future-ready is criticaI to success
3
The Truths of Security The Truths of Security
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ey questions to ask ey questions to ask
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Is my existing network security setup rigid and
hard-coded?
Can it respond to Iatest threats without decIine
in system performance?
E.g. newer AV/AS/PS signatures to fight zero
hour malware threats, DoS attacks etc
Can the architecture grow to accommodate
future threats?
Threat environment is dynamic. Can I keep up with it? Threat environment is dynamic. Can I keep up with it?
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ExtensibiIity of security appIiance
Ability to accomodate additional features and
capabilities that protects your network against
threats
StabIe Performance
Protecting investment
Guiding factors to heIp overcome Iatest & unknown threats Guiding factors to heIp overcome Iatest & unknown threats
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ppIications and More ppIications. m I in controI? ppIications and More ppIications. m I in controI?
ho decides which appIications are important to business
and run on network ?
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Managing the 4 eIements
now and cIassify appIications trying to enter the network
usiness e.g. Salesforce, CRM, ERP etc.
onbusiness e.g. P2P, iTunes etc.
Sociobusiness e.g. Twitter, Facebook etc.
User Gain controls on "who is accessing which applications
Time Schedule access to applications
andwidth Commit bandwidth to critical applications
Guiding factors to enabIe productive use of appIications Guiding factors to enabIe productive use of appIications
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ow much controI I have over users in my network? ow much controI I have over users in my network?
hat are my empIoyees doing in my network
aII the time
ho is doing what?
ho is the attacker?
ho are the likely targets?
hich devices are being used to connect to
the web? ho accesses them?
ow to increase productivity?
Can I be proactive?
Can I get reports on security incidents in reaI
time?
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Measure User Threat Quotient (UTQ)
DepIoy a network security soIution
dentitybased approach to control
ho can connect using which device?
hat is being accessed over the network
and by whom?
Security over i-Fi
SecureIy extend network to customers,
partners, remote workers
Guiding factors to mitigate insider threats Guiding factors to mitigate insider threats
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Does my firewaII protect websites and appIications hosted in
my IocaI network or data center?
Traditional firewalls cannot determine if a properly
addressed packet contains a threat.
Hackers exploit OASP Top 10 vulnerabilities e.g. SQL
command injection, crosssite scripting, session hijacking
m I abIe to protect web appIications in my network? m I abIe to protect web appIications in my network?
eb
CIient
eb
Server
ppIication
ppIication
Database
Server
Firewall
Port 80 HTTP Traffic
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
eb ppIication FirewaII
nspect any incoming data before it reaches the web server,
and also any outgoing data after it leaves the web server
Offers protection against exploitation of OASP Top 10 eb
Application vulnerabilities
Offers proactive protection against Application layer attacks
and business logic attacks
ShouId integrate with other security devices or features over
one device
Provides reports on attacks
Guiding factors to protect web appIications in your network Guiding factors to protect web appIications in your network
www.cyberoam.com
Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank you!

You might also like