Cyberoam EndPoint Data Protection Presentation

31
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.

description

Cyberoam EndPoint Data Protection Presentation

Transcript of Cyberoam EndPoint Data Protection Presentation

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam – End Point Data ProtectionProtect your Data. Protect your Assets.

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam for End Point Data Protection

1. Need for Data Protection

2. Data Protection & Encryption

3. Device Management

4. Application Control

5. Asset Management

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Need for Data Protection

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Medical records of 741 patients lost by a hospital

60% corporate data lies unprotected on endpoints

Lost USBs

Lost Multimedia Discs

Wrong Email Attachment

Lost iPods

Personal information of 11.1mn customers of leading oil refinery (USA) found on streets

Bank employee accidentally sent sensitive customer details to wrong email address

12,500 handheld devices forgotten at the back of taxis every 6 months in UK

9000 USB sticks found in people's pockets at the local dry cleaners in UK

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

What Places Data At Risk?

ApplicationsWeb, Mail, IM, P2P, Printing, FTP

Removable DevicesUSBs, CDs/DVDs, MP3,

Digital cameras

InsidersUnauthorized transfer of sensitive data;

Malware-laden email for information access; Sensitive data sent to wrong person

Data At Risk• Intellectual property related to R&D • Business plans, RFP / Tender quotes

• Product launch dates and roadmap • Customer data

MaliciousUnintentional

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

• Average cost of security breach - $202 per record lost • Total cost per incident averages $6.6 million

Immediate Need – End Point Data Protection

Cost of Data At Risk

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam End Point Data Protection

Protect your Data. Protect your Assets.

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam End Point Data Protection

• Comprehensive End Point Data Protection Suite

• Modules

• Data Protection & Encryption• Device Management• Application Control• Asset Management

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam End Point Data Protection

Benefits

• Enhanced protection to all your Endpoints

• Across geographic locations• Centralized controls• Regulatory and Security Compliance

• Rapid installation

• Easy to use

• Maintains security with flexibility

• Clear ROI

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Data Protection & Encryption

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Prevent Data Leakage – Email Attachments

Control data shared as attachment in emails Send customized warning message to user and alert to administrator

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Record Data Shared over Webmails

Record content of Webmail such as Yahoo, Gmail & Msn

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Prevent Data Leakage - Attachments over Instant Messengers

Attachment:

.doc NOT ALLOWED

File name: confident NOT ALLOWED

Size: > 2 MB

Control data shared as attachment over Instant Messengers Send customized warning message to user and alert to administrator

.exe

.jpg

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Before deleting

Operation

Modify

Delete

Fixed

Floppy

CD rom

Removable

Network

Unknown

.jpg

.doc

Before modifying

Before copying/cut to

Before copying/cut from

Mode of Transfer

File Name/Extn.

Back up

Read

Document

Prevent Accidental / Malicious Deletion of Data

Selective Action & Back-up of Document

• Control operations over a document and its mode of transfer• Back up files before specific actions

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

PrinterPrinter Type Selected files/Extn.

Attachment:.xls

Attachment:.doc

Shared

Local

Network

Virtual

Database Server

PrinterPrinter Type Selected files/Extn.

Attachment:.xls

Attachment:.doc

Shared

Local

Network

Virtual

Database Server

Prevent Data Leakage through Printed Files

Copy of Printed File Saved in Database Server

• Control access to printers in the system• Save shadow copy of printed file

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Encrypt entire device

Attachment:.xls

Attachment:.doc

Attachment:.jpg

Decrypt before reading

Encrypt selected files

Data Sharing Through Removable Devices

• Encrypt all/selected files while writing to removable device• Decrypt files while reading from a removable device only in organization

network

• - Data in your lost USB device cannot be decrypted and is safe

Encrypts Data, Blocks Data Sharing

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Record Chat Sessions even for SKYPE

Chat session

logs

Back up server

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Device Management

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Protect your Data by controlling data over device

• Allow only authorized devices

Device Management

Storage Device

Communication Interface Device

USB Device

Network Devices Others

Dial Floppy, CD, Burning device, Tape, Removable device

Serial ports, parallel ports, modems, Bluetooth

Dial-up connection

USB keyboard, mouse, modem, storage, hard disk, others

Wireless LAN adapter, PnP adapter, Virtual LAN adapter

Audio equipment, Virtual CDROM, any new device

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Application Control

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Protect your Data by Controlling Applications

• Prevent data loss through unauthorized/indiscriminate use of applications• Granular, policy-based application controls

- Protect sensitive data & enhance employee productivity

- Prevent legal liability, network outages

IM tools

Entertainment(MP3, MP4, MPEG)

Pirated software Screensavers

Password crackers

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Asset ManagementProtect your Assets

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Need for End Point Asset Management

Organizations exposed to higher levels of threats Distributed offices Rise in malware attacks

Tracking Hardware & Software assets Management of hardware/software inventory

Sophisticated attacks – Targeting vulnerabilities Need for timely patch implementation across –

Hundreds or thousands of devices Geographic locations

Immediate need - Centralized, automated asset management

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Fighting Threats with Asset ManagementProtect your Assets

• Seamless IT infrastructure management

• Simplifies tracking of IT asset allocation, configuration, version, historical information

• Control over hardware, software costs

• Automates and centralizes

• Patch management

• Install Software Remotely

• Silently or in user-interactive mode

• Meets security compliance requirements

• Rapid and correct installation of patches• Handling bug fixes across network, geographies

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

About Cyberoam

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Products

• Cyberoam UTM• Cyberoam iView (Open source Logging & Reporting)• Cyberoam Central Console (Centralized Management)• Cyberoam SSL VPN appliance

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam CRi Network Security Appliances

• Large Enterprises • CR 1500i• CR 1000i• CR 500i

• Small to Medium Enterprises • CR 200i• CR 300i• CR 100ia

• Small Offices - Remote Offices • CR 50ia• CR 35ia • CR 25ia• CR 15i

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Cyberoam Credentials

Awards Gartner Positions Cyberoam as a Visionary in Magic Quadrant Finalist in SC Magazine Awards 2009 for Best SME Security Finalist in PC Pro Awards 2009 Emerging Vendor of the Year 2008 by Frost & Sullivan IT Leader of the Year Award by ZDNet Asia Channel's Favorite Security Company Award 2008 by VAR India

Certifications Checkmark ICSA Labs for Firewall ICSA Labs for Firewalls with Active-Active HA capability Member of VPNC

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Established  in 1999 Team strength - 400+ employees Investment from global private equity firm The Carlyle Group Domain – Communication, Networks, Security Sales and distribution channel in over 75 countries Product offering

Cyberoam Cyberoam iView Cyberoam End Point Data Protection CRESTEL EliteAAA 24online 24online Everywhere

Elitecore Technologies

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Thank You

Question / Answer Session

Please visit us at www.secureone.com.my

Cyberoam - Unified Threat ManagementEnd Point Data ProtectionCyberoam

www.cyberoam.com Copyright 2009 © Elitecore Technologies Ltd. All Rights Reserved. Privacy Policy

Thank You

Thank You

Please visit us at www.secureone.com.my