Cyberoam layer8

23
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Pioneering Identity Based Technology

description

Pioneering Cyberoam's Layer 8 Identity Based UTM

Transcript of Cyberoam layer8

Page 1: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Pioneering Identity Based Technology

Page 2: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Human Approach

• Numbers – Hard & Boring to remember! 192.168.1.2

172.16.13.123

10.12.111.213

Names - Used daily!!!TonyMegan

Page 3: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

- Identity theft- Data loss- Data deletion- Data modification

Internalthreats

- Worms- Malicious code- Virus- Malware

External threats

- Spam- Phishing- Pharming

Social Engineering threats

User

User – The Weakest Security Link

Organization

- Data theft- DoS attacks- Hacking

Page 4: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Layer 8 Technology – Security around the User

- Treats User-Identity as the 8th Layer in Network stack

- Network security decisions based on Usernames and IP Addresses

Control Who is doing What in the network

Identifies traffic by username even in case of dynamic IP

Layer 8 – The Human LayerLayer 8 – The Human Layer

Page 5: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Layer 8 Firewall

Page 6: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based Technology

User

Page 7: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based Security

Page 8: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity based Technology - The Reason

Application Based Control.

Page 9: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

The Reason - Illustrated

Tony

Access throughHTTP HTTPS

SMTP POP3 IMAP

During For

2010

Along with

With only

Page 10: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 11: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based – Logging & Reporting

Page 12: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Dashboard

Page 13: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based

Page 14: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Top Web Users

Page 15: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Top Mail Senders

Page 16: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Top Denied Categories

Page 17: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Search Keywords based on Users

Page 18: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

IPS Logs

Page 19: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Web Logs

Page 20: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Anti-Spam

Page 21: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Anti-Virus

Page 22: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

IM logs

Page 23: Cyberoam layer8

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Thank You

Live Demo – http://demo.cyberoam.com

Website – http://www.cyberoam.com

Thank You