Cyberoam USP (PT-BR)

54
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com Cyberoam Next Generation Security Our Products © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Next Generation Security Appliance (Hardware & Virtual) Vitor Nakano PreSales Manager [email protected] Cel: 011 98509-3505 Skype: vinakano

Transcript of Cyberoam USP (PT-BR)

Page 1: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam

Next Generation Security

Our Products

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Next Generation Security Appliance

(Hardware & Virtual)

Vitor Nakano

PreSales Manager

[email protected]

Cel: 011 98509-3505

Skype: vinakano

Page 2: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Tecnologia Powerhouse

550+ Funcionários

Vendas, canal de distribuição e clientes em todo +125 Países

Entre os 3 melhores UTM do mundo em recursos de

segurança de rede

Gestão de usuários baseada em identidade com patente pendente

Introdução Cyberoam

Page 3: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Segurança de rede

Gerenciamento de

segurança

centralizada

Relatórios de redes e

ameaças

Soluções Cyberoam

Segurança para home

users Modem Router

Page 4: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Appliances para Segurança de Rede – UTM, NGFW

(Hardware & Virtual)

Page 5: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam Next-Generation Security

Core NGFW

Segurançaem

Camada 8Firewall

Filtro de Aplicação

Filtro web e de conteúdo

IPS VPN

Gerenciamento de Banda/QoS

Relatórios

Gateway Anti-Virus

Gateway Anti-Spam (Inbound/outbound)

Wireless Security

Web Application Firewall

Gerenciamentode multiplos

linksSuporte a 3G/4G

Características do UTM

Suporte IPv6

Page 6: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam Next Generation security appliances offer…

Page 7: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Poderoso Hardware

Multicore Gigahertz processors for

Nano second security processing

Gigabit Ports to integrate with

Gigabit network

Cyberoam Architecture

Intelligent Firmware

Tight integration with

Hardware

Network & Crypto

Acceleration

Page 8: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Appliances de segurança de alto desempenho

Modelo de entrada oferece

throughput Gigabit firewall para

pequenos escritórios e filiais

Top CR2500iNG-XP Oferece

Firewall Throughput: 60 Gbps

NGFW Throughput: 8 Gbps

Page 9: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Inovação Cyberoam : Segurança em Camada 8

Cyberoam trata a Identidade do

usuário como camada 8

Cyberoam UTM oferece segurança

da camada 2 até a camada 8

usando politicas baseadas em

identidade

Page 10: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Appliance UTM

Cyberoam

Auditoria

• Identity–based

Logs + Reports

• Compliance

Reports

Cyberoam

Autoriza

• Internet surfing quota

• Schedule control

• Security Policies

• Web Filtering

• Application Visibility

& Control

• QoS / Bandwidth

Management

• IM Controls

Cyberoam

Autentica

• Nome

• IP Address

• MAC Id

• Session Id

Users

Clientes

Funcionários

Gerentes

Parceiros

Identidade Baseada em AAA

Controle das atividades dos

usuário Quem pode conectar à rede

• Quem pode acessar o que

• O que eles têm acessado

Capacidade de rastrear as

atividades dos usuários;

identificar ataques / vítimas

Tomar decisões rápidas

Page 11: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

192.168.3.110

Ancy

192.168.3.105

RichardInternet

Corporate LAN

DHCP

Administrator

Aplica políticas de segurança baseadas

em identidade real de usuários.

Regras específicas para vários usuários

compartilhar um endereço IP comum

192.168.3.110

Steve

Segurança baseada em identidade

Page 12: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Priorize o controle das aplicações

Aplicações infectadas e Bloqueados

Internet

Tráfego aplicação

Appliance Cyberoam

Visibilidade Controle

worms Spyware

Gerenciamento banda

indesejável

Crítico para o negócio

Redes Sociais

Não Crítico

Logs & Reports

Controles com base na identidade do usuário, Tempo, Aplicação e largura de banda

Page 13: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Risk Level

Very Low (1)

Low (2)

Medium (3)

High (4)

Very High (5)

Characteristics

Excessive Bandwidth

Prone to misuse

Transfer files

Tunnel other apps

Widely used

Loss of Productivity

Can bypass firewall policy

Technology

Browser Based

Client Server

Network Protocol

P2P

Category

File Transfer

Gaming

General Internet

Instant Messenger

Infrastructure

Network Services

P2P

Proxy and Tunnel

Remote Access

Streaming Media

VoIP

Mobile Applications

Social Networking

Web Mail

And more…

Classificação de aplicações

Page 14: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

proteção pró-ativa:Elimina a necessidade de intervenção manual dos administradores para atualizar políticas e

para novas aplicações

Classificação de aplicações

Selecione

aplicações P2P

Bloquea todas as futuras aplicações P2P

sem a necessidade adicionar de

aplicativos manualmente

Definir as ações

Page 15: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Visibilidade em tempo real das atividades dos usuário e da rede

Descoberta de tráfego

Visibilidade em tempo real da utilização de banda por usuário, protocolos das

aplicações

Log e Reporte

Gerenciamentode

Segurança

AnáliseForense

ProteçãoDe

Dados

Gerenciamentode

Conformidade

1200+

Reportes

Page 16: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Layer-8 User-based Reports

Page 17: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Layer-8 User-based Reports

Page 18: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Dual Dashboard – Traffic & Security Dashboard

Traffic Dashboard

Page 19: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Dual Dashboard – Traffic & Security Dashboard

Security Dashboard

Page 20: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Application Reports

Page 21: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Compliance Reports

Page 22: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Interactive World Traffic Map

Interactive World Traffic Map for Source and Destination traffic

Page 23: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Traffic Discovery

Page 24: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Traffic Discovery

Page 25: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Firewall Stateful Inspection

Segurança Unificada

Firewall de Aplicação

Identidade baseada em Firewall

Controle de entrada/saída de

tráfego para um país específico

Tecnologia FastPath

- Melhor velocidade de processamento e

reduz a sobrecarga da CPU

Politicas de

segurança

Políticas de

conectividade

Políticas de

produtividad

e

Regrasde

Firewall

Segurança Unificada

• Regras para todos os recursos de

firewall em uma página

• Navegação fácil

Page 26: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Regras para todos os recursos a partir da página de

Firewall

Identificação

Segurança

Produtividade

Conectividade

+

+

+

Page 27: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Intrusion Prevention System

- Camada 8

- Identidade baseados em políticas IPS por grupo, usuários e endereço IP

- Permite diversas políticas IPS

- alerts & reports

- 4500+ assinaturas - cobertura ampla em segurança

Anti-Spam (Inbound/Outbound)

- Três niveis de scan:

IP Reputation filtering

Real-time Blackhole List (RBL)

Tecnologia Recurrent Pattern Detection (RPDTM)

- 98% de datecção de spam

- Self-service Sumário quarentena e Spam

- Scans SMTP, POP3, IMAP traffic

- Virus outbreak detection para proteção zero-hora

DoS & DDoS Protection

- Proteção contra ataques flood

- SYN Flood

- TCP Flood

- UDP Flood

- ICMP Flood

- Assinatura IPS para evitar ataques

- Anomalia de protocolo

Gateway Anti-Virus, Anti- spyware

- +4 milhões de assinaturas

- Scan Bi-directional: Web & Email

- Self-service para quarentenas de Virus

- Scan HTTP, FTP, SMTP, POP3, HTTPS, IMAP e tráfego IM

- Visibilidade instantânea para Ataque/Vítima

Recursos de Proteção para Amaças

Atualização constante via

Cyberoam Security Center

Central de

Segurança

Cyberoam

Page 28: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Firewalls/IPS não podem proteger uma aplicação web de ameaças desconhecidas

Web Application Firewall (WAF)

Traditional

Firewall

Web &

Application

ServerDatabase

Server

Organization's IT networkUnauthorized

access blocked

Custo EficazNão há necessidade de comprar

hardware dedicado WAF

Fácil de implantarNão necessita de nenhuma

alteração na configuração

Cyberoam UTM oferta

proteção WAF

WAF protecção no Cyberoam UTM

Protege web-apps e servidores web

de hackers

Modelo de proteção Positiva e não

base de assinaturas

Intuitivo detector de sites, se adapta

automaticamente às mudanças do

site

Protege contra aplicativos da Web

e Vulnerabilidades(www.owasp.org)

Monitora & Reporta

Page 29: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Suporte para IPSec, L2TP,

PPTP, SSL VPN

Tecnologia Threat Free

Tunneling (TFT)

Clientes VPN suportados

MacOS

iOS

Dispositivos Android

IPSec VPN

L2TP VPN

PPTP VPN

iOS

L2TP VPN

Android

Virtual Private Network (VPN)

SSL VPN

-Licença gratuita

- Verifica na VPN tráfego de Malware, Spam,

Conteúdo impróprio, Tentativas de invasão

Recursos avançados para continuidade

dos negócios

MPLS failover para VPN

- VPN failover

Clientes móveis VPN

Page 30: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Blocked

Websites

HTTP

/HTTPS

Website

HTTP /

HTTPS

Web & Content Filtering

Allowed

Websites

HTTP/

HTTPS

Web

2.0

Web

2.0

Google

cache

pages

Google

cache

pages

Embedded

URLs

Embedded

URLs

Malware

hosting

sites

Malware

hosting

sites

Banco de dados de URL mais abrangente

+ 100 milhões URLs em + 89 categorias

Controla o acesso a HTTP/HTTPS

Bloqueia o cache do Google

Bloqueia URLs

Detecta e Bloqueia sites de tunelamento

Filtros de Web 2.0

Web

2.0

Bloqueia Sites de hospedagem de malware

Proxy

&

Tunneling

sites

Proxy&

Tunneling

sites

Internet

Page 31: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Gerenciar a produtividade, controlar o acesso a sites indesejados

Banco de dados web On-appliance

Acesso mais rapido

Controle de vazamento de dados

Bloqueia upload de arquivos em páginas da web

Ajuda a atender às exigências de conformidade

Evita a perda de produtividade com abordagem

Personalize as mensagens bloqueadas para educar os usuários

sobre as políticas corporativas

“YouTube para escolas”for Educational Institutes Permite o acesso a conteúdo

educacional

Bloqueia todo o conteúdo

impróprio, periféricos, tais como

anúncios, comentários e links

Web & Content Filtering

Page 32: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Políticas de banda baseados UserUserUser/Users

groupUser/Users

groupFirewall RuleFirewall Rule

Web Category

Web Category

ApplicationApplication

O Melhor para Gerenciamento de Banda/ QoS

Page 33: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Crie política de largura de banda para:

Usuário, Grupos de usuários/Departamento

Aplicações ou Categoria de aplicações

Categoraias Web

Permite grande flexibilidade e real visibilidade em L2 – L8

Compartilha largura de banda

Schedule largura de banda

O Melhor para Gerenciamento de Banda/ QoS

• Compartilhar a largura de banda não

utilizadaComprometimento de Banda• Aloca banda dedicada

CEO Manager ERP System

5 mbps 2 mbps 8 mbps

Manager

2mbps

Employee 2

2mbps

Employee 1

2mbps

Employee 2

3mbps

Employee 1

3mbps

Marketing

Group

6mbpsQuando o

usuário

não está

conectado

Page 34: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

High Availability

- Active-Active & Active-Passive

- Reduces single-point-of-failure

- Maximizes network uptime

- Ensures continuous network security

Multiple Link Management with Automated Load Balancing

- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover

conditions

- Active-Active and Active-Passive Auto Link Failover

- Gateway failover over VPN

Business Continuity Features

ISP2(5 mbps)

Sales Dept.

Dev. Dept.

Finance Dept.

ISP1(10 mbps)

MPLS

ISP3 (3G)(3 mbps)

Failover LinkOrganization's IT network

Page 35: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Layer 8 Policy-based Routing

- Routes traffic based on Source IP addresses, Protocols & Users

- Assures QoS for key users and applications

Business Continuity Features

Page 36: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

High performance, integrated security over WLAN

- Secures wireless networks to the extent of wired networks

Faster performance, broader coverage with 3x3 MIMO Technology

- Dual band support: 2.4 GHz or 5 GHz

Multiple Virtual Access Points

Layer 8 over WLAN

- Identity-based policies in dynamic IP environment

- MAC-based filtering

- Supports IP-address pool

Enhances security

Wireless (WLAN) Security

Internet

Marketing

Engineering

Sales

File server

ADS

ERP

Page 37: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Prevent the risk of IT administrator from misusing privilege of

tracking user activities

2 people: Authorizer and Administrator

- Authorizer consent required for the Administrator to view user-specific activities

Safeguard user privacy – 4-Eye Authentication

Page 38: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Needed for hotspots, airports, hotels, corporate offices

Default group can be created for guest users

Sending Internet access credentials using SMS for guest users

SMS (Text-based) Authentication

Airports

Hotels

SMS for Guest users

Page 39: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

FleXi Ports for flexible network connectivity

Combination of Fixed Ports and Flexible Ports

Flexibility to choose Copper, Fiber 1GbE / 10GbE modules

Modules can be purchased individually as per need

Fixed Copper GbE Ports

Page 40: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Organizations cannot afford to compromise on any of these.The right SCP balance is essential!

Cyberoam features assure Security, Connectivity, Productivity

Page 41: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Web

Support

Chat

Support

Email

Support

Phone

Support

Customer Support System

• Appliance Registration and Upgrade• Subscribe security features• Create support tickets• Request RMA

• Support available across all time zones

• Global Support Excellence - ITIL compliance (ISO 20000)

Knowledge

base

Page 42: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Web

Support

Chat

Support

Email

Support

Partner Support System

• Ordering & Inventory management• Sales & Marketing tools &

resources• Presales Support• Track Appliance/Subscription

Knowledge

base

Region specific dedicated Technical Account Managers (TAM)

Page 43: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam Network Security Appliance Product Range

Hardware appliances

UTM, Next Generation FirewallVirtual security appliances

CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C

NGFW for Large EnterprisesCR2500iNG, CR2500iNG-XP

CR1500iNG-XP, CR1000iNG-XP

CR750iNG-XP, CR500iNG-XP

UTM for Small and Medium EnterprisesCR300iNG-XP, CR200iNG-XP

CR300iNG, CR200iNG,

CR100iNG, CR50iNG

UTM for Small and Remote OfficesCR35wiNG, CR35iNG,

CR25wiNG, CR25iNG,

CR15wiNG, CR15iNG

Page 44: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Dubai

Head Office

New York

Branch Office

Mumbai

Branch Office

Boston

Branch Office

Cyberoam

Cyberoam

Cyberoam

Cyberoam

Cyberoam Central Console (CCC)

CCC is for centralized, integrated management and

monitoring of Cyberoam network security devices

- Offers complete control over distributed networks from

head office (H.O.) or Security Operations Center (S.O.C.)

of MSSPs

Available as

- Hardware CCC Appliances, Virtual CCC Appliances

Cyberoam Central Console (CCC)

Page 45: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Servers

Firewalls

IDP / IPS

SwitchesRouters

UTM / NGFW

Applications

Desktop systems

Logs & Events

Identity

Logging Reporting

Compliance

Management

Forensic

Analysis

Log

Management

Security

Management

Cyberoam iView – Logging and Reporting

Ability to log and report

activities from various

devices/vendors Available as Open Source software

Appliance

Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

Page 46: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

CCC & iView

CCC appliances iView – Logging & Reporting

CR-iVU200

CR-iVU100

CR-iVU25

Hardware CCC appliances

CCC15, CCC50, CCC100,

CCC200, CCC500, CCC1000

Virtual CCC appliances

CCCV15, CCCV50, CCCV100,

CCCV200, CCCV500

Page 47: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Desenvolvendo competências com Dispositivos de segurança Cyberoam Next Generation

CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)

CYBEROAM CERTIFIED TRAINER (CCT)

CYBEROAM CERTIFIED NETWORK & SECURITY PROFESSIONAL (CCNSP)

Treinamento & Certificação

Page 48: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam Threat Research Labs (CTRL)

Identify emerging

threats and zero-day

vulnerabilities

Post vulnerabilities

to global bodies

Release

signatures

Page 49: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Certificações

UTM Level 5:

Cyberoam holds a unique &

complete UTM certification

Anti-SpywareAnti-VirusFirewall VPN

IPS/IDPAnti-Spam URL Filtering

PremiumPremium Premium

ICSA Certified

High-Availability

ICSA Certified Firewall

VPNC Certified for Basic

VPN & AES Interoperability

Cyberoam achieves

Common Criteria

EAL4+ Certification

Page 50: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Reconhecido como "visionário" no Gartner UTM MQ

2009

2010

2012

2009Magic Quadrant for SMB

Multifunction Firewalls

2010Magic Quadrant for Unified

Threat Management

2012Magic Quadrant for Unified

Threat Management

2013Magic Quadrant for Unified Threat Management

Page 51: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Educação Saúde Telecom

GovernoFinanceiro Industria

Clientes pelo Mundo

Page 52: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Hoteis

Clientes pelo Mundo

Serviços

Outros

IT/BPO & Media

Page 53: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Link:

http://demo.cyberoam.com

Credentials:

guest /guest

Cyberoam Demo on-line

Get a 30 day FREE Evaluation of

Cyberoam Virtual appliance

Page 54: Cyberoam USP (PT-BR)

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Thank youContact: [email protected]