www.cyberoam.com © copyright 2011 elitecore technologies ltd. all rights reserved. securing you...
TRANSCRIPT
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Partner Road Show Presentation
Shailesh MecwanBusiness Development Manager, Cyberoam
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Agenda of PresentationAgenda of Presentation
About Elitecore Technologies Ltd.
Cyberoam Product Line
Cyberoam UTM
Industry Accolades & Product Certifications
Q&A
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Established in 1999
400+ Employees
ISO 9001:2000 certified company
Backed by World’s Largest Private Equity Group ($90bn)
Communication - Networks – Security
- Cyberoam - Network to Endpoint Security
- CRESTEL - Telecommunication OSS BSS
- EliteAAA - Telecommunication
- 24online - Bandwidth Management Solution
About Elitecore TechnologiesAbout Elitecore Technologies
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Global Presence (Over 100 Countries)Global Presence (Over 100 Countries)
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Appliance Product Line
Unified Threat Management
Cyberoam Central Console (CCC)
SSL VPN
CyberoamEnd Point Data Protection
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Integrated security over single platform Identity based approach with Cyberoam’s
Layer 8 Technology Applies on each Security Feature in the UTM
Offers interface for achieving Unified Security Reduced TCO (Total Cost of Operations)
Best Quality of Security features Lower expenditure and Ease of Management Reduced cost of training and support Future Ready with IPv6 Ability to upgrade to future threats Security subscriptions as needs grow
Cyberoam UTM- Identity-based SecurityCyberoam UTM- Identity-based Security
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Layer 8 Technology – Security around the User
- Layer 8 penetrates from Layer 1 to Layer 7 of the OSI protocol stack
- Network security decisions based on Usernames and IP Addresses
Control Who is doing What in the network
Allows creation of User Identity-based security policies
Identifies traffic by username even in case of dynamic IP
Introducing Layer 8 – The Human LayerIntroducing Layer 8 – The Human Layer
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Unique Identity based Cyberoam Firewall available on UTM (integrated with all other security features)
No need of blanket policies
Admin can define the policies based on combination of Username, IP Address, Mac Address, Session Id
Identity based Authentication, Authorization, Audits over single security device
Admin can create work profile based groups
Identity based Security Policy ControlsIdentity based Security Policy Controls
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Know who is doing what?
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Cyberoam UTM FeaturesCyberoam UTM Features
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Cyberoam UTM Product RangeCyberoam UTM Product Range
SME EnterprisesSmall Offices
15wi, 15i, 25wi, 25ia, 35wi, 35ia
50ia, 100ia, 200i, 300i 500ia, 750ia, 1000i, 1500i
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Industry Recognition &
Product Certifications
Industry Recognition &
Product Certifications
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Product CertificationsProduct Certifications
IPv6 ReadyCheckmark
Certification
ICSA Labs Certified Firewall
ICSA Labs certification for
Active Active HA
Internet Watch Foundation
Member of VPN Consortium
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Industry RecognitionIndustry Recognition
Cyberoam speedily rises in the ‘Visionaries’ Quadrant of Gartner MQ
GartnerGartner
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Cyberoam is the only Network UTM vendor to receive this recognition this year
Cyberoam recognized as ‘Innovator’SC Magazine
Industry RecognitionIndustry Recognition
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Cyberoam CR35ia outshines competitors in SOHO UTM Group TestTechWorld Magazine
Product Review: TechWorld SwedenProduct Review: TechWorld Sweden
"Cyberoam "CR35ia is the best-in-test thanks to a combination of good performance and a straightforward & intuitive GUI management”
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
SC Magazine Five Star Rating – Seven Times in a Row!SC Magazine Five Star Rating – Seven Times in a Row!
April 2009 – Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“
December 2008 – Product review Cyberoam CR100i“Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”
March 2008 – UTM Roundup Cyberoam CR1000i “Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”.
July 2007 – UTM Roundup Cyberoam CR250i “console is well organized and intuitive to navigate” “flexible and very powerful” “this appliance is a good value for almost any size environment”.
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Awards & RecognitionAwards & Recognition
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Cyberoam
Channel Model
Cyberoam
Channel Model
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Cyberoam Channel ModelCyberoam Channel Model
END CUSTOMER
END CUSTOMER
Service Providers
Value Added Reseller
System Integrators
Distributor
Cyberoam
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Activity Purpose
Advertisements and media coverage Brand Building
Online Presence Visibility and Lead Generation
Exhibitions / Conferences Seminars Lead Generation / Brand Building
Prospective Customer Road Shows Lead Generation
Partner Road Show Partner Training and Alignment
Direct Mailer (Print) Lead Generation
E-mailers Lead Generation
Tele-Marketing Lead Generation
Marketing ActivitiesMarketing Activities
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Partner Support on Cyberoam WebsitePartner Support on Cyberoam Website
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Q&AIf any??
www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved.
Securing You
Tack!Contact me at:
Tack!Contact me at:
Unified Threat Management Cyberoam Central Console (CCC) SSL VPN
Data Protection & Encryption
Device Management
Application Control
Asset Management
Cyberoam – Endpoint Data Protection