88
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Rese Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM

Our Products

Embed Size (px)

DESCRIPTION

CYBEROAM. Comprehensive Network Security. Our Products. Cyberoam – Endpoint Data Protection. Data Protection & Encryption Device Management. Application Control Asset Management. Unified Threat Management. Cyberoam Central Console (CCC). SSL VPN. Cyberoam Unified Threat Management. - PowerPoint PPT Presentation

Citation preview

Page 1: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Our Products

Unified Threat Management Cyberoam Central Console (CCC) SSL VPN

Data Protection & Encryption

Device Management

Application Control

Asset Management

Cyberoam – Endpoint Data Protection

Comprehensive Network Security

CYBEROAM

Page 2: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam Unified Threat Management

Gateway Integrated security over single platform

Unique Identity-based Layer 8 approach penetrates through each security module

Page 3: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

How do you Identify users and grant access?

Page 4: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

How do you Identify users and grant access?How do you Identify users and grant access?

“Certain employees are using their hand-held devices like Iphones & Blackberrys to access internal resources in my company. Some are working from home.”

“Our Network works on Citrix, and we would like to block certain users from accessing particular applications and apply unique policy for each user across the network.”

“How can I create special privilege for the technical team to access only specific servers / applications in my DMZ zone?”

Page 5: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“How can I know have information of which users logging when and what he is accessing from network or even from HOME. (Work from HOME)”

“How can I have AAA (Authenticate, Authorize and Audit) in my single security device.”

How do you Identify users and grant access?How do you Identify users and grant access?

Page 6: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION – Unique Identity Based Cyberoam FirewallSOLUTION – Unique Identity Based Cyberoam Firewall

Cyberoam features:

Stateful Inspection Firewall

Application based Firewall

Identity based Firewall

Admin can define the policies based on Username or IP Addresses and follows wherever he goes

Admin can bind the policies with user-name, IP address, MAC and session id (For Windows Terminal Sever and Citrix) as well

Terminal Server

XenServer

Page 7: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Page 8: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

HOW DO YOU PROVIDE ACCESS PRIVILEDGES TO USERS?

Page 9: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

How do you enable access policies for your users?How do you enable access policies for your users?

“Blanket policies for all departments do not work for us anymore.”

“I want my HR department to have access to Job & Recruitment websites.”

“I want to apply a daily download quota to certain users in my network”

“I want to block certain websites for a specific group of users. Although, these websites are hosted on HTTPS”

“I want to allow IM access to our Senior Management & Sales Team”

Page 10: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

How do you enable access policies for your users?How do you enable access policies for your users?

“How can I give access to FACEBOOK to specific users only one hr a day that too after office hrs?”

“How can I manage B/W to social networking websites to (for eg: Facebook) 2kbps so that business application gets right b/w?”

“How to block P2P applications, Proxy applications or Secured application like Ultrasurf acoross my organization?”

“How can I monitor/log DATA Transfer over HTTPS?”

Page 11: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: WEB CONTENT & APPLICATION FILTERSOLUTION: WEB CONTENT & APPLICATION FILTER

Block, Control & Monitor internet access & application access of Users.

Over 44 million+ websites in 82+ categories

Blocks and inspect

HTTPS websites

Google Cached pages

All known proxies such as Ultrasurf etc.

Educate healthy-usage policy by providing customized messages on blocked websites.

Premium

Page 12: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

COMPLETE CONTROL WITHUSER IDENTITY

Page 13: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Blocks over 5000+ Applications

SOLUTION: APPLICATION CONTROLSOLUTION: APPLICATION CONTROL

Page 14: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: IM MANAGEMENT & CONTROLSOLUTION: IM MANAGEMENT & CONTROL

Log & Monitor leading Instant Messengers

Yahoo,

Windows Live

Filter content over IM: Blacklist certain keywords or regular expressions

Block File transfer over messengers

Page 15: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IM Controls for Yahoo MSG:

Data Leak Protection (File Transfer Control)Who can chat with whom!Logging of Chat Conversations

Page 16: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

HOW DO YOU OPTIMIZE NETWORK & RESOURCE AVAILABILITY?

Page 17: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“We want to allot dedicated bandwidth to our VOIP/CRM/ERP”

“My CEO – wherever he logs in – Wifi/Lan/Handheld – should receive committed bandwidth at all times and hours.”

“I want to assign burstable (128kbps – 1 Mbps) to users/group and burst it when the B/W is free from other users”

How do you optimize Network & Resource Availability?How do you optimize Network & Resource Availability?

Page 18: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“How can I provide Dedicated B/W to Video Conferencing/ Backup device for only 2 hrs on specific date?”

“We would like to prioritize applications that utilize applications. CRM should have highest priority.”

“How can I analyze that which application / User is using how much B/W in real time?”

How do you optimize Network & Resource Availability?How do you optimize Network & Resource Availability?

Page 19: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: BANDWIDTH MANAGEMENTSOLUTION: BANDWIDTH MANAGEMENT

Allocate/Restrict bandwidth to specific application or users/groups

Allocate/Restrict bandwidth to specific categories Schedule bandwidth allocation/restriction Allocate dedicated bandwidth or as per availability

(burstable)

Page 20: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CRM

ERP

Salesforce

YouTube

IM Application

Webmail

CasualTraffic

Application Firewall Crowd of Applications Bandwidth Management

Page 21: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: TRAFFIC DISCOVERY SOLUTION: TRAFFIC DISCOVERY

Real-time visibility into bandwidth utilization by User Protocol Application

Provides visibility of unproductive usage of resources and threat incidence

Page 22: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Traffic Discovery:

Live Traffic Analysis including Bandwidth, Data Transfer Connection InformationLive traffic filtering by Application, User, IP AddressFilter traffic for specific applicationTraffic Filtering by Firewall Rule-ID, IP Address, Port etc.

Page 23: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

HOW DO YOU ENSURE BUSINESS CONTINUITY?

Page 24: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

How do you ensure Business Continuity?How do you ensure Business Continuity?

“Internet access should not be interrupted even though one of our link fails”

“We want the traffic of our finance department to route via a separate gateway”

“How can I ensure my VPN connectivity is having 100% uptime?”

“How can I use my 3G modem as back-up link when ADSL goes down?”

Page 25: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: MULTIPLE LINK MANAGERSOLUTION: MULTIPLE LINK MANAGER

Automated Link Load balancing assures ROI/investment Support for more than 2 ISP links Supports Wireless WAN (3G USB modems, Wimax)

Link Failover

Policy-based routing: Source ID/Users/Protocols

VPN Failover

High Availability Active Active Active Passive

Page 26: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Active-Active gateway load balancing

Sales Dept. Finance Dept.Dev. Dept.

Failover Link

ISP1 (MPLS)(10 mbps)

ISP2 (ADSL)(5 mbps)

ISP3 (3G)(1 mbps)

Page 27: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

HOW DO REMOTE WORKERSACCESS YOUR NETWORK?

Page 28: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

How do remote workers access your network?How do remote workers access your network?

“I want a connect all branches to my HO using secure and stable connection with zero downtime”

“I would like to grant our employees secured access to internal resources from hand-held devices like iPhone”

“I want my work-from-home employees/Roaming users to have limited access to only specific application ”

I want to SCAN my Remote/Roaming users traffic before they connect to my NETWORK?

Page 29: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: VIRTUAL PRIVATE NETWORK (VPN)SOLUTION: VIRTUAL PRIVATE NETWORK (VPN)

Secure & Seamless connectivity between branch offices

Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for:

Malware Spam Inappropriate content Intrusion attempts

Supports IPSec, L2TP, PPTP technologies (client-based) SSL-VPN enables access to internal resources from any

device (Does not require a client)

Page 30: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SSL VPN User Portal

Page 31: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

ARE DESKTOP ANTI-VIRUS & ANTI-SPAM SUFFICIENT?

Page 32: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“I want to optimize my bandwidth by blocking spam at the source/gateway itself”

“I want to provide users the ability to release/tag their messages from/to the quarantine area”

“Even HTTPS websites/applications need to be scanned for viruses”

“I want my F/W/UTM to use trusted AV and use all the signatures of Virus and give 100% protection”

“How can I create User based Anit-SPAM rules? “

“How can I comply SOX?”

Are Desktop Anti-virus & Anti-spam sufficient?Are Desktop Anti-virus & Anti-spam sufficient?

Page 33: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SECURITY » Content Security » Anti-Malware

Gateway Anti-Malware

- 4 million+ signatures

- Bi-directional scanning of web & email

- Self-service Virus Quarantine

- Reduced window of vulnerability Broadest security cover against all malware

- Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic

- Layer 8 Impact Identity-based virus reports

- Instant visibility into attacker/victim

Identity-based Quarantine policies

indicates feature offered only by top-rated UTMs

Anti-Virus

Anti-Spyware

Page 34: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION : GATEWAY ANTI-SPAMSOLUTION : GATEWAY ANTI-SPAM

Premium

Detects & blocks 98% of all spam False positive rate of 1 in a million. Unique Recurrent Pattern Detection (RPD)

technology blocks all types of spam including excel,pdf, multi-lingual spam etc.

Self-Service Quarantine Area for users, allowing them to check quarantined emails and reduce administrator overhead

Users Receive daily/weekly/monthly spam digest IP Reputation filtering:

Stops 85% of spam at Gateway Does not let it enter the network Saves bandwidth & resources

Page 35: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“How can I protect my network from DDOS & SQL Injection attacks?”

“I wan to block a specific (custom) application for Specific users by creating signature in my firewall?”

“How do I get immediate intimation on a hacking attempt on my network?”

How do you safe-guard your network from Hacking attempts?How do you safe-guard your network from Hacking attempts?

Page 36: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: INTRUSION PREVENTION SYSTEM (IPS)SOLUTION: INTRUSION PREVENTION SYSTEM (IPS)

More than 3500+ signatures to block a plethora of intrusion attempts.

Complete protection against DOS, DDOS, Syn Flood attacks and more.

Identity-based IPS policies per user or group Overview of threat status:

Top alerts, top attackers, top victims

Page 37: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

KEY QUESTION TO ASK:

DO YOU HAVE COMPLETE VISIBILITYOF YOUR NETWORK?

Page 38: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Do you have complete visibility of your network?Do you have complete visibility of your network?

“I want to identify the most dangerous users in my network”

“I would like to discover which users receive the most spam”

“Can I find out what people are surfing on the net in my company?”

“I want to monitor IM conversations of employees in my company”

“I want to monitor what files are being uploaded on the net”

“I want know know what google searches are being made”

Page 39: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SOLUTION: ON-APPLIANCE REPORTINGSOLUTION: ON-APPLIANCE REPORTING

More than 1000+ on appliance reports.

No Additional Purchase needed of hardware/service to access reports.

Collects logs and assists in Network Forensics

Reports in compliance with CIPA – Children’s Internet Protection Act

HIPAA – Health Insurance Portability & Accountability Act

GLBA – Gramm-Leach-Bliley Act

SOX – Sarbanex-Oxley

FISMA – Federal Information Security Management Act

PCI – Payment Card Industry Data Security Standards

Powered By:

Page 40: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

User Dashboard

Page 41: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Combined Report

Page 42: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Categories

Page 43: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Web Users

Page 44: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Search Engine – Google Search Results

Page 45: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Spam Recipients

Page 46: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Other UTMs

User Login

Cyberoam Authenticates

• User• IP Address• MAC Id• Session Id

Cyberoam Authorizes

• Access Time • Internet Quota• Security Policies• Web Filtering• Layer 7 Controls• QoS• IM Controls

Cyberoam Audits

• Identity - based Logs + Reports

• MAC Id• Session Id

Cyberoam Layer 8 Advantage

Page 47: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam UTM solves Organizational Concerns

Page 48: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

DEPLOYMENT MODES CYBEROAM

Page 49: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Default Gateway: 192.168.0.1 Users

Router

Network:192.168.0.x/24

FirewallINT IP: 192.168.0.1/24

BRIDGE MODEBRIDGE MODE

Page 50: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Default Gateway: 192.168.0.1

Network:192.168.0.x/24

RouterIP:61.0.5.1/29

Users

Mail ServerIP:172.16.1.3

Gateway: 172.16.1.1

Database ServerIP:172.16.1.4

Gateway: 172.16.1.1

Switch

Web ServerIP:172.16.1.2

Gateway: 172.16.1.1

SwitchConsole

INT IP:192.168.0.1/24

DMZ IP: 172.16.1.1/24

EXT IP: 61.0.5.2/29Gateway IP: 61.0.5.1

DMZ Zone

GATEWAY MODEGATEWAY MODE

Page 51: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

OVERVIEW:

CYBEROAM APPLIANCE RANGE

& SUBSCRIPTION SERVICES

Page 52: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Large Enterprises- CR 1500ia- CR 1000ia- CR 750ia- - CR 500ia

Small to Medium Enterprises- CR 300i- CR 200i- CR 100ia- CR 50ia

Remote Offices- CR 35ia - CR 35wi- CR 25ia - CR25wi- CR 15i- CR 15wi

CYBEROAM UTM APPLIANCE RANGECYBEROAM UTM APPLIANCE RANGE

Page 53: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam

(RBL Service)

Basic ApplianceBasic Appliance SubscriptionsSubscriptions

Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)

Gateway Anti-spam Subscription

Web & Application Filtering Subscription

Intrusion Prevention System (IPS)

8x5 Tech support & Warranty

24 x 7 Tech Support & Warranty

Subscription ModelSubscription Model

Page 54: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Bundled SubscriptionsBundled Subscriptions

TVS (Total Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)

- Gateway Anti-spam

- Web & Application Filtering

- Intrusion Prevention System (IPS)

- 8 x 5 Email, phone and chat Tech Support

SVS (Security Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)

- Web & Application Filtering

- Intrusion Prevention System (IPS)

- 8 x 5 Email, phone and chat Tech Support

Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

Page 55: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Bundled SubscriptionsBundled Subscriptions

TVSP (Total Value Subscription Plus)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)

- Gateway Anti-spam

- Web & Application Filtering

- Intrusion Prevention System (IPS)

- 24 x 7 Email, phone and chat Tech Support

SVSP (Security Value Subscription Plus)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)

- Web & Application Filtering

- Intrusion Prevention System (IPS)

- 24 x 7 Email, phone and chat Tech Support

Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

Page 56: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Product Line

Unified Threat Management Cyberoam Central Console (CCC)

SSL VPN

CyberoamEnd Point Data Protection

Page 57: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

PRICINGPRICING

HARDWARE

One Time Payment

SOFTWARE

Yearly Renewal Required

AV/AS/CF/IPS Database needs to update regularly to provide up-to-date protection

Need to renew 8x5 to get updates and keep the appliance under warranty

Page 58: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

HOW TO CHOOSE A CYBEROAM MODEL?HOW TO CHOOSE A CYBEROAM MODEL?

USER MODEL MATRIXNote: Denotes Number of Firewall Users SupportedActivation of other modules will lower performance

USER MODEL MATRIXNote: Denotes Number of Firewall Users SupportedActivation of other modules will lower performance

2250

1500

1100

750450

3001507550402525

0

500

1000

1500

2000

2500

CR15i

CR15wi

CR25ia

CR35ia

CR50ia

CR100ia

CR200i

CR300i

CR500ia

CR750ia

CR1000

i

CR1500

i

Appliance Name

Nu

mb

er

of

Us

ers

Su

pp

ort

ed

Please Note: Chart is an approximation Only. Number of users may vary on the network load & configuration.

Page 59: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Product Description List Price (US$)

Qty Final Price (US$)

Cyberoam 300i Appliance - Firewall, Bandwidth Management , Multiple Gateway & Load Balancing

SKU : 01-CRI-300-01

100

1Year Antivirus-Antispam for CR 300i 60

1 Year Web & Application Filtering for CR300i 31

1 Year IPS for CR300i 18

1 year TVS ( AV+AS+IPS+WAF with 8*5 support) 60

1 year SVS (AV+IPS+WAF with 8*5 support) 54

1 yrs 8*5 Support 11

Total

SAMPLE QUOTESAMPLE QUOTE

Page 60: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IMPORTANT RESOURCES FOR CYBEROAM PARTNERSIMPORTANT RESOURCES FOR CYBEROAM PARTNERS

http://partner.cyberoam.com Partner Portal >> Knowledge-base

Page 61: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Stay updated with Cyberoam Newslettershttp://www.cyberoam.com/newsletters.html

IMPORTANT RESOURCES FOR CYBEROAM PARTNERSIMPORTANT RESOURCES FOR CYBEROAM PARTNERS

Page 62: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IMPORTANT RESOURCES FOR CYBEROAM PARTNERSIMPORTANT RESOURCES FOR CYBEROAM PARTNERS

Register for Cyberoam WebinarsRegister for Cyberoam Cerficationhttp://training.cyberoam.com

Page 63: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

DEDICATED CONSULTANTS FOR PARTNERSDEDICATED CONSULTANTS FOR PARTNERS

www.cyberoam.com/presalessupport/ Cyberoam Presales Consultants are available 24x7 for

Channel Partners

Dedicated Support

Email

Chat: Yahoo/MSN/Skype

Telephone: Toll Free for some regions

Presales Consultants help you with

Installation Support,

Network Consultation

Documentation Support for Tenders/RFPs

Feature Requests

Training/Certification requests

Page 64: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Credentials

Page 65: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Industry RecognitionIndustry Recognition

Recognized as ‘Visionary’ in the Gartner UTM MQRecognized as ‘Visionary’ in the Gartner UTM MQ

Page 66: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam is the only Network UTM vendor to receive this recognition in 2010 from SC Magazine

SC Magazine

Recognized as ‘Network UTM Innovator – Security Innovator’Recognized as ‘Network UTM Innovator – Security Innovator’

Page 67: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”

Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight

IDC ReviewIDC Review

Page 68: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

2008 - Emerging Vendor of the Year2008 - Emerging Vendor of the Year

Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year

Award in the Network Security Market

Page 69: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam CertificationsCyberoam Certifications

Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP

UTM Level 5: Cyberoam holds a unique & complete UTM certification

ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability

ICSA Certified High-Availability

PremiumPremium

IPv6Ready

Member of Internet Watch

Foundation

Page 70: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SC Magazine Five Star Rating – Seven Times in a Row!SC Magazine Five Star Rating – Seven Times in a Row!

April 2009 – Product Review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“

July 2010 – Product Review Cyberoam CR50ia “A lot of features at a low cost.” “A solid product and the price is right. We give CR50ia our Best Buy this month.”

October 2010 – Product Review Cyberoam CR15wi “Remarkably good value, identity-based security, simple deployment,

extensive security measures, top quality reporting software.”

April 2011 – Product Review Cyberoam CR100ia

“Easy to deploy with a lot of granular controls.”

Page 71: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Reviews and AwardsReviews and Awards

Cyberoam CR35ia outshines competitors in SOHO UTM Group Test

Page 72: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Partial ClientelePartial Clientele

Page 73: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Partial ClientelePartial Clientele

Page 74: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam maximizes Return Over Investment. We are fully satisfied with Cyberoam Unified Threat Management solution.” Mr. Avnesh JainSr. Manager, Information SystemsHero Honda Motors Limited

TestimonialsTestimonials

“Since its deployment, unlike FortiGate, Cyberoam has been able to give wire speed performance. We soon plan to invest more in Cyberoam appliances to protect our other operations. The most important quality of Cyberoam is its unobtrusive businessfriendly wire-speed security. Cyberoam All-in-One solution is running very well and can change people’s mind about the performance of UTM solutions” Mr. Vo Remy Manager, IT Department, Societe Generale Viet Finance, Vietnam

Page 75: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“We purchased few appliances to start with and monitored them. We soon came to a conclusion that Cyberoam UTM was a robust appliance and that the post-sales support is prompt. VisionTech Systems, Cyberoam’s channel partners ensures that we have continuous support. Today, after purchasing twenty appliances from them, our opinion about them still remains unchanged. We intend to continue deploying Cyberoam UTM appliances on our other constructions sites in future.”

TestimonialsTestimonials

“Through Cyberoam we have gained in efficiency, quality control and now we focus on users rather than IP addresses, which is more logical when addressing security concerns. We actually got what we were promised on paper. The security policies have been easy to configure” Mr.Thierry ManginDirectro of Information Systems, Baccarat Crystal, France

Page 76: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“We find Cyberoam UTM a dependable solution. It amply takes care of our primary productivity need. En route, it also bridges security our to productivity requirements. Cyberoam is productivity promoting, business friendly security” Mr.Leonides Tolentino, Sr. Manager, MISCDO-Foodsphere, Philippines

TestimonialsTestimonials

“The Cyberoam team has set an extremely high bar for vendors that I deal with on all levels of business. The responsiveness, impeccable follow-up and willingness to adjust as dynamically as our requests was uncanny. Cyberoam’s customer service should be a model. From sales to support, I could not ask for a more desirable experience. The product’s power matches the providers experience and support. Stellar! Five Star! Speechless! ” Mr. Courtney SwanagainIBusiness Strategist,Swanagain Elite Enterprises, USA

Page 77: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

ABOUT ELITECORE

Page 78: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Established in 1999

500+ Employees

ISO 9001:2000 certified company

Backed by  World’s Largest Private Equity Group ($90bn)

Sales, Distribution Channel & Customers across 75+ countries

Communication - Networks – Security

- Cyberoam - Network to Endpoint Security

- CRESTEL - Telecommunication OSS BSS

- EliteAAA - Telecommunication

- 24online - Bandwidth Management Solution

About Elitecore TechnologiesAbout Elitecore Technologies

Page 79: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

LET’S RECAP THROUGH SOME SCENARIOS

Page 80: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Scenario 1Scenario 1

A Finance Company has offices at different cities Head Office: 150 Employees

Branch Offices: 15 Employees each

IT Managers’ Challenge: Wants to deploy security solution for their network

Wants to store all reports at central location

What solution will you recommend to the IT Manager?

Page 81: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Scenario 1: The SolutionScenario 1: The Solution

At Head Quarters

CR200i AV & AS

IPS for Mail Server

Web & App Filter

iView & CCC

At Branch Offices CR15wi

Page 82: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Scenario 2Scenario 2

A Retail Marketing Company Head Office: 50 Employees

IT Managers’ Challenge: Wants marketing executives to have secured access to

their CRM

What will you recommend to the IT Manager?

Page 83: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Scenario 2: The SolutionScenario 2: The Solution

At Head Quarters

CR50ia SSL VPN

CRM Access to Marketing Executives

Page 84: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Scenario 3Scenario 3

An Educational Institution 1500 Students accessing Internet

2 ISP Links with 50 Mbps bandwidth on each links

IT Managers’ Challenge:

Wants to grant user access based on profile.

Control access of unwanted & bandwidth guzzling websites

Games

Music

Youtube, Facebook

P2P

Load Balancing on both Links. No Auto Failover Available

Staff is getting lot of spam & virus infected emails.

Mail server gets listed in spam database due to student infected laptops sending 1000s of emails

Page 85: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Solution: Scenario 3Solution: Scenario 3

At Head Quarters

2 x CR1500i for

redundancy One link for

Hosted Servers

Second for Internet Browsing

AV & AS for: Outgoing &

Incoming Mail traffic

CF For: Blocking Im’s,

P2P, Music etc.

Page 86: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Scenario 4Scenario 4

A Small Company Head Office: 50 Employees

3 Remote Offices: 15 Employees

DSL Line Connectivity at all 4 Places

IT Managers’ Challenge: All remote offices need to be connected to main office securely

Every office has wifi connection

What will you recommend to the IT Manager?

Page 87: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Solution: Scenario 4Solution: Scenario 4

Head office:

CR 50ia

All remote offices:

CR 15i

Dynamic DNS

Support

Site-to-Site VPN

Tunnel is established

Page 88: Our Products

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Question/Answer Session