Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.

Similar presentations


Presentation on theme: "Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management."— Presentation transcript:

1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM

2 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Agenda of Presentation  About Elitecore Technologies  Cyberoam UTM  Cyberoam Credentials/ Awards/ Accreditations

3 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Established in 1999  400+ Employees  ISO 9001:2000 certified company  Backed by World’s Largest Private Equity Group ($90bn)  Sales, Distribution Channel & Customers across 75+ countries  Communication - Networks – Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution About Elitecore Technologies

4 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

5 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Internal threats  Identity theft  Data loss  Data deletion  Data modification External threats  Worms  Malicious code  Virus  Malware Social Engineering threats  Spam  Phishing  Pharming  Data theft  DoS attacks  Hacking USER Attack on Organization User – The Weakest Security Link

6 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 8 Technology – Security around the User -Treats User-Identity as the 8th Layer in Network stack -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity-based security policies  Identifies traffic by username even in case of dynamic IP Layer 8 – The Human Layer indicates a feature unique to Cyberoam

7 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security User

8 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Cyberoam’s Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 – The Human Layer

9 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam UTM- Identity-based Security  Integrated security over single platform  Layer 8 penetrates through each security module

10 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Intrusion Prevention Policies Anti-Malware Anti-Spam Web Filtering Layer 7 Controls Bandwidth Management & QoS Instant Messaging Archiving & Control Internet Surfing Quota Internet Access Time Internet Data Quota Cyberoam Audits Identity - based Logs + Reports MAC Id Session Id Cyberoam Layer 8 Advantage

11 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SecurityConnectivityProductivity Organizational Concerns  Network security  Content Security  Administrative Security  Business Continuity  Network Availability  Future-ready connectivity  Employee productivity  IT resource optimization  Administrator productivity

12 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES SECURITY Network SecurityContent SecurityAdministrative Security  Firewall  IPS  Wireless security  Anti-Malware  Anti-Spam  HTTPS Content security  Next-Gen UI  iView- Logging & Reporting

13 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Stateful Inspection Firewall (Fusion Technology) SECURITY » Network Security » Firewall -Interface for achieving Unified Security  Identity-based policies enable security, connectivity, productivity Fusion Technology

14 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Intrusion Prevention System signatures - broadest security cover -Internet Threat Response Team  Regular Signature updates -Quick protection against latest vulnerabilities -IPS Policy Tuner  Allows multiple IPS policies  Granular control over IPS policies -Unnecessary alerts -Reduced traffic latency -Improved performance SECURITY » Network Security » IPS

15 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Cyberoam IPS + Layer 8 Technology  Identity-based IPS policies per user or group  Identity-based alerts and reports -Visibility into applications – User, Source, Destination, Usage -Overview of threat status – Top alerts, top attackers, top victims SECURITY » Network Security » IPS

16 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Wireless (WLAN) Security -High performance, integrated security over WLAN  Secures wireless networks to the extent of wired networks -Supports n wireless standard -Layer 8 over WLAN  Identity-based policies in dynamic IP environment  MAC-based filtering  Supports IP-address pool -Enhances security SECURITY » Network Security » Wireless security

17 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Gateway Anti-Malware -4 million+ signatures -Bi-directional scanning of web & -Self-service Virus Quarantine -Reduced window of vulnerability  Broadest security cover against all malware -Scans  HTTP, FTP, SMTP, POP3  HTTPS, IMAP  Instant Messenger traffic -Layer 8 Impact  Identity-based virus reports -Instant visibility into attacker/victim  Identity-based Quarantine policies SECURITY » Content Security » Anti-Malware indicates feature offered only by top-rated UTMs

18 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam  Gateway Anti-Spam -IP Reputation Filtering  Blocks 85% of incoming messages at gateway -Saves bandwidth -Near 98% spam detection -False Positive rate of 1 in a million  Reduces fear of losing business s - Self-Service quarantine area

19 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -User-based Spam Digest  Frees administrator time & management -Manage recipients  Data leakage prevention and archiving -Scanning with Recurrent Pattern Detection (RPD) technology  Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 SECURITY » Content Security » Anti-Spam -Virus Outbreak Detection (VOD) for zero-hour protection -Scans SMTP, POP3, IMAP traffic

20 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SECURITY » Content Security » Anti-Spam -RPD Technology -Most outbreaks last only a few hours -Cyberoam identifies outbreaks real-time -Signature-based Anti-Spam take time to release signatures -Users remain unprotected till Anti-Spam is updated -Too late to battle out the initial peak of attack

21 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  HTTPS/SSL Content Security -Scans SSL traffic for virus & malware -Controls File upload over SSL -Reports files uploaded via SSL -Stops HTTPS/SSL as a medium for  Data Leakage  Malware Propagation SECURITY » Content Security » HTTPS Content Security indicates feature offered only by top-rated UTMs

22 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Next-Gen UI -Web 2.0 technology advantages -Easy navigation, custom controls, intuitive interface  Fewer security errors - Increases security  Enhances administrative productivity  Shorter learning curves -Unified Security  Rules for all security features from firewall page SECURITY » Administrative Security » Next-Gen UI

23 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Cyberoam iView – On-Appliance Logging & Reporting -Ability to log and report activities -LAYER 8 - Identity-based logging and reporting – Pinpoints the user -Security Management  iView dashboard- Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  Reports -Log Management -Compliance Management  HIPAA, PCI DSS, GLBA, and more -Forensic Analysis SECURITY » Administrative Security » iView- Logging & Reporting

24 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

25 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES CONNECTIVITY Business ContinuityNetwork AvailabilityFuture-ready connectivity  Multiple Link Management  High Availability  VPN  3G/WiMAX modem support  IPv6

26 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Multi-Link Management -Automated Load balancing assures ROI/investment  Support for more than 2 ISP links  Supports Wireless WAN (3G USB modems) CONNECTIVITY » Business Continuity » Multiple Link Management 3G

27 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CONNECTIVITY » Business Continuity » Multiple Link Management -Link Failover  Supports multiple failover conditions  Monitors link availability of multiple WAN connections  Transfers traffic from a failed link to a working link -Maximizes business up-time -Optimizes link utilization for business continuity  Active-Active Auto Link Failover  Active-Passive Auto Link Failover  Support for more than 2+ ISP links  Supports WWAN for failover

28 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Layer 8 Policy-based Routing  Routes traffic based on: -Source IP addresses -Protocols -Users  Assures Quality of Service for key users and applications CONNECTIVITY » Business Continuity » Multiple Link Management

29 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  ICSA Labs Certified Active Active High Availability -Maximizes network uptime -Reduces single-point-of-failure -Ensures continuous Cyberoam security -Ensures business continuity CONNECTIVITY » Business Continuity » High Availability

30 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Virtual Private Network (VPN) -Anywhere, any device secure remote connectivity -Supports  IPSec, L2TP, PPTP technologies  SSL-VPN -Client-type independent Web access mode -Application access mode -Client mode  Threat Free Tunneling (TFT) Technology  Scans traffic entering VPN tunnel for: -Malware -Spam -Inappropriate content -Intrusion attempts -Maintains secure endpoint and network environments CONNECTIVITY » Network Availability » VPN

31 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  3G/WiMAX – USB Modem Support -High-speed wireless WAN (WWAN) -Wide ISP support -All gateway security features available  Can function as a main or failover link CONNECTIVITY » Network Availability » 3G/WiMAX modem support 3G

32 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization  Content Filtering  IM controls  Bandwidth Management  Traffic Discovery  Layer 7 Administrator Productivity  Next-Gen UI

33 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  IPv6  ‘IPv6 Ready’ gold logo -Cyberoam identifies and processes IPv6 traffic  Third-party validation -International Testing Program with rigorous test cases  IPv6 compliance to become mandatory in government and other enterprises -Driven by diplomatic initiatives CONNECTIVITY » Future-ready connectivity » IPv6

34 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Content Filtering -Industry’s most comprehensive URL database  82+ categories  44 million+ URLs -On-appliance web category database  Faster access  Surfing pattern privacy -Controls access to HTTP & HTTPS hosted websites  Increases productivity Productivity » Employee Productivity » Content Filtering

35 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Controls that are difficult to bypass  Blocks Google cache pages  Search keyword reports  Blocks embedded URLs  Detects/Blocks Third Party Proxy and Tunneling software -Controls access to Instant Messengers, P2P -Controls Data Leakage  Blocks files from uploading to web pages  Blocks file transfer through Instant Messengers Productivity » Employee Productivity » Content Filtering

36 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  IM Controls -Identity-based controls for Yahoo messenger and Windows Live Messenger -Scans malware -Logs and controls  Access  Conversation  File transfer  Voice/Webcam Productivity » Employee Productivity » IM controls

37 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Best of Breed Bandwidth Management/QoS -Application and Identity-based bandwidth allocation -Category wise Bandwidth management -Restrict Bandwidth usage for a combination of source, destination and service/service group -Schedule-based bandwidth allocation -Committed and burstable bandwidth Productivity » IT Resource Optimization » Bandwidth Management

38 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Traffic Discovery -Real-time visibility into bandwidth utilization by user, protocol, application -Provides visibility of unproductive usage of resources and threat incidence Productivity » IT Resource Optimization » Traffic Discovery

39 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Layer 7 -Offers visibility and management over Application Layer 7 -Allows control over application, user, time and bandwidth  Essential for Cloud Computing -Bandwidth Management assures availability of business- critical applications -Controls bandwidth costs Productivity » IT Resource Optimization » Layer 7

40 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security VoIP Bit Torrent CRM ERP IM Application Web mail Internet Medium Quality High Quality Low Quality Application Layer 7 Visibility

41 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Multi-core Technology -High Security without compromising on performance -Multi-core processors  Parallel processing of Cyberoam security features -Real-time, Unified Security  Higher Throughputs -High-speed memory access to signatures  Security against advanced threats Cyberoam Architecture

42 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Extensible Security Architecture (ESA) -Ability to adapt to future security needs -Ability to support feature enhancements in future -Ready for future upgrades Vs ASIC Cyberoam Architecture

43 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Central Console

44 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Centralized controls and security management over remote networks  Reduces operational complexity and deployment time  Minimizes errors and lowers administration cost  Enables the MSSPs to have different personnel for managing different customer deployments  Ease of use with view of multiple devices and network status at a glance Cyberoam Central Console

45 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security

46 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SSL VPN

47 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Supports remote access VPN users and site-to-site VPN connections  Accommodates between 50 to 1000 concurrent users  Policy-based resource access control  Zero-client administration  Flexibility in purchasing remote security solutions: -Virtual appliance mode -Dedicated appliance mode SSL VPN

48 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Dedicated SSL VPN appliance Deployment

49 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Virtual SSL VPN Deployment Diagram

50 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView

51 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Available as Open Source software and as Appliance  Ability to log and report activities from various devices/ vendors  Log Management -Near real-time log retrieval -Archival and Search facility  Security Management -iView dashboard – Shows network attacks on single screen Reports  Compliance Management -Reduces compliance costs -Single click access to reports - Simplified compliance management -Easy visibility into access by users Cyberoam iView

52 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Forensic Analysis -Reconstructing sequence of events in a security breach -Reporting stands in the face of legal scrutiny  Benefits -Security Benefits  Centralized control  Identifies attacks based on – -Attack Reports (Type of Reports) -Deviation from norm in access or usage of resources  Allows quick investigation and determination of cause of breach Cyberoam iView

53 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Compliance Benefits  Access and Usage logs of -Activity in critical applications, databases -Data transmitted to external entities  Enables setting user identity-based thresholds for acceptable use -Productivity Benefits  Shows deviation in resource consumption -Financial Benefits  Low capital requirements  Low technical manpower requirements Cyberoam iView

54 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

55 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam - Endpoint Data Protection

56 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Endpoint protection: -Across geographic locations -Centralized controls -Regulatory and Security compliance  Cyberoam Endpoint Data Protection suite -Data Protection & Encryption  Prevents data leakage through: - attachments -Web mail -Instant Messengers -Printed files  Encrypts files/device while writing data to removable devices  Document back-up prevents accidental/malicious data deletion Cyberoam - Endpoint Data Protection

57 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Device Management  Protects data by controlling data over: -USB device -Storage device -Network device -Communication Interface device -Others -Application Control  Protects data by controlling unauthorized/indiscriminate use of applications -Enhances employee productivity -Prevents legal liabilities, network outages Cyberoam - Endpoint Data Protection

58 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security -Asset Management  Offers IT infrastructure management  Automates and centralizes  Allows remote software installations  Meets security compliance requirements Cyberoam - Endpoint Data Protection

59 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Appliance Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN

60 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Other Appliances  Cyberoam Central Console -CCC 15 -CCC 50 -CCC 100 -CCC 200  SSL VPN Appliance -CR-SSL-800 -CR-SSL CR-SSL-2400  Cyberoam iView -CR-iVU25

61 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam CRi UTM Appliance Range  Large Enterprises -CR 1500i -CR 1000i -CR 500ia  Small to Medium Enterprises -CR 300i -CR 200i -CR 100ia -CR 50ia  Remote Offices -CR 35ia -CR 25ia -CR 15i

62 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Subscription Model

63 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Identity-based Firewall  VPN  Free SSL-VPN  Bandwidth Management  Multiple Link Management  On Appliance Reporting  Basic Anti-Spam (RBL Service) Basic Appliance

64 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security  Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)  Gateway Anti-spam Subscription  Web & Application Filtering Subscription  Intrusion Prevention System (IPS)  24 x 7 Tech Support & Warranty Bundled Subscriptions

65 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Bundled Subscriptions  TVS (Total Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Gateway Anti-spam Subscription -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 , phone and chat Tech Support  SVS (Security Value Subscription) -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Web & Application Filtering Subscription -Intrusion Prevention System (IPS) -8 x 5 , phone and chat Tech Support Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

66 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlight IDC Review

67 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Emerging Vendor of the Year Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year Award in the Network Security Market

68 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Cyberoam Certifications Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium

69 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security SC Magazine Five Star Rating – Four Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch”  “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i  “console is well organized and intuitive to navigate”  “flexible and very powerful”  “this appliance is a good value for almost any size environment”.

70 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Best Integrated Security Appliance Best Security Solution for Education Best Unified Security Tomorrow’s Technology Today , 2008 Finalist Network Middle East Award 2008 Finalist Channel Middle East Award VAR Editor’s Choice for Best UTM (2007) Finalist Global Excellence in Network Security Solution ZDNET Asia- IT Leader Of the Year Emerging Vendor of the Year for Network Security SMB Product of the Year 2008 – Best Content Filtering Awards

71 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele

72 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Global Clientele (Cont’d)

73 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Middle East Clientele

74 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Thank You


Download ppt "Www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management."

Similar presentations


Ads by Google