Introducing Quick Heal Terminator.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Designed By: Technical Training Department
Firewall Slides by John Rouda
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 7: Using Windows Servers to Share Information.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Unify and Simplify: Security Management
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Vantage Report 3.0 Product Sales Guide
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Barracuda NG Firewall ™
Chapter 7: Using Windows Servers
Barracuda Firewall The Next-Generation Firewall for Everyone
Network Security Solution
TMG Client Protection 6NPS – Session 7.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Cloud Firewall.
Barracuda Firewall The Next-Generation Firewall for Everyone
Critical Security Controls
AT&T Premises-Based Firewall Enhanced SBS Solution
Data Center Firewall.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Threat Management Gateway
Introduction to Networking
Risk of the Internet At Home
Firewalls Chapter 8.
AT&T Dedicated Internet (ADI)
Presentation transcript:

Introducing Quick Heal Terminator

Terminate gateway-level threats with future-ready security

Quick Heal TERMINATOR Unified Threat Management Solution A solution that emerged out of the need to stop blended and insider threats and newer attack techniques that target the user as the weakest link for corporate information systems. Ability to perform multiple security functions in a single appliance and managed through a single console. A comprehensive solution. Recent inception in network security industry since 2004. The term Unified Threat Management (UTM) was originally forged by IDC , a leading IT market research firm.

Why do SMBs need UTM? Targeted Espionage Target is intellectual property or operational data Network shutdown due to bogus traffic Commercially sensitive information leaks High potential revenue per unit Spear Phishing, Hacking, Backdoor Entry Ability to act is targeted Network Service disruption & degradation Data pilferage| Medium revenue per unit

Why do SMBs need UTM? Mass Internet Attacks – DOS, DDOS Drive by exploits Websites knocked online Bandwidth, disk space or CPU time unavailable to its intended users Port Scan Infiltrations Exposes open and/ or unprotected ports to criminals who can gain access to networks Wi-Fi Sniffing Illegally capture and decode other people’s data Gain Internet access unethically

Why do SMBs need UTM? Poor network security Competence being the best asset, one data leak can ruin all that effort Repercussions to your credibility, reputation and finances Budget constraints to appoint experts for IT security needs. Typical attackers do not target individuals or businesses – they target vulnerabilities. Every computer attached to the Internet is a target.

Why do attackers want any and all networked computers? Any PC can be used as a spam relay. Any PC can be used as an illegal file repository. Any PC can help put a foe out of business. Any PC can host a phishing site.

Quick Heal TERMINATOR for ROBO/SOHO Quick Heal TERMINATOR for SME Quick Heal TERMINATOR for Enterprise

Anti-Spam, Anti-Malware Internet Firewall Inspection Intrusion Prevention URL Filtering Anti-Spam, Anti-Malware VPN Remote Users Users

Network Security Connectivity Productivity

Robust Network Security Quick Heal TERMINATOR Features for Robust Network Security

Firewall Administrators can block or allow access, for each protocol, to each internal network, user and user group.

IDS/IPS Prevents network from mass attacks like DOS and DDOS so that the network remains unaffected from remote and sync flood attacks.

User Based Access Control Restricts or authorizes Internet access for users based on authentication credentials.

Gateway Mail Protection Scans inbound and outbound email messages and email attachments. AntiSpam scans and runs a series of tests on inbound email messages.

Category-wise Web Filtering Prevent viewing inappropriate web sites.

Content Filtering Prevents download of specific files and applications based on file extensions.

Gateway Anti-Virus protection provides another layer augmenting existing desktop virus solutions.

Active Directory/LDAP Support Automatically connects and syncs with existing Active Directory/LDAP and updates user base.

Seamless Connectivity Quick Heal TERMINATOR Features for Seamless Connectivity

VPN Provides the IT administrators means for secure communications with the company’s remote users and for building secure site-to-site connections.

Bandwidth Manager Simplifies the IT administrator’s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need.

IPv6 Enabled The appliance is ready to support IPv6 based networks.

Load Balancing Allows multiple ISPs to be used in a network simultaneously enabling users to utilize the same gateway irrespective of the ISP lines.

Automatic Link Failover Automatically diverts the data traffic from inactive ISP to active ISP lines in case any of the ISP lines fail to perform.

Multiple LAN/WAN/DMZ Zone Configuration Flexible interfaces which can be configured for local network, Internet and DMZ.

Enhanced Productivity Quick Heal TERMINATOR Features for Enhanced Productivity

Detailed Reports Provides on appliance extensive reporting of top websites accessed, policy breaches and bandwidth usage.

Role based Administrator Support Different levels of access to TERMINATOR console depending on the role of the Administrator.

Log Viewer Allows system admin to see all the events happening on the appliance viz. log in any changes made to settings

User Friendly User Interface User Interface Graphical Dashboard gives immediate status of critical security situations that need immediate attention.

SMS and Email Notifications Allows notifications to be sent to configured email addresses and numbers. These notifications would alert the network administrator of critical network events such as detection of viruses, intrusions, update notifications, license expiry date, etc.

Employee Productivity Role based access control.

Bandwidth Manager Simplifies the IT administrator’s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need.

IT Policy Management On device comprehensive logging and reporting. User friendly web-based configuration.

Quick Heal TERMINATOR Streamlined Performance, Scalability to meet growth & simplified Management

Business Benefits Safe working environment, Employee Productivity, Cost- effective bundled solution, Regulatory Compliance

Financial Benefits Consolidated Cost-effective Solution, Optimum use of IT Resources

Technological Benefits Cumulative Network security, Plug-and-Play Solution, Extensive Support for your Quick Heal TERMINATOR

No matter how big or complex, the enterprise network is, with: Quick Heal TERMINATOR Managing security is made simple.