Cyberoam Complete Network Security for Banks. Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security.

Slides:



Advertisements
Similar presentations
Introducing Quick Heal Terminator.
Advertisements

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
LittleOrange Internet Security an Endpoint Security Appliance.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You What’s new in CyberoamOS Ver Build 304 Unified.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Barracuda Load Balancer Server Availability and Scalability.
Chapter 7: Using Windows Servers to Share Information.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)
Identity-Based Unified Threat Management One Identity – One Security
ShareTech 2015 Next-Gen UTM.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.6 build 16.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Vantage Report 3.0 Product Sales Guide
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Centralized Logging and Reporting for Managed Security Services Providers.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Securing Information Systems
Chapter 7: Using Windows Servers
BUILD SECURE PRODUCTS AND SERVICES
CompTIA Security+ Study Guide (SY0-401)
Barracuda Firewall The Next-Generation Firewall for Everyone
Complete Network Security for Banks
UTM Content Security Gateway
Barracuda Web Security Flex
Barracuda Web Filtering Service
Threat Management Gateway
Introducing ProxyClient
Complete Network Security for Banks
(With Hybrid Network Support)
Designing IIS Security (IIS – Internet Information Service)
Comodo Dome Data Protection
Presentation transcript:

Cyberoam Complete Network Security for Banks

Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security Solution Range

Dimension - 1 – External threats External Threats – Attackers are after financial gain Targeting the Internal User Blended threats over multiple protocol Over 90 % mail is spam carrying spyware, phishing, viruses, worm HTTP - Drive-by downloads, Pharming, Spyware via P2P sites IM: Malicious links and attachments FTP – Malicious uploads & downloads Q1: Point Solutions? A combination? or UTM?

Dimension - 2 – Insider Threats Insider Threats – Over 50% threats are from insiders Most attackers are current or former employees Majority of insiders plan their activities in advance using remote access Methods –Using someone else’s computer, Social engineering, Unattended terminal Malicious Intent: Selling corporate/customer data for financial gain User Ignorance: Indiscriminate surfing = Malware, Spyware Q.2. Would you settle for Plain Security if you had the choice of Identity-based security?

Dimension – 3 – Remote Office Security Remote Office Security – Greater Granularity and Control over system resources High Security Levels at par with Head Office External threats Internal threats Limited Technical Resources at Remote Office Centralized control and visibility required Regulatory Compliance: BS 7799/ ISO 27001, Basel II Norms, PCI-DSS Q. 3. Are your remote offices as secure as the Head Office? At what cost ?

Dimension – 4 – Safe Guarding Your EndPoints Medical records of 741 patients lost by a hospital 60% corporate data lies unprotected on endpoints Lost USBs Lost Multimedia Discs Wrong Attachment Lost iPods Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Bank employee accidentally sent sensitive customer details to wrong address 12,500 handheld devices forgotten at the back of taxis every 6 months in UK 9000 USB sticks found in people's pockets at the local dry cleaners in UK

Dimension – 4 –Safe Guarding Your Network EndPoints What Places Data At Risk? Applications Web, Mail, IM, P2P, Printing, FTP Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Insiders Unauthorized transfer of sensitive data; Malware-laden for information access; Sensitive data sent to wrong person Data At Risk Intellectual property related to R&D Business plans, RFP / Tender quotes Product launch dates and roadmap Customer data Malicious Unintentional

Core Banking System Components Datacenter Network Administrators Core-Banking Application OS, Database Internet-Banking ATM Desktops, Branch Servers WAN, Internet Branches Application Developers System AdministratorsBranch User/Admins Alternative Channels

Challenges  Existing Firewall inadequate for 1500 users. To be replaced or not?  Limitations of IP-based security – No tracing of malicious users, No reporting on Net use  No Anti-Malware / Content Filtering / Bandwidth Management / Multiple link management  No Endpoint Security Cyberoam Solution  2 Cyberoam CR 1500i appliances act as Proxy. Active-Active, High Availability mode.  Firewall, IPS, Anti-Virus & Anti-Spam, Content Filtering  SSL-VPN Secure Remote Clientless, Access  Threat Free Tunnelling prevents malware  CR Protects Customer data in DMZ and LAN, does Load Balancing for 2 ISP’s  On-appliance reporting and Identity-based Surfing policies  Protection in dynamic and Wi-fi environments Bank X– Case Study

 Confidentiality – Only Authorized users may access  Restricted Zonal access –User Identity, VLAN  Incident Management – Identity-based logging & reporting  Device Control – Block unauthorized file copies, USBs etc.  Application Control – Authorized use of Applications Only Summary of Benefits  Prevents unauthorized access, leakage / damage to information  Reduces the risk of human error, theft, fraud, misuse of infrastructure  Zero-hour threat detection and alerts with username  Ensures Quick and Suitable Response  Ongoing monitoring with username reports Cyberoam Security to X Bank

Cyberoam Unified Threat Management

What is Cyberoam? 1.Comprehensive Security with Performance-Effectiveness-Granularity Firewall-VPN-IPS Gateway Anti-virus & Antispam Content Filtering & Bandwidth Management High-Availability & Multiple Link Management On-Appliance Reporting 2. Identity-based Security 3. Comprehensive Branch Office Security

Firewall-VPN-IPS Dimension 1

Why Cyberoam Firewall-VPN-IPS? Enterprise-class performance 6 Gbps Firewall Throughput, 2.5 Gbps IPS Throughput Certifications ICSA certified Firewall Checkmark certified Enterprise UTM Interoperability with 3 rd party VPN - VPNC certified Benefits Prevents file uploads and data leakage via IM IPS signatures to prevent abnormal activity Works on Layer 8 – The Human layer Allows users to carry their access rights anywhere in the network Dimension 1

Anti-virus & Anti-Spam Dimension 1

Why Cyberoam Anti-Virus and Anti-Spam? Anti-Virus:  99 % Anti-Virus detection rate; Zero-hour protection  Virus Outbreak Detection – Zero-hour protection Anti-Spam:  98 % Spam detection rate – Low False Positive  Scans SMTP, POP3, IMAP with Recurrent Pattern Detection (RPD TM )  Content-agnostic and language independent – Image spam and emerging spam Certification Checkmark certified Anti-virus and Anti-spam Dimension 1

Content Filtering Dimension 1

Why Cyberoam Content Filtering? Database of millions of sites – 82 + categories HTTP upload control Categorizes Google cached pages with dynamic URLs Prevents Proxy surfing eg: tunnel proxy utility, open proxy, web proxy. Certifications Checkmark certified Content Filtering Network Products Guide award Dimension 1 Benefits Prevents entry of malware through unrestricted surfing Policies based on user identity Prevents Data Leakage

Bandwidth Management & Multiple Link Management

 Committed and burstable bandwidth  Restricts bandwidth usage by proper allocation on requirements basis  Prevents Bandwidth Choking  Controls cost – prevents excessive bandwidth usage Why Cyberoam? Bandwidth Management User Identity in Security Assigns bandwidth to critical users and applications – supports business agility Application and Identity-based bandwidth allocation Dimension 1

Advanced Multiple Gateway Features  Auto gateway failover  Weighted round robin load balancing  Policy routing per application, user, source and destination  Gateway status on dashboard  No restriction on number of WAN Ports  Schedule based bandwidth assignment What does it solve?  Provides continuous connectivity  Security over multiple ISP links Dimension 1

Why Cyberoam? Dimension - 2 Identity-based Security

Why Identity? – AAA through Cyberoam UTM Security User  Authentication by Username – including Wi-Fi  Authorization - Access Rights based on pre-defined corporate policies  Username – Not IP Addresses  Need-to-Use basis  Across distributed locations  Accounting – Centralized Logging and Reporting with Username  Shows Who is Doing What even in Dynamic Environments  DHCP - Wi-Fi - Shared Machine Scenarios

Data Leakage Control & Reporting (HTTP Upload)

Why Cyberoam? Dimension - 3 Branch Office Security

Why Cyberoam? Branch Office Security  Comprehensive security  Branch user visibility and controls at HQ  Proven interoperability with 3 rd party VPNs – VPNC certified  WAN optimization at branches  Bandwidth efficiency  Simplified Operations – No need for technical resource  Remote web-GUI management Dimension 3

Secure Remote Access IPSec & SSL VPN on UTM Appliance Anywhere Secure Access to telecommuters, road warriors, partners Threat Free Tunneling Technology – Scans endpoint for malware Clientless VPN Full or limited access based on user work profile High scalability Easy to use and manage Dimension 3