Www.cyberoam.com © Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Cyberoam NG series: Future-ready Security Confidential. For internal use only Cyberoam Technologies Pvt. Ltd.
Cyberoam - Unified Threat Management End Point Data Protection Cyberoam © Elitecore Technologies Ltd. All Rights Reserved.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam: Channel’s Most Preferred UTM Player Cyberoam: Channel’s.
MIGRATION FROM SCREENOS TO JUNOS based firewall
CYBEROAM PARTNER PORTAL
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You What’s new in CyberoamOS Ver Build 304 Unified.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Network Techlab (India) Pvt. Ltd.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security CYBEROAM Presented by: Shailesh Mecwan.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Identity-Based Unified Threat Management One Identity – One Security
WELCOME.  SoundConnect  45 Minute Presentation  15 Minute Q & A  Recording will be available within 24-hours AGENDA Greg Plum VP Channel Development.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Our Products Unified Threat Management SSL VPN Data.
Vantage Report 3.0 Product Sales Guide
©2007 D-Link India Ltd. All rights reserved. UTM solution for a medium size Call Center Medium Size call center Both inbound and outbound.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Comprehensive Network Security For internal use Our Products Unified.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Our Products Unified Threat Management SSL VPN Data.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Building a Fully Trusted Authentication Environment
An SAIC Company Rich Fialkoff Executive Director Customer Care and Billing Solutions (732) March 15, 2001 Operations Support.
© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary.
Gain High Availability Performance and Scale of Applications Running on Windows Azure with KEMP Technologies’ Virtual LoadMaster COMPANY PROFILE: KEMP.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Webinar How To Choose The Right Technology To Make Your Website More Social Kim Celestre, Senior Analyst September 19, Call in at 12:55 p.m. Eastern.
Virtual Private Networks
Barracuda NG Firewall ™
Cisco ASA 5500 Series Transition and Migration Guide for Distributors
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
International TOP ups Business presentation
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Forefront Security ISA
Threat Management Gateway
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Your Business Opportunity
Take Control of Insurance Product Management: Build, Test, and Launch Any Product Globally 10x Faster, 10x More Cheaply with INSTANDA on Azure Partner.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Presentation transcript:

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business Development Manager, Cyberoam

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Agenda of Presentation  About Elitecore Technologies Ltd.  Cyberoam Product Line  Cyberoam UTM  Industry Accolades & Product Certifications  Q&A

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You  Established in 1999  400+ Employees  ISO 9001:2000 certified company  Backed by World’s Largest Private Equity Group ($90bn)  Communication - Networks – Security -Cyberoam - Network to Endpoint Security -CRESTEL - Telecommunication OSS BSS -EliteAAA - Telecommunication -24online - Bandwidth Management Solution About Elitecore Technologies

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Global Presence (Over 100 Countries)

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Appliance Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Cyberoam End Point Data Protection

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You  Integrated security over single platform  Identity based approach with Cyberoam’s Layer 8 Technology  Applies on each Security Feature in the UTM  Offers interface for achieving Unified Security  Reduced TCO (Total Cost of Operations)  Best Quality of Security features  Lower expenditure and Ease of Management  Reduced cost of training and support  Future Ready with IPv6  Ability to upgrade to future threats  Security subscriptions as needs grow Cyberoam UTM- Identity-based Security

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You  Layer 8 Technology – Security around the User -Layer 8 penetrates from Layer 1 to Layer 7 of the OSI protocol stack -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity- based security policies  Identifies traffic by username even in case of dynamic IP Introducing Layer 8 – The Human Layer

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You  Unique Identity based Cyberoam Firewall available on UTM (integrated with all other security features)  No need of blanket policies  Admin can define the policies based on combination of Username, IP Address, Mac Address, Session Id  Identity based Authentication, Authorization, Audits over single security device  Admin can create work profile based groups Identity based Security Policy Controls

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Know who is doing what?

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Cyberoam UTM Features

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Cyberoam UTM Product Range SMEEnterprisesSmall Offices 15wi, 15i, 25wi, 25ia, 35wi, 35ia 50ia, 100ia, 200i, 300i500ia, 750ia, 1000i, 1500i

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Industry Recognition & Product Certifications Industry Recognition & Product Certifications

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Product Certifications IPv6 Ready Checkmark Certification ICSA Labs Certified Firewall ICSA Labs certification for Active Active HA Internet Watch Foundation Member of VPN Consortium

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Industry Recognition Cyberoam speedily rises in the ‘Visionaries’ Quadrant of Gartner MQ Gartner

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Cyberoam is the only Network UTM vendor to receive this recognition this year Cyberoam recognized as ‘Innovator’ SC Magazine Industry Recognition

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Cyberoam CR35ia outshines competitors in SOHO UTM Group Test TechWorld Magazine Product Review: TechWorld Sweden "Cyberoam "CR35ia is the best-in- test thanks to a combination of good performance and a straightforward & intuitive GUI management”

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You SC Magazine Five Star Rating – Seven Times in a Row! April 2009 – Product review Cyberoam CR200i  A lot of functionality, including good integration support, in a single easy-to-use appliance”  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i  “Fully loaded, with many great features”  “packs a more serious punch”  “can restrict or open internet access by bandwidth usage, surf time or data transfer”. July 2007 – UTM Roundup Cyberoam CR250i  “console is well organized and intuitive to navigate”  “flexible and very powerful”  “this appliance is a good value for almost any size environment”.

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Awards & Recognition

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Cyberoam Channel Model Cyberoam Channel Model

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Cyberoam Channel Model END CUSTOMER Service Providers Value Added Reseller System Integrators Distributor Cyberoam

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You ActivityPurpose Advertisements and media coverageBrand Building Online PresenceVisibility and Lead Generation Exhibitions / Conferences SeminarsLead Generation / Brand Building Prospective Customer Road ShowsLead Generation Partner Road ShowPartner Training and Alignment Direct Mailer (Print)Lead Generation ersLead Generation Tele-MarketingLead Generation Marketing Activities

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Support on Cyberoam Website

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Q&A If any??

© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Tack! Contact me at: Tack! Contact me at: Unified Threat ManagementCyberoam Central Console (CCC)SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection