Presented by-
Anshika Mishra
Compton Computers Pvt. Ltd.
•
3/26/2014 compton computers pvt. ltd. 2
•Benetton Group is a global fashion brand.
• Benetton family who founded the com...
3/26/2014 compton computers pvt. ltd. 3
• Compton Computers Pvt. Ltd. is one of the leading IT
Solution Provider & System ...
3/26/2014 compton computers pvt. ltd. 4
• Compton has done many turn-key projects, where it
has integrated end-to-end solu...
• CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integr...
•Understand security services required by UCB.
•Be aware of vulnerabilities and threats.
•Realize why network security is ...
Internet Security?
Buffer Overflows
Viruses
3/26/2014 compton computers pvt. ltd. 7
Network security architect has following problems:
1. Data loss/theft
2. Content filtering
3. Malware
4. Intrusion detecti...
It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, trans...
A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Sig...
A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. l...
3/26/2014 compton computers pvt. ltd. 12
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to i...
 Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Aud...
CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security ...
Why is our solution best
It is a UTM (Unified Threat Management)
It can act as a gateway level anti-virus
Intrusion det...
3/26/2014 compton computers pvt. ltd. 17
S.
No.
FEATURES CR 300ING-XP CR 500ING-XP
1. Max. no. of available ports 14 24
2....
Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
3/26/2014 compton computers pvt. ltd. 18
• The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds...
3/26/2014 compton computers pvt. ltd. 20
Upcoming SlideShare
Loading in …5
×

Network security

392 views
290 views

Published on

N

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
392
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Network security

  1. 1. Presented by- Anshika Mishra Compton Computers Pvt. Ltd.
  2. 2. • 3/26/2014 compton computers pvt. ltd. 2 •Benetton Group is a global fashion brand. • Benetton family who founded the company in 1965. • Benetton has a network of over 6,500 stores in 120 countries. • Benetton Group is one of the best-known fashion companies in the world. • 1st store in Belluno and 3yrs after in Paris.
  3. 3. 3/26/2014 compton computers pvt. ltd. 3 • Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System integrator in India. • Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief. • An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.
  4. 4. 3/26/2014 compton computers pvt. ltd. 4 • Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work. • At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
  5. 5. • CRN xcellence Award- Best Private Cloud Deployment in SME’s 2013 • CRN Xcellence award- Among India’s Best System Integrators for the year 2012 • Emerson presents Critical Difference Partner Award. • CRN Xcellence award- Top solution provider- server and storage –north 2011 • CRN Xcellence award top solution provider-server and storage –north 2010 • CRN Xcellence award-top integrated solution provider- north zone 2009 3/26/2014 compton computers pvt. ltd. 5
  6. 6. •Understand security services required by UCB. •Be aware of vulnerabilities and threats. •Realize why network security is necessary. •What are the elements of a comprehensive security program. 3/26/2014 compton computers pvt. ltd. 6
  7. 7. Internet Security? Buffer Overflows Viruses 3/26/2014 compton computers pvt. ltd. 7
  8. 8. Network security architect has following problems: 1. Data loss/theft 2. Content filtering 3. Malware 4. Intrusion detection 3/26/2014 compton computers pvt. ltd. 8
  9. 9. It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing Prevention- • power failure- multi power circuits with battery back up and a generator. • software and hardware failure- journaling file system and RAID storage. 3/26/2014 compton computers pvt. ltd. 9
  10. 10. A device or software application that monitors network or system activities or policy violation. Detection Methods: 1. Signature based detection 2. Statistical anomaly based detection 3. Stateful protocol analysis detection 3/26/2014 compton computers pvt. ltd. 10
  11. 11. A system or group of system that enforces an access control policy between two networks 3/26/2014 compton computers pvt. ltd. 11
  12. 12. 3/26/2014 compton computers pvt. ltd. 12
  13. 13. 1. Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches especially for microsoft office , microsoft internet explorer. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a LAN 3/26/2014 compton computers pvt. ltd. 13
  14. 14.  Have strong password Use good anti viral product Use good cryptography Have good firewall Have a back up system Audit and monitor system and network Have training and awareness program Test your security frequently 3/26/2014 compton computers pvt. ltd. 14
  15. 15. CYBEROAM- • Provides user identity based network security • It offers: - network security solution - Centralized security management - Centralized visibility • Global network security appliances provider, with a global presence spanning more than 125 countries. • We offer: -cyberoam CR300ING-XP -cyberoam CR500ING-XP 3/26/2014 compton computers pvt. ltd. 15
  16. 16. Why is our solution best It is a UTM (Unified Threat Management) It can act as a gateway level anti-virus Intrusion detection and prevention can be done very effectively by using Cyberoam Content filtering Anti SPAM VPN and other benifits 3/26/2014 compton computers pvt. ltd. 16
  17. 17. 3/26/2014 compton computers pvt. ltd. 17 S. No. FEATURES CR 300ING-XP CR 500ING-XP 1. Max. no. of available ports 14 24 2. Copper GbE ports 6 8 3. Firewall Throughput(UDP) 12,000 18,000 4. Firewall Throughput(TCP) 9,500 16,000 5. New sessions/seconds 85,000 1,00,000 6. Antivirus throughput 2,600 3,500 7. IPS throughput 2,400 4,500 8. WAF protected throughput 900 850 9. No. of IP sec. tunnel 400 1,000
  18. 18. Assured Satisfaction Low cost of operation Best Outcome Accuracy Expediency 3/26/2014 compton computers pvt. ltd. 18
  19. 19. • The Internet works only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest security advisories to know how to patch any security holes 3/26/2014 compton computers pvt. ltd. 19
  20. 20. 3/26/2014 compton computers pvt. ltd. 20

×