Your SlideShare is downloading. ×
FIT 10 - Hargun - Cyberoam
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

FIT 10 - Hargun - Cyberoam

778
views

Published on

Published in: Business, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
778
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
32
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HARI GUNAWAN
    FIT 04 Juni 2010
    PT. Jerbee Indonesia
  • 2. ANCAMAN KEAMANAN JARINGAN
    EKSTERNAL
    INTERNAL
    • MALICIOUS INTENT
    • 8. INFORMATION LEAKAGE
    • 9. IDENTITY THEFT
  • Unified Threat Management (UTM)
    Evolution of the traditional firewall into an all-inclusive security product that has the ability to perform multiple security functions in one single appliance: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing and on-appliance reporting.
  • 10. Unified Threat Management (UTM)
    Firewall
    VPN
    Intrusion Detection & Prevention
    Gateway Level Anti-virus for Mails, Website, File Transfers
    Gateway level Anti-spam
    Content Identification & Filtering
    Bandwidth Management for Applications & Services
    Load Balancing & Failover Facilities
  • 11. Benefits of UTM Appliances
    Reduced complexity
    All-in-one approach simplifies product selection, integration and support
    Easy to deploy
    Customers, VARs, VADs, MSSPs can easily install and maintain the products
    Remote Management
    Remote sites may not have security professionals – requires plug-and-play appliance for easy installation and management
    Better Man Power Management
    Reduction in dependency and number of high end skilled Human resources
    Managed Services
    Security requirements & day to day operations can be outsourced to MSSPs
  • 12. Challenges with Current UTM Products
    Lack of user Identity recognition and control
    • Inadequate in handling threats that target the user – Phishing, Pharming
    Unable to Identify source of Internal Threats
    • Employee with malicious intent posed a serious internal threat
    • 13. Indiscriminate surfing exposes network to external threats
    • 14. 50 % of security problems originate from internal threats – Yankee Group
    • 15. Source of potentially dangerous internal threats remain anonymous
    Unable to Handle Dynamic Environments
    Unable to Handle Blended Threats
    • Threats arising out of internet activity done by internal members of organization
    • 17. External threats that use multiple methods to attack - Slammer
    Lack of In-depth Features
    • Sacrificed flexibility as UTM tried to fit in many features in single appliance.
    • 18. Inadequate Logging, reporting, lack of granular features in individual solutions
    Need for Identity based UTM…
  • 19. Identity is missing on firewall, antivirus & Anti-spam
  • 20. Products
    • Cyberoam UTM
    • 21. CyberoamiView (Open source Logging & Reporting)
    • 22. Cyberoam Central Console (Centralized Management)
    • 23. CyberoamEndPoint Data Protection
  • Cyberoam Unified Threat Management (UTM)
    Layer 8 Firewall (Patent-pending Technology)
  • 24. User
    Patent Pending: Identity-Based Technology
  • 25. Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls.
  • 26. Web and Application Filtering Features
    • Database of millions of sites in 82+ categories
    • 27. Blocks phishing, pharming, spyware URLs
    • 28. HTTP upload control & reporting
    • 29. Block & Control Applications such as P2P, Streaming, Videos/Flash
    • 30. Local Content Filter Database to reduces latency and dependence on network connectivity.
    • 31. Customized blocked message to educate users about organizational policies and reduce support calls
  • Identity-based Bandwidth Management
    • Application and Identity-based bandwidth allocation
    • 32. Committed and burstable bandwidth
    • 33. Time-based, schedule-based bandwidth allocation
    • 34. Restrict Bandwidth usage to a combination of source, destination and service/service group
  • Authentication and External Integration
  • 35. Advanced Multiple Gateway Features
    • Active-Active Auto Link Failover & Load Balancing
    • 36. Active-Passive Auto Link Failover
    • 37. Source & Destination Routing
    • 38. Support for more than 2+ ISP links
    • 39. Schedule based bandwidth assignment
    • 40. Gateway Alerts on Dashboard
    • 41. Bandwidth Utilization Graphs
  • Educate Users with Custom Denied Messages and Reduce Your Support Calls
    James
  • 42. Gateway Anti- Virus Features
    • Scans WEB, FTP, Pop3, SMTP & IMAP traffic
    • 43. Self-service quarantine area
    • 44. Signature update ever 30 Mins
    • 45. Identity-based HTTP virus reports
    • 46. Disclaimer Addition to outbound emails
    • 47. Spyware and other malware protection including “Phishing” emails
    • 48. Block attachment based on Extensions (exe, .bat, .wav etc)
  • Gateway Anti-Spam Features
    • Spam filtering with (RPD) Recurrent Pattern Detection technology
    • 49. Virus Outbreak Detection (VOD) for zero hour protection
    • 50. Self-Service quarantine area
    • 51. Content-agnostic
    • 52. Change recipients of emails
    • 53. Scans SMTP, POP3, IMAP traffic
  • RPD (Recurrent Pattern Detection)
    • Protects against Image-based Spam and spam in different languages
    • 54. The spam catch rate of over 98%
    • 55. 1 in Million false positives in spam
    • 56. Local cache is effective for >70% of all spam resolution cases
  • Intrusion Prevention System (IPS)
    IPS Features
    • Multiple and Custom IPS policies Identity-based policies
    • 57. Identity-based intrusion reporting
    • 58. Ability to define multiple policies
    • 59. Reveals User Identity in Internal Threats scenario
  • Cyberoam in Numbers
    More than virus signatures in the anti-virus database
    500,000
    82+
    URLs categorized in categories
    More than 50 Million
    More than 5500+
    * 98%
    IPS Signatures
    Spam Detection
    False Positives
    * 1 in million
  • 60. Other Network / System Features
    • High Availability (Active-Active / Active-Passive)
    • 61. Stateful Failover
    • 62. VPN Failover
    • 63. Dynamic Routing (RIP, OSPF, BGP)
    • 64. NTP Support
    • 65. Multiple Configurable Syslog Server Support
    • 66. GUI based Real Time Firewall Log
    • 67. Roll Back (Roll back to last upgraded version)
    … And Much More
  • 68. CONTOH APLIKASI CYBEROAM
  • 69. iView
    (Cyberoam Aggregated Reporting & Logging Software)
    • Subscription free On-Appliance Reporting
    • 70. Real-time Monitoring and Alerting
    • 71. Over 1100+ Drilldown Reports
    • 72. Reports in HTML, MHTML, PDF, & CSV formats & Email Alerts
    • 73. Web 2.0 GUI and Reporting interface.
  • 74.
  • 75.
  • 76. Instant Messaging Logging & Control
    • Yahoo & Windows Live Messaging
    • 77. Control Who Communicates with Whom
    • 78. Control Webcam usage
    • 79. Control Voice Usage
    • 80. Individual as well as Group Control
  • Control communication medium
    (chat, video, voice)
    Archive Communication
    Data Protection
    Control who can chat with whom
    Productivity
  • 81. Cyberoam Central Console – CCC Series
    • Reduces operational complexity and deployment time
    • 82. Minimizes errors and lowers administration cost Enables the MSSPs to have different personnel for managing different customer deployments
    • 83. Ease of use with view of multiple devices and network status at a glance
  • 84. Cyberoam for End Point Data Protection
    1. Need for Data Protection
    2. Data Protection & Encryption
    3. Device Management
    4. Application Control
    5. Asset Management
  • 85. Need for Data Protection
    60% corporate data lies unprotected on endpoints
    Lost USBs
    Medical records of 741 patients lost by a hospital
    9000 USB sticks found in people's pockets at the local dry cleaners in UK
    Lost Multimedia Discs
    Personal information of 11.1mn customers of leading oil refinery (USA) found on streets
    Wrong Email Attachment
    Bank employee accidentally sent sensitive
    customer details to wrong email address
    Lost iPods
    12,500 handheld devices forgotten at the back of taxis every 6 months in UK
  • 86. What Places Data At Risk?
    Removable Devices
    USBs, CDs/DVDs, MP3, Digital cameras
    Unintentional
    Malicious
    Insiders
    Applications
    Unauthorized transfer of sensitive data;
    Malware-laden email for information access;
    Sensitive data sent to wrong person
    Web, Mail, IM, P2P, Printing, FTP
    Data At Risk
    • Business plans, RFP / Tender quotes
    • Intellectual property related to R&D
    • Product launch dates and roadmap
    • Customer data
  • 87. CyberoamEnd Point Data Protection
    Protect your Data. Protect your Assets.
  • 88. Cyberoam End Point Data Protection
    • Comprehensive End Point Data Protection Suite
    • 89. Modules
    • 90. Data Protection & Encryption
    • 91. Device Management
    • 92. Application Control
    • 93. Asset Management
  • Data Protection & Encryption
    Prevent Data Leakage – Email Attachments
    • Control data shared as attachment in emails
    • 94. Send customized warning message to user and alert to administrator
  • Record Data Shared over Webmails
    • Record content of Webmail such as Yahoo, Gmail & Msn
  • Prevent Data Leakage - Attachments over Instant Messengers
    Attachment:
    .doc NOT ALLOWED
    .jpg
    .exe
    File name: confident NOT ALLOWED
    Size: > 2 MB
    • Control data shared as attachment over Instant Messengers
    • 95. Send customized warning message to user and alert to administrator
  • Operation
    Mode of Transfer
    File Name/Extn.
    Back up
    Document
    Fixed
    Before modifying
    Floppy
    Read
    Before copying/cut to
    CD rom
    .jpg
    Modify
    .doc
    Removable
    Before copying/cut from
    Delete
    Network
    Before deleting
    Unknown
    Prevent Accidental / Malicious Deletion of Data
    Selective Action & Back-up of Document
    • Control operations over a document and its mode of transfer
    • 96. Back up files before specific actions
  • Printer
    Printer Type
    Selected files/Extn.
    Printer
    Printer Type
    Selected files/Extn.
    Attachment:.doc
    Attachment:.doc
    Local
    Local
    Attachment:.xls
    Attachment:.xls
    Shared
    Shared
    Network
    Network
    Virtual
    Virtual
    Database
    Server
    Database
    Server
    Prevent Data Leakage through Printed Files
    Copy of Printed File Saved in Database Server
    • Control access to printers in the system
    • 97. Save shadow copy of printed file
  • Encrypt entire device
    Encrypt selected files
    Attachment:.doc
    Attachment:.xls
    Decrypt before reading
    Attachment:.jpg
    Data Sharing Through Removable Devices
    Encrypts Data, Blocks Data Sharing
    • Encrypt all/selected files while writing to removable device
    • 98. Decrypt files while reading from a removable device only in organization network
    • 99. - Data in your lost USB device cannot be decrypted and is safe
  • Chat session logs
    Record Chat Sessions even for SKYPE
    Back up server
  • 100. Device
    Management
    Device Management
    Protect your Data by controlling data over device
    USB Device
    USB keyboard, mouse, modem, storage, hard disk, others
    StorageDevice
    Floppy, CD, Burning device, Tape, Removable device
    Dial
    Dial-up connection
    Network Devices
    Others
    Wireless LAN adapter, PnP adapter, Virtual LAN adapter
    Audio equipment, Virtual CDROM, any new device
    Communication Interface Device
    Serial ports, parallel ports, modems, Bluetooth
    • Allow only authorized devices
  • Entertainment
    (MP3, MP4, MPEG)
    Pirated software
    Screensavers
    Password crackers
    IM tools
    Application Control
    Protect your Data by Controlling Applications
    • Prevent data loss through unauthorized/indiscriminate use of applications
    • 101. Granular, policy-based application controls
    - Protect sensitive data & enhance employee productivity
    - Prevent legal liability, network outages
  • 102. QUESTION ?
  • 103. TERIMA KASIH