• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cyberoam layer8
 

Cyberoam layer8

on

  • 1,833 views

Pioneering Cyberoam's Layer 8 Identity Based UTM

Pioneering Cyberoam's Layer 8 Identity Based UTM

Statistics

Views

Total Views
1,833
Views on SlideShare
1,827
Embed Views
6

Actions

Likes
0
Downloads
100
Comments
0

2 Embeds 6

http://www.slideshare.net 4
http://www.apsense.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cyberoam layer8 Cyberoam layer8 Presentation Transcript

    • Pioneering Identity Based Technology
    • Human Approach
      • Numbers – Hard & Boring to remember!
      192.168.1.2 172.16.13.123 10.12.111.213
      • N a m e s - Used daily!!!
      Tony Megan
    • - Identity theft - Data loss - Data deletion - Data modification Internal threats - Worms - Malicious code - Virus - Malware External threats - Spam - Phishing - Pharming Social Engineering threats User User – The Weakest Security Link Organization - Data theft - DoS attacks - Hacking
      • Layer 8 Technology – Security around the User
        • Treats User-Identity as the 8th Layer in Network stack
        • Network security decisions based on Usernames and IP Addresses
          • Control Who is doing What in the network
          • Identifies traffic by username even in case of dynamic IP
      Layer 8 – The Human Layer
    • Layer 8 Firewall
    • Identity Based Technology User
    • Identity Based Security
    • Identity based Technology - The Reason
        • Application Based Control.
    • The Reason - I llustrated Tony Access through HTTP HTTPS SMTP POP3 IMAP During For Along with With only 2010
    •  
    • Identity Based – Logging & Reporting
    • Dashboard
    • Identity Based
    • Top Web Users
    • Top Mail Senders
    • Top Denied Categories
    • Search Keywords based on Users
    • IPS Logs
    • Web Logs
    • Anti-Spam
    • Anti-Virus
    • IM logs
    • Thank You Live Demo – http://demo.cyberoam.com Website – http://www.cyberoam.com Thank You