Pioneering Identity Based Technology
Human Approach <ul><li>Numbers – Hard & Boring  to remember! </li></ul>192.168.1.2 172.16.13.123 10.12.111.213 <ul><li>N a...
- Identity theft - Data loss - Data deletion - Data modification Internal threats - Worms - Malicious code - Virus - Malwa...
<ul><li>Layer 8 Technology – Security around the User </li></ul><ul><ul><li>Treats User-Identity as the 8th Layer in Netwo...
Layer 8 Firewall
Identity Based Technology User
Identity Based Security
Identity based Technology -  The Reason <ul><ul><li>Application Based Control.  </li></ul></ul>
The Reason  - I llustrated Tony Access through HTTP HTTPS SMTP POP3 IMAP During For Along with With only 2010
 
Identity Based – Logging & Reporting
Dashboard
Identity Based
Top Web Users
Top Mail Senders
Top Denied Categories
Search Keywords based on Users
IPS Logs
Web Logs
Anti-Spam
Anti-Virus
IM logs
Thank You Live Demo –  http://demo.cyberoam.com Website –  http://www.cyberoam.com Thank You
Upcoming SlideShare
Loading in …5
×

Cyberoam layer8

2,362 views

Published on

Pioneering Cyberoam's Layer 8 Identity Based UTM

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,362
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
185
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyberoam layer8

  1. 1. Pioneering Identity Based Technology
  2. 2. Human Approach <ul><li>Numbers – Hard & Boring to remember! </li></ul>192.168.1.2 172.16.13.123 10.12.111.213 <ul><li>N a m e s - Used daily!!! </li></ul>Tony Megan
  3. 3. - Identity theft - Data loss - Data deletion - Data modification Internal threats - Worms - Malicious code - Virus - Malware External threats - Spam - Phishing - Pharming Social Engineering threats User User – The Weakest Security Link Organization - Data theft - DoS attacks - Hacking
  4. 4. <ul><li>Layer 8 Technology – Security around the User </li></ul><ul><ul><li>Treats User-Identity as the 8th Layer in Network stack </li></ul></ul><ul><ul><li>Network security decisions based on Usernames and IP Addresses </li></ul></ul><ul><ul><ul><li>Control Who is doing What in the network </li></ul></ul></ul><ul><ul><ul><li>Identifies traffic by username even in case of dynamic IP </li></ul></ul></ul>Layer 8 – The Human Layer
  5. 5. Layer 8 Firewall
  6. 6. Identity Based Technology User
  7. 7. Identity Based Security
  8. 8. Identity based Technology - The Reason <ul><ul><li>Application Based Control. </li></ul></ul>
  9. 9. The Reason - I llustrated Tony Access through HTTP HTTPS SMTP POP3 IMAP During For Along with With only 2010
  10. 11. Identity Based – Logging & Reporting
  11. 12. Dashboard
  12. 13. Identity Based
  13. 14. Top Web Users
  14. 15. Top Mail Senders
  15. 16. Top Denied Categories
  16. 17. Search Keywords based on Users
  17. 18. IPS Logs
  18. 19. Web Logs
  19. 20. Anti-Spam
  20. 21. Anti-Virus
  21. 22. IM logs
  22. 23. Thank You Live Demo – http://demo.cyberoam.com Website – http://www.cyberoam.com Thank You

×