SlideShare a Scribd company logo
1 of 13
PPT CONTENT
• Antivirus
• Kespersky antivirus
• Firewall
• Cyberoam Firewall
• Encryption
• Sophos Encryption
• Enterprise /Wifi Routers
• Aruba wifi routers
• IAS
• Difference bw Routers & Access point
• Google / Gmail admin console .
ANTIVIRUS
• Antivirus software is a program that actively searches for,
protects against, detects and removes viruses and malware,
such as trojans, adware and worms.
• An antivirus software checks every file that you download.
Whether it's a Word document, a ZIP file, a spreadsheet or
EXE file
• Antivirus software runs in the background, though, policing
everything
• If your antivirus software finds anything suspicious, it flags it
and lets you know. Then you can have the software
quarantine the virus or delete it.
KESPERSKY ANTIVIRUS
• Kaspersky Anti-Virus features include real-time protection,
detection and removal of viruses, trojans, worms, spyware,
adware, keyloggers, malicious tools and auto-dialers, as well
as detection and removal of rootkits. It also includes
instantaneous automatic updates via the "Kaspersky Security
Network" service.
• According to Kaspersky, "Kaspersky Security Network service
allows users of Kaspersky Lab security products from around
the world to help facilitate malware identification and reduce
the time it takes to provide protection against new (“in the
wild”) security risks targeting your computer.
FIREWALL
• In computing, a firewall is a network security system that
monitors and controls the incoming and outgoing
network traffic based on predetermined security rules.A
firewall typically establishes a barrier between a trusted,
secure internal network and untrusted outside network,
such as the Internet.
• Firewall appliances may also offer other functionality to
the internal network they protect, such as acting as a
DHCPor VPN server for that network.
CYBEROAM FIREWALL
• Cyberoam Technologies, a Sophos Company, is a global Network
Security appliances provider, with presence in more than 125
countries. The company offers User Identity-based network security
in its Firewalls/ Unified Threat Management appliances, allowing
visibility and granular control into users' activities in business
networks. For SOHO, SMB and large enterprise networks, this
ensures security built around the network user for protection against
APTs, insider threats, malware, hacker, and other sophisticated
network attacks.
• Cyberoam’s product range offers network security solution (Firewall
and UTM appliances), centralized security management (Cyberoam
Central Console appliances), centralized visibility (Cyberoam iView
), and Cyberoam NetGenie for home and small office networks.
ENCRYPTION
• In cryptography, encryption is the process of encoding a
message or information in such a way that only
authorized parties can access it. Encryption does not
itself prevent interference, but denies the intelligible
content to a would-be interceptor. In an encryption
scheme, the intended information or message, referred
to as plaintext, is encrypted using an encryption
algorithm – a cipher – generating ciphertext that can only
be read if decrypted. For technical reasons,
SOPHOS ENCRYPTION
• Sophos Group is a British security software and
hardware company. Sophos develops products for
communication endpoint, encryption, network security,
email security, mobile security and unified threat
management. Sophos is primarily focused on providing
security software to the mid market and pragmatic
enterprise from 100 to 5000 Seat organisations. Whilst
not a primary focus, Sophos also protects home users,
through a free anti virus software (Sophos Home)
intended to demonstrate product functionality.
WIFI ROUTERS
• A wireless router is the router found in a wireless local
area network (WLAN) for home and small office
networks. It enables Internet and local network access.
Typically, the wireless router is directly connected to a
wired or wireless WAN. Users connected to the wireless
router are able to access the LAN as well as the external
WAN, such as the Internet.
ARUBA ROUTERS
• Aruba, a Hewlett Packard Enterprise Company, is a
vendor of data networking solutions for enterprises and
businesses worldwide. Aruba Networks was founded in
2002 and is focused on bringing Wi-Fi wireless LAN
mobility solutions to enterprise networks.
IAS (INTERNET AUTHENTICATION SERVICE)
• Internet Authentication Service (IAS) is the Microsoft
implementation of a Remote Authentication Dial-in User
Service (RADIUS) server and proxy. IAS performs
centralized connection authentication, authorization,
accounting, and auditing (AAAA) for many types of
network access including wireless, authenticating switch,
and remote access dial-up and virtual private network
(VPN) connections
DIFFERENCE B/W ROUTERS & ACCESS POINT
• A Router is a device that routes packets across networks.
Thats all it does. If data from one computer is trying to get to
another computer that is not on the same logical network it
must be 'routed' to that network. Your home network is
different then your ISP's network thus a router is always the
last device that sits between you and your ISP.
• An Access Point is a device that allows other devices to
connect wirelessly. Its nothing more then an antenna. Access
points can be purchased on their own and plugged into a
wired switch or router to grant users wireless connectivity to
that device.
GOOGLE/GMAIL ADMIN CONSOLE
• The Google Admin Console is a management tool
provided by Google for G Suite administrators. It allows
administrators to maintain all their G Suite services from
one dashboard. With the Google Admin Console,
administrators can configure settings for G Suite, monitor
the usage of their domains, create user accounts, and
more.
• Some of the most common controls you will probably
use are Users, Groups, Admin Roles, Apps and Reports.
Other controls that are also included are Company
Profile, Domains, Billing, Security, Support, Migration,
Device Management, and App Engine Apps
THANK YOU
• MADE BY: SACHIN SHARMA

More Related Content

What's hot

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
tsmithnasd
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
Al Ewers
 

What's hot (20)

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
home networking
home networkinghome networking
home networking
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access Management
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
LAN Security
LAN Security LAN Security
LAN Security
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Webinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesWebinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux Devices
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
 
Go Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB AdapterGo Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB Adapter
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console

New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014
Jeffrey Strobach
 

Similar to Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console (20)

Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Find the key features of an advanced firewall
Find the key features of an advanced firewallFind the key features of an advanced firewall
Find the key features of an advanced firewall
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Wlan solu aag_brochure
Wlan solu aag_brochureWlan solu aag_brochure
Wlan solu aag_brochure
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014
 
Firewalls
FirewallsFirewalls
Firewalls
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Network examples and network software
Network examples and network softwareNetwork examples and network software
Network examples and network software
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Wlan - Infraestrutura
Wlan - InfraestruturaWlan - Infraestrutura
Wlan - Infraestrutura
 
Tech Link Company's Profile
Tech Link Company's Profile Tech Link Company's Profile
Tech Link Company's Profile
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console

  • 1. PPT CONTENT • Antivirus • Kespersky antivirus • Firewall • Cyberoam Firewall • Encryption • Sophos Encryption • Enterprise /Wifi Routers • Aruba wifi routers • IAS • Difference bw Routers & Access point • Google / Gmail admin console .
  • 2. ANTIVIRUS • Antivirus software is a program that actively searches for, protects against, detects and removes viruses and malware, such as trojans, adware and worms. • An antivirus software checks every file that you download. Whether it's a Word document, a ZIP file, a spreadsheet or EXE file • Antivirus software runs in the background, though, policing everything • If your antivirus software finds anything suspicious, it flags it and lets you know. Then you can have the software quarantine the virus or delete it.
  • 3. KESPERSKY ANTIVIRUS • Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers, malicious tools and auto-dialers, as well as detection and removal of rootkits. It also includes instantaneous automatic updates via the "Kaspersky Security Network" service. • According to Kaspersky, "Kaspersky Security Network service allows users of Kaspersky Lab security products from around the world to help facilitate malware identification and reduce the time it takes to provide protection against new (“in the wild”) security risks targeting your computer.
  • 4. FIREWALL • In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.A firewall typically establishes a barrier between a trusted, secure internal network and untrusted outside network, such as the Internet. • Firewall appliances may also offer other functionality to the internal network they protect, such as acting as a DHCPor VPN server for that network.
  • 5. CYBEROAM FIREWALL • Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, with presence in more than 125 countries. The company offers User Identity-based network security in its Firewalls/ Unified Threat Management appliances, allowing visibility and granular control into users' activities in business networks. For SOHO, SMB and large enterprise networks, this ensures security built around the network user for protection against APTs, insider threats, malware, hacker, and other sophisticated network attacks. • Cyberoam’s product range offers network security solution (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam NetGenie for home and small office networks.
  • 6. ENCRYPTION • In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can only be read if decrypted. For technical reasons,
  • 7. SOPHOS ENCRYPTION • Sophos Group is a British security software and hardware company. Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management. Sophos is primarily focused on providing security software to the mid market and pragmatic enterprise from 100 to 5000 Seat organisations. Whilst not a primary focus, Sophos also protects home users, through a free anti virus software (Sophos Home) intended to demonstrate product functionality.
  • 8. WIFI ROUTERS • A wireless router is the router found in a wireless local area network (WLAN) for home and small office networks. It enables Internet and local network access. Typically, the wireless router is directly connected to a wired or wireless WAN. Users connected to the wireless router are able to access the LAN as well as the external WAN, such as the Internet.
  • 9. ARUBA ROUTERS • Aruba, a Hewlett Packard Enterprise Company, is a vendor of data networking solutions for enterprises and businesses worldwide. Aruba Networks was founded in 2002 and is focused on bringing Wi-Fi wireless LAN mobility solutions to enterprise networks.
  • 10. IAS (INTERNET AUTHENTICATION SERVICE) • Internet Authentication Service (IAS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. IAS performs centralized connection authentication, authorization, accounting, and auditing (AAAA) for many types of network access including wireless, authenticating switch, and remote access dial-up and virtual private network (VPN) connections
  • 11. DIFFERENCE B/W ROUTERS & ACCESS POINT • A Router is a device that routes packets across networks. Thats all it does. If data from one computer is trying to get to another computer that is not on the same logical network it must be 'routed' to that network. Your home network is different then your ISP's network thus a router is always the last device that sits between you and your ISP. • An Access Point is a device that allows other devices to connect wirelessly. Its nothing more then an antenna. Access points can be purchased on their own and plugged into a wired switch or router to grant users wireless connectivity to that device.
  • 12. GOOGLE/GMAIL ADMIN CONSOLE • The Google Admin Console is a management tool provided by Google for G Suite administrators. It allows administrators to maintain all their G Suite services from one dashboard. With the Google Admin Console, administrators can configure settings for G Suite, monitor the usage of their domains, create user accounts, and more. • Some of the most common controls you will probably use are Users, Groups, Admin Roles, Apps and Reports. Other controls that are also included are Company Profile, Domains, Billing, Security, Support, Migration, Device Management, and App Engine Apps
  • 13. THANK YOU • MADE BY: SACHIN SHARMA