Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Unified - Management
Threat Unified Threat Management
Unified Threat Management Solution
for New Age Network Threats
Presented by AUNALLY MALOO – Mart
Networks on Behalf of Nadiyya Ahmed
Coast Data Systems Ltd
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Agenda of Presentation
TEAMS (The East African Marine System), and the Eastern Africa
Submarine Cable System (EASSy) on the other hand are
government-backed ventures.
The fibre roll-out will connect the East African region to the rest of
the world empowering the East Africans to become digital citizens.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Faster connectivity
Instant Communication
e
ag
k
Lea
ta
Da
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
External Threats
Cyberoam UnifiedCyberoam - Management
Threat Unified Threat Management
In a nutshell…
External threats comprise of
Malware
Spam
Intrusions
Spyware
2 Understanding
External Threats
ORGANIZATION SCENARIO
HACKER ORGANIZATION
The Spam goes undetected by the traditional security solution and lands into your inbox
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
BANK MAIL
YOU ARE ELIGIBLE FOR A SPECIAL OFFER
CLICK
TO KNOW MORE
The fraudulent email appears to be from your Bank. Unaware, you click on the link in the
email.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
INTERNATIONAL BANK
PIN BANK361487544
PASSWORD **********
SUBMIT
The link is deceiving and resembles your Bank’s webpage. You are asked to verify your
account details which is actually a ‘phishing’ mail, that has thrown you a bait.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
HACKER ENTERPRISE
After filling your account details and click ‘Enter’ you are shown a “website unavailable”
page. The details entered on this fraudulent webpage are in fact passed to the hacker.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Hacker receives your bank details and empties all the money from your account.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
INTERNATIONAL BANK
PIN BANK361487544
**********
PASSWORD
YOU HAVE 0 BALANCE
IN YOUR ACCOUNT SUBMIT
When you try to log-in the next time on your genuine Bank’s website, you are shocked to
find that you have no money left.
Cyberoam Cyberoam
Unified Threat Unified- Management
Threat Management
Some Facts…
Internal Threats
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Understanding
Internal Threats
Insider Attacks
Source: IDG
ORGANIZATION SCENARIO
You receive an email from your friend. Your friend has sent you a video, which they would
like you to watch.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
To view the video, you are asked to download the supporting format. While you are
downloading, a mal-ware enters your computer.
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
The mal-ware significantly slows down your computer. The mal-ware has made your
computer a zombie and is made to perform malicious activities. You are not aware of it.
Cyberoam Cyberoam
Unified Threat - Management Management
Unified Threat
Some Facts…
IDP Firewall
Multiple link Anti-Virus
Management
Bandwidth
Management Content
Filtering
Anti- VPN
Spam
1. Firewall
2. VPN
3. Intrusion Detection & Prevention
4. Gateway level Anti-virus
5. Gateway level Anti-spam
6. Content Identification & Filtering
7. Bandwidth Management for Applications & Services
8. Load Balancing & Failover Facilities
UTM
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Reduced complexity
All-in-one approach simplifies product selection, integration and support
Easy to deploy
Customers, VARs, VADs, MSSPs can easily install and maintain the products
Remote Management
Remote sites may not have security professionals – requires plug-and-play appliance for
easy installation and management
Managed Services
Security requirements & day to day operations can be outsourced to MSSPs
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Layer 8 Firewall
Identity-Based Technology
User
Cyberoam Cyberoam - Management
Unified Threat Management
Unified Threat
Router
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Large Enterprises
CR 1500i
CR 1000i
CR 500i
CR 300i
CR 200i
CR 100ia
Small Offices
CR 50ia
CR 25i
CR 15i
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Awards
Business Hardware
of the Year 2009
ZDNET Asia- IT Leader of
the Year 2008
Best Integrated Security
Appliance
Best Security Solution for
Education
June 2009, CR 15i Best Unified Security
Tomorrow’s Technology
Today 2007
2008 – Best Content Filtering
CRN – Emerging
SMB Product of the Year Tech Vendors 2007
Sample Clientele
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
Business alliances
Cyberoam Unified
Cyberoam
Threat- Management
Unified ThreatManagement
*9 8% 3500+
IPS
*1 Spa Sig
nat
in mD ures
mil ete
lion False ction
Pos
es itiv
Cyberoam Cyberoam
Unified - Management
Threat Unified Threat Management
Question/Answer Session
For more information please contact
our following offices:
Kenya:
sales@coastdata.co.ke
Dubai:
salesmea@mart-metworks.co.uk
UK:
sales@mart-networks.co.uk
Thank you!