11. Benefits of UTM Appliances Reduced complexity All-in-one approach simplifies product selection, integration and support Easy to deploy Customers, VARs, VADs, MSSPs can easily install and maintain the products Remote Management Remote sites may not have security professionals – requires plug-and-play appliance for easy installation and management Better Man Power Management Reduction in dependency and number of high end skilled Human resources Managed Services Security requirements & day to day operations can be outsourced to MSSPs
25. Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls.
82. Minimizes errors and lowers administration cost Enables the MSSPs to have different personnel for managing different customer deployments
83.
84. Cyberoam for End Point Data Protection 1. Need for Data Protection 2. Data Protection & Encryption 3. Device Management 4. Application Control 5. Asset Management
85. Need for Data Protection 60% corporate data lies unprotected on endpoints Lost USBs Medical records of 741 patients lost by a hospital 9000 USB sticks found in people's pockets at the local dry cleaners in UK Lost Multimedia Discs Personal information of 11.1mn customers of leading oil refinery (USA) found on streets Wrong Email Attachment Bank employee accidentally sent sensitive customer details to wrong email address Lost iPods 12,500 handheld devices forgotten at the back of taxis every 6 months in UK
86. What Places Data At Risk? Removable Devices USBs, CDs/DVDs, MP3, Digital cameras Unintentional Malicious Insiders Applications Unauthorized transfer of sensitive data; Malware-laden email for information access; Sensitive data sent to wrong person Web, Mail, IM, P2P, Printing, FTP Data At Risk • Business plans, RFP / Tender quotes • Intellectual property related to R&D • Product launch dates and roadmap • Customer data