hicomp
Uploaded by
22 SLIDES
224 VUES
220LIKES

CR Intro2-Nebojsa

DESCRIPTION

CRM

1 / 22

Télécharger la présentation

CR Intro2-Nebojsa

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pioneering Identity Based Technology

  2. - Data theft - DoS attacks - Hacking Organization User – The Weakest Security Link - Identity theft - Data loss - Data deletion - Data modification Internal threats External threats - Worms - Malicious code - Virus - Malware User - Spam - Phishing - Pharming Social Engineering threats

  3. The new OSI+HCI model The complete 10-layer OSI+HCI model. **HCI - Human-Computer Interaction

  4. Layer 8 – The Human Layer • Layer 8 Security – Security linked to the User • Treats User-Identity as the 8th Layer in Network stack • Network security decisions based on Usernames and IP Addresses • Control Who is doing What in the network • Identifies traffic by username even in case of dynamic IP • Enforcement of policies, rules and regulations

  5. Cyberoam UTM Layer 8 Firewall

  6. User Identity Based Technology

  7. Award winning Identity Based Security "Best Security Appliance Range" at Network Middle East Innovation Awards Finalist in SC Magazine Awards 2009, Europe "Best UTM (SMB Segment) " at National Computrade Publication Awards Finalist in PC Pro Awards 2009 Gold Award from the International Data Group’s (IDG) Channel World Magazine

  8. Identity based Technology - The Reason • Application Based Control. Username / IP Address

  9. Content Filtering Load Balancing Data Transfer Control Logging

  10. Identity Based – Logging & Reporting

  11. Dashboard

  12. Identity Based

  13. Top Web Users

  14. Top Mail Senders

  15. Top Denied Categories

  16. Search Keywords based on Users

  17. IPS Logs

  18. Web Logs

  19. Anti-Spam

  20. Anti-Virus

  21. IM logs

  22. Thank You hiComputers -Serbia- www.hicomputers.rs www.hicomputers.eu Thank You Live Demo – http://demo.cyberoam.com Website – http://www.cyberoam.com Mail to- nebojsa.subotic@hicomputers.eu

More Related