SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam Wi-Fi Appliance Comprehensive Network Security with Wi-Fi Access Point  for Small and Remote Offices
Topics ,[object Object],[object Object],[object Object],[object Object]
SOHO/SMB Dilemma – Wi-Fi vs. Wired networks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wi-Fi Security Risks for SOHO & SMB ,[object Object],[object Object],[object Object],[object Object]
Traditional Wi-Fi  vs  Cyberoam Wi-Fi
[object Object],[object Object],[object Object],Common Pre-Shared key Traditional Wi-Fi without user authentication Internet   Firewall / Router Employee Guest 1  Ex-Employee Guest 2 Guest 3 Wi-Fi Router ACME CORPORATION
Cyberoam Wi-Fi with user authentication Common  Pre-Shared  key Temporary User Access Temporary User Access Expires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User Name MAC ID IP Address Internet   Employee Layer 8 Technology CR15wi Network Guest 1  ACME CORPORATION
Cyberoam’s Layer 8 Advantage – Identity-based Controls Internet Tony Bandwidth control Duration / Quota control Schedule  Control Reporting Apply these controls on Employees as well as Guests CR 15wi
Traditional Wi-Fi without network segmentation Common Pre-Shared key ,[object Object],[object Object],[object Object],[object Object],Internet   Firewall - Router Wi-Fi Router Employee Guest Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Shared Network Drives Switch ACME CORPORATION
Cyberoam Wi-Fi allows Separate Guest and Employee Network Access CR15wi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet   Switch Employee Layer 8 Advantage   Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Guest Shared Network Drives ACME Guest ACME Employees
CR15wi Layer 8 Advantage   Multiple Virtual Access Points – 8 SSIDs for network segmentation ACME Marketing Internet   Switch Accounting/ERP Software  E.g. Tally, Quicken, PeachTree Guest Shared Network Drives Engineering ACME Guest ACME Engineering Marketing
Cyberoam Wi-Fi Advantage
Cyberoam Wi-Fi Advantage Reduced TCO Enhanced Security
Cyberoam Wi-Fi Reduces TCO + + = CR 15wi Wi-Fi Router Other Network Security Devices ,[object Object],[object Object],[object Object],- Antivirus - Antispam - IPS - VPN and many more ,[object Object],[object Object],Firewall - Router
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Coverage Bandwidth Ability to fine-tune coverage with bandwidth
Cyberoam Wi-Fi Security Advantage ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Extend 1 Access Point to 8 Virtual Access Points
CR 15wi Specs
Cyberoam WiFi Appliance – CR 15wi  802.11 n/b/g (WEP, WPA, WPA2, 802.11i ,TKIP, AES, PSK,  802.1x EAP) Antenna Detachable 2x3 MIMO Access Points Up to 8 bssid Transmit Power (EIRP) 11n HT40 : +17dBm 11b CCK: +19dBm 11g OFDM:+17dBm Receiver Sensitivity - 65dBm at 300Mbps - 70dBm at 54Mpbs 10% PER - 86dBm at 11Mpbs 8% PER
CR 15wi GUI Preview
Configuring Wireless Access Point
Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Configuring Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
DHCP Server www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
DHCP Configuration Option
Thank You [email_address] www.cyberoam.com

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayLiberteks
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTMsharetech
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 

Was ist angesagt? (13)

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
CCNSP
CCNSPCCNSP
CCNSP
 
CCNSE
CCNSECCNSE
CCNSE
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Andere mochten auch

Mobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMark S. Steed
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...Tokyo University of Science
 
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Mark S. Steed
 
Secure Business WiFi
Secure Business WiFiSecure Business WiFi
Secure Business WiFiKim Devins
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightRandle Stonier
 

Andere mochten auch (7)

Mobile Device Strategy for Schools
Mobile Device Strategy for SchoolsMobile Device Strategy for Schools
Mobile Device Strategy for Schools
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
 
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
Why we're getting rid of our Interactive Whiteboards and our Mobile Device St...
 
Xamarin Robotics
Xamarin RoboticsXamarin Robotics
Xamarin Robotics
 
Secure Business WiFi
Secure Business WiFiSecure Business WiFi
Secure Business WiFi
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it right
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 

Ähnlich wie Wifi Security for SOHOs: Cyberoam UTM CR15wi

Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technologygainspan
 
HotSpot de Planet WSG-500
HotSpot de Planet WSG-500HotSpot de Planet WSG-500
HotSpot de Planet WSG-500Cartronic Group
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networkshypknight
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 PresentationMonark Goel
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 
Wireless World
Wireless World Wireless World
Wireless World bhattsipl
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive Networks
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point AustraliaCalAnderson
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point SolutionSavvius, Inc
 

Ähnlich wie Wifi Security for SOHOs: Cyberoam UTM CR15wi (20)

Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
 
HotSpot de Planet WSG-500
HotSpot de Planet WSG-500HotSpot de Planet WSG-500
HotSpot de Planet WSG-500
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 Presentation
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Wireless World
Wireless World Wireless World
Wireless World
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
Cradle Point Australia
Cradle Point AustraliaCradle Point Australia
Cradle Point Australia
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Wifi Security for SOHOs: Cyberoam UTM CR15wi

  • 1. Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Cyberoam Wi-Fi Appliance Comprehensive Network Security with Wi-Fi Access Point for Small and Remote Offices
  • 2.
  • 3.
  • 4.
  • 5. Traditional Wi-Fi vs Cyberoam Wi-Fi
  • 6.
  • 7.
  • 8. Cyberoam’s Layer 8 Advantage – Identity-based Controls Internet Tony Bandwidth control Duration / Quota control Schedule Control Reporting Apply these controls on Employees as well as Guests CR 15wi
  • 9.
  • 10.
  • 11. CR15wi Layer 8 Advantage Multiple Virtual Access Points – 8 SSIDs for network segmentation ACME Marketing Internet Switch Accounting/ERP Software E.g. Tally, Quicken, PeachTree Guest Shared Network Drives Engineering ACME Guest ACME Engineering Marketing
  • 13. Cyberoam Wi-Fi Advantage Reduced TCO Enhanced Security
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Cyberoam WiFi Appliance – CR 15wi 802.11 n/b/g (WEP, WPA, WPA2, 802.11i ,TKIP, AES, PSK, 802.1x EAP) Antenna Detachable 2x3 MIMO Access Points Up to 8 bssid Transmit Power (EIRP) 11n HT40 : +17dBm 11b CCK: +19dBm 11g OFDM:+17dBm Receiver Sensitivity - 65dBm at 300Mbps - 70dBm at 54Mpbs 10% PER - 86dBm at 11Mpbs 8% PER
  • 21. CR 15wi GUI Preview
  • 23. Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 24. Configuring Firewall Rule Page Comprehensive Network Security www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 25. DHCP Server www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 27. Thank You [email_address] www.cyberoam.com