Information and Communication Technologies
Country
Prices in
VAT
For Captains, Shipmanagers and Shipowners

Satellite Data Communication Security and Management

Data communication and internet access have become crucial in the managing and operating of a ship whereby vital information can almost instantly be sent to shore or technicians can perform remote maintenance tasks while the ship is sailing, saving valuable time and money.

As the internet has become a common communication medium your crew also wants to be able to stay in touch with their family and friends. Maybe take an on-line course or check up on the latest news. And because a good crew is worth every penny you want to keep them on board and happy.

Maritime Internet connection costs are, in comparison to their terrestrial counterparts, very expensive and have their technical difficulties to keep your ship connected at all times. They are however equally threatened by viruses, spam, intrusion attacks, spyware, malware, bandwidth abuse as the land based connections. The impact of each of these threats is however much bigger with much further reaching consequences.

Satmarin, together with Elitecore, have developed a unique solution that will give you the possibility to manage all these threats and problems in one very efficient way through the Cyberoam Unified Threat Management appliance. Whereas classic solution only offer the possibility to verify activity based on IP or MAC address our solution is at user level. Which means that you can individually tailor the needs of each user, without being limited to one specific computer for that user.

Security

When not implementing limited security like a firewall and anti-virus you leave yourself exposed to the high volume and range of external and internal threats.

Gateway Anti-Virus, Anti-Spyware & Anti-Spam

Cyberoam’s Check Mark certified gateway Anti-virus and Anti-spyware solution scans email and web traffic at the gateway to block malicious threats from entering the network. It offers real-time protection against all spyware/malware, including viruses, worms, spyware, backdoors, Trojans, keyloggers and more. Cyberoam firewall VPN appliance scans incoming and outgoing HTTP, FTP, SMTP, POP3 and IMAP traffic, offering a highly dependable security solution.

Spam and malware writers are coming together, making email one of the leading vectors for viruses. Today, email accounts for 23 % of total enterprise malware infections. Spammers are using sophisticated techniques like zombie botnets to defeat conventional spam-blocking technologies and steal confidential financial data, propagate pharmaceutical, financial spam and more. Some attacks are so highly targeted that they are not identified by traditional Anti-virus and Anti-spam solutions. Enterprises require a real-time Defense that relies on not just traditional signature-based protection, but also on a real-time analysis of content, source or distribution pattern for effective protection against spam and malware.

Content & Application Filtering

Enterprises face heavy financial damage due to the entry of viruses, malware, worms, Trojans, spyware, and more through malicious websites. Phishing, pharming and spyware may lead to theft of passwords, identity theft and loss of other confidential information. Indiscriminate Internet surfing by internal users leaves enterprises vulnerable to legal liabilities, besides loss of productivity. Unrestricted use of file-sharing applications like IM and P2P and multimedia downloads cause risk of data loss or leakage as well as bandwidth choking, draining the enterprise resources.

Intrusion Prevention System (IPS)

Attackers are increasingly turning to highly targeted external and internal attacks. Sometimes, these attacks are so highly focused, that they target just the key individuals with access to enterprise resources. With many attacks being too small to fall within the anti-virus and anti-malware radar, enterprises are turning to advanced IPS engines for zero-hour protection.

Firewall

Cyberoam firewall is the only UTM firewall that embeds user identity in firewall rule matching criteria, enabling enterprises to configure policies and identify users directly by the username rather than through IP addresses. Cyberoam’s powerful hardware firewall provides stateful and deep packet inspection, access control, user authentication, network and application-level protection.

Productivity

Bandwidth Management

  • Is your bandwidth choked from music and video downloads?
  • Want to allocate guaranteed bandwidth to critical applications and users?
  • Is your Captain receiving committed bandwidth through the day?
  • Do you want to allocate 512 kbps to Special Projects from 6 to 9 pm?
  • Do you know Who is using how much Bandwidth?

Indiscriminate Internet surfing and bandwidth-guzzling downloads by internal users often leave enterprises with insufficient bandwidth for business-critical applications. Cyberoam’s user identity-based bandwidth management allows optimum utilization of bandwidth and offers bandwidth control over congestion, preventing bandwidth abuse and resultant choking. Enterprises receive committed, burstable bandwidth, preventing non-critical applications from degrading network performance in addition to gaining control over investment in bandwidth.

Multiple Link Load Balancing and Gateway Failover

Single ISP links can leave business-critical applications of enterprises vulnerable to link failures, resulting in severe business losses. Redundancy in ISP links has become critical for business continuity and greater profitability of enterprises.

Cyberoam Multiple Link Manager enables enterprises to control traffic over multiple WAN links by delivering comprehensive traffic management capability and optimizing the links. It offers high-speed connectivity while maximizing ROI, making optimal use of low-cost, small pipes in combination with high cost links.

A single Cyberoam UTM firewall appliance handles multiple WAN links (Satellite, WiFi, UMTS, Cellular, ...), limiting capital expenses as compared to solutions where multiple appliances are required to handle multiple WAN links. In the process, Cyberoam delivers integrated security through a single appliance.

Don't take unnecessary risk and ACT NOW !

You can leave your network unprotected and hope that something bad will never happen to it ... but it will. You have received spam (and paid for it in bandwidth), you could have a virus on your network and not know it (and paying for it), your crew could be watching full length high definition videos online ... and you're paying for it ...

Don't wait for it to happen to you and contact us to let us show you how we can help you SAVE time and money in a very efficient way.