Upload
belmont-baruch-belmont
View
1
Download
0
Embed Size (px)
DESCRIPTION
Cyberoam
Citation preview
Cyberoam Next Generation Security
www.cyberoam.com
Our Products Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Network Security Appliances - UTM, NGFW (Hardware & Virtual)
Modem RouterIntegrated Security appliance
Cyberoam Next Generation Security
Cuauhtmoc TrejoChannel Manager Mexico Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com1Cyberoam Layer 8 User-ID Technology
Support for 3G/4G/WiMax
Layer 8 securityMultilink Mgmt Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comCyberoam Next-Generation Security
Core NGFW FeaturesLayer-8 SecurityFirewallApplication FilteringWeb & Content FilteringIPSVPNBandwidth Management/QoSOn-appliance reportingGateway Anti-VirusGateway Anti-Spam (Inbound/outbound)Wireless SecurityWeb Application FirewallMulti-link ManagementSupport for 3G/4G/WiMAXUTM FeaturesIPv6 Support Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Powerful Hardware
Multicore Gigahertz processors for Nano second security processingGigabit Ports to integrate with Gigabit networkCyberoam ArchitectureIntelligent Firmware
Tight integration with HardwareNetwork & Crypto Acceleration
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comOne Task = 3 msTen Tasks = 15 msOne Task = 2 msTen Tasks = 20 ms
10
9
8
7
6
5
4
3
2
1
10
9
8
7
6
5
4
3
2
1
1
1Purpose built Technology
Multi-core TechnologyParallel ExecutionSerial ExecutionThis is strictly a conceptual representation of the actual process, not to be taken literally.Multi-core Vs. Purpose-built ArchitectureThe Magic of Parallel Task Execution Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comCyberoam's Layer 8 Technology treats User Identity as the 8th Layer in the protocol stackCyberoam network security appliances offer security across Layer 2-Layer 8 using Identity-based policies
Cyberoam Innovation: Layer 8 Security Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Cyberoam Next Generation security appliances offer
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comAAA over single Cyberoam applianceCyberoam Audits Identitybased Logs + Reports Compliance ReportsCyberoam Authorizes Internet surfing quotaSchedule controlSecurity PoliciesWeb FilteringApplication Visibility & ControlQoS / Bandwidth ManagementIM ControlsCyberoam Authenticates User NameIP AddressMAC IdSession IdUsersCustomers
Employees
Management
Partners
Identity-based AAAControl user network activitiesWho can connect to the networkWho can access whatWhat have they accessed Ability to track the user activities; identify attackers /victimsTake quick network security decisions Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com192.168.3.110Ancy
192.168.3.105Richard
InternetCorporate LANDHCP
AdministratorApplies security policies based on actual identity of users. User-specific rules for multiple users to share a common IP address192.168.3.110Steve
192.168.3.105
192.168.3.110
192.168.3.110Identity-based Security Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comPrioritize applications with Layer 7 and Layer 8 controls
Infected Applications Blocked
Internet
Application Traffic
Cyberoam ApplianceVisibilityControl
worms
Spyware
Manage Bandwidth
Undesirable
Business Critical
Socio business
Non CriticalLogs & Reports
Controls over applications based on User Identity, Time, Application and Bandwidth Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Risk LevelVery Low (1)Low (2)Medium (3)High (4)Very High (5)CharacteristicsExcessive BandwidthProne to misuseTransfer filesTunnel other appsWidely usedLoss of ProductivityCan bypass firewall policyTechnologyBrowser BasedClient ServerNetwork ProtocolP2PGranular classification of applicationsCategoryFile TransferGamingGeneral InternetInstant MessengerInfrastructureNetwork ServicesP2PProxy and TunnelRemote AccessStreaming MediaVoIPMobile ApplicationsSocial NetworkingWeb MailAnd more Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Proactive Protection model:Eliminates the need for manual intervention by administrators to update policies for new applications added to the listGranular classification of applications
Select P2P Applications
Block all future P2P applications without adding applications manually
Set Action
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Real time visibility into user and network activitiesTraffic DiscoveryReal-time visibility into bandwidth utilization by user, protocol, applicationOn-appliance Logging & ReportingSecurity ManagementForensicAnalysisData ProtectionComplianceManagement
1200+ Reports Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comTraffic Discovery
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comStateful Inspection FirewallUnified SecurityApplication FirewallIdentity-based FirewallLayer 8 Geo-based Traffic ControlControl incoming/outgoing traffic from/to a specific countryFastPath TechnologyTo improve processing speed and reduce CPU overhead
Security Policies
Connectivity Policies
Productivity PoliciesFirewall Rule
Unified SecurityRules for all security features from firewall pageEasy navigation and increased administrative productivity Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comFirewalls/IPS cannot protect a web application from unknown threatsOn-appliance Web Application Firewall (WAF)
TraditionalFirewall
Web & ApplicationServer
DatabaseServer
Organization's IT networkUnauthorized access blockedCost EffectiveNo need to buy dedicated hardware WAFEasy to deployDoes not require any changes in setup
Cyberoams on-appliance WAF protectionCyberoams on-appliance WAFProtects web-apps and web servers from hackersPositive protection model and No Signature TablesIntuitive website flow detector Automatically adapts to website changesProtects against OWASP top 10 web-app vulnerabilitiesSSL OffloadingMonitoring & Reporting Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comSupport for IPSec, L2TP, PPTP, SSL VPNThreat Free Tunneling (TFT) TechnologySupported VPN ClientsMacOSiOSAndroid DevicesIPSec VPNL2TP VPNPPTP VPNiOS
L2TP VPN
Android
Virtual Private Network (VPN)SSL VPNClient-based & Client lessLicense freeScans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attemptsAdvanced features for business continuityMPLS failover to VPNVPN failoverEmbrace BYOD with mobile VPN clients Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
BlockedWebsitesHTTP /HTTPS
WebsiteHTTP / HTTPSWeb & Content Filtering
Allowed WebsitesHTTP/HTTPS
Web 2.0
Web 2.0
Google cache pages
Google cache pages
Embedded URLs
EmbeddedURLs
Malware hosting sites
Malware hosting sites
Industrys most comprehensive URL database100 million+ URLs in 89+ categoriesControls access to HTTP/HTTPS websitesBlocks Google Cache pagesBlocks Embedded URLsDetects & Blocks Third Party Proxy and Tunneling sitesFilters Web 2.0 content
Web2.0Blocks Malware hosting sites
Proxy& Tunneling sites
Proxy& Tunneling sites
Internet
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Manage productivity by controlling access to unwanted sitesOn-appliance web category databaseFaster accessSurfing pattern privacyControl Data LeakageBlocks file uploads to web pagesHelps meet regulatory compliance requirementsPrevent productivity loss with identity-based approachCustomize blocked messages to educate users on corporate policies
YouTube for Schoolsfor Educational InstitutesAllows access to selected educational contentBlocks all inappropriate, peripheral content such as ads, comments & links
Web & Content Filtering Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comBest of Breed Bandwidth Management / QoS
Bandwidth policies tied withUserUserUser/Users groupUser/Users group
Firewall RuleFirewall RuleWeb CategoryWeb CategoryApplicationApplication
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comCreate a bandwidth policy on a combination of User or User Group /DepartmentApplication or Application CategoryWeb category Allows great flexibility and real L2-L8 visibility and control Bandwidth sharing with prioritySchedule-based bandwidth allocationBest of Breed Bandwidth Management / QoSBurstable bandwidthShare the unutilized bandwidthCommitted bandwidthAllocate dedicated bandwidth CEO
Manager
ERP System
5 mbps2 mbps8 mbpsManager2mbps
Employee 22mbps
Employee 12mbps
Employee 23mbps
Employee 13mbps
Marketing Group6mbps
When user is not connected Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comHigh AvailabilityActive-Active & Active-PassiveReduces single-point-of-failureMaximizes network uptimeEnsures continuous network securityMultiple Link Management with Automated Load BalancingMultiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditionsActive-Active and Active-Passive Auto Link FailoverGateway failover over VPNBusiness Continuity Features
ISP2(5 mbps)Sales Dept.
Dev. Dept.
Finance Dept.
ISP1(10 mbps)MPLS
ISP3 (3G)(3 mbps)Failover Link
Organization's IT network Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comLayer 8 Policy-based RoutingRoutes traffic based on Source IP addresses, Protocols & UsersAssures QoS for key users and applicationsBusiness Continuity Features
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comPrevent the risk of IT administrator from misusing privilege of tracking user activities2 people: Authorizer and AdministratorAuthorizer consent required for the Administrator to view user-specific activities
Safeguard user privacy 4-Eye Authentication Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comFleXi Ports for flexible network connectivityCombination of Fixed Ports and Flexible PortsFlexibility to choose Copper, Fiber 1GbE / 10GbE modulesModules can be purchased individually as per need
Fixed Copper GbE Ports
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com25Product Certifications
UTM Level 5: Cyberoam holds a unique & complete UTM certification
Anti-SpywareAnti-VirusFirewallVPN
IPS/IDP
Anti-Spam
URL FilteringPremiumPremiumPremium
ICSA Certified High-Availability
ICSA Certified FirewallVPNC Certified for Basic VPN & AES Interoperability
Cyberoam achieves Common Criteria EAL4+ Certification Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comRecognized as Visionary in the Gartner UTM MQ
2009
2010
2012
2009Magic Quadrant for SMB Multifunction Firewalls
2010Magic Quadrant for Unified Threat Management
2012Magic Quadrant for Unified Threat Management
2013Magic Quadrant for Unified Threat Management Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com28