Cyberoam

Embed Size (px)

DESCRIPTION

Cyberoam

Citation preview

Cyberoam Next Generation Security

www.cyberoam.com

Our Products Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Network Security Appliances - UTM, NGFW (Hardware & Virtual)

Modem RouterIntegrated Security appliance

Cyberoam Next Generation Security

Cuauhtmoc TrejoChannel Manager Mexico Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com1Cyberoam Layer 8 User-ID Technology

Support for 3G/4G/WiMax

Layer 8 securityMultilink Mgmt Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comCyberoam Next-Generation Security

Core NGFW FeaturesLayer-8 SecurityFirewallApplication FilteringWeb & Content FilteringIPSVPNBandwidth Management/QoSOn-appliance reportingGateway Anti-VirusGateway Anti-Spam (Inbound/outbound)Wireless SecurityWeb Application FirewallMulti-link ManagementSupport for 3G/4G/WiMAXUTM FeaturesIPv6 Support Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

Powerful Hardware

Multicore Gigahertz processors for Nano second security processingGigabit Ports to integrate with Gigabit networkCyberoam ArchitectureIntelligent Firmware

Tight integration with HardwareNetwork & Crypto Acceleration

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comOne Task = 3 msTen Tasks = 15 msOne Task = 2 msTen Tasks = 20 ms

10

9

8

7

6

5

4

3

2

1

10

9

8

7

6

5

4

3

2

1

1

1Purpose built Technology

Multi-core TechnologyParallel ExecutionSerial ExecutionThis is strictly a conceptual representation of the actual process, not to be taken literally.Multi-core Vs. Purpose-built ArchitectureThe Magic of Parallel Task Execution Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comCyberoam's Layer 8 Technology treats User Identity as the 8th Layer in the protocol stackCyberoam network security appliances offer security across Layer 2-Layer 8 using Identity-based policies

Cyberoam Innovation: Layer 8 Security Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

Cyberoam Next Generation security appliances offer

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comAAA over single Cyberoam applianceCyberoam Audits Identitybased Logs + Reports Compliance ReportsCyberoam Authorizes Internet surfing quotaSchedule controlSecurity PoliciesWeb FilteringApplication Visibility & ControlQoS / Bandwidth ManagementIM ControlsCyberoam Authenticates User NameIP AddressMAC IdSession IdUsersCustomers

Employees

Management

Partners

Identity-based AAAControl user network activitiesWho can connect to the networkWho can access whatWhat have they accessed Ability to track the user activities; identify attackers /victimsTake quick network security decisions Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com192.168.3.110Ancy

192.168.3.105Richard

InternetCorporate LANDHCP

AdministratorApplies security policies based on actual identity of users. User-specific rules for multiple users to share a common IP address192.168.3.110Steve

192.168.3.105

192.168.3.110

192.168.3.110Identity-based Security Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comPrioritize applications with Layer 7 and Layer 8 controls

Infected Applications Blocked

Internet

Application Traffic

Cyberoam ApplianceVisibilityControl

worms

Spyware

Manage Bandwidth

Undesirable

Business Critical

Socio business

Non CriticalLogs & Reports

Controls over applications based on User Identity, Time, Application and Bandwidth Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

Risk LevelVery Low (1)Low (2)Medium (3)High (4)Very High (5)CharacteristicsExcessive BandwidthProne to misuseTransfer filesTunnel other appsWidely usedLoss of ProductivityCan bypass firewall policyTechnologyBrowser BasedClient ServerNetwork ProtocolP2PGranular classification of applicationsCategoryFile TransferGamingGeneral InternetInstant MessengerInfrastructureNetwork ServicesP2PProxy and TunnelRemote AccessStreaming MediaVoIPMobile ApplicationsSocial NetworkingWeb MailAnd more Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

Proactive Protection model:Eliminates the need for manual intervention by administrators to update policies for new applications added to the listGranular classification of applications

Select P2P Applications

Block all future P2P applications without adding applications manually

Set Action

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

Real time visibility into user and network activitiesTraffic DiscoveryReal-time visibility into bandwidth utilization by user, protocol, applicationOn-appliance Logging & ReportingSecurity ManagementForensicAnalysisData ProtectionComplianceManagement

1200+ Reports Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comTraffic Discovery

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comStateful Inspection FirewallUnified SecurityApplication FirewallIdentity-based FirewallLayer 8 Geo-based Traffic ControlControl incoming/outgoing traffic from/to a specific countryFastPath TechnologyTo improve processing speed and reduce CPU overhead

Security Policies

Connectivity Policies

Productivity PoliciesFirewall Rule

Unified SecurityRules for all security features from firewall pageEasy navigation and increased administrative productivity Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comFirewalls/IPS cannot protect a web application from unknown threatsOn-appliance Web Application Firewall (WAF)

TraditionalFirewall

Web & ApplicationServer

DatabaseServer

Organization's IT networkUnauthorized access blockedCost EffectiveNo need to buy dedicated hardware WAFEasy to deployDoes not require any changes in setup

Cyberoams on-appliance WAF protectionCyberoams on-appliance WAFProtects web-apps and web servers from hackersPositive protection model and No Signature TablesIntuitive website flow detector Automatically adapts to website changesProtects against OWASP top 10 web-app vulnerabilitiesSSL OffloadingMonitoring & Reporting Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comSupport for IPSec, L2TP, PPTP, SSL VPNThreat Free Tunneling (TFT) TechnologySupported VPN ClientsMacOSiOSAndroid DevicesIPSec VPNL2TP VPNPPTP VPNiOS

L2TP VPN

Android

Virtual Private Network (VPN)SSL VPNClient-based & Client lessLicense freeScans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attemptsAdvanced features for business continuityMPLS failover to VPNVPN failoverEmbrace BYOD with mobile VPN clients Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

BlockedWebsitesHTTP /HTTPS

WebsiteHTTP / HTTPSWeb & Content Filtering

Allowed WebsitesHTTP/HTTPS

Web 2.0

Web 2.0

Google cache pages

Google cache pages

Embedded URLs

EmbeddedURLs

Malware hosting sites

Malware hosting sites

Industrys most comprehensive URL database100 million+ URLs in 89+ categoriesControls access to HTTP/HTTPS websitesBlocks Google Cache pagesBlocks Embedded URLsDetects & Blocks Third Party Proxy and Tunneling sitesFilters Web 2.0 content

Web2.0Blocks Malware hosting sites

Proxy& Tunneling sites

Proxy& Tunneling sites

Internet

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

Manage productivity by controlling access to unwanted sitesOn-appliance web category databaseFaster accessSurfing pattern privacyControl Data LeakageBlocks file uploads to web pagesHelps meet regulatory compliance requirementsPrevent productivity loss with identity-based approachCustomize blocked messages to educate users on corporate policies

YouTube for Schoolsfor Educational InstitutesAllows access to selected educational contentBlocks all inappropriate, peripheral content such as ads, comments & links

Web & Content Filtering Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comBest of Breed Bandwidth Management / QoS

Bandwidth policies tied withUserUserUser/Users groupUser/Users group

Firewall RuleFirewall RuleWeb CategoryWeb CategoryApplicationApplication

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comCreate a bandwidth policy on a combination of User or User Group /DepartmentApplication or Application CategoryWeb category Allows great flexibility and real L2-L8 visibility and control Bandwidth sharing with prioritySchedule-based bandwidth allocationBest of Breed Bandwidth Management / QoSBurstable bandwidthShare the unutilized bandwidthCommitted bandwidthAllocate dedicated bandwidth CEO

Manager

ERP System

5 mbps2 mbps8 mbpsManager2mbps

Employee 22mbps

Employee 12mbps

Employee 23mbps

Employee 13mbps

Marketing Group6mbps

When user is not connected Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comHigh AvailabilityActive-Active & Active-PassiveReduces single-point-of-failureMaximizes network uptimeEnsures continuous network securityMultiple Link Management with Automated Load BalancingMultiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditionsActive-Active and Active-Passive Auto Link FailoverGateway failover over VPNBusiness Continuity Features

ISP2(5 mbps)Sales Dept.

Dev. Dept.

Finance Dept.

ISP1(10 mbps)MPLS

ISP3 (3G)(3 mbps)Failover Link

Organization's IT network Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comLayer 8 Policy-based RoutingRoutes traffic based on Source IP addresses, Protocols & UsersAssures QoS for key users and applicationsBusiness Continuity Features

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comPrevent the risk of IT administrator from misusing privilege of tracking user activities2 people: Authorizer and AdministratorAuthorizer consent required for the Administrator to view user-specific activities

Safeguard user privacy 4-Eye Authentication Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comFleXi Ports for flexible network connectivityCombination of Fixed Ports and Flexible PortsFlexibility to choose Copper, Fiber 1GbE / 10GbE modulesModules can be purchased individually as per need

Fixed Copper GbE Ports

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com25Product Certifications

UTM Level 5: Cyberoam holds a unique & complete UTM certification

Anti-SpywareAnti-VirusFirewallVPN

IPS/IDP

Anti-Spam

URL FilteringPremiumPremiumPremium

ICSA Certified High-Availability

ICSA Certified FirewallVPNC Certified for Basic VPN & AES Interoperability

Cyberoam achieves Common Criteria EAL4+ Certification Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.comRecognized as Visionary in the Gartner UTM MQ

2009

2010

2012

2009Magic Quadrant for SMB Multifunction Firewalls

2010Magic Quadrant for Unified Threat Management

2012Magic Quadrant for Unified Threat Management

2013Magic Quadrant for Unified Threat Management Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com

[email protected]

Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.www.cyberoam.com28