Upload
mari-solis
View
64
Download
1
Embed Size (px)
DESCRIPTION
Cyberoam SSL VPN - Secure Remote Access. Established in 1999. 500+ Employee Company. ISO 9001-2000 Certified. 55 Distributors covering 75+ countries. 30000+ combined installation of. Central Console (CCC). Unified Threat Management. Agenda of Presentation The Business Need of SSL VPN - PowerPoint PPT Presentation
Citation preview
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam SSL VPN - Secure Remote Access
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Established in 1999. 500+ Employee Company. ISO 9001-2000 Certified. 55 Distributors covering 75+ countries. 30000+ combined installation of
Central Console (CCC)Unified Threat Management
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Agenda of Presentation
• The Business Need of SSL VPN• About Cyberoam SSL VPN• Product Walkthrough
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
The Business Need for SSL VPN
Also, An Introduction to Virtual SSL VPN Appliances
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Secure, Remote Access is indispensable in today’s work environment
Scenario 1: Employees and Mobile Workers
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Secure, Remote Access is indispensable in today’s work environment
Scenario 2: Partners, Suppliers and Customers get Extranet access
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
IPSec
PPTP
L2TP
SSL VPN
Solutions Comparison: When to use What?
Ideal for a limited number of employees accessing corporate resources through clients on trusted devices
Use SSL VPN in
Different Locations: Home, Airport, Hotels, cyber cafe
Various Devices
laptops, home PC, PDA, mobile phone
Extranet access to customers, partners, suppliers
Web-enabled access – no need to install client on device
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
The Onset of Virtualization in SSL VPN…
How is it done?
Utilizing virtualization environments like VMware
Building Virtual appliances within existing hardware
Running a large number of independent, virtual SSL VPN gateways
Implementing complex virtual datacenters so servers are consolidated across multiple physical servers
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
The Onset of Virtualization in SSL VPN…
Benefits
Multiple SSL VPN instances can run on one single appliance
Appliance-wide or individual instances upgrades
Optimum hardware resource allocation
Resilience to hardware failure
Increases deployment scalability
Minimizes operating and maintenance costs
Eco-friendly
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Higher security due to 128-K Encryption and Authenticated Access Granularly restrict users to specific applications and resources Security checks on endpoint devices even before giving access Ease of Use Lower costs, Less Maintenance Least Admin intervention Access from any web-enabled device Minimum downtime
Business Advantages of SSL VPN
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
About Cyberoam SSL VPN
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam SSL VPN – Secure Remote Access
Employees, Customers,
Partners and guest users
Cyberoam SSL VPN
Internal Resources
Different Devices
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Roaming User Cyberoam SSL VPN Servers (App./Web/FTP/File
Share/WTS etc)
Client Certificate
Username/Password
Server Certificate
User gets a list of applications based
on policies
All Published Applications/Resources
Cyberoam SSL VPN – How does it work?
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Why choose Cyberoam SSL VPN?
Scalability and Performance
Unlimited user license
N+1 clustering with application load balancing
Available as Virtualized Solution
Available as virtual appliances
Run a large number of independent virtual gateways from existing infrastructure
Identity-based Security
Monitor user log-on activity including username, MAC address, IP address of endpoint
Know “who is doing what” in the network
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Key Features
Multiple Applications Support
Microsoft Outlook, TCP, 802.11X and UDP, FTP, Citrix and Microsoft Terminal Servers and more
Secure Firewall Traversal
Works alongside existing firewalls
Prevents exposure of UDP port ranges to hackers
Does not publish internal IP address
to outside network
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Access Mode
Clientless VPN with a browser agent for seamless access to applications
Linux, Windows, MAC support
Authentication and Authorization
Supports LDAP, AD, RADIUS etc.
E-mail based user-provisioning
Support for external two-factor& biometric authentication
Key Features
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Device Profiling (Endpoint Security)
Product checks – Anti-virus, Firewall & Anti-spyware
Up to 1100+ products supported
MAC address and IP address checks
Quarantine policy for devices that fail profiling test
Remediation information sent to user for any failed access e.g. updating anti-virus software, configuring firewall etc.
Key Features
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Auditing & Logging
Users logon activity including time of access, username, MAC address and IP address of endpoint
Management
Web-based and Command Line Insole
Wizard-driven installation
Role-based administration
Monitor and disconnect live users
Real-time status and monitoring
Key Features
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Product Walkthrough
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Dedicated SSL VPN appliance Deployment
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam SSL VPN Virtual Appliance
No need to buy separate hardware!!
Based on VMWare virtualization platform
Install multiple virtual SSL VPN machines
Cyberoam’s Virtualization platform, VMware allows virtual datacenters where servers are consolidated across multiple physical servers, for guaranteed efficiency and performance
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Virtual Appliance Deployment Diagram
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Bootstrap State◦ Initial Installation
Configuration state◦ State where firmware upgrades, license upgrades,
backup-restore can be performed (Involves downtime) Run State
◦ Resource configuration on-the-fly possible◦ State in when users connect and access their
resources
Note: Appliance can be changed from Configuration state to Run State as and when needed or vice versa
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
AD/LDAP Groups
Endpoint Security Policies
Device Profiling
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Mandatory Profile
Quarantine Profile
General Profile
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Pricing and Support
Virtual Appliance Mode
Base License – Default 5 user license available for 30 days FREE TRIAL
No Endpoint Security in Trial version
Dedicated Appliance Mode Concurrent user license (upgrade option available e.g.50 to 100 user license upgrade)
Support Plans: 8X5 and 24X7 plans based on appliance + per user license
Free Trial Download online with support + full access to all features
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
CR-SSL-800
Supports 1-50 concurrent users
Secure, remote Intranet & Extranet access
Designed For SMEs, MSSPs and more
Comparison of Cyberoam Dedicated Appliance Offerings
CR-SSL-1200
Supports 51-250 concurrent users
Secure, remote Intranet & Extranet access
Designed For SMEs, large enterprises, MSSPs and more
CR-SSL-2400
Supports 251-1000 concurrent users
Secure, remote Intranet & Extranet access
Designed For large global enterprises, MSSPs
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
New Revenue Opportunities: Global SSL VPN market at $500 million in 2008 (Source: Gartner)
Support: 24X7 Support and monitoring Centralized Policy Management Continuous access Familiar, easy-to-use interface Cyberoam Virtual Appliances allow MSSPs to service multiple clients
through shared allocation of hardware resources
Summary Benefits for MSSPs
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Reduced costs: Centralized management, minimum admin intervention, timely support
Protect your Investments: Use existing networks, firewalls, servers Trusted Remote Access: Extend access to regional offices, partners,
customers, telecommuters, wireless users Continuous access: Provide reliable access 24X7 Increase employee productivity (Intranet portals, ERP) Partner access to internal applications (Partner Extranet) Eliminate risks of organizational resource access from cyber cafes,
customer site etc. Apply Uniform security policy
Summary Benefits for Organizations– Cyberoam SSL VPN
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam SSL VPN Virtual Appliance Free Trial…
Register for a free online trial
A fully functional Cyberoam product
Free technical support
No financial obligations
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Thank You! [email protected]