Upload
vcw-security-ltd
View
123
Download
5
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Our Products
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Cyberoam USP
Presenter: <Name><Position>, Cyberoam
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Technology Powerhouse
450+ Employees
Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for UTM features
Patent-pending Identity-based Management
Cyberoam Introduction
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Network Security
Centralized security Management
Network Monitoring & Analysis
Securing Home users
One stop shop: Cyberoam’s Holistic Security SolutionsOne stop shop: Cyberoam’s Holistic Security Solutions
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Support for 3G/4G/WiMax
Cyberoam UTM – Comprehensive Network SecurityCyberoam UTM – Comprehensive Network Security
Layer 8 security
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam UTMs offer…Cyberoam UTMs offer…
Gigabit Firewall Throughputs
Powerful Hardware
Superior Quality
Value for Money
Cyberoam OS
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Powerful Hardware
Multicore Gigahertz processors for Nano second security processing
Gigabit Ports to integrate with Gigabit network
Faster, Next-Gen Memory and High Capacity Storage for superior performance
Industrial grade components to withstand extreme environments
Cyberoam ArchitectureCyberoam Architecture
Intelligent Firmware
Tight integration with Hardware
Network & Crypto Acceleration
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack
Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies
Cyberoam Innovation: Layer 8 SecurityCyberoam Innovation: Layer 8 Security
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
AAA over single UTM applianceAAA over single UTM appliance
Cyberoam Audits • Identity–based
Logs + Reports • Compliance
Reports
Cyberoam Authorizes • Internet surfing quota• Schedule control• Security Policies• Web Filtering• Application Visibility
& Control• QoS / Bandwidth
Management• IM Controls
Cyberoam Authenticates • User Name• IP Address• MAC Id• Session Id
Users
Customers
Employees
Management
Partners
Identity-based AAA
Control user network activities• Who can connect to the network• Who can access what• What have they accessed
Ability to track the user activities; identify attackers
/victims
Take quick network security decisions
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
192.168.3.110Ancy192.168.3.105Richard Internet
Corporate LAN
DHCP
Administrator
Applies security policies based on actual identity of users.
User-specific rules for multiple users to share a common IP address
192.168.3.110Steve
Identity-based SecurityIdentity-based Security
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Prioritize applications with Layer 7 and Layer 8 controlsPrioritize applications with Layer 7 and Layer 8 controls
Infected Applications Blocked
Internet
Application Traffic
Cyberoam Appliance
Visibility Control
worms Spyware
Manage Bandwidth
Undesirable
Business Critical
Socio business
Non Critical
Logs & Reports
Controls over applications based on User Identity, Time, Application and Bandwidth
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Technology
Browser Based
Client Server
Network Protocol
P2P
Granular classification of applicationsGranular classification of applications
Category
File Transfer
Gaming
General Internet
Instant Messenger
Infrastructure
Network Services
P2P
Proxy and Tunnel
Remote Access
Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more…
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Proactive Protection model:Eliminates the need for manual intervention by administrators to update policies for new applications added to the list
Granular classification of applicationsGranular classification of applications
Select P2P Applications
Block all future P2P applications without adding applications manually
Set Action
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Control who can chat with whom
Archive Communication
Control communication medium(chat, video, voice, file transfer)
Data Protection
Productivity
Instant Messaging ControlsInstant Messaging Controls
Control loss of productivity• Control access over chat, voice,
video, file transfer• Control who can chat with whom
Prevent data leakage• Block specific keywords• Block regular expressions (RegEx)
e.g. social security no., credit card no., ABN routing numbers
Forensic Analysis• IM audit logs• Filter logs based on Users, IPs,
Messages based on keywords
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Real time visibility into user and network activities Traffic Discovery
- Real-time visibility into bandwidth utilization by user, protocol, application
On-appliance Logging & ReportingOn-appliance Logging & Reporting
Security Management
ForensicAnalysis
Data Protection
ComplianceManagement
1200+ Reports
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Layer-8 User-based ReportsLayer-8 User-based Reports
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Layer-8 User-based ReportsLayer-8 User-based Reports
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Dual Dashboard – Traffic & Security DashboardDual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Dual Dashboard – Traffic & Security DashboardDual Dashboard – Traffic & Security Dashboard
Security Dashboard
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Application ReportsApplication Reports
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Compliance ReportsCompliance Reports
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Interactive World Traffic MapInteractive World Traffic Map
Interactive World Traffic Map for Source and Destination traffic
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Traffic DiscoveryTraffic Discovery
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Traffic DiscoveryTraffic Discovery
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Stateful Inspection FirewallStateful Inspection Firewall
Unified Security
Application Firewall
Identity-based Firewall
Layer 8 Geo-based Traffic Control
- Control incoming/outgoing traffic from/to a specific country
FastPath Technology
- To improve processing speed and reduce CPU overhead
Security Policies
Connectivity Policies
Productivity Policies
Firewall Rule
Unified Security
Rules for all security features from firewall page
Easy navigation and increased administrative productivity
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Configure rules for all features from Firewall pageConfigure rules for all features from Firewall page
Identity
Security
Productivity
Connectivity
++
++
++
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Intrusion Prevention System
- Layer 8 and IPS Tuner driven- Identity-based IPS policies per user, group and
IP address- Allows multiple IPS policies- Identity-based alerts & reports- 4500+ signatures – broadest security cover
Anti-Spam (Inbound/Outbound)
- Three level scanning: IP Reputation filtering Real-time Blackhole List (RBL) Recurrent Pattern Detection (RPDTM) technology
- ~98% spam detection- Self-service Quarantine and Spam Digest- Scans SMTP, POP3, IMAP traffic- Virus outbreak detection for zero-hour protection
DoS & DDoS Protection
- Packet Rate Limit- Protection against flood attacks
- SYN Flood- TCP Flood- UDP Flood- ICMP Flood
- IPS Signature to prevent attacks- Protocol Anomaly
Gateway Anti-Virus, Anti- spyware
- 4 million+ signatures- Bi-directional scanning: Web & Email- Self-service Virus Quarantine- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM
traffic- Instant visibility into Attacker/Victim
Continuously updated via
Cyberoam Security Center
Threat Protection FeaturesThreat Protection Features
Cyberoam Security Center
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Firewalls/IPS cannot protect a web application from unknown threats
On-appliance Web Application Firewall (WAF)On-appliance Web Application Firewall (WAF)
Traditional
Firewall
Web &
Application
ServerDatabase
Server
Organization's IT networkUnauthorized
access blocked
Cost EffectiveNo need to buy dedicated hardware
WAF
Easy to deployDoes not require any changes
in setup
Cyberoam UTM offering WAF protection
WAF protection on Cyberoam UTM Protects web-apps and web servers
from hackers Positive protection model and No
Signature Tables Intuitive website flow detector
Automatically adapts to website
changes Protects against OWASP top 10
web-app vulnerabilities SSL Offloading Monitoring & Reporting
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Support for IPSec, L2TP, PPTP, SSL VPN
Threat Free Tunneling (TFT) Technology
Supported VPN Clients MacOS
iOS
Android Devices
IPSec VPNL2TP VPNPPTP VPN
iOS
L2TP VPNAndroid
Virtual Private Network (VPN)Virtual Private Network (VPN)
SSL VPN- Client less
- License free
- Scans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attempts
Advanced features for business continuity
- MPLS failover to VPN
- VPN failover
Embrace BYOD with mobile VPN clients
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
BlockedWebsites
HTTP /HTTPS
WebsiteHTTP / HTTPS
Web & Content FilteringWeb & Content Filtering
Allowed Websites
HTTP/HTTPS
Web 2.0
Web 2.0
Google cache pages
Google cache pages
Embedded URLs
EmbeddedURLs
Malware hosting
sites
Malware hosting
sites
Industry’s most comprehensive URL database44million+ URLs in 82+ categories
Regular Web category updates
Cyberoam Security Center
Controls access to HTTP/HTTPS websitesBlocks Google Cache pagesBlocks Embedded URLs
Detects & Blocks Third Party Proxy and Tunneling sitesFilters Web 2.0 content
Web2.0
Blocks Malware hosting sites
Proxy&
Tunneling sites
Proxy&
Tunneling sites
Internet
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Manage productivity by controlling access to unwanted sites On-appliance web category database
Faster access Surfing pattern privacy
Control Data Leakage Blocks file uploads to web pages
Helps meet regulatory compliance requirements Prevent productivity loss with identity-based approach Customize blocked messages to educate users on corporate
policies
“YouTube for Schools”for Educational Institutes Allows access to selected
educational content
Blocks all inappropriate, peripheral content such as ads, comments & links
Web & Content FilteringWeb & Content Filtering
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Best of Breed Bandwidth Management / QoSBest of Breed Bandwidth Management / QoS
Bandwidth policies tied with UserUserUser/Users group
User/Users group Firewall RuleFirewall Rule Web
CategoryWeb
Category ApplicationApplication
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Create a bandwidth policy on a combination of User or User Group /Department
Application or Application Category
Web category
Allows great flexibility and real L2-L8 visibility and control
Bandwidth sharing with priority Schedule-based bandwidth allocation
Best of Breed Bandwidth Management / QoSBest of Breed Bandwidth Management / QoS
Burstable bandwidth• Share the unutilized bandwidth
Committed bandwidth• Allocate dedicated bandwidth
CEO Manager ERP System5 mbps 2 mbps 8 mbps
Manager2mbps
Employee 22mbps
Employee 12mbps
Employee 23mbps
Employee 13mbps
Marketing Group6mbps
When user is not connected
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
High Availability- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime
- Ensures continuous network security
Multiple Link Management with Automated Load Balancing- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover
conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
Business Continuity FeaturesBusiness Continuity Features
ISP2(5 mbps)
Sales Dept.
Dev. Dept.
Finance Dept.
ISP1(10 mbps)
MPLS
ISP3 (3G)(3 mbps)
Failover LinkOrganization's IT network
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Layer 8 Policy-based Routing- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications
Business Continuity FeaturesBusiness Continuity Features
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
High performance, integrated security over WLAN - Secures wireless networks to the extent of wired networks
Faster performance, broader coverage with 3x3 MIMO Technology- Dual band support: 2.4 GHz or 5 GHz
Multiple Virtual Access Points Layer 8 over WLAN
- Identity-based policies in dynamic IP environment
- MAC-based filtering
- Supports IP-address pool Enhances security
Wireless (WLAN) SecurityWireless (WLAN) Security
Internet
Marketing
Engineering
Sales
File server
ADS
ERP
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Prevent the risk of IT administrator from misusing privilege of tracking user activities
2 people: Authorizer and Administrator- Authorizer consent required for the Administrator to view user-specific activities
Safeguard user privacy – 4-Eye AuthenticationSafeguard user privacy – 4-Eye Authentication
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Needed for hotspots, airports, hotels, corporate offices Default group can be created for guest users Sending Internet access credentials using SMS for guest users
SMS (Text-based) AuthenticationSMS (Text-based) Authentication
Airports
Hotels
SMS for Guest users
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Organizations cannot afford to compromise on any of these.The right SCP balance is essential!
Cyberoam features assure Security, Connectivity, ProductivityCyberoam features assure Security, Connectivity, Productivity
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Web Support
Chat Support
Email Support
Phone Support
Customer Support SystemCustomer Support System
• Appliance Registration and Upgrade• Subscribe security features• Create support tickets• Request RMA
• Support available across all time zones
• Global Support Excellence - ITIL compliance (ISO 20000)
Knowledge base
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Web Support
Chat Support
Email Support
Partner Support SystemPartner Support System
• Ordering & Inventory management• Sales & Marketing tools & resources• Presales Support• Track Appliance/Subscription
Knowledge base
Region specific dedicated Technical Account Managers (TAM)
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam UTM Product RangeCyberoam UTM Product Range
Hardware UTM appliances Virtual UTM appliances
CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C
Large EnterprisesCR2500iNGCR1500ia, CR1500ia-10F, CR1000ia, CR1000ia-10F, CR750ia, CR750ia-1F/10F, CR500ia, CR500ia-1F/10F/RP,
Small and Medium EnterprisesCR300i, CR200i, CR100iNG, CR50iNG
Small and Remote OfficesCR35wiNG, CR35iNG,CR25wiNG, CR25iNG,CR15wiNG, CR15iNG
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
DubaiHead Office
New YorkBranch Office
MumbaiBranch Office
BostonBranch Office
Cyberoam UTM
Cyberoam UTM
Cyberoam UTM
Cyberoam UTM
Cyberoam Central Console (CCC)
CCC is for centralized, integrated management and monitoring of Cyberoam UTM devices - Offers complete control over distributed networks from
head office (H.O.) or Security Operations Center (S.O.C.) of MSSPs
Available as- Hardware CCC Appliances, Virtual CCC Appliances
Cyberoam Central Console (CCC)Cyberoam Central Console (CCC)
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Servers
Firewalls
IDP / IPS
Switches Routers
UTM
Applications
Desktop systems
Logs & Events
Identity
Logging Reporting
ComplianceManagement
ForensicAnalysis
Log Management
Security Management
Cyberoam iView – Logging and ReportingCyberoam iView – Logging and Reporting
Ability to log and report activities from various devices/vendors Available as
Open Source software Appliance
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
CCC & iView product rangeCCC & iView product range
CCC appliances iView – Logging & Reporting
CR-iVU200CR-iVU100CR-iVU25
Hardware CCC appliances
CCC1000, CCC500, CCC200, CCC100, CCC50, CCC15
Virtual CCC appliances
For VMware Server: CCC VMS 200, CCC VMS 100, CCC VMS 50, CCC VMS 15
For VMware Workstation: CCC VMW 200, CCC VMW 100, CCC VMW 50, CCC VMW 15
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Developing competencies with Cyberoam UTM appliances
CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)
CYBEROAM CERTIFIED TRAINER (CCT)
CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP)
Training & CertificationTraining & Certification
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
2012Magic Quadrant for Unified
Threat Management
2010Magic Quadrant for Unified
Threat Management
2009Magic Quadrant for SMB
Multifunction Firewalls
Recognized as ‘Visionary’ in the Gartner UTM MQRecognized as ‘Visionary’ in the Gartner UTM MQ
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
“One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model - that allows connection of names. This could be users, domains and more. This allows greatly improved granularity of system administration.”
Innovation: Go-to-market strategy in a global market that is quite crowded in its product space.
Greatest strength: Product and support through most media 24/7.
For Cyberoam, customer commitment means measuring, analyzing and responding to customer attitudes, needs and how customers view Cyberoam products.
NASSCOM INNOVATION AWARD 2011
Proven track record of InnovationProven track record of Innovation
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Clientele WorldwideClientele Worldwide
BFSI Manufacturing
Education Pharma & Healthcare Telecom & ISP
Government
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Others
Clientele WorldwideClientele Worldwide
Hotels Retail & Services IT/BPO & Media
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
VPNC Certified for Basic VPN & AES Interoperability
ICSA Certified High-Availability
ICSA Certified Firewall IPv6 Ready
Member of Internet Watch
Foundation
UTM Level 5: Cyberoam holds a unique & complete UTM certification
Anti-SpywareAnti-VirusFirewall VPN
IPS/IDPAnti-Spam URL Filtering
PremiumPremium
Product CertificationsProduct Certifications
Premium
EAL4+ Pending Approval
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Link: http://demo.cyberoam.com
Credentials: guest /guest
Cyberoam Live DemoCyberoam Live Demo
Get a 30 day FREE Evaluation of Cyberoam Virtual appliance
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Thank youContact: [email protected]