53
opyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com Our Products www.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Cyberoam USP Presenter: <Name> <Position>, Cyberoam

Cyberoam Unified Threat Management

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Our Products

www.cyberoam.com

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Cyberoam USP

Presenter: <Name><Position>, Cyberoam

Page 2: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Technology Powerhouse

450+ Employees

Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group

Sales, Distribution Channel and Customers across 125+ Countries

Amongst the top 3 global players for UTM features

Patent-pending Identity-based Management

Cyberoam Introduction

Page 3: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Network Security

Centralized security Management

Network Monitoring & Analysis

Securing Home users

One stop shop: Cyberoam’s Holistic Security SolutionsOne stop shop: Cyberoam’s Holistic Security Solutions

Page 4: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Page 5: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Support for 3G/4G/WiMax

Cyberoam UTM – Comprehensive Network SecurityCyberoam UTM – Comprehensive Network Security

Layer 8 security

Page 6: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam UTMs offer…Cyberoam UTMs offer…

Gigabit Firewall Throughputs

Powerful Hardware

Superior Quality

Value for Money

Cyberoam OS

Page 7: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Powerful Hardware

Multicore Gigahertz processors for Nano second security processing

Gigabit Ports to integrate with Gigabit network

Faster, Next-Gen Memory and High Capacity Storage for superior performance

Industrial grade components to withstand extreme environments

Cyberoam ArchitectureCyberoam Architecture

Intelligent Firmware

Tight integration with Hardware

Network & Crypto Acceleration

Page 8: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack

Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies

Cyberoam Innovation: Layer 8 SecurityCyberoam Innovation: Layer 8 Security

Page 9: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

AAA over single UTM applianceAAA over single UTM appliance

Cyberoam Audits • Identity–based

Logs + Reports • Compliance

Reports

Cyberoam Authorizes • Internet surfing quota• Schedule control• Security Policies• Web Filtering• Application Visibility

& Control• QoS / Bandwidth

Management• IM Controls

Cyberoam Authenticates • User Name• IP Address• MAC Id• Session Id

Users

Customers

Employees

Management

Partners

Identity-based AAA

Control user network activities• Who can connect to the network• Who can access what• What have they accessed

Ability to track the user activities; identify attackers

/victims

Take quick network security decisions

Page 10: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

192.168.3.110Ancy192.168.3.105Richard Internet

Corporate LAN

DHCP

Administrator

Applies security policies based on actual identity of users.

User-specific rules for multiple users to share a common IP address

192.168.3.110Steve

Identity-based SecurityIdentity-based Security

Page 11: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Prioritize applications with Layer 7 and Layer 8 controlsPrioritize applications with Layer 7 and Layer 8 controls

Infected Applications Blocked

Internet

Application Traffic

Cyberoam Appliance

Visibility Control

worms Spyware

Manage Bandwidth

Undesirable

Business Critical

Socio business

Non Critical

Logs & Reports

Controls over applications based on User Identity, Time, Application and Bandwidth

Page 12: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Risk Level

Very Low (1)

Low (2)

Medium (3)

High (4)

Very High (5)

Characteristics

Excessive Bandwidth

Prone to misuse

Transfer files

Tunnel other apps

Widely used

Loss of Productivity

Can bypass firewall policy

Technology

Browser Based

Client Server

Network Protocol

P2P

Granular classification of applicationsGranular classification of applications

Category

File Transfer

Gaming

General Internet

Instant Messenger

Infrastructure

Network Services

P2P

Proxy and Tunnel

Remote Access

Streaming Media

VoIP

Mobile Applications

Social Networking

Web Mail

And more…

Page 13: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Proactive Protection model:Eliminates the need for manual intervention by administrators to update policies for new applications added to the list

Granular classification of applicationsGranular classification of applications

Select P2P Applications

Block all future P2P applications without adding applications manually

Set Action

Page 14: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Control who can chat with whom

Archive Communication

Control communication medium(chat, video, voice, file transfer)

Data Protection

Productivity

Instant Messaging ControlsInstant Messaging Controls

Control loss of productivity• Control access over chat, voice,

video, file transfer• Control who can chat with whom

Prevent data leakage• Block specific keywords• Block regular expressions (RegEx)

e.g. social security no., credit card no., ABN routing numbers

Forensic Analysis• IM audit logs• Filter logs based on Users, IPs,

Messages based on keywords

Page 15: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Real time visibility into user and network activities Traffic Discovery

- Real-time visibility into bandwidth utilization by user, protocol, application

On-appliance Logging & ReportingOn-appliance Logging & Reporting

Security Management

ForensicAnalysis

Data Protection

ComplianceManagement

1200+ Reports

Page 16: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Layer-8 User-based ReportsLayer-8 User-based Reports

Page 17: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Layer-8 User-based ReportsLayer-8 User-based Reports

Page 18: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Dual Dashboard – Traffic & Security DashboardDual Dashboard – Traffic & Security Dashboard

Traffic Dashboard

Page 19: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Dual Dashboard – Traffic & Security DashboardDual Dashboard – Traffic & Security Dashboard

Security Dashboard

Page 20: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Application ReportsApplication Reports

Page 21: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Compliance ReportsCompliance Reports

Page 22: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Interactive World Traffic MapInteractive World Traffic Map

Interactive World Traffic Map for Source and Destination traffic

Page 23: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Traffic DiscoveryTraffic Discovery

Page 24: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Traffic DiscoveryTraffic Discovery

Page 25: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Stateful Inspection FirewallStateful Inspection Firewall

Unified Security

Application Firewall

Identity-based Firewall

Layer 8 Geo-based Traffic Control

- Control incoming/outgoing traffic from/to a specific country

FastPath Technology

- To improve processing speed and reduce CPU overhead

Security Policies

Connectivity Policies

Productivity Policies

Firewall Rule

Unified Security

Rules for all security features from firewall page

Easy navigation and increased administrative productivity

Page 26: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Configure rules for all features from Firewall pageConfigure rules for all features from Firewall page

Identity

Security

Productivity

Connectivity

++

++

++

Page 27: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Intrusion Prevention System

- Layer 8 and IPS Tuner driven- Identity-based IPS policies per user, group and

IP address- Allows multiple IPS policies- Identity-based alerts & reports- 4500+ signatures – broadest security cover

Anti-Spam (Inbound/Outbound)

- Three level scanning: IP Reputation filtering Real-time Blackhole List (RBL) Recurrent Pattern Detection (RPDTM) technology

- ~98% spam detection- Self-service Quarantine and Spam Digest- Scans SMTP, POP3, IMAP traffic- Virus outbreak detection for zero-hour protection

DoS & DDoS Protection

- Packet Rate Limit- Protection against flood attacks

- SYN Flood- TCP Flood- UDP Flood- ICMP Flood

- IPS Signature to prevent attacks- Protocol Anomaly

Gateway Anti-Virus, Anti- spyware

- 4 million+ signatures- Bi-directional scanning: Web & Email- Self-service Virus Quarantine- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM

traffic- Instant visibility into Attacker/Victim

Continuously updated via

Cyberoam Security Center

Threat Protection FeaturesThreat Protection Features

Cyberoam Security Center

Page 28: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Firewalls/IPS cannot protect a web application from unknown threats

On-appliance Web Application Firewall (WAF)On-appliance Web Application Firewall (WAF)

Traditional

Firewall

Web &

Application

ServerDatabase

Server

Organization's IT networkUnauthorized

access blocked

Cost EffectiveNo need to buy dedicated hardware

WAF

Easy to deployDoes not require any changes

in setup

Cyberoam UTM offering WAF protection

WAF protection on Cyberoam UTM Protects web-apps and web servers

from hackers Positive protection model and No

Signature Tables Intuitive website flow detector

Automatically adapts to website

changes Protects against OWASP top 10

web-app vulnerabilities SSL Offloading Monitoring & Reporting

Page 29: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Support for IPSec, L2TP, PPTP, SSL VPN

Threat Free Tunneling (TFT) Technology

Supported VPN Clients MacOS

iOS

Android Devices

IPSec VPNL2TP VPNPPTP VPN

iOS

L2TP VPNAndroid

Virtual Private Network (VPN)Virtual Private Network (VPN)

SSL VPN- Client less

- License free

- Scans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attempts

Advanced features for business continuity

- MPLS failover to VPN

- VPN failover

Embrace BYOD with mobile VPN clients

Page 30: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

BlockedWebsites

HTTP /HTTPS

WebsiteHTTP / HTTPS

Web & Content FilteringWeb & Content Filtering

Allowed Websites

HTTP/HTTPS

Web 2.0

Web 2.0

Google cache pages

Google cache pages

Embedded URLs

EmbeddedURLs

Malware hosting

sites

Malware hosting

sites

Industry’s most comprehensive URL database44million+ URLs in 82+ categories

Regular Web category updates

Cyberoam Security Center

Controls access to HTTP/HTTPS websitesBlocks Google Cache pagesBlocks Embedded URLs

Detects & Blocks Third Party Proxy and Tunneling sitesFilters Web 2.0 content

Web2.0

Blocks Malware hosting sites

Proxy&

Tunneling sites

Proxy&

Tunneling sites

Internet

Page 31: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Manage productivity by controlling access to unwanted sites On-appliance web category database

Faster access Surfing pattern privacy

Control Data Leakage Blocks file uploads to web pages

Helps meet regulatory compliance requirements Prevent productivity loss with identity-based approach Customize blocked messages to educate users on corporate

policies

“YouTube for Schools”for Educational Institutes Allows access to selected

educational content

Blocks all inappropriate, peripheral content such as ads, comments & links

Web & Content FilteringWeb & Content Filtering

Page 32: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Best of Breed Bandwidth Management / QoSBest of Breed Bandwidth Management / QoS

Bandwidth policies tied with UserUserUser/Users group

User/Users group Firewall RuleFirewall Rule Web

CategoryWeb

Category ApplicationApplication

Page 33: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Create a bandwidth policy on a combination of User or User Group /Department

Application or Application Category

Web category

Allows great flexibility and real L2-L8 visibility and control

Bandwidth sharing with priority Schedule-based bandwidth allocation

Best of Breed Bandwidth Management / QoSBest of Breed Bandwidth Management / QoS

Burstable bandwidth• Share the unutilized bandwidth

Committed bandwidth• Allocate dedicated bandwidth

CEO Manager ERP System5 mbps 2 mbps 8 mbps

Manager2mbps

Employee 22mbps

Employee 12mbps

Employee 23mbps

Employee 13mbps

Marketing Group6mbps

When user is not connected

Page 34: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

High Availability- Active-Active & Active-Passive

- Reduces single-point-of-failure

- Maximizes network uptime

- Ensures continuous network security

Multiple Link Management with Automated Load Balancing- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover

conditions

- Active-Active and Active-Passive Auto Link Failover

- Gateway failover over VPN

Business Continuity FeaturesBusiness Continuity Features

ISP2(5 mbps)

Sales Dept.

Dev. Dept.

Finance Dept.

ISP1(10 mbps)

MPLS

ISP3 (3G)(3 mbps)

Failover LinkOrganization's IT network

Page 35: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Layer 8 Policy-based Routing- Routes traffic based on Source IP addresses, Protocols & Users

- Assures QoS for key users and applications

Business Continuity FeaturesBusiness Continuity Features

Page 36: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

High performance, integrated security over WLAN - Secures wireless networks to the extent of wired networks

Faster performance, broader coverage with 3x3 MIMO Technology- Dual band support: 2.4 GHz or 5 GHz

Multiple Virtual Access Points Layer 8 over WLAN

- Identity-based policies in dynamic IP environment

- MAC-based filtering

- Supports IP-address pool Enhances security

Wireless (WLAN) SecurityWireless (WLAN) Security

Internet

Marketing

Engineering

Sales

File server

ADS

ERP

Page 37: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Prevent the risk of IT administrator from misusing privilege of tracking user activities

2 people: Authorizer and Administrator- Authorizer consent required for the Administrator to view user-specific activities

Safeguard user privacy – 4-Eye AuthenticationSafeguard user privacy – 4-Eye Authentication

Page 38: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Needed for hotspots, airports, hotels, corporate offices Default group can be created for guest users Sending Internet access credentials using SMS for guest users

SMS (Text-based) AuthenticationSMS (Text-based) Authentication

Airports

Hotels

SMS for Guest users

Page 39: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Organizations cannot afford to compromise on any of these.The right SCP balance is essential!

Cyberoam features assure Security, Connectivity, ProductivityCyberoam features assure Security, Connectivity, Productivity

Page 40: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Web Support

Chat Support

Email Support

Phone Support

Customer Support SystemCustomer Support System

• Appliance Registration and Upgrade• Subscribe security features• Create support tickets• Request RMA

• Support available across all time zones

• Global Support Excellence - ITIL compliance (ISO 20000)

Knowledge base

Page 41: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Web Support

Chat Support

Email Support

Partner Support SystemPartner Support System

• Ordering & Inventory management• Sales & Marketing tools & resources• Presales Support• Track Appliance/Subscription

Knowledge base

Region specific dedicated Technical Account Managers (TAM)

Page 42: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Cyberoam UTM Product RangeCyberoam UTM Product Range

Hardware UTM appliances Virtual UTM appliances

CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C

Large EnterprisesCR2500iNGCR1500ia, CR1500ia-10F, CR1000ia, CR1000ia-10F, CR750ia, CR750ia-1F/10F, CR500ia, CR500ia-1F/10F/RP,

Small and Medium EnterprisesCR300i, CR200i, CR100iNG, CR50iNG

Small and Remote OfficesCR35wiNG, CR35iNG,CR25wiNG, CR25iNG,CR15wiNG, CR15iNG

Page 43: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

DubaiHead Office

New YorkBranch Office

MumbaiBranch Office

BostonBranch Office

Cyberoam UTM

Cyberoam UTM

Cyberoam UTM

Cyberoam UTM

Cyberoam Central Console (CCC)

CCC is for centralized, integrated management and monitoring of Cyberoam UTM devices - Offers complete control over distributed networks from

head office (H.O.) or Security Operations Center (S.O.C.) of MSSPs

Available as- Hardware CCC Appliances, Virtual CCC Appliances

Cyberoam Central Console (CCC)Cyberoam Central Console (CCC)

Page 44: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Servers

Firewalls

IDP / IPS

Switches Routers

UTM

Applications

Desktop systems

Logs & Events

Identity

Logging Reporting

ComplianceManagement

ForensicAnalysis

Log Management

Security Management

Cyberoam iView – Logging and ReportingCyberoam iView – Logging and Reporting

Ability to log and report activities from various devices/vendors Available as

Open Source software Appliance

Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

Page 45: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

CCC & iView product rangeCCC & iView product range

CCC appliances iView – Logging & Reporting

CR-iVU200CR-iVU100CR-iVU25

Hardware CCC appliances

CCC1000, CCC500, CCC200, CCC100, CCC50, CCC15

Virtual CCC appliances

For VMware Server: CCC VMS 200, CCC VMS 100, CCC VMS 50, CCC VMS 15

For VMware Workstation: CCC VMW 200, CCC VMW 100, CCC VMW 50, CCC VMW 15

Page 46: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Developing competencies with Cyberoam UTM appliances

CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)

CYBEROAM CERTIFIED TRAINER (CCT)

CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP)

Training & CertificationTraining & Certification

Page 47: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

2012Magic Quadrant for Unified

Threat Management

2010Magic Quadrant for Unified

Threat Management

2009Magic Quadrant for SMB

Multifunction Firewalls

Recognized as ‘Visionary’ in the Gartner UTM MQRecognized as ‘Visionary’ in the Gartner UTM MQ

Page 48: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

“One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model - that allows connection of names. This could be users, domains and more. This allows greatly improved granularity of system administration.”

Innovation: Go-to-market strategy in a global market that is quite crowded in its product space.

Greatest strength: Product and support through most media 24/7.

For Cyberoam, customer commitment means measuring, analyzing and responding to customer attitudes, needs and how customers view Cyberoam products.

NASSCOM INNOVATION AWARD 2011

Proven track record of InnovationProven track record of Innovation

Page 49: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Clientele WorldwideClientele Worldwide

BFSI Manufacturing

Education Pharma & Healthcare Telecom & ISP

Government

Page 50: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Others

Clientele WorldwideClientele Worldwide

Hotels Retail & Services IT/BPO & Media

Page 51: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

VPNC Certified for Basic VPN & AES Interoperability

ICSA Certified High-Availability

ICSA Certified Firewall IPv6 Ready

Member of Internet Watch

Foundation

UTM Level 5: Cyberoam holds a unique & complete UTM certification

Anti-SpywareAnti-VirusFirewall VPN

IPS/IDPAnti-Spam URL Filtering

PremiumPremium

Product CertificationsProduct Certifications

Premium

EAL4+ Pending Approval

Page 52: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Link: http://demo.cyberoam.com

Credentials: guest /guest

Cyberoam Live DemoCyberoam Live Demo

Get a 30 day FREE Evaluation of Cyberoam Virtual appliance

Page 53: Cyberoam Unified Threat Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Thank youContact: [email protected]