850 likes | 1.09k Views
By: Yashesh Vaishnav Cyberoam www.cyberoam.com. agenda. Why are we here? Company Profile MSSP Requirements Cyberoam Solution Action Plan References Q&A. Why Are we Here ?. To Sign up Business alliance. ISP to become as an MSSP. To offer Telecom Customers :. &. SECURITY.
E N D
By: Yashesh Vaishnav Cyberoam www.cyberoam.com
agenda Why are we here? Company Profile MSSP Requirements Cyberoam Solution Action Plan References Q&A
To offer Telecom Customers : & SECURITY CONNECTIVITY PRODUCTIVITY Network Connectivity, Productivity & Security with Cyberoam
Cyberoam Introduction Technology Powerhouse – Founded in 1999 800+ Employees Backed by World’s Largest PE Investor ($90bn); The Carlyle Group Sales, Distribution Channel and Customers across 110+ Countries Amongst the top 3 global UTM players in terms of features Patent Pending Identity-based Management
FEW CUSTOMER ACQUISITIONS (2011-12) • Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC) • Carlson Suites, USA (150 x CR15i ) • Indian Army, India (50 x CR500ia, CR200i with CCC) • National Stock Exchange. India (240 x CR50ia with CCC) • LYDEC, Morocco ( Multiple CR’s) • Ministry of Justice, Morocco, (84x CR1000ia) • Casablanca Stock Exchange, Morocco (4 x 500ia) • Iran Postal Services, GCC, (44 x CR200i) • Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC) • BTT Bank, GCC, (30 X CR300i) • Abu Dhabi Government, Abu Dhabi (4 x CR1500ia) • Giordano, UAE/Saudi, (50 x CR25ia) • Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC) • Ministry of Interior, Italy, (8 x CR1500ia, CCC) • Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC) • Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia) • British Aid, Kenya (6 x CR1500ia) • Imperial Logistics, South Africa (20 x CR15i)Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO And Many More….
2.5 Years in North Africa! • Revenue grew 60% YOY • 500+ success deployments • Conducted 30 CCNSP & 7 CCNSE trainings • 14+ CCSC Trainings • 200+ CCNSPs on ground • Number of end client focused events & seminars • Successful Penetration in all the verticals.
North African Clientele And Many More….
Typical Requirements of MSSP • Providing best quality of services to clients with least effort and cost • Provide higher coverage of managed security services • Centralized control of client network’s security without allocating dedicated resources for each client • Rapid deployment at client site without interrupting client operations • Easy Policy setting, Modification, Monitoring Performance, Reacting to situations in time • Pro-active security management
Typical Requirements of MSSP • Have a system that • Is simple to configure and manage • Helps meet the SLA’s • Help customers to display compliance • Ability to offer flexible security plans to clients • Ability to offer easy system upgrade alternative for growing businesses
Cyberoam Solution for MSSP Network Security Centralized security Management Network Monitoring & Analysis Securing Home users
Layer 8 security in DHCP environment Corporate LAN DHCP Internet 192.168.3.105 Richard 192.168.3.110 Steve 192.168.3.110 Ancy • Applies security policies based on actual identity of users. • User-specific rules for multiple users to share a common IP address 192.168.3.105 192.168.3.110 192.168.3.110 Administrator
Cyberoam’s Layer 8 (Identity-based) security Identity-based AAA Users Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits Employees • User Name • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity–based Logs + Reports • Compliance Reports Management Customers • Control user network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions Partners
Cyberoam UTM Features are : • Fusion Technology driven SI Firewall • Interface for achieving Unified Security • Intrusion Prevention System • Maximum security against emerging threats • Identity-based IPS policies per user or group • 3500+ signatures – broadest security cover • Gateway Anti-Virus, Anti-spyware • Prevent blended threats • 4 million+ signatures • Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
Other Cyberoam UTM Features are : • Virtual Private Network (VPN) • Threat-free remote access • Threat Free Tunneling (TFT) Technology • IPSec, L2TP, PPTP and SSL-VPN • Multi-Link Management • For an ‘always-on’ network • Support for more than 2 ISP links • Supports Wireless WAN (3G USB modems, WiMax) • Gateway failover over VPN
Other Cyberoam UTM Features are : • Gateway Anti-Spam • Real-time, most accurate spam protection • Recurrent Pattern Detection (RPD) technology • Scans SMTP, POP3, IMAP traffic • Outbound Spam Protection • Protecting service providers against • Outbound Spam • iView: Intelligent logging & reporting • Real-time visibility into network activities • On-appliance reporting. LAYER 8 - Identity-based reporting • 1200+ reports
Other Cyberoam UTM Features are : • Instant Messaging & Control • Identity-based controls for Yahoo messenger and Windows Live Messenger • Control who can chat with whom, file transfer, webcam • Bandwidth Management • Enhance network performance and productivity • Application and Identity-based bandwidth allocation
Other Cyberoam UTM Features are : • 3G/WiMAX Connectivity • Secure, Uninterruped WAN Connectivity • Configure Wireless WAN as primary or back-up link • ‘IPv6 Ready’ Gold • Web & Content Filtering • Complete Visibility & Control over HTTP & HTTPS • 82+ categories and 44 million+ URLs
Cyberoam UTM – One Stop Solution !!! Multiple security features over single appliance
UTM appliance range Segment wise & Network size Large Enterprises Small to Medium Enterprises Small and Remote Offices CR 2500iNG, CR1500ia, CR1500ia-10F CR1000ia, CR1000ia-10F CR750ia, CR750ia-1F/10F CR500ia, CR500ia –RP/1F/10F CR35wiNG, CR35iNG, CR 25wiNG – 6P, CR 25iNG – 6P, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG CR200i, CR300i, CR100iNG, CR50iNG
Subscriptions Bifurcations Basic Appliance Subscriptions • Identity-based Firewall • VPN • Free SSL-VPN • Bandwidth Management • Multiple Link Management • On Appliance Reporting • Basic Anti-Spam (RBL Service) • Gateway Anti-Virus • Gateway Anti-spam • Web & Application Filtering • Intrusion Prevention System (IPS) • Web application firewall • 8x5 Tech support & Warranty • 24 x 7 Tech Support & Warranty
Cyberoam UTM – Subscriptions • Enables MSSP to offer flexible service packages to their customers • Customers with individual security needs: • Gateway Anti-Virus Subscription • (Anti-malware, phishing, spyware protection included) • Anti-Spam • Web & Application Filtering Subscription • Intrusion Prevention System Subscription • Advanced Subscriptions include: • Web Application Firewall (WAF) Subscription • Outbound Spam Protection Subscription • Support Subscriptions • 8x5 support • 24x7 support
Cyberoam UTM – Bundled Subscriptions • For customers not having mail server in their network • Security Value Subscription (SVS) / SVS Plus* • Gateway Anti-Virus Subscription • (Anti-malware, phishing, spyware protection included) • Web & Application Filtering Subscription • Intrusion Prevention System (IPS) • 8x5 Tech Support & Warranty • For customer having mail server in their network • Total Value Subscription (TVS) / TVS Plus* • Gateway Anti-Virus Subscription • (Anti-malware, phishing, spyware protection included) • Gateway Anti-Spam Subscription • Web & Application Filtering Subscription • Intrusion Prevention System (IPS) • 8x5 Tech Support & Warranty * SVS Plus and TVS Plus offers additional 24x7 support service to SVS and TVS services
Cyberoam UTM – Advance Subscriptions • For customers having web server in their network • Web Application Firewall (WAF) Subscription • Protection to corporate websites and web-based applications such as CRM, ERP, MIS, Payment Gateway and others • Website Flow Detector technology • OWASP Top 10 web application vulnerabilities • For Service Providers to protect them from Outbound spam • Outbound Spam Protection Subscription • Unique feature with Cyberoam UTM • Scanning with Recurrent Pattern Detection (RPD) Technology • Detection of Outbound Spam which is a part of global outbreak • Near 98% spam detection • False Positive rate of 1 in a million
CCC – Cyberoam Central Console • Centralized integrated management and monitoring appliance • Helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam installations centrally
Ease and flexibility of management • Easy grouping of Cyberoam UTM appliances • Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions • Dynamic views in CCC help in managing, searching and sorting appliances • Customizable and multiple dashboards
Ease and flexibility of management Group of UTM Appliances Based on Geography Based on Appliance Models Based on Client
Appliance Discovery Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click
Easy, instant security policy enforcement • Simplified security management • Centralized policy creation and implementation for all Cyberoam UTM features • Leads to uniform adoption of security practices across offices • Establish policies based on work-profiles across offices • Subscription and signature updates for Cyberoam UTM features like Gateway Anti-Virus, Anti-Spam, etc. • Protection against zero-hour threats
Easy, instant security policy enforcement Add UTM appliances Client based grouping of UTM appliances
Easy, instant security policy enforcement Configure UTM appliance from CCC
Easy, instant security policy enforcement Update configuration of UTM appliances
Security against misuse of administrator privileges • Role-based administration privileges • For CCC appliance • Individual Cyberoam appliances • Groups of Cyberoam UTM appliances
Role based administration privileges CCC Access profiles Profiles considered: VPN Administrator, Security Administrator, Global Administrator
Role based administration privileges CCC rights per access profile (example of VPN administrator rights)
Role based administration privileges CCC admin users
Role based administration privileges Access to each UTM appliance
Audit logs & alerts for organization-wide security visibility • Logs and views of administrator actions as well as dispersed UTM appliances • Instant security visibility • Supports regulatory compliance • Investigative analysis • Keeping track of historical activity • Email alerts • Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, etc. • Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count, etc.
Audit logs and alerts for greater security visibility CCC Logs
Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs