html5-img
1 / 84

By: Yashesh Vaishnav Cyberoam cyberoam

By: Yashesh Vaishnav Cyberoam www.cyberoam.com. agenda. Why are we here? Company Profile MSSP Requirements Cyberoam Solution Action Plan References Q&A. Why Are we Here ?. To Sign up Business alliance. ISP to become as an MSSP. To offer Telecom Customers :. &. SECURITY.

lilia
Download Presentation

By: Yashesh Vaishnav Cyberoam cyberoam

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By: Yashesh Vaishnav Cyberoam www.cyberoam.com

  2. agenda Why are we here? Company Profile MSSP Requirements Cyberoam Solution Action Plan References Q&A

  3. Why Are we Here ?

  4. To Sign up Business alliance..

  5. ISP to becomeas an MSSP

  6. To offer Telecom Customers : & SECURITY CONNECTIVITY PRODUCTIVITY Network Connectivity, Productivity & Security with Cyberoam

  7. Offer

  8. Company pROFILE

  9. Cyberoam Introduction Technology Powerhouse – Founded in 1999 800+ Employees Backed by World’s Largest PE Investor ($90bn); The Carlyle Group Sales, Distribution Channel and Customers across 110+ Countries Amongst the top 3 global UTM players in terms of features Patent Pending Identity-based Management

  10. MNC Clientele

  11. FEW CUSTOMER ACQUISITIONS (2011-12) • Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC) • Carlson Suites, USA (150 x CR15i ) • Indian Army, India (50 x CR500ia, CR200i with CCC) • National Stock Exchange. India (240 x CR50ia with CCC) • LYDEC, Morocco ( Multiple CR’s) • Ministry of Justice, Morocco, (84x CR1000ia) • Casablanca Stock Exchange, Morocco (4 x 500ia) • Iran Postal Services, GCC, (44 x CR200i) • Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC) • BTT Bank, GCC, (30 X CR300i) • Abu Dhabi Government, Abu Dhabi (4 x CR1500ia) • Giordano, UAE/Saudi, (50 x CR25ia) • Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC) • Ministry of Interior, Italy, (8 x CR1500ia, CCC) • Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC) • Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia) • British Aid, Kenya (6 x CR1500ia) • Imperial Logistics, South Africa (20 x CR15i)Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO And Many More….

  12. 2.5 Years in North Africa! • Revenue grew 60% YOY • 500+ success deployments • Conducted 30 CCNSP & 7 CCNSE trainings • 14+ CCSC Trainings • 200+ CCNSPs on ground • Number of end client focused events & seminars • Successful Penetration in all the verticals.

  13. North African Clientele And Many More….

  14. MSSP?

  15. Typical Requirements of MSSP • Providing best quality of services to clients with least effort and cost • Provide higher coverage of managed security services • Centralized control of client network’s security without allocating dedicated resources for each client • Rapid deployment at client site without interrupting client operations • Easy Policy setting, Modification, Monitoring Performance, Reacting to situations in time • Pro-active security management

  16. Typical Requirements of MSSP • Have a system that • Is simple to configure and manage • Helps meet the SLA’s • Help customers to display compliance • Ability to offer flexible security plans to clients • Ability to offer easy system upgrade alternative for growing businesses

  17. Business proposal

  18. Be an MSSP in 3 Simple Steps 1 2 3

  19. Cyberoam Solution for MSSP Network Security Centralized security Management Network Monitoring & Analysis Securing Home users

  20. Cyberoam UTM – Layer 8 Technology

  21. Layer 8 security in DHCP environment Corporate LAN DHCP Internet 192.168.3.105 Richard 192.168.3.110 Steve 192.168.3.110 Ancy • Applies security policies based on actual identity of users. • User-specific rules for multiple users to share a common IP address 192.168.3.105 192.168.3.110 192.168.3.110 Administrator

  22. Cyberoam’s Layer 8 (Identity-based) security Identity-based AAA Users Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits Employees • User Name • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity–based Logs + Reports • Compliance Reports Management Customers • Control user network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions Partners

  23. Cyberoam UTM Features are : • Fusion Technology driven SI Firewall • Interface for achieving Unified Security • Intrusion Prevention System • Maximum security against emerging threats • Identity-based IPS policies per user or group • 3500+ signatures – broadest security cover • Gateway Anti-Virus, Anti-spyware • Prevent blended threats • 4 million+ signatures • Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic

  24. Other Cyberoam UTM Features are : • Virtual Private Network (VPN) • Threat-free remote access • Threat Free Tunneling (TFT) Technology • IPSec, L2TP, PPTP and SSL-VPN • Multi-Link Management • For an ‘always-on’ network • Support for more than 2 ISP links • Supports Wireless WAN (3G USB modems, WiMax) • Gateway failover over VPN

  25. Other Cyberoam UTM Features are : • Gateway Anti-Spam • Real-time, most accurate spam protection • Recurrent Pattern Detection (RPD) technology • Scans SMTP, POP3, IMAP traffic • Outbound Spam Protection • Protecting service providers against • Outbound Spam • iView: Intelligent logging & reporting • Real-time visibility into network activities • On-appliance reporting. LAYER 8 - Identity-based reporting • 1200+ reports

  26. Other Cyberoam UTM Features are : • Instant Messaging & Control • Identity-based controls for Yahoo messenger and Windows Live Messenger • Control who can chat with whom, file transfer, webcam • Bandwidth Management • Enhance network performance and productivity • Application and Identity-based bandwidth allocation

  27. Other Cyberoam UTM Features are : • 3G/WiMAX Connectivity • Secure, Uninterruped WAN Connectivity • Configure Wireless WAN as primary or back-up link • ‘IPv6 Ready’ Gold • Web & Content Filtering • Complete Visibility & Control over HTTP & HTTPS • 82+ categories and 44 million+ URLs

  28. Cyberoam UTM – One Stop Solution !!! Multiple security features over single appliance

  29. UTM appliance range Segment wise & Network size Large Enterprises Small to Medium Enterprises Small and Remote Offices CR 2500iNG, CR1500ia, CR1500ia-10F CR1000ia, CR1000ia-10F CR750ia, CR750ia-1F/10F CR500ia, CR500ia –RP/1F/10F CR35wiNG, CR35iNG, CR 25wiNG – 6P, CR 25iNG – 6P, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG CR200i, CR300i, CR100iNG, CR50iNG

  30. Subscriptions Bifurcations Basic Appliance Subscriptions • Identity-based Firewall • VPN • Free SSL-VPN • Bandwidth Management • Multiple Link Management • On Appliance Reporting • Basic Anti-Spam (RBL Service) • Gateway Anti-Virus • Gateway Anti-spam • Web & Application Filtering • Intrusion Prevention System (IPS) • Web application firewall • 8x5 Tech support & Warranty • 24 x 7 Tech Support & Warranty

  31. Cyberoam UTM – Subscriptions • Enables MSSP to offer flexible service packages to their customers • Customers with individual security needs: • Gateway Anti-Virus Subscription • (Anti-malware, phishing, spyware protection included) • Anti-Spam • Web & Application Filtering Subscription • Intrusion Prevention System Subscription • Advanced Subscriptions include: • Web Application Firewall (WAF) Subscription • Outbound Spam Protection Subscription • Support Subscriptions • 8x5 support • 24x7 support

  32. Cyberoam UTM – Bundled Subscriptions • For customers not having mail server in their network • Security Value Subscription (SVS) / SVS Plus* • Gateway Anti-Virus Subscription • (Anti-malware, phishing, spyware protection included) • Web & Application Filtering Subscription • Intrusion Prevention System (IPS) • 8x5 Tech Support & Warranty • For customer having mail server in their network • Total Value Subscription (TVS) / TVS Plus* • Gateway Anti-Virus Subscription • (Anti-malware, phishing, spyware protection included) • Gateway Anti-Spam Subscription • Web & Application Filtering Subscription • Intrusion Prevention System (IPS) • 8x5 Tech Support & Warranty * SVS Plus and TVS Plus offers additional 24x7 support service to SVS and TVS services

  33. Cyberoam UTM – Advance Subscriptions • For customers having web server in their network • Web Application Firewall (WAF) Subscription • Protection to corporate websites and web-based applications such as CRM, ERP, MIS, Payment Gateway and others • Website Flow Detector technology • OWASP Top 10 web application vulnerabilities • For Service Providers to protect them from Outbound spam • Outbound Spam Protection Subscription • Unique feature with Cyberoam UTM • Scanning with Recurrent Pattern Detection (RPD) Technology • Detection of Outbound Spam which is a part of global outbreak • Near 98% spam detection • False Positive rate of 1 in a million

  34. CCC – Cyberoam Central Console • Centralized integrated management and monitoring appliance • Helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam installations centrally

  35. Ease and flexibility of management • Easy grouping of Cyberoam UTM appliances • Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions • Dynamic views in CCC help in managing, searching and sorting appliances • Customizable and multiple dashboards

  36. Ease and flexibility of management Group of UTM Appliances Based on Geography Based on Appliance Models Based on Client

  37. Appliance Discovery Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click

  38. Easy, instant security policy enforcement • Simplified security management • Centralized policy creation and implementation for all Cyberoam UTM features • Leads to uniform adoption of security practices across offices • Establish policies based on work-profiles across offices • Subscription and signature updates for Cyberoam UTM features like Gateway Anti-Virus, Anti-Spam, etc. • Protection against zero-hour threats

  39. Easy, instant security policy enforcement Add UTM appliances Client based grouping of UTM appliances

  40. Easy, instant security policy enforcement Configure UTM appliance from CCC

  41. Easy, instant security policy enforcement Update configuration of UTM appliances

  42. Easy Signature Distribution

  43. Security against misuse of administrator privileges • Role-based administration privileges • For CCC appliance • Individual Cyberoam appliances • Groups of Cyberoam UTM appliances

  44. Role based administration privileges CCC Access profiles Profiles considered: VPN Administrator, Security Administrator, Global Administrator

  45. Role based administration privileges CCC rights per access profile (example of VPN administrator rights)

  46. Role based administration privileges CCC admin users

  47. Role based administration privileges Access to each UTM appliance

  48. Audit logs & alerts for organization-wide security visibility • Logs and views of administrator actions as well as dispersed UTM appliances • Instant security visibility • Supports regulatory compliance • Investigative analysis • Keeping track of historical activity • Email alerts • Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, etc. • Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count, etc.

  49. Audit logs and alerts for greater security visibility CCC Logs

  50. Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs

More Related