1 / 30

Cyberoam NG series: Future-Ready Security

Cyberoam NG series: Future-Ready Security. A glimpse into the future of networks…. Superfast Internet Data moving at 10 times current Internet speeds Google launched a 1000 Mbps ‘Google Fiber’ Internet service

Download Presentation

Cyberoam NG series: Future-Ready Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberoam NG series: Future-Ready Security

  2. A glimpse into the future of networks… • Superfast Internet • Data moving at 10 times current Internet speeds • Google launched a 1000 Mbps ‘Google Fiber’ Internet service • IDNet launched UK 1000 Mbps Leased Line Business Ethernet Service • Device Explosion: • Multiple Internet devices per user • Each device with a unique IP address • Employee-owned smart devices to reach 350mn by 2014, up from 150mn • Cloud: Web Applications • Critical business applications and Services moving to the Web • Cloud Computing will generate more than $45.4 billion in revenue by 2015! • Cloud: Explosion of Internet Applications • Infinite applications moving to the cloud

  3. How will Organizations Gain? CONNECTIVITY PRODUCTIVITY With Network Connectivity & Productivity taking a leap, what about Security? SECURITY

  4. Can your Security keep pace? • The New Network Infrastructure • SOHO /SMB Network Infrastructure is moving to Gigabit! • Anything less than Gigabit is nearly obsolete! • Does your security appliance have Gigabit ports? • Does any security vendor offer network security appliances with • Gigabit ports to these segments? • Superfast Internet Speeds • Gigabit Internet speeds to be soon available from ISPs /Telco’s • Can your security appliance match high Internet speeds? • Does it offer Gigabit throughputs? • Device Explosion • More devices per employee connecting to the IT network • Changing approach from ‘Users’ to ‘Devices’ • Can your security appliance support more number of Devices?

  5. Can your Security keep pace? • Explosion of Internet applications • Leading to ‘Application Chaos’! • What level of application control granularity does your Security offer? • Critical business applications moving to Cloud • Internet-facing applications face risk of getting hacked • Does your security offer a web application protection?

  6. No one wants SECURITY to become a bottleneck in their network!

  7. What can SOHO/SMB do to prevent Security from becoming a bottleneck in progress? Expand Security budgets to buy Enterprise security solutions • Move to Future-Ready security appliances Or IT Manager

  8. Presenting The Cyberoam NG series The ‘Next-Generation’ appliances built for Future-ready Security in networks!

  9. Cyberoam NG series offers ‘Future-Ready’ Security • The Fastest ‘UTM’ appliances for SOHO and SMB segments • Offering Next-Generation Firewall protection for Large Enterprises! • Offering Future-Ready security to • SOHO, ROBO • CR15iNG, CR25iNG, CR35iNG • Wi-Fi appliances • CR15wiNG, CR25wiNG, CR35wiNG • Faster performance, broader coverage with 3 x 3 MIMO • Dual band support • SMB • CR50iNG, CR100iNG • Enterprise • CR2500iNG

  10. How Cyberoam NG series offers Future-Ready Security?

  11. Offering upto 5 times industry average throughput for SOHO /SMB Appliances starting with Gigabit Firewall Throughputs Best in class UTM throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  12. Cyberoam CR15iNG Firewall throughputs UTM throughputs Cyberoam CR15iNG vs. CR15i ONE CR15iNG vs Dell Sonicwall TZ series Cyberoam CR15iNG vs Fortinet FG20C, FG40C Cyberoam CR15iNG vs Watchguard WG XTM25, WG XTM26 Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  13. Cyberoam CR25iNG Firewall throughputs UTM throughputs Cyberoam CR25iNG vs. CR25ia CR25iNG vs Dell Sonicwall NSA220, NSA 250M Cyberoam CR25iNG vs Fortinet FG60C Cyberoam CR25iNG vs Watchguard WG XTM33 Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  14. Cyberoam CR35iNG Firewall throughputs UTM throughputs Cyberoam CR35iNG vs. CR35ia Power to secure SMB with SOHO appliance! CR35iNG vs Dell Sonicwall NSA2400, Power to secure SMB with SOHO appliance! Cyberoam CR35iNG vs Fortinet FG80C Cyberoam CR35iNG vs Watchguard WG XTM330, XTM 505 Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  15. Cyberoam CR50iNG Firewall throughputs UTM throughputs Cyberoam CR50iNG vs. CR50ia Size doesn’t matter! CR50iNG vs Dell Sonicwall NSA2400, NSA 3500 Size doesn’t matter! Cyberoam CR50iNG vs Fortinet FG100D Size doesn’t matter! Cyberoam CR50iNG vs Watchguard XTM505, XTM 515 Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  16. Cyberoam CR100iNG Firewall throughputs UTM throughputs Cyberoam CR100iNG vs. CR100ia Size doesn’t matter! CR100iNG vs Dell Sonicwall NSA3500, NSA 4500 Size doesn’t matter! Cyberoam CR100iNG vs Fortinet FG200B, FG300C Size doesn’t matter! Cyberoam CR100iNG vs Watchguard XTM515, XTM 525 Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  17. NG series offers Future-Ready Security • Powerful Hardware • Superfast processing speed : A must for Gigabit Internet speeds! • Nano second security processing with multicore Gigahertz processors • Gigabit Ports to enable Gigabit Speeds for SOHO /SMB networks • A complete overhaul of appliance design • Faster, Next-Gen Memory and High Capacity Storage • Superior Quality for High Performance and Robustness • Design & components supporting high speed I/O throughput and withstanding extreme environments

  18. NG series offers Future-Ready Security • Increased port density

  19. Intelligent, Powerful firmware • Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance • Better use of Multicore architecture for Parallel processing • Optimized workload distribution across cores • Lockless path for packet forwarding • A single core handles packets for each connection at any given time to avoid inter-locks • Optimized Interrupt rates for minimum CPU overhead and latency • High rate of interrupts - A bottleneck in high-speed data transfers • Fastpath packets to improve processing speed and reduce CPU overhead

  20. Intelligent, Powerful firmware • CyberoamOS offers advance features with entry-level appliances • CyberoamOSinstalled on flash and reports are stored in HDD* • Auto flash recovery** • Auto OS failover from flash to HDD in case of flash failure** *available in models above CR15iNG/wiNG **Future implementation

  21. Take complete control over applications running on your network

  22. Bit Torrent CRM VoIP ERP IM Application Web mail Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls Medium Quality Internet High Quality Low Quality Control over

  23. Granular classification of applications Proactive Protection model: Eliminates the need for manual intervention by administrators to update policies for new applications added to the list

  24. On-Appliance Web Application Firewall • No need to buy dedicated WAF appliance • Protect Web Servers and Web Applications from hackers • Prevents hackers from exploiting Web-Application Vulnerabilities • Positive protection model and No Signature Tables • Intuitive website flow detector automatically adapts to website changes • Protects against OWASP top 10 vulnerabilities

  25. Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits • User Name • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity - based • Logs + Reports • Compliance Reports User Login Cyberoam’s Layer 8 (Identity-based) security • Control over staff network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions

  26. Best-in-class Reporting • 1000+ in-depth reports • - Real time visibility into user and network activities • Helps with Security & Compliance management, Forensic Analysis • Reports include dynamic and animated reports, in-line graphs, country maps Country maps for Source/ Destination traffic Dual Dashboard - Traffic & Security Dashboard Application Reports

  27. Support for new Connectivity Technologies – 4G /LTE • Makes organizations ready for high speed future • Easy deployment for high speed Internet connection • Simple USB modem plug-in into Cyberoam appliance • Ensures business connectivity • Automatic fail-over to 4G/LTE WWAN connection • Gateway failover over VPN • VPN over 4G/LTE 4G 3G

  28. Threat Protection Features • Intrusion Prevention System • Maximum security against emerging threats • Identity-based IPS policies per user or group • 4500+ signatures – broadest security cover • Gateway Anti-Virus, Anti-spyware • Prevents blended threats • 4 million+ signatures • Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic • Gateway Anti-Spam • Real-time, most accurate spam protection • Recurrent Pattern Detection (RPD) technology • Scans SMTP, POP3, IMAP traffic • Outbound Spam Protection • Protects service providers against Outbound Spam

  29. Other Security Features • Fusion Technology driven SI Firewall • Interface for achieving Unified Security • Virtual Private Network (VPN) • Threat-free remote access • Threat Free Tunneling (TFT) Technology • IPSec, L2TP, PPTP and SSL-VPN • Web & Content Filtering • Complete Visibility & Control over HTTP & HTTPS • 82+ categories and 44 million+ URLs • Bandwidth Management • Helps enhance network performance and productivity • Create a bandwidth policy on a combination of User, Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control

  30. Live NG Series Demo View Demo

More Related