1 / 74

Our Products

Cyberoam – Endpoint Data Protection. Application Control Asset Management. Data Protection & Encryption Device Management. CYBEROAM. Comprehensive Network Security. Our Products. Unified Threat Management. SSL VPN. Cyberoam Central Console (CCC). Agenda of Presentation.

platt
Download Presentation

Our Products

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberoam – Endpoint Data Protection Application Control Asset Management Data Protection & Encryption Device Management CYBEROAM Comprehensive Network Security Our Products Unified Threat Management SSL VPN Cyberoam Central Console (CCC)

  2. Agenda of Presentation • About Elitecore Technologies • Cyberoam UTM • Cyberoam Credentials/ Awards/ Accreditations

  3. About Elitecore Technologies • Established in 1999 • 400+ Employees • ISO 9001:2000 certified company • Backed by  World’s Largest Private Equity Group ($90bn) • Sales, Distribution Channel & Customers across 75+ countries • Communication - Networks – Security • Cyberoam - Network to Endpoint Security • CRESTEL - Telecommunication OSS BSS • EliteAAA - Telecommunication • 24online - Bandwidth Management Solution

  4. Internal threats • Identity theft • Data loss • Data deletion • Data modification • Data theft • DoS attacks • Hacking External threats • Worms • Malicious code • Virus • Malware Social Engineering threats • Spam • Phishing • Pharming User – The Weakest Security Link USER Attack on Organization

  5. Layer 8 – The Human Layer • Layer 8 Technology – Security around the User • Treats User-Identity as the 8th Layer in Network stack • Network security decisions based on Usernames and IP Addresses • Control Who is doing What in the network • Allows creation of User Identity-based security policies • Identifies traffic by username even in case of dynamic IP indicates a feature unique to Cyberoam

  6. User User

  7. Layer 8 – The Human Layer • Cyberoam’s Layer 8 Technology adds SPEED to security • Offers instant visibility into source of attacks • Identifies attackers/victims with usernames • Allows immediate remediation to restore security or enables proactive security • Quickly and easily configure and manage policies based on users

  8. Cyberoam UTM- Identity-based Security • Integrated security over single platform • Layer 8 penetrates through each security module

  9. Other UTMs Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits User Login • User • IP Address • MAC Id • Session Id • Intrusion Prevention Policies • Anti-Malware • Anti-Spam • Web Filtering • Layer 7 Controls • Bandwidth Management & QoS • Instant Messaging Archiving & Control • Internet Surfing Quota • Internet Access Time • Internet Data Quota • Identity - based • Logs + Reports Cyberoam Layer 8 Advantage • MAC Id • Session Id

  10. Organizational Concerns Security Connectivity Productivity • Network security • Content Security • Administrative Security • Business Continuity • Network Availability • Future-ready connectivity • Employee productivity • IT resource optimization • Administrator productivity

  11. CYBEROAM ASSURES SECURITY Network Security Content Security Administrative Security • Firewall • IPS • Wireless security • Anti-Malware • Anti-Spam • HTTPS Content security • Next-Gen UI • iView- Logging & Reporting

  12. SECURITY»Network Security»Firewall • Stateful Inspection Firewall (Fusion Technology) • Interface for achieving Unified Security • Identity-based policies enable security, connectivity, productivity Fusion Technology

  13. SECURITY»Network Security»IPS • Intrusion Prevention System • 3500+ signatures - broadest security cover • Internet Threat Response Team • Regular Signature updates • Quick protection against latest vulnerabilities • IPS Policy Tuner • Allows multiple IPS policies • Granular control over IPS policies • Unnecessary alerts • Reduced traffic latency • Improved performance

  14. SECURITY»Network Security»IPS • Cyberoam IPS + Layer 8 Technology • Identity-based IPS policies per user or group • Identity-based alerts and reports • Visibility into applications – User, Source, Destination, Usage • Overview of threat status – Top alerts, top attackers, top victims

  15. SECURITY»Network Security»Wireless security • Wireless (WLAN) Security • High performance, integrated security over WLAN • Secures wireless networks to the extent of wired networks • Supports 802.11n wireless standard • Layer 8 over WLAN • Identity-based policies in dynamic IP environment • MAC-based filtering • Supports IP-address pool • Enhances security

  16. indicates feature offered only by top-rated UTMs SECURITY»Content Security»Anti-Malware • Gateway Anti-Malware • 4 million+ signatures • Bi-directional scanning of web & email • Self-service Virus Quarantine • Reduced window of vulnerability • Broadest security cover against all malware • Scans • HTTP, FTP, SMTP, POP3 • HTTPS, IMAP • Instant Messenger traffic • Layer 8 Impact • Identity-based virus reports • Instant visibility into attacker/victim • Identity-based Quarantine policies

  17. SECURITY»Content Security»Anti-Spam • Gateway Anti-Spam • IP Reputation Filtering • Blocks 85% of incoming messages at gateway • Saves bandwidth • Near 98% spam detection • False Positive rate of 1 in a million • Reduces fear of losing business emails • - Self-Service quarantine area

  18. SECURITY»Content Security»Anti-Spam • User-based Spam Digest • Frees administrator time & management • Manage Email recipients • Data leakage prevention and archiving • Scanning with Recurrent Pattern Detection (RPD) technology • Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 • Virus Outbreak Detection (VOD) for zero-hour protection • Scans SMTP, POP3, IMAP traffic

  19. SECURITY»Content Security»Anti-Spam • RPD Technology • Most outbreaks last only a few hours • Cyberoam identifies outbreaks real-time • Signature-based Anti-Spam take time to release signatures • Users remain unprotected till Anti-Spam is updated • Too late to battle out the initial peak of attack

  20. indicates feature offered only by top-rated UTMs SECURITY»Content Security»HTTPS Content Security • HTTPS/SSL Content Security • Scans SSL traffic for virus & malware • Controls File upload over SSL • Reports files uploaded via SSL • Stops HTTPS/SSL as a medium for • Data Leakage • Malware Propagation

  21. SECURITY»Administrative Security»Next-Gen UI • Next-Gen UI • Web 2.0 technology advantages • Easy navigation, custom controls, intuitive interface • Fewer security errors - Increases security • Enhances administrative productivity • Shorter learning curves • Unified Security • Rules for all security features from firewall page

  22. SECURITY»Administrative Security»iView- Logging & Reporting • Cyberoam iView – On-Appliance Logging & Reporting • Ability to log and report activities • LAYER 8 - Identity-based logging and reporting – Pinpoints the user • Security Management • iView dashboard- Shows network attacks on single screen • Drill-down reports – 3rd level drill-down for attack details • 1000+ Reports • Log Management • Compliance Management • HIPAA, PCI DSS, GLBA, and more • Forensic Analysis

  23. Security Management Forensic Analysis Data Protection Compliance Management Identity Logging Reporting Logs & Events Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

  24. CYBEROAM ASSURES CONNECTIVITY Business Continuity Network Availability Future-ready connectivity • Multiple Link Management • High Availability • VPN • 3G/WiMAX modem support • IPv6

  25. CONNECTIVITY » Business Continuity » Multiple Link Management • Multi-Link Management • Automated Load balancing assures ROI/investment • Support for more than 2 ISP links • Supports Wireless WAN (3G USB modems) 3G

  26. CONNECTIVITY » Business Continuity » Multiple Link Management • Link Failover • Supports multiple failover conditions • Monitors link availability of multiple WAN connections • Transfers traffic from a failed link to a working link • Maximizes business up-time • Optimizes link utilization for business continuity • Active-Active Auto Link Failover • Active-Passive Auto Link Failover • Support for more than 2+ ISP links • Supports WWAN for failover

  27. CONNECTIVITY » Business Continuity » Multiple Link Management • Layer 8 Policy-based Routing • Routes traffic based on: • Source IP addresses • Protocols • Users • Assures Quality of Service for key users and applications

  28. CONNECTIVITY » Business Continuity » High Availability • ICSA Labs Certified Active Active High Availability • Maximizes network uptime • Reduces single-point-of-failure • Ensures continuous Cyberoam security • Ensures business continuity

  29. CONNECTIVITY » Network Availability » VPN • Virtual Private Network (VPN) • Anywhere, any device secure remote connectivity • Supports • IPSec, L2TP, PPTP technologies • SSL-VPN • Client-type independent Web access mode • Application access mode • Client mode • Threat Free Tunneling (TFT) Technology • Scans traffic entering VPN tunnel for: • Malware • Spam • Inappropriate content • Intrusion attempts • Maintains secure endpoint and network environments

  30. CONNECTIVITY » Network Availability » 3G/WiMAX modem support • 3G/WiMAX – USB Modem Support • High-speed wireless WAN (WWAN) • Wide ISP support • All gateway security features available • Can function as a main or failover link 3G

  31. CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization Administrator Productivity • Content Filtering • IM controls • Bandwidth Management • Traffic Discovery • Layer 7 • Next-Gen UI

  32. CONNECTIVITY » Future-ready connectivity » IPv6 • IPv6 • ‘IPv6 Ready’ gold logo • Cyberoam identifies and processes IPv6 traffic • Third-party validation • International Testing Program with 3000+ rigorous test cases • IPv6 compliance to become mandatory in government and other enterprises • Driven by diplomatic initiatives

  33. Productivity»Employee Productivity»Content Filtering • Content Filtering • Industry’s most comprehensive URL database • 82+ categories • 44 million+ URLs • On-appliance web category database • Faster access • Surfing pattern privacy • Controls access to HTTP & HTTPS hosted websites • Increases productivity

  34. Productivity»Employee Productivity»Content Filtering • Controls that are difficult to bypass • Blocks Google cache pages • Search keyword reports • Blocks embedded URLs • Detects/Blocks Third Party Proxy and Tunneling software • Controls access to Instant Messengers, P2P • Controls Data Leakage • Blocks files from uploading to web pages • Blocks file transfer through Instant Messengers

  35. Productivity»Employee Productivity»IM controls • IM Controls • Identity-based controls for Yahoo messenger and Windows Live Messenger • Scans malware • Logs and controls • Access • Conversation • File transfer • Voice/Webcam

  36. Productivity»IT Resource Optimization»Bandwidth Management • Best of Breed Bandwidth Management/QoS • Application and Identity-based bandwidth allocation • Category wise Bandwidth management • Restrict Bandwidth usage for a combination of source, destination and service/service group • Schedule-based bandwidth allocation • Committed and burstable bandwidth

  37. Productivity»IT Resource Optimization»Traffic Discovery • Traffic Discovery • Real-time visibility into bandwidth utilization by user, protocol, application • Provides visibility of unproductive usage of resources and threat incidence

  38. Productivity»IT Resource Optimization»Layer 7 • Layer 7 • Offers visibility and management over Application Layer 7 • Allows control over application, user, time and bandwidth • Essential for Cloud Computing • Bandwidth Management assures availability of business-critical applications • Controls bandwidth costs

  39. Bit Torrent CRM VoIP ERP IM Application Web mail Medium Quality Internet High Quality Low Quality Application Layer 7 Visibility

  40. Cyberoam Architecture • Multi-core Technology • High Security without compromising on performance • Multi-core processors • Parallel processing of Cyberoam security features • Real-time, Unified Security • Higher Throughputs • High-speed memory access to signatures • Security against advanced threats

  41. Cyberoam Architecture • Extensible Security Architecture (ESA) • Ability to adapt to future security needs • Ability to support feature enhancements in future • Ready for future upgrades Vs ASIC

  42. Cyberoam Central Console

  43. Cyberoam Central Console • Centralized controls and security management over remote networks • Reduces operational complexity and deployment time • Minimizes errors and lowers administration cost • Enables the MSSPs to have different personnel for managing different customer deployments • Ease of use with view of multiple devices and network status at a glance

  44. SSL VPN

  45. SSL VPN • Supports remote access VPN users and site-to-site VPN connections • Accommodates between 50 to 1000 concurrent users • Policy-based resource access control • Zero-client administration • Flexibility in purchasing remote security solutions: • Virtual appliance mode • Dedicated appliance mode

  46. Dedicated SSL VPN appliance Deployment

  47. Virtual SSL VPN Deployment Diagram

  48. Cyberoam iView

More Related