1 / 62

Cyberoam Virtual UTM

Cyberoam Virtual UTM. Our Products. Unified Threat Management. Different Stages Virtualization Implementation. Already Implemented In Process In Planning. Benefits. Virtualization Strategy: Data Center. Simplify server management Reduce infrastructure costs

Download Presentation

Cyberoam Virtual UTM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberoam Virtual UTM Our Products UnifiedThreatManagement

  2. Different Stages Virtualization Implementation • Already Implemented • In Process • In Planning

  3. Benefits Virtualization Strategy: Data Center • Simplify server management • Reduce infrastructure costs • Reduce physical server sprawl • Reduce power consumption • Implement scalable system to cater for future growth

  4. Workstation virtualization Transform single host server into workgroup of multiple users Benefits Virtualization Strategy: Office in a Box • Reduce infrastructure costs • Centralized control • Works in a BYOD scenario

  5. Getting office into a box : Enterprise scenario Branch office 1 Corporate office Branch office 2

  6. Virtualization – You Gain Some, You Lose Some

  7. Scanning InterVM traffic Cannot scan Inter-VM traffic with externally based security hardware A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control Tying service access and network usage to user Identity Security hardware cannot offer inline protection Traffic flows are invisible; creating blindspots in network Cannot conduct forensic analysis and display compliance Security challenges in Virtualization • Need of virtual security solution for virtual environment

  8. Cyberoam Virtual UTM – Solving Virtual Problems

  9. Cyberoam Virtual appliance • Resides on the Virtual layer • Scans all traffic inside virtual environment VM1 VM2 VM3 Best-of-breed security • Stateful inspection firewall • Intrusion Prevention System • Gateway Antivirus • Anti-spyware and Anti-spam • Web filtering • Application Visibility & Control • Web Application Firewall (WAF) • Virtual Private Network • Logging & Reporting • Layer 8 Identity-based security Apps Apps Apps Other OS Windows OS Linux OS Hypervisor Cyberoam Virtual UTM appliance Hardware

  10. Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports Security in a Virtual Data Center

  11. Scenario: Security in a Virtual Data Center vSwitch Internet vSwitch Cyberoam vUTM vSwitch administrator

  12. Scenario: Enterprise/ MSSP Security in a Box Complete Virtual Security solution BO/Customer n BO/Customer 3 BO/Customer 2 BO/Customer 1

  13. MSSP Scenario1: MSSP + Hosting Services Provider Customer 1 Internet Central Console & Logging /Reporting Customer 2 Customer 3 vSwitch vSwitch vSwitch vSwitch Cyberoam vUTM Cyberoam vUTM Cyberoam vUTM Cyberoam vUTM vSwitch vSwitch vSwitch vSwitch administrator

  14. On-premise deployment MSSP Scenario2: On-premise deployment vSwitch Internet MSSP vSwitch Cyberoam vUTM administrator At Customer premise

  15. MSSP Scenario3: ISP as an MSSP Customer 1 Internet R1 R4 vUTM - Customer 1 vUTM – Customer 2 vUTM – Customer 3 ISP Switch R3 R2 Customer 2

  16. Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more Access control for users Tying service access and network usage to user Identity Provides multiple security features on single appliance Cyberoam protects Virtual Office or ‘Office in a box’

  17. Scenario: Office-in-a-box setup Internet Switch Switch vSwitch LAN vSwitch Cyberoam vUTM administrator Repurposed PC Laptop Thin Client

  18. Cyberoam offers • Protection for virtualized networks • Protects hypervisor management console, hypervisor & Guest OS • Scan Inter-VM traffic • Secure zero trust networks • Comprehensive Security • Consolidate multiple security features on single virtual appliance • Secures virtual networks to the extent of physical networks • Ease to deployment • Offers flexibility to allot number of vCPUs • Easy to upgrade with simple activation key

  19. Cyberoam offers • Compliance Management • Segregates and secures traffic and data between and around virtual entities to help stay regulatory compliant • Display compliance with indepth on-appliance reports • Centralized Management for Virtual & Physical appliances • Centrally manage physical and virtual infrastructure using single interface with CCC (Cyberoam Central Console) • Available as Virtual CCC and Hardware CCC • Ensure centralized, consistent and quick security actions across your network

  20. Virtualization platforms Supported • VMware ESX/ESXi 3.5/4.0/4.1/5.0 • VMware Workstation 7.0 or 8.0 • VMware Player 3.0 or 4.0

  21. Cyberoam Virtual UTM appliance models Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.

  22. Cyberoam’s Security Portfolio Software

  23. Take Control of Your Security Infrastructure with Cyberoam • Take Control of • WHAT you want? • HOW MUCH you want? • HOW you want?

  24. Virtual UTM - Workflow

  25. Content • Introduction – Cyberoam Virtual UTM • Cyberoam Virtual UTM – Trial • Order • Registration • Cyberoam Virtual UTM – Upgrade • Order • Apply Upgrade • Resources

  26. Introduction Cyberoam Virtual UTM

  27. Cyberoam Virtual UTM – CRiV Series • Platform support: • VMware ESX/ESXi 4.0/4.1/5.0 • VMware Workstation 8.0/9.0 • Base Configuration Required: • One vCPU • 1GB vRAM • 3 vNIC • Primary Disk with 4GB size • Report Disk with 80GB size • 1 Serial Port • 1 USB Port

  28. Cyberoam Virtual UTM Subscription ●Available ○Optional

  29. Cyberoam Virtual UTM – Trial

  30. Cyberoam Virtual UTM – Trial Order

  31. Steps For Customer

  32. STEP 01 Customer Visit www.cyberoam.com & Click on “Try & Buy”

  33. STEP 02 Customer Cyberoam sales team forwards customer lead to respective partner

  34. Steps For Partner Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial

  35. STEP 01 Partner Visit https://partner.cyberoam.com

  36. STEP 02 Partner

  37. STEP 03 Partner

  38. Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer

  39. Cyberoam Virtual UTM – Trial Registration

  40. Steps For Customer Continued

  41. STEP 03 Customer Visit https://customer.cyberoam.com • Existing Customers Login to Customer Portal • New Customers create account and Login with credentials

  42. STEP 04 Customer

  43. STEP 05 Customer • Enter Trial Appliance Key and other details

  44. STEP 06 Customer Email to customer confirming registration of virtual appliance

  45. STEP 07 Customer Email to customer with steps to download Virtual UTM appliance

  46. STEP 08 Customer • Download Virtual UTM OVF • Install Cyberoam Virtual UTM • (Refer Installation Guide for reference)

  47. STEP 09 Customer • Click on Registered appliance key to see appliance information

  48. STEP 10 Customer

  49. Cyberoam Virtual UTM – Upgrade • Upgrade from Trial to Full Version • Upgrade to Higher model

  50. Cyberoam Virtual UTM – Upgrade Order

More Related