1 / 39

Unified Threat Management

CYBEROAM. Comprehensive Network Security. Cyberoam End Point Data Protection. Presented by: Shailesh Mecwan, Manager - Channel sales (Europe). Unified Threat Management. Agenda of Presentation. Why MSSP? Drivers of MSSP business Customer s’ criteria Challenges of MSSP

ulla
Download Presentation

Unified Threat Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBEROAM Comprehensive Network Security Cyberoam End Point Data Protection Presented by: Shailesh Mecwan, Manager - Channel sales (Europe) Unified Threat Management

  2. Agenda of Presentation • Why MSSP? • Drivers of MSSP business • Customer s’ criteria • Challenges of MSSP • How can Cyberoam help? • What is Cyberoam? • Cyberoam product range • Business Model • Questions and Answers

  3. Why get into Managed Security Services business in Europe? • MSS market in Europe = USD 2.1 billion (in 2010) • Expected compound annual growth rate = 14 %

  4. Drivers for employing Managed Security Services (MSS) Source: Forrester Research

  5. Customer’s criteria to evaluate MSSPs • Ability of the MSSP to present their coverage of services • Comprehensive Security Management • Depth of Security Expertise • Help in taking decisions in real-time • Quality of Service • Delivery Capabilities • SLA’s • Cost • Compliance Requirements

  6. Challenges of MSSP • Providing best quality of services to clients with least effort and cost • Provide higher coverage of managed security services • Centralized control of client network’s security • Policy setting, Modification, Monitoring Performance, Reacting to situations in time, Pro-active security management • Have a system that • Is simple to configure and manage • helps meet the SLA’s • Help customers to display compliance • Ability to offer flexible security plans to clients

  7. How can Cyberoam help?

  8. Cyberoam deployment scenario for MSSPs Customer Appliances Group: Customer2 Group: Customer1 Group: Customer3 Stockholm Berlin Prague Vilnius Warsaw Paris Boston Dubai New York MSSP Network

  9. Internal threats • Identity theft • Data loss • Data deletion • Data modification • Data theft • DoS attacks • Hacking External threats • Worms • Malicious code • Virus • Malware Social Engineering threats • Spam • Phishing • Pharming User – The Weakest Security Link USER Attack on Organization

  10. User User Layer 8 – The Human Layer • Layer 8 Technology – Security around the User • Network security decisions based on Usernames and IP Addresses • Control Who is doing What in the network • Allows creation of User Identity-based security policies • Identifies traffic by username even in case of dynamic IP indicates a feature unique to Cyberoam

  11. Benefits of UTM Appliances • Reduced complexity • All-in-one approach simplifies product selection, integration and support • Easy to deploy • Customers, VARs, VADs, MSSPs can easily install and maintain the products • Remote Management • Remote sites may not have security professionals – requires plug-and-play appliance for easy installation and management • Better Man Power Management • Reduction in dependency and number of high end skilled Human resources • Managed Services • Security requirements & day to day operations can be outsourced to MSSPs

  12. Identity-based security in DHCP environment Corporate LAN DHCP Internet 192.168.3.105 Richard 192.168.3.110 Steve 192.168.3.110 Ancy • Applies security policies based on actual identity of users. • User-specific rules for multiple users to share a common IP address 192.168.3.105 192.168.3.110 192.168.3.110 Administrator

  13. Layer 8 – The Human Layer • Cyberoam’s Layer 8 Technology adds SPEED to security • Offers instant visibility into source of attacks • Identifies attackers/victims with usernames • Allows immediate remediation to restore security or enables proactive security • Quickly and easily configure and manage policies based on users

  14. Cyberoam UTM- Identity-based Security • Gateway Integrated security over single platform • Layer 8 penetrates through each security module • Reduced TCO (Total Cost of Operations) • Best Quality of Security features • Lower expenditure • Ease of Management • Reduced cost of training and support • Ability to upgrade to future threats • Security subscriptions as needs grow

  15. Know who is doing what in your Network with Cyberoam’s Layer 8 Technology

  16. Other UTMs Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits User Login • User • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity - based • Logs + Reports • Compliance Reports Cyberoam Layer 8 Advantage • MAC Id • Session Id

  17. Cyberoam UTM solves Organizational Concerns

  18. Cyberoam UTM Product Range Small Offices SME Enterprises 15wi, 15i, 25ia, 25wi, 35ia, 35wi 50ia, 100ia, 200i, 300i 500ia, 750ia, 1000ia, 1500ia

  19. Cyberoam Central Console (CCC Series) • Cyberoam Central Console is an centralized integrated management and monitoring appliance allows to manage multiple, dispersed Cyberoam UTM Installations. • Cyberoam Central Console helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam Installations centrally.

  20. Virtual CCC deployment for MSSPs Customer Appliances Group: Customer2 Group: Customer1 Group: Customer3 Boston Dubai New York Boston Dubai New York Boston Dubai New York MSSP Network

  21. Virtual CCC Appliances • Benefits of Virtual CCC appliances • Eliminates need for dedicated hardware • Use existing VMware environment • Simplifies future upgrades • Reduces cost of ownership

  22. Server-based Workstation-based Application Server, Email Server Virtual Workstation

  23. CCC - Easy, instant security policy enforcement • Simplified security management • Centralized policy creation and implementation for Cyberoam UTM features like Firewall, IPS etc. • Leads to uniform adoption of security practices across offices • Establish policies based on work-profiles across offices • Subscription and signature updates for Cyberoam UTM features like Gateway Anti-virus, Anti-Spam etc. • Protection against zero-hour threats

  24. CCC – Ease and flexibility of management • Easy grouping of Cyberoam UTM appliances • Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions • Dynamic views in CCC help in managing, searching and sorting appliances • Customizable and multiple dashboards

  25. CCC – Security against misuse of administrator privileges • Role-based administration privileges • For CCC appliance • Individual Cyberoam appliances • Groups of Cyberoam UTM appliances

  26. CCC – Audit logs & alerts for organization-wide security visibility • Logs and views of administrator actions as well as dispersed UTM appliances • Instant security visibility • Supports regulatory compliance • Investigative analysis • Keeping track of historical activity • Email alerts • Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits etc. • Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count etc.

  27. CCC Features & Benefits

  28. Virtual CCC Appliance Product Range • Use existing virtual environment to host CCC • VMware-based Virtual CCC appliances • Virtual CCC for VMware Server • CCC VMS 15, CCC VMS 50, CCC VMS 100, CCC VMS 200 • Virtual CCC for VMware Workstation • CCC VMW 15, CCC VMW 50, CCC VMW 100, CCC VMW 200

  29. Security Management Forensic Analysis Data Protection Compliance Management Identity Logging Reporting Servers Desktop systems Logs & Events Applications Firewalls UTM IDP / IPS Routers Switches Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

  30. iView - Cyberoam’s Logging and Reporting Tool • MSSPs can aggregate the reports of various customers • Free (Open Source) • Aggregation of logs and data from multiple CR appliances as well as competitor appliances, Squid, Access Gateway etc • Centralized storage of reports and log data • View reports of specific devices • Application Usage Reports • User-wise web surfing reports • Real-time Monitoring and Alerting • Over 1000+ Drilldown Reports • Reports in HTML, PDF, & CSV formats & Email Alerts • Web 2.0 GUI and Reporting interface • Role based user access of iView

  31. iView - Compliance Reports • PCI (Payment Card Industry) • HIPPA (Health Insurance Portability and Accountability Act) • GLBA (Gramm-Leach-Bliley Act) • SOX (Sarbanes-Oxley Act) • FISMA (Federal Information Security Management Act)

  32. Cyberoam Business Model

  33. Cyberoam Business Model • 100% Channel focused company • Quick product support • Better margin • Access to Sales Leads • Lead locking facility • Marketing support • Access to comprehensive Knowledgebase • Technical and Sales training (free of cost) • Access to market development funds • Access to Cyberoam Partner Portal

  34. Q&A If any??

  35. Thank you! shailesh.mecwan@cyberoam.com Phone: +91-9974060355 (24X7)* Skype: shailesh.elitecore

More Related