1 / 59

Future is Ready. Are You?

Future is Ready. Are You?. A Glimpse into the Future of networks…. Super Fast Internet. Data to move at 10 times current Internet speeds Google launched ‘Google Fiber’ service that offers a 1000 Mbps Internet service UK ISP, IDNet , launched 1000 Mbps Leased Line Business Ethernet Service.

Download Presentation

Future is Ready. Are You?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Future is Ready. Are You?

  2. A Glimpse into the Future of networks…

  3. Super Fast Internet • Data to move at 10 times current Internet speeds • Google launched ‘Google Fiber’ service that offers a 1000 Mbps Internet service • UK ISP, IDNet, launched 1000 Mbps Leased Line Business Ethernet Service 1000 Mbps 1000 Mbps

  4. Device Explosion: Multiple Internet Access Devices per User • Each device will have a unique IP address • Employee-owned smart devices to reach 350mn by 2014, up from 150mn this yr • 1 Billion Smart Devices Shipped in 2011, Expected to Double by 2016

  5. Cloud: Web Applications • Critical business applications and Services moving to the Web • Cloud Computing will generate more than $45.4 billion in revenue by 2015! Email Server HR ERP Mobile Apps Intranet CRM Critical business applications

  6. Cloud: Explosion of Internet Applications • Infinite applications on the Internet Internet

  7. How will Organizations Gain? CONNECTIVITY PRODUCTIVITY With Network Connectivity & Productivity taking a leap, what about Security? SECURITY

  8. Can your Security keep pace? • The New Network Infrastructure • SOHO /SMB network infrastructure is moving to Gigabit! • Anything less than Gigabit is nearly obsolete! • Does your security appliance have Gigabit ports? • Does any security vendor offer network security appliances with Gigabit ports to these segments? • Superfast Internet Speeds • Gigabit Internet speeds to be soon available from ISPs /Telcos • Can your security appliance match high Internet speeds? • Does it offer Gigabit throughputs? • Device Explosion • More devices per employee connecting to the IT network • Changing approach from ‘Users’ to ‘Devices’ • Can your security appliance support more number of Devices?

  9. Can your Security keep pace? • Explosion of Internet applications • Leading to ‘Application Chaos’! • What level of application control granularity does your Security offer? • Critical business applications moving to Cloud • Internet-facing applications face risk of getting hacked • Does your security offer web application protection?

  10. No one wants SECURITY to become a bottleneck in their network!

  11. What can SOHO/SMBs do to prevent Security from becoming a bottleneck in progress? Expand Security budgets to buy Enterprise security solutions • Move to Future-Ready security appliances Or IT Manager

  12. Presenting The Cyberoam NG series The ‘Next-Generation’ appliances built for Future-ready Security in networks!

  13. Cyberoam NG series offers ‘Future-Ready’ Security • The ‘Fastest UTM appliances’ for SOHO and SMB segments • Next-Generation Firewall protection for Large Enterprises! • Offers Future-Ready security to: • SOHO, ROBO • CR15iNG, CR25iNG, CR35iNG • Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG • SMB • CR50iNG, CR100iNG • Enterprise • CR2500iNG

  14. How Cyberoam NG series offers Future-Ready Security?

  15. Appliances starting with Gigabit Firewall Throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

  16. Best in class UTM throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

  17. Powerful Hardware for Future-Ready Security • Superfast processing speed • A must for Gigabit Internet speeds! • Nano second security processing with Giga Hertz processors • Parallel security processing with Dual core • Gigabit Ports to enable Gigabit Speeds • Gigabit Ethernet for future SOHO & SMB networks • Higher port density

  18. Complete overhaul of appliance design to provide Future-Ready Security • Next-Gen Fast Memory • Larger memory size for Enterprise-grade security • DDR3 RAM for more number of data transfers per clock cycle • Faster, Next-Gen memory for higher I/O throughput • High Capacity Storage • Today, higher throughput leads to more activities, generating more data. • More storage for more reports • Reports stored for longer duration • Superior Quality for High Performance and Robustness • Design & components supporting high speed I/O throughput • Designed to protect against power surge & fluctuations • Industrial grade components to withstand extreme environments

  19. Wi-Fi Security appliances for SOHO/ROBO networks • Faster performance, broader coverage with 3x3 MIMO Technology • Dual band support: 2.4 GHz or 5 GHz • Higher performance by aggressively transmitting and receiving data over Wi-Fi channels • Faster handling of video streaming and high bandwidth downloads • High performance integrated security over WLAN • Secures wireless networks to the extent of wired networks

  20. The NG Series-Loaded with All-New Firmware

  21. The most Intelligent and Powerful Cyberoam firmware • Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance • Better use of Multicore architecture for Parallel processing • Optimize workload distribution across cores • Lockless path for packet forwarding • A single core handles packets for each connection at any given time to avoid inter-locks • Optimize Interrupt rates for minimum CPU overhead and latency • High rate of interrupts - A bottleneck in high-speed data transfers • FastPath packets to improve processing speed and reduce CPU overhead

  22. The NG Series-Interactive, Easy to use, All-new GUI

  23. Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

  24. The need for Next Generation Security features…

  25. The need to be more application-layer aware than ever before • Explosion of Internet Applications • Need to control which applications are important to business and run on network Internet

  26. NG series offers Advanced Application Controls

  27. Take complete control over applications running on your network

  28. Bit Torrent CRM VoIP ERP IM Application Web mail Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls Medium Quality Internet High Quality Low Quality Control over

  29. Granular classification of applications

  30. Proactive Protection Model • Easy selection of filtering criteria by administrator • Technology, Risk Level, Characteristics • Set action – regardless of application name • Allow or Deny • Allow/Block all future applications included for respective criteria • No administrator intervention needed to add new applications to policy

  31. The increasing need to protect Web Applications from hackers • Legacy business applications moving to the Web • Firewalls/IPS cannot protect Web application from unknown threats Email Server HR ERP Mobile Apps Intranet CRM Critical business applications

  32. NG series offers On-Appliance Web Application Firewall

  33. On-Appliance Web Application Firewall • No need to buy dedicated WAF appliance • Protect Web Servers and Web Applications from hackers • Prevents hackers from exploiting Web-Application Vulnerabilities • Positive protection model and No Signature Tables • Intuitive website flow detector automatically adapts to website changes • Protects against OWASP top 10 vulnerabilities

  34. The ever increasing need for identity awareness and granular controls • Increasing instances of insider threats • Increasing need to implement acceptable use policies to greater granularity at user and group level • Binding service access and network usage to user Identity to enhance user productivity • Tracking end user activities with logs, reports and forensic ability to comply to regulatory needs

  35. NG series offers Layer 8 granular Identity-based Security

  36. Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits • User Name • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity - based • Logs + Reports • Compliance Reports User Login Cyberoam’s Layer 8 (Identity-based) security • Control over staff network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions

  37. NG series offers First-of-its-kind On-Appliance Reporting

  38. First-of-its-kind On-appliance reporting • Eliminates the need to purchase a dedicated reporting solution • 1000+ indepth reports • Real time visibility into user and network activities • Logs and Reports help organizations with • Security management • Compliance Management • Forensic Analysis • Reports include dynamic and animated reports, in-line graphs, country maps

  39. Country Maps for Source/Destination Traffic • Graphical overview of Data transfer and Risk level

  40. Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard

  41. Dual Dashboard – Traffic and Security Dashboard Security Dashboard

  42. Dual Dashboard – Traffic and Security Dashboard Security Dashboard N/A: Private IP Others: Rest of records

  43. Application Reports

  44. Support for new Connectivity Technologies – 4G/ LTE

  45. Support for new Connectivity Technologies – 4G /LTE • Makes organizations ready for high speed future • Easy deployment for high speed Internet connection • Simple USB modem plug-in into Cyberoam appliance • Ensures business connectivity • Automatic fail-over to 4G/LTE WWAN connection • Gateway failover over VPN • VPN over 4G/LTE 4G 3G

  46. Security Features • Fusion Technology-driven SI Firewall • Interface for achieving Unified Security • Virtual Private Network (VPN) • Threat-free remote access • Threat Free Tunneling (TFT) Technology • IPSec, L2TP, PPTP and SSL-VPN

More Related