450 likes | 677 Views
Cyberoam Virtual UTM. Our Products. Unified Threat Management. Benefits. Virtualization Strategy: Data Center. Simplify server management Reduce infrastructure costs Reduce physical server sprawl Reduce power consumption Implement scalable system to cater for future growth.
E N D
Cyberoam Virtual UTM Our Products UnifiedThreatManagement
Benefits Virtualization Strategy: Data Center • Simplify server management • Reduce infrastructure costs • Reduce physical server sprawl • Reduce power consumption • Implement scalable system to cater for future growth
Workstation virtualization Transform single host server into workgroup of multiple users Benefits Virtualization Strategy: Office in a Box • Reduce infrastructure costs • Centralized control • Works in a BYOD scenario
Getting office into a box : Enterprise scenario Branch office 1 Corporate office Branch office 2
Scanning InterVM traffic Cannot scan Inter-VM traffic with externally based security hardware A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control Tying service access and network usage to user Identity Security hardware cannot offer inline protection Traffic flows are invisible; creating blindspots in network Cannot conduct forensic analysis and display compliance Security challenges in Virtualization • Need of virtual security solution for virtual environment
Cyberoam Virtual UTM – Solving Virtual Problems
Cyberoam Virtual appliance • Resides on the Virtual layer • Scans all traffic inside virtual environment VM1 VM2 VM3 Best-of-breed security • Stateful inspection firewall • Intrusion Prevention System • Gateway Antivirus • Anti-spyware and Anti-spam • Web filtering • Application Visibility & Control • Web Application Firewall (WAF) • Virtual Private Network • Logging & Reporting • Layer 8 Identity-based security Apps Apps Apps Other OS Windows OS Linux OS Hypervisor Cyberoam Virtual UTM appliance Hardware
Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports Security in a Virtual Data Center
Scenario: Security in a Virtual Data Center vSwitch Internet vSwitch Cyberoam vUTM vSwitch administrator
Virtualization platforms Supported • VMware ESX/ESXi 3.5/4.0/4.1/5.0 • VMware Workstation 7.0 or 8.0 • VMware Player 3.0 or 4.0
Cyberoam Virtual UTM appliance models Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
Take Control of Your Security Infrastructure with Cyberoam • Take Control of • WHAT you want? • HOW MUCH you want? • HOW you want?
Content • Introduction – Cyberoam Virtual UTM • Cyberoam Virtual UTM – Trial • Order • Registration • Cyberoam Virtual UTM – Upgrade • Order • Apply Upgrade • Resources
Introduction Cyberoam Virtual UTM
Cyberoam Virtual UTM – CRiV Series • Platform support: • VMware ESX/ESXi 4.0/4.1/5.0 • VMware Workstation 8.0/9.0 • Base Configuration Required: • One vCPU • 1GB vRAM • 3 vNIC • Primary Disk with 4GB size • Report Disk with 80GB size • 1 Serial Port • 1 USB Port
Cyberoam Virtual UTM Subscription ●Available ○Optional
STEP 01 Customer Visit www.cyberoam.com & Click on “Try & Buy”
STEP 02 Customer Cyberoam sales team forwards customer lead to respective partner
Steps For Customer Continued
STEP 03 Customer Visit https://customer.cyberoam.com • Existing Customers Login to Customer Portal • New Customers create account and Login with credentials
STEP 04 Customer
STEP 05 Customer • Enter Trial Appliance Key and other details
STEP 06 Customer Email to customer confirming registration of virtual appliance
STEP 07 Customer Email to customer with steps to download Virtual UTM appliance
STEP 08 Customer • Download Virtual UTM OVF • Install Cyberoam Virtual UTM • (Refer Installation Guide for reference)
STEP 09 Customer • Click on Registered appliance key to see appliance information
STEP 10 Customer
Cyberoam Virtual UTM – Upgrade • Upgrade from Trial to Full Version • Upgrade to Higher model
Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order
STEP 01 Customer • Login to Virtual UTM’s CLI Console • From the Menu select “License upgrade”
STEP 02 Customer • From the Menu select Purchased Model No.
STEP 03 Customer • Enter Upgrade Key to activate the purchased appliance • On successful activation previous appliance expires and new registered appliance is shown in customer portal
Cyberoam’s Security Portfolio Software