1 / 43

Cyberoam Virtual UTM

Cyberoam Virtual UTM. Our Products. Unified Threat Management. Benefits. Virtualization Strategy: Data Center. Simplify server management Reduce infrastructure costs Reduce physical server sprawl Reduce power consumption Implement scalable system to cater for future growth.

gerek
Download Presentation

Cyberoam Virtual UTM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberoam Virtual UTM Our Products UnifiedThreatManagement

  2. Benefits Virtualization Strategy: Data Center • Simplify server management • Reduce infrastructure costs • Reduce physical server sprawl • Reduce power consumption • Implement scalable system to cater for future growth

  3. Workstation virtualization Transform single host server into workgroup of multiple users Benefits Virtualization Strategy: Office in a Box • Reduce infrastructure costs • Centralized control • Works in a BYOD scenario

  4. Getting office into a box : Enterprise scenario Branch office 1 Corporate office Branch office 2

  5. Virtualization – You Gain Some, You Lose Some

  6. Scanning InterVM traffic Cannot scan Inter-VM traffic with externally based security hardware A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control Tying service access and network usage to user Identity Security hardware cannot offer inline protection Traffic flows are invisible; creating blindspots in network Cannot conduct forensic analysis and display compliance Security challenges in Virtualization • Need of virtual security solution for virtual environment

  7. Cyberoam Virtual UTM – Solving Virtual Problems

  8. Cyberoam Virtual appliance • Resides on the Virtual layer • Scans all traffic inside virtual environment VM1 VM2 VM3 Best-of-breed security • Stateful inspection firewall • Intrusion Prevention System • Gateway Antivirus • Anti-spyware and Anti-spam • Web filtering • Application Visibility & Control • Web Application Firewall (WAF) • Virtual Private Network • Logging & Reporting • Layer 8 Identity-based security Apps Apps Apps Other OS Windows OS Linux OS Hypervisor Cyberoam Virtual UTM appliance Hardware

  9. Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports Security in a Virtual Data Center

  10. Scenario: Security in a Virtual Data Center vSwitch Internet vSwitch Cyberoam vUTM vSwitch administrator

  11. Virtualization platforms Supported • VMware ESX/ESXi 3.5/4.0/4.1/5.0 • VMware Workstation 7.0 or 8.0 • VMware Player 3.0 or 4.0

  12. Cyberoam Virtual UTM appliance models Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.

  13. Take Control of Your Security Infrastructure with Cyberoam • Take Control of • WHAT you want? • HOW MUCH you want? • HOW you want?

  14. Virtual UTM - Workflow

  15. Content • Introduction – Cyberoam Virtual UTM • Cyberoam Virtual UTM – Trial • Order • Registration • Cyberoam Virtual UTM – Upgrade • Order • Apply Upgrade • Resources

  16. Introduction Cyberoam Virtual UTM

  17. Cyberoam Virtual UTM – CRiV Series • Platform support: • VMware ESX/ESXi 4.0/4.1/5.0 • VMware Workstation 8.0/9.0 • Base Configuration Required: • One vCPU • 1GB vRAM • 3 vNIC • Primary Disk with 4GB size • Report Disk with 80GB size • 1 Serial Port • 1 USB Port

  18. Cyberoam Virtual UTM Subscription ●Available ○Optional

  19. Cyberoam Virtual UTM – Trial

  20. Cyberoam Virtual UTM – Trial Order

  21. Steps For Customer

  22. STEP 01 Customer Visit www.cyberoam.com & Click on “Try & Buy”

  23. STEP 02 Customer Cyberoam sales team forwards customer lead to respective partner

  24. Cyberoam Virtual UTM – Trial Registration

  25. Steps For Customer Continued

  26. STEP 03 Customer Visit https://customer.cyberoam.com • Existing Customers Login to Customer Portal • New Customers create account and Login with credentials

  27. STEP 04 Customer

  28. STEP 05 Customer • Enter Trial Appliance Key and other details

  29. STEP 06 Customer Email to customer confirming registration of virtual appliance

  30. STEP 07 Customer Email to customer with steps to download Virtual UTM appliance

  31. STEP 08 Customer • Download Virtual UTM OVF • Install Cyberoam Virtual UTM • (Refer Installation Guide for reference)

  32. STEP 09 Customer • Click on Registered appliance key to see appliance information

  33. STEP 10 Customer

  34. Cyberoam Virtual UTM – Upgrade • Upgrade from Trial to Full Version • Upgrade to Higher model

  35. Cyberoam Virtual UTM – Upgrade Order

  36. Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order

  37. Cyberoam Virtual UTM – Apply Upgrade

  38. Steps For Customer

  39. STEP 01 Customer • Login to Virtual UTM’s CLI Console • From the Menu select “License upgrade”

  40. STEP 02 Customer • From the Menu select Purchased Model No.

  41. STEP 03 Customer • Enter Upgrade Key to activate the purchased appliance • On successful activation previous appliance expires and new registered appliance is shown in customer portal

  42. Cyberoam’s Security Portfolio Software

  43. Thankyou

More Related