1 / 59

Cyberoam NG series: Future-ready Security

Cyberoam NG series: Future-ready Security. The Future of networks…. Where are Networks moving to?. Superfast Internet: 1000 Mbps Internet speed a reality today! More devices per user – More devices connecting to Internet More web-applications being accessed Increase in usage of data.

keiji
Download Presentation

Cyberoam NG series: Future-ready Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberoam NG series: Future-ready Security

  2. The Future of networks…

  3. Where are Networks moving to? • Superfast Internet: 1000 Mbps Internet speed a reality today! • More devices per user – More devices connecting to Internet • More web-applications being accessed • Increase in usage of data

  4. How will Organizations Gain? CONNECTIVITY PRODUCTIVITY With Network Connectivity & Productivity taking a leap, what about Security? SECURITY

  5. No one wants SECURITY to become a bottleneck in their network!

  6. Presenting The Cyberoam NG seriesThe ‘Next-Generation’ appliances built for Future-ready Security in networks!

  7. Cyberoam NG (Next-Generation) series offers ‘Future-Ready’ Security • The Fastest ‘UTM’ appliances for SOHO and SMB segments • Offering Next-Generation Firewall protection for Large Enterprises! • Offering Future-Ready security to • SOHO, ROBO • CR15iNG, CR25iNG, CR35iNG • Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG • SMB • CR50iNG, CR100iNG • Enterprise • CR2500iNG

  8. The Cyberoam NG Series • Powerful Hardware • Superior Quality • Performance Leap • Value for Money • All-New Firmware Future-Ready Security

  9. Powerful Hardware for Future-Ready Security • Superfast processing speed • A must for Gigabit Internet speeds! • Nano second security processing with Giga Hertz processors • Parallel security processing with Dual core • Next-Gen Memory • High Internet speed and data transfer demand Next-Gen memory • Larger memory size for Enterprise-grade security • DDR3 RAM for more number of data transfers per clock cycle • Faster, Next-Gen memory for higher I/O throughput

  10. Powerful Hardware for Future-Ready Security • Gigabit Ports for Gigabit Speeds • Any network security appliance with having less than Gigabit port is nearly obsolete! • All network components have moved to Gigabit ports • Gigabit Ethernet for future SOHO & SMB networks • Higher port density • More Storage • Today, higher throughput leads to more activities, generating more data. • More storage for more reports • Reports stored for longer duration

  11. Superior Quality • Better performance • Design & components supporting high speed I/O throughput • Highly robust • Designed to protect against power surge & fluctuations • Industrial grade components to withstand extreme environments

  12. Wi-Fi Security appliances for SOHO/ROBO networks • Faster performance, broader coverage with 3x3 MIMO Technology • Dual band support: 2.4 GHz or 5 GHz • Higher performance by aggressively transmitting and receiving data over Wi-Fi channels • Faster handling of video streaming and high bandwidth downloads • High performance integrated security over WLAN • Secures wireless networks to the extent of wired networks

  13. Appliances starting with Gigabit Firewall Throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

  14. Best in class UTM throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

  15. CR2500iNG: Next-Generation Firewall throughput • Supports upto 4000 users UTM throughput: 4000 Mbps 36000 Mbps

  16. Get Ready for Future Networks • 6.5 times increase in Firewall throughputs • 5 times increase in UTM throughputs • Best in class throughput against competitor models An Anti-aging remedy for your network offering the best value for money!

  17. The NG Series-Loaded with All-New Firmware

  18. The NG Series-All-New-GUI

  19. The need for “Intelligent Software” • Key challenges • Keep up with the exponentially rising Network Traffic • Reduce overall cost of networking & security equipments • Minimize power consumption • Limitation of “Hardware” • Increasing clock frequencies to boost performance leads to prohibitively high power consumption • Shift to Multicore architecture to • Meet every increasing performance • Maintain manageable levels of power consumption

  20. CyberoamOSwith ‘Intelligent Software’

  21. ‘Intelligent Software’: Doing more with less • Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance • Better use of Multicore architecture for Parallel processing • Optimize workload distribution across cores • Lockless path for packet forwarding • A single core handles packets for each connection at any given time to avoid inter-locks • Optimize Interrupt rate for minimum CPU overhead and latency • High rate of interrupts - A bottleneck in high-speed data transfers

  22. ‘Intelligent Software’: Doing more with less • Fastpath packets to improve processing speed and reduce CPU overhead • Avoid firewalling for file packets once Firewall decision is taken (unless in event of rule change). • E.g. 200 mb file. Once the Firewall decision is taken on the file, the rest file packets need not go through Firewalling decision.

  23. The need for Next Generation Security features…

  24. The need to be more application-layer aware than ever before • Explosion of Internet Applications • Risk: ‘Application Chaos’ in organization Internet

  25. NG series offers Advanced Application Controls

  26. Take control of which applications can run on your network Application Classification based on

  27. Application Classification Applications are classified based on

  28. Proactive Protection Model • Administrator can simply select filtering criteria • Technology, Risk Level or Characteristics • Set action – regardless of application name • Allow or Deny • Allow/Block all future applications included for respective criteria • No need of administrator intervention to add new applications to policy

  29. Proactive Protection Model Select P2P Applications Set Action Block all future P2P application without adding applications manually

  30. Bit Torrent CRM VoIP ERP IM Application Web mail Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls Medium Quality 5000+ Applications Internet High Quality Low Quality Control over

  31. The increasing need to protect Web Applications from hackers • Critical business applications and Services moving to the Web. Risk of web-application attack. • Firewalls/IPS cannot protect a web application from unknown threats Email Server HR ERP Mobile Apps Intranet CRM Critical business applications

  32. NG series offers On-Appliance Web Application Firewall

  33. On-Appliance Web Application Firewall • Protect Web Servers and Web Applications from hackers • No need to buy dedicated WAF appliance • Cyberoam WAF blocks hackers from exploiting Web-Application Vulnerabilities • WAF Features include • Positive protection model and No Signature Tables • Intuitive website flow detector automatically adapts to website changes • Protects against OWASP top 10 vulnerabilities • SSL Offloading • Monitoring & Reporting

  34. The need to support BYOD & handle security risks • Device Explosion Trend: Multiple Internet Access Devices per User • Each device has a unique IP address • Employee-owned smart devices to reach 350mn by 2014, up from 150mn this yr

  35. Embrace BYOD with Cyberoam

  36. Mobile VPN for iOS and Android devices • Cyberoam’s Layer 8 Identity based security extended to mobile devices • Securely connect your iPhone, iPad and Android devices to your corporate network through VPN Android iOS IPSec VPN (New) L2TP VPN PPTP VPN L2TP VPN (New)

  37. Support for new Connectivity Technologies – 4G/ LTE

  38. Support for new Connectivity Technologies – 4G /LTE • Making organizations ready for high speed future • Easy deployment for high speed internet connection • Simple USB modem plug-in into Cyberoam appliance • Maximize business connectivity • Automatic fail-over to 4G/LTE WWAN connection • Gateway failover over VPN • VPN over 4G/LTE 4G

  39. First-of-its-kind Reporting

  40. Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard

  41. Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard N/A: Private IP Others: Rest of records

  42. Dual Dashboard – Traffic and Security Dashboard Security Dashboard

  43. Dual Dashboard – Traffic and Security Dashboard Security Dashboard N/A: Private IP Others: Rest of records

More Related