800 likes | 1.05k Views
Identity-Based Unified Threat Management One Identity – One Security. Presentation. Agenda of Presentation About Company Challenges of UTM Scenario Introduction to Cyberoam Cyberoam Credentials / Awards/ Accreditations Cyberoam Product Walk-thru. Est. in 1999 500+ Employees
E N D
Identity-Based Unified Threat Management One Identity – One Security Presentation
Agenda of Presentation • About Company • Challenges of UTM Scenario • Introduction to Cyberoam • Cyberoam Credentials / Awards/ Accreditations • Cyberoam Product Walk-thru
Est. in 1999 • 500+ Employees • ISO 9001-2000 Certified • Presence in USA, Asia, Middle East • Product installations in 55+ Countries • Invested by $90bn World’s Largest Private Equity Group
UTM : Unified Threat Management A solution to fight against multiple attacks and threats
UTM UTM Unified threat management (UTM) refers to a comprehensive security product which integrates a range of security features into a single appliance. • A true UTM Appliance should have following features in single • solution: • Firewall • VPN • Intrusion Detection & Prevention • Gateway Level Anti-virus for Mails, Website, File Transfers • Gateway level Anti-spam • Content Identification & Filtering • Bandwidth Management for Applications & Services • Load Balancing & Failover Facilities
Benefits of UTM Appliances Reduced complexity All-in-one approach simplifies product selection, integration and support Easy to deploy Customers, VARs, VADs, MSSPs can easily install and maintain the products Remote Management Remote sites may not have security professionals – requires plug-and-play appliance for easy installation and management Better Man Power Management Reduction in dependency and number of high end skilled Human resources Managed Services Security requirements & day to day operations can be outsourced to MSSPs
Challenges with Current UTM Products Lack of user Identity recognition and control • Inadequate in handling threats that target the user – Phishing, Pharming Unable to Identify source of Internal Threats • Employee with malicious intent posed a serious internal threat • Indiscriminate surfing exposes network to external threats • 50 % of security problems originate from internal threats – Yankee Group • Source of potentially dangerous internal threats remain anonymous Unable to Handle Dynamic Environments • Wi-Fi • DHCP Unable to Handle Blended Threats • Threats arising out of internet activity done by internal members of organization • External threats that use multiple methods to attack - Slammer Lack of In-depth Features • Sacrificed flexibility as UTM tried to fit in many features in single appliance. • Inadequate Logging, reporting, lack of granular features in individual solutions Need for Identity based UTM…
User Patent Pending: Identity-Based Technology
Cyberoam – Identity Based Security Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls.
CRi series for SOHO (Small Office-Home Office) & ROBO (Remote Office-Branch Office) CR 15wi - Wireless CR 15i CR 25ia CR 35ia CRi series for Medium Enterprises CR 300i CR 500ia CR 750ia CRi series for Large Enterprises CR 1000i CR 1500i Cyberoam Appliances CRi Series CRi series for Small to Medium Business CR 50ia CR 100ia CR 200i
Basic Appliance • Identity-based Firewall • VPN • Bandwidth Management • Multiple Link Management • On Appliance Reporting • 8*5 Tech Support & 1 Year Warranty Subscriptions • Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) • Gateway Anti-spam Subscription • Web & Application Filtering Subscription • Intrusion Prevention System (IPS) • 8*5 Tech Support & 1 Year Warranty • Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
Certifications - pipeline ICSA Certification for High Availability ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability Certifications UTM Level 5 complete UTM certification Premium IPS/IDP URL Filtering Firewall Anti-Spyware Anti-Spam VPN Anti-Virus IPv6 compliance
“Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”. March 2008 – UTM Roundup Cyberoam CR1000i Five Star Rated – Three Years Running July 2007 – UTM Roundup Cyberoam CR250i Enterprise SMB • “console is well organized and intuitive to navigate” • “flexible and very powerful” Year 2009 – UTM Roundup One of the best UTM Finalist in SC Magazine Awards 2009, Europe Cyberoam has been short-listed as a finalist for the Best SME Security Category
“deserves credit for its flexible configuration options, extensive security, content filtering, and bandwidth management features. “
Awards • 2007 Finalist American Business Awards • Tomorrow’s Technology Today 2007 • Get top tech company • From Zdnet Asia 2008/09 • 2007 Finalist Network Middle East Award • Best Security Product • Best SMB Networking Vendor • Finalist - 2008 Global Excellence in Network Security Solution • VAR Editor’s Choice for Best UTM (2007 –left , 2008-right) • CRN – Emerging Tech Vendors 2007 • Received Gold Award from IDG Channel World Magazine • Best network security vendor 2009 • Finalist – PC pro awards 2009 • for the Business Hardware of the year
Global Clientele USA Largest Chain Store
DY Patil Institute of Management Education:
BSNL BFSI & Govt. Clientele
Normal Firewall Cyberoam - Identity Based UTM • Rule matching criteria - Source address - Destination address - Service (port) - Schedule • Action - Accept - NAT - Drop - Reject - Identity • However, fails in DHCP, Wi-Fi environment • Unified Threat Controls (per Rule Matching Criteria) • - IDP Policy • - Internet Access Policy • - Bandwidth Policy • - Anti Virus & Anti Spam • - Routing decision
Next Generation Layer 7 Firewall
80 80 80 21 443 80 443 443 21 443 1st Generation Firewalls Port 80 Port 443
Skype Mail Mail Web Web FTP Web Bit Torrent Application Firewalls – CR Version 9
CRM ERP Sales force You Tube IM Application Web mail Casual Traffic Next Generation Firewalls – Version X Application Firewall Crowd of Applications Bandwidth Management
CRM ERP Sales force You Tube IM Application Web mail Casual Traffic Next Generation Firewalls Application Firewall Crowd of Applications Bandwidth Management
New Architecture & Firmware
Salient Features of the NG GUI
Web and Application Filtering Features • Database of millions of sites in 82+ categories • Blocks phishing, pharming, spyware URLs • HTTP upload control & reporting • Block & Control Applications such as P2P, Streaming, Videos/Flash • Local Content Filter Database to reduces latency and dependence on network connectivity. • Customized blocked message to educate users about organizational policies and reduce support calls
Educate Users with Custom Denied Messages and Reduce Your Support Calls James
Key Features Pasted from <http://cyberoam.com/bandwidthmanagement.html> Identity-based Bandwidth Management • Application and Identity-based bandwidth allocation • Committed and burstable bandwidth • Time-based, schedule-based bandwidth allocation • Restrict Bandwidth usage to a combination of source, destination and service/service group
Advanced Multiple Gateway Features • Active-Active Auto Link Failover & Load Balancing • Active-Passive Auto Link Failover • Source & Destination Routing • Support for more than 2+ ISP links • Schedule based bandwidth assignment • Gateway Alerts on Dashboard • Bandwidth Utilization Graphs
Gateway Anti- Virus Features • Scans WEB, FTP, Pop3, SMTP & IMAP traffic • Self-service quarantine area • Signature update ever 30 Mins • Identity-based HTTP virus reports • Disclaimer Addition to outbound emails • Spyware and other malware protection including “Phishing” emails • Block attachment based on Extensions (exe, .bat, .wav etc)
Gateway Anti-Spam Features • Spam filtering with (RPD) Recurrent Pattern Detection technology • Virus Outbreak Detection (VOD) for zero hour protection • Self-Service quarantine area • Content-agnostic • Change recipients of emails • Scans SMTP, POP3, IMAP traffic
RPD (Recurrent Pattern Detection) • Protects against Image-based Spam and spam in different languages • The spam catch rate of over 98% • 1 in Million false positives in spam • Local cache is effective for >70% of all spam resolution cases
IPS Features • Multiple and Custom IPS policies Identity-based policies • Identity-based intrusion reporting • Ability to define multiple policies • Reveals User Identity in Internal Threats scenario