740 likes | 925 Views
Cyberoam – Endpoint Data Protection. Application Control Asset Management. Data Protection & Encryption Device Management. CYBEROAM. Comprehensive Network Security. Our Products. Unified Threat Management. SSL VPN. Cyberoam Central Console (CCC). Agenda of Presentation.
E N D
Cyberoam – Endpoint Data Protection Application Control Asset Management Data Protection & Encryption Device Management CYBEROAM Comprehensive Network Security Our Products Unified Threat Management SSL VPN Cyberoam Central Console (CCC)
Agenda of Presentation • About Elitecore Technologies • Cyberoam UTM • Cyberoam Credentials/ Awards/ Accreditations
About Elitecore Technologies • Established in 1999 • 400+ Employees • ISO 9001:2000 certified company • Backed by World’s Largest Private Equity Group ($90bn) • Sales, Distribution Channel & Customers across 75+ countries • Communication - Networks – Security • Cyberoam - Network to Endpoint Security • CRESTEL - Telecommunication OSS BSS • EliteAAA - Telecommunication • 24online - Bandwidth Management Solution
Internal threats • Identity theft • Data loss • Data deletion • Data modification • Data theft • DoS attacks • Hacking External threats • Worms • Malicious code • Virus • Malware Social Engineering threats • Spam • Phishing • Pharming User – The Weakest Security Link USER Attack on Organization
Layer 8 – The Human Layer • Layer 8 Technology – Security around the User • Treats User-Identity as the 8th Layer in Network stack • Network security decisions based on Usernames and IP Addresses • Control Who is doing What in the network • Allows creation of User Identity-based security policies • Identifies traffic by username even in case of dynamic IP indicates a feature unique to Cyberoam
User User
Layer 8 – The Human Layer • Cyberoam’s Layer 8 Technology adds SPEED to security • Offers instant visibility into source of attacks • Identifies attackers/victims with usernames • Allows immediate remediation to restore security or enables proactive security • Quickly and easily configure and manage policies based on users
Cyberoam UTM- Identity-based Security • Integrated security over single platform • Layer 8 penetrates through each security module
Other UTMs Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits User Login • User • IP Address • MAC Id • Session Id • Intrusion Prevention Policies • Anti-Malware • Anti-Spam • Web Filtering • Layer 7 Controls • Bandwidth Management & QoS • Instant Messaging Archiving & Control • Internet Surfing Quota • Internet Access Time • Internet Data Quota • Identity - based • Logs + Reports Cyberoam Layer 8 Advantage • MAC Id • Session Id
Organizational Concerns Security Connectivity Productivity • Network security • Content Security • Administrative Security • Business Continuity • Network Availability • Future-ready connectivity • Employee productivity • IT resource optimization • Administrator productivity
CYBEROAM ASSURES SECURITY Network Security Content Security Administrative Security • Firewall • IPS • Wireless security • Anti-Malware • Anti-Spam • HTTPS Content security • Next-Gen UI • iView- Logging & Reporting
SECURITY»Network Security»Firewall • Stateful Inspection Firewall (Fusion Technology) • Interface for achieving Unified Security • Identity-based policies enable security, connectivity, productivity Fusion Technology
SECURITY»Network Security»IPS • Intrusion Prevention System • 3500+ signatures - broadest security cover • Internet Threat Response Team • Regular Signature updates • Quick protection against latest vulnerabilities • IPS Policy Tuner • Allows multiple IPS policies • Granular control over IPS policies • Unnecessary alerts • Reduced traffic latency • Improved performance
SECURITY»Network Security»IPS • Cyberoam IPS + Layer 8 Technology • Identity-based IPS policies per user or group • Identity-based alerts and reports • Visibility into applications – User, Source, Destination, Usage • Overview of threat status – Top alerts, top attackers, top victims
SECURITY»Network Security»Wireless security • Wireless (WLAN) Security • High performance, integrated security over WLAN • Secures wireless networks to the extent of wired networks • Supports 802.11n wireless standard • Layer 8 over WLAN • Identity-based policies in dynamic IP environment • MAC-based filtering • Supports IP-address pool • Enhances security
indicates feature offered only by top-rated UTMs SECURITY»Content Security»Anti-Malware • Gateway Anti-Malware • 4 million+ signatures • Bi-directional scanning of web & email • Self-service Virus Quarantine • Reduced window of vulnerability • Broadest security cover against all malware • Scans • HTTP, FTP, SMTP, POP3 • HTTPS, IMAP • Instant Messenger traffic • Layer 8 Impact • Identity-based virus reports • Instant visibility into attacker/victim • Identity-based Quarantine policies
SECURITY»Content Security»Anti-Spam • Gateway Anti-Spam • IP Reputation Filtering • Blocks 85% of incoming messages at gateway • Saves bandwidth • Near 98% spam detection • False Positive rate of 1 in a million • Reduces fear of losing business emails • - Self-Service quarantine area
SECURITY»Content Security»Anti-Spam • User-based Spam Digest • Frees administrator time & management • Manage Email recipients • Data leakage prevention and archiving • Scanning with Recurrent Pattern Detection (RPD) technology • Content-agnostic, multi-language security against all spam types viz. pdf, excel, mp3 • Virus Outbreak Detection (VOD) for zero-hour protection • Scans SMTP, POP3, IMAP traffic
SECURITY»Content Security»Anti-Spam • RPD Technology • Most outbreaks last only a few hours • Cyberoam identifies outbreaks real-time • Signature-based Anti-Spam take time to release signatures • Users remain unprotected till Anti-Spam is updated • Too late to battle out the initial peak of attack
indicates feature offered only by top-rated UTMs SECURITY»Content Security»HTTPS Content Security • HTTPS/SSL Content Security • Scans SSL traffic for virus & malware • Controls File upload over SSL • Reports files uploaded via SSL • Stops HTTPS/SSL as a medium for • Data Leakage • Malware Propagation
SECURITY»Administrative Security»Next-Gen UI • Next-Gen UI • Web 2.0 technology advantages • Easy navigation, custom controls, intuitive interface • Fewer security errors - Increases security • Enhances administrative productivity • Shorter learning curves • Unified Security • Rules for all security features from firewall page
SECURITY»Administrative Security»iView- Logging & Reporting • Cyberoam iView – On-Appliance Logging & Reporting • Ability to log and report activities • LAYER 8 - Identity-based logging and reporting – Pinpoints the user • Security Management • iView dashboard- Shows network attacks on single screen • Drill-down reports – 3rd level drill-down for attack details • 1000+ Reports • Log Management • Compliance Management • HIPAA, PCI DSS, GLBA, and more • Forensic Analysis
Security Management Forensic Analysis Data Protection Compliance Management Identity Logging Reporting Logs & Events Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
CYBEROAM ASSURES CONNECTIVITY Business Continuity Network Availability Future-ready connectivity • Multiple Link Management • High Availability • VPN • 3G/WiMAX modem support • IPv6
CONNECTIVITY » Business Continuity » Multiple Link Management • Multi-Link Management • Automated Load balancing assures ROI/investment • Support for more than 2 ISP links • Supports Wireless WAN (3G USB modems) 3G
CONNECTIVITY » Business Continuity » Multiple Link Management • Link Failover • Supports multiple failover conditions • Monitors link availability of multiple WAN connections • Transfers traffic from a failed link to a working link • Maximizes business up-time • Optimizes link utilization for business continuity • Active-Active Auto Link Failover • Active-Passive Auto Link Failover • Support for more than 2+ ISP links • Supports WWAN for failover
CONNECTIVITY » Business Continuity » Multiple Link Management • Layer 8 Policy-based Routing • Routes traffic based on: • Source IP addresses • Protocols • Users • Assures Quality of Service for key users and applications
CONNECTIVITY » Business Continuity » High Availability • ICSA Labs Certified Active Active High Availability • Maximizes network uptime • Reduces single-point-of-failure • Ensures continuous Cyberoam security • Ensures business continuity
CONNECTIVITY » Network Availability » VPN • Virtual Private Network (VPN) • Anywhere, any device secure remote connectivity • Supports • IPSec, L2TP, PPTP technologies • SSL-VPN • Client-type independent Web access mode • Application access mode • Client mode • Threat Free Tunneling (TFT) Technology • Scans traffic entering VPN tunnel for: • Malware • Spam • Inappropriate content • Intrusion attempts • Maintains secure endpoint and network environments
CONNECTIVITY » Network Availability » 3G/WiMAX modem support • 3G/WiMAX – USB Modem Support • High-speed wireless WAN (WWAN) • Wide ISP support • All gateway security features available • Can function as a main or failover link 3G
CYBEROAM ASSURES PRODUCTIVITY Employee Productivity IT Resource Optimization Administrator Productivity • Content Filtering • IM controls • Bandwidth Management • Traffic Discovery • Layer 7 • Next-Gen UI
CONNECTIVITY » Future-ready connectivity » IPv6 • IPv6 • ‘IPv6 Ready’ gold logo • Cyberoam identifies and processes IPv6 traffic • Third-party validation • International Testing Program with 3000+ rigorous test cases • IPv6 compliance to become mandatory in government and other enterprises • Driven by diplomatic initiatives
Productivity»Employee Productivity»Content Filtering • Content Filtering • Industry’s most comprehensive URL database • 82+ categories • 44 million+ URLs • On-appliance web category database • Faster access • Surfing pattern privacy • Controls access to HTTP & HTTPS hosted websites • Increases productivity
Productivity»Employee Productivity»Content Filtering • Controls that are difficult to bypass • Blocks Google cache pages • Search keyword reports • Blocks embedded URLs • Detects/Blocks Third Party Proxy and Tunneling software • Controls access to Instant Messengers, P2P • Controls Data Leakage • Blocks files from uploading to web pages • Blocks file transfer through Instant Messengers
Productivity»Employee Productivity»IM controls • IM Controls • Identity-based controls for Yahoo messenger and Windows Live Messenger • Scans malware • Logs and controls • Access • Conversation • File transfer • Voice/Webcam
Productivity»IT Resource Optimization»Bandwidth Management • Best of Breed Bandwidth Management/QoS • Application and Identity-based bandwidth allocation • Category wise Bandwidth management • Restrict Bandwidth usage for a combination of source, destination and service/service group • Schedule-based bandwidth allocation • Committed and burstable bandwidth
Productivity»IT Resource Optimization»Traffic Discovery • Traffic Discovery • Real-time visibility into bandwidth utilization by user, protocol, application • Provides visibility of unproductive usage of resources and threat incidence
Productivity»IT Resource Optimization»Layer 7 • Layer 7 • Offers visibility and management over Application Layer 7 • Allows control over application, user, time and bandwidth • Essential for Cloud Computing • Bandwidth Management assures availability of business-critical applications • Controls bandwidth costs
Bit Torrent CRM VoIP ERP IM Application Web mail Medium Quality Internet High Quality Low Quality Application Layer 7 Visibility
Cyberoam Architecture • Multi-core Technology • High Security without compromising on performance • Multi-core processors • Parallel processing of Cyberoam security features • Real-time, Unified Security • Higher Throughputs • High-speed memory access to signatures • Security against advanced threats
Cyberoam Architecture • Extensible Security Architecture (ESA) • Ability to adapt to future security needs • Ability to support feature enhancements in future • Ready for future upgrades Vs ASIC
Cyberoam Central Console • Centralized controls and security management over remote networks • Reduces operational complexity and deployment time • Minimizes errors and lowers administration cost • Enables the MSSPs to have different personnel for managing different customer deployments • Ease of use with view of multiple devices and network status at a glance
SSL VPN • Supports remote access VPN users and site-to-site VPN connections • Accommodates between 50 to 1000 concurrent users • Policy-based resource access control • Zero-client administration • Flexibility in purchasing remote security solutions: • Virtual appliance mode • Dedicated appliance mode