620 likes | 760 Views
Cyberoam Virtual UTM. Our Products. Unified Threat Management. Different Stages Virtualization Implementation. Already Implemented In Process In Planning. Benefits. Virtualization Strategy: Data Center. Simplify server management Reduce infrastructure costs
E N D
Cyberoam Virtual UTM Our Products UnifiedThreatManagement
Different Stages Virtualization Implementation • Already Implemented • In Process • In Planning
Benefits Virtualization Strategy: Data Center • Simplify server management • Reduce infrastructure costs • Reduce physical server sprawl • Reduce power consumption • Implement scalable system to cater for future growth
Workstation virtualization Transform single host server into workgroup of multiple users Benefits Virtualization Strategy: Office in a Box • Reduce infrastructure costs • Centralized control • Works in a BYOD scenario
Getting office into a box : Enterprise scenario Branch office 1 Corporate office Branch office 2
Scanning InterVM traffic Cannot scan Inter-VM traffic with externally based security hardware A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control Tying service access and network usage to user Identity Security hardware cannot offer inline protection Traffic flows are invisible; creating blindspots in network Cannot conduct forensic analysis and display compliance Security challenges in Virtualization • Need of virtual security solution for virtual environment
Cyberoam Virtual UTM – Solving Virtual Problems
Cyberoam Virtual appliance • Resides on the Virtual layer • Scans all traffic inside virtual environment VM1 VM2 VM3 Best-of-breed security • Stateful inspection firewall • Intrusion Prevention System • Gateway Antivirus • Anti-spyware and Anti-spam • Web filtering • Application Visibility & Control • Web Application Firewall (WAF) • Virtual Private Network • Logging & Reporting • Layer 8 Identity-based security Apps Apps Apps Other OS Windows OS Linux OS Hypervisor Cyberoam Virtual UTM appliance Hardware
Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports Security in a Virtual Data Center
Scenario: Security in a Virtual Data Center vSwitch Internet vSwitch Cyberoam vUTM vSwitch administrator
Scenario: Enterprise/ MSSP Security in a Box Complete Virtual Security solution BO/Customer n BO/Customer 3 BO/Customer 2 BO/Customer 1
MSSP Scenario1: MSSP + Hosting Services Provider Customer 1 Internet Central Console & Logging /Reporting Customer 2 Customer 3 vSwitch vSwitch vSwitch vSwitch Cyberoam vUTM Cyberoam vUTM Cyberoam vUTM Cyberoam vUTM vSwitch vSwitch vSwitch vSwitch administrator
On-premise deployment MSSP Scenario2: On-premise deployment vSwitch Internet MSSP vSwitch Cyberoam vUTM administrator At Customer premise
MSSP Scenario3: ISP as an MSSP Customer 1 Internet R1 R4 vUTM - Customer 1 vUTM – Customer 2 vUTM – Customer 3 ISP Switch R3 R2 Customer 2
Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more Access control for users Tying service access and network usage to user Identity Provides multiple security features on single appliance Cyberoam protects Virtual Office or ‘Office in a box’
Scenario: Office-in-a-box setup Internet Switch Switch vSwitch LAN vSwitch Cyberoam vUTM administrator Repurposed PC Laptop Thin Client
Cyberoam offers • Protection for virtualized networks • Protects hypervisor management console, hypervisor & Guest OS • Scan Inter-VM traffic • Secure zero trust networks • Comprehensive Security • Consolidate multiple security features on single virtual appliance • Secures virtual networks to the extent of physical networks • Ease to deployment • Offers flexibility to allot number of vCPUs • Easy to upgrade with simple activation key
Cyberoam offers • Compliance Management • Segregates and secures traffic and data between and around virtual entities to help stay regulatory compliant • Display compliance with indepth on-appliance reports • Centralized Management for Virtual & Physical appliances • Centrally manage physical and virtual infrastructure using single interface with CCC (Cyberoam Central Console) • Available as Virtual CCC and Hardware CCC • Ensure centralized, consistent and quick security actions across your network
Virtualization platforms Supported • VMware ESX/ESXi 3.5/4.0/4.1/5.0 • VMware Workstation 7.0 or 8.0 • VMware Player 3.0 or 4.0
Cyberoam Virtual UTM appliance models Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
Cyberoam’s Security Portfolio Software
Take Control of Your Security Infrastructure with Cyberoam • Take Control of • WHAT you want? • HOW MUCH you want? • HOW you want?
Content • Introduction – Cyberoam Virtual UTM • Cyberoam Virtual UTM – Trial • Order • Registration • Cyberoam Virtual UTM – Upgrade • Order • Apply Upgrade • Resources
Introduction Cyberoam Virtual UTM
Cyberoam Virtual UTM – CRiV Series • Platform support: • VMware ESX/ESXi 4.0/4.1/5.0 • VMware Workstation 8.0/9.0 • Base Configuration Required: • One vCPU • 1GB vRAM • 3 vNIC • Primary Disk with 4GB size • Report Disk with 80GB size • 1 Serial Port • 1 USB Port
Cyberoam Virtual UTM Subscription ●Available ○Optional
STEP 01 Customer Visit www.cyberoam.com & Click on “Try & Buy”
STEP 02 Customer Cyberoam sales team forwards customer lead to respective partner
Steps For Partner Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial
STEP 01 Partner Visit https://partner.cyberoam.com
STEP 02 Partner
STEP 03 Partner
Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer
Steps For Customer Continued
STEP 03 Customer Visit https://customer.cyberoam.com • Existing Customers Login to Customer Portal • New Customers create account and Login with credentials
STEP 04 Customer
STEP 05 Customer • Enter Trial Appliance Key and other details
STEP 06 Customer Email to customer confirming registration of virtual appliance
STEP 07 Customer Email to customer with steps to download Virtual UTM appliance
STEP 08 Customer • Download Virtual UTM OVF • Install Cyberoam Virtual UTM • (Refer Installation Guide for reference)
STEP 09 Customer • Click on Registered appliance key to see appliance information
STEP 10 Customer
Cyberoam Virtual UTM – Upgrade • Upgrade from Trial to Full Version • Upgrade to Higher model