410 likes | 747 Views
CYBEROAM. Comprehensive Network Security. Cyberoam End Point Data Protection. Presented by: Shailesh Mecwan, Manager - Channel sales (Europe). Unified Threat Management. Agenda of Presentation. Why MSSP? Drivers of MSSP business Customer s’ criteria Challenges of MSSP
E N D
CYBEROAM Comprehensive Network Security Cyberoam End Point Data Protection Presented by: Shailesh Mecwan, Manager - Channel sales (Europe) Unified Threat Management
Agenda of Presentation • Why MSSP? • Drivers of MSSP business • Customer s’ criteria • Challenges of MSSP • How can Cyberoam help? • What is Cyberoam? • Cyberoam product range • Business Model • Questions and Answers
Why get into Managed Security Services business in Europe? • MSS market in Europe = USD 2.1 billion (in 2010) • Expected compound annual growth rate = 14 %
Drivers for employing Managed Security Services (MSS) Source: Forrester Research
Customer’s criteria to evaluate MSSPs • Ability of the MSSP to present their coverage of services • Comprehensive Security Management • Depth of Security Expertise • Help in taking decisions in real-time • Quality of Service • Delivery Capabilities • SLA’s • Cost • Compliance Requirements
Challenges of MSSP • Providing best quality of services to clients with least effort and cost • Provide higher coverage of managed security services • Centralized control of client network’s security • Policy setting, Modification, Monitoring Performance, Reacting to situations in time, Pro-active security management • Have a system that • Is simple to configure and manage • helps meet the SLA’s • Help customers to display compliance • Ability to offer flexible security plans to clients
Cyberoam deployment scenario for MSSPs Customer Appliances Group: Customer2 Group: Customer1 Group: Customer3 Stockholm Berlin Prague Vilnius Warsaw Paris Boston Dubai New York MSSP Network
Internal threats • Identity theft • Data loss • Data deletion • Data modification • Data theft • DoS attacks • Hacking External threats • Worms • Malicious code • Virus • Malware Social Engineering threats • Spam • Phishing • Pharming User – The Weakest Security Link USER Attack on Organization
User User Layer 8 – The Human Layer • Layer 8 Technology – Security around the User • Network security decisions based on Usernames and IP Addresses • Control Who is doing What in the network • Allows creation of User Identity-based security policies • Identifies traffic by username even in case of dynamic IP indicates a feature unique to Cyberoam
Benefits of UTM Appliances • Reduced complexity • All-in-one approach simplifies product selection, integration and support • Easy to deploy • Customers, VARs, VADs, MSSPs can easily install and maintain the products • Remote Management • Remote sites may not have security professionals – requires plug-and-play appliance for easy installation and management • Better Man Power Management • Reduction in dependency and number of high end skilled Human resources • Managed Services • Security requirements & day to day operations can be outsourced to MSSPs
Identity-based security in DHCP environment Corporate LAN DHCP Internet 192.168.3.105 Richard 192.168.3.110 Steve 192.168.3.110 Ancy • Applies security policies based on actual identity of users. • User-specific rules for multiple users to share a common IP address 192.168.3.105 192.168.3.110 192.168.3.110 Administrator
Layer 8 – The Human Layer • Cyberoam’s Layer 8 Technology adds SPEED to security • Offers instant visibility into source of attacks • Identifies attackers/victims with usernames • Allows immediate remediation to restore security or enables proactive security • Quickly and easily configure and manage policies based on users
Cyberoam UTM- Identity-based Security • Gateway Integrated security over single platform • Layer 8 penetrates through each security module • Reduced TCO (Total Cost of Operations) • Best Quality of Security features • Lower expenditure • Ease of Management • Reduced cost of training and support • Ability to upgrade to future threats • Security subscriptions as needs grow
Know who is doing what in your Network with Cyberoam’s Layer 8 Technology
Other UTMs Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits User Login • User • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity - based • Logs + Reports • Compliance Reports Cyberoam Layer 8 Advantage • MAC Id • Session Id
Cyberoam UTM Product Range Small Offices SME Enterprises 15wi, 15i, 25ia, 25wi, 35ia, 35wi 50ia, 100ia, 200i, 300i 500ia, 750ia, 1000ia, 1500ia
Cyberoam Central Console (CCC Series) • Cyberoam Central Console is an centralized integrated management and monitoring appliance allows to manage multiple, dispersed Cyberoam UTM Installations. • Cyberoam Central Console helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam Installations centrally.
Virtual CCC deployment for MSSPs Customer Appliances Group: Customer2 Group: Customer1 Group: Customer3 Boston Dubai New York Boston Dubai New York Boston Dubai New York MSSP Network
Virtual CCC Appliances • Benefits of Virtual CCC appliances • Eliminates need for dedicated hardware • Use existing VMware environment • Simplifies future upgrades • Reduces cost of ownership
Server-based Workstation-based Application Server, Email Server Virtual Workstation
CCC - Easy, instant security policy enforcement • Simplified security management • Centralized policy creation and implementation for Cyberoam UTM features like Firewall, IPS etc. • Leads to uniform adoption of security practices across offices • Establish policies based on work-profiles across offices • Subscription and signature updates for Cyberoam UTM features like Gateway Anti-virus, Anti-Spam etc. • Protection against zero-hour threats
CCC – Ease and flexibility of management • Easy grouping of Cyberoam UTM appliances • Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions • Dynamic views in CCC help in managing, searching and sorting appliances • Customizable and multiple dashboards
CCC – Security against misuse of administrator privileges • Role-based administration privileges • For CCC appliance • Individual Cyberoam appliances • Groups of Cyberoam UTM appliances
CCC – Audit logs & alerts for organization-wide security visibility • Logs and views of administrator actions as well as dispersed UTM appliances • Instant security visibility • Supports regulatory compliance • Investigative analysis • Keeping track of historical activity • Email alerts • Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits etc. • Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count etc.
Virtual CCC Appliance Product Range • Use existing virtual environment to host CCC • VMware-based Virtual CCC appliances • Virtual CCC for VMware Server • CCC VMS 15, CCC VMS 50, CCC VMS 100, CCC VMS 200 • Virtual CCC for VMware Workstation • CCC VMW 15, CCC VMW 50, CCC VMW 100, CCC VMW 200
Security Management Forensic Analysis Data Protection Compliance Management Identity Logging Reporting Servers Desktop systems Logs & Events Applications Firewalls UTM IDP / IPS Routers Switches Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
iView - Cyberoam’s Logging and Reporting Tool • MSSPs can aggregate the reports of various customers • Free (Open Source) • Aggregation of logs and data from multiple CR appliances as well as competitor appliances, Squid, Access Gateway etc • Centralized storage of reports and log data • View reports of specific devices • Application Usage Reports • User-wise web surfing reports • Real-time Monitoring and Alerting • Over 1000+ Drilldown Reports • Reports in HTML, PDF, & CSV formats & Email Alerts • Web 2.0 GUI and Reporting interface • Role based user access of iView
iView - Compliance Reports • PCI (Payment Card Industry) • HIPPA (Health Insurance Portability and Accountability Act) • GLBA (Gramm-Leach-Bliley Act) • SOX (Sarbanes-Oxley Act) • FISMA (Federal Information Security Management Act)
Cyberoam Business Model • 100% Channel focused company • Quick product support • Better margin • Access to Sales Leads • Lead locking facility • Marketing support • Access to comprehensive Knowledgebase • Technical and Sales training (free of cost) • Access to market development funds • Access to Cyberoam Partner Portal
Q&A If any??
Thank you! shailesh.mecwan@cyberoam.com Phone: +91-9974060355 (24X7)* Skype: shailesh.elitecore