Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
com
Cyberoam USP
Presenter:
<Name>
<Position>, Cyberoam
Our Products
Copyright
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights
Reserved.2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
www.cyberoam.com
Cyberoam Introduction
Technology Powerhouse
450+ Employees
Backed by Worlds Largest PE Investor ($156bn) the Carlyle Group
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for UTM features
Patent-pending Identity-based Management
www.cyberoam.com
One
One stop
stop shop:
shop: Cyberoams
Cyberoams Holistic
Holistic Security
Security Solutions
Solutions
Network Security
Centralized security
Management
www.cyberoam.com
www.cyberoam.com
Cyberoam
Cyberoam UTM
UTM Comprehensive
Comprehensive Network Security
Security
Layer 8 security
Support for
3G/4G/WiMax
www.cyberoam.com
Cyberoam
Cyberoam UTMs
UTMs offer
offer
Gigabit Firewall
Throughputs
Powerful Hardware
Superior Quality
Value for Money
Cyberoam OS
www.cyberoam.com
Cyberoam
Cyberoam Architecture
Architecture
Powerful Hardware
Intelligent Firmware
www.cyberoam.com
Cyberoam
Cyberoam Innovation: Layer
Layer 88 Security
Security
www.cyberoam.com
AAA
AAA over
over single
single UTM
UTM appliance
appliance
Identity-based AAA
Users
Employees
Management
Cyberoam
Authenticates
User Name
IP Address
MAC Id
Session Id
Customers
Partners
Cyberoam
Authorizes
Cyberoam
Audits
Identitybased
Logs + Reports
Compliance
Reports
www.cyberoam.com
Identity-based
Identity-based Security
Security
Corporate LAN
DHCP
192.168.3.105
192.168.3.110
Richard
Steve
Ancy
Administrator
Internet
www.cyberoam.com
Prioritize
Prioritize applications
applications with
with Layer
Layer 77 and
and Layer
Layer 88 controls
controls
Internet
Application Traffic
Cyberoam Appliance
Visibility
Control
Manage Bandwidth
Business
Business Critical
Critical
Socio
Socio business
business
Non
Non Critical
Critical
Infected Applications Blocked
worms
Spyware
Undesirable
Undesirable
Controls over applications based on User Identity, Time, Application and Bandwidth
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
www.cyberoam.com
Granular
Granular classification of applications
applications
Category
Risk Level
Characteristics
Technology
File Transfer
Excessive Bandwidth
Browser Based
Gaming
Low (2)
General Internet
Medium (3)
Prone to misuse
Client Server
Instant Messenger
High (4)
Transfer files
Network Protocol
Infrastructure
P2P
Network Services
P2P
Widely used
Loss of Productivity
Remote Access
Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
www.cyberoam.com
Granular
Granular classification of applications
applications
Proactive Protection model:
Eliminates the need for manual intervention by administrators to update policies for new
applications added to the list
Select P2P
Applications
Set Action
Block all future P2P applications without
adding applications manually
www.cyberoam.com
Instant
Instant Messaging
Messaging Controls
Controls
Archive
Communication
Data Protection
Productivity
Control loss of productivity
Forensic Analysis
IM audit logs
Filter logs based on Users, IPs,
Messages based on keywords
www.cyberoam.com
On-appliance
On-appliance Logging
Logging & Reporting
Reporting
Real time visibility into user and network activities
Traffic Discovery
- Real-time visibility into bandwidth utilization by user, protocol, application
Security
Management
Forensic
Analysis
1200+
1200+
Reports
Reports
Data
Protection
Compliance
Management
www.cyberoam.com
Layer-8
Layer-8 User-based
User-based Reports
Reports
www.cyberoam.com
Layer-8
Layer-8 User-based
User-based Reports
Reports
www.cyberoam.com
Dual
Dual Dashboard
Dashboard Traffic
Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
Dual
Dual Dashboard
Dashboard Traffic
Traffic & Security Dashboard
Security Dashboard
www.cyberoam.com
Application
Application Reports
www.cyberoam.com
Compliance
Compliance Reports
www.cyberoam.com
Interactive
Interactive World
World Traffic
Traffic Map
Map
www.cyberoam.com
Traffic
Traffic Discovery
Discovery
www.cyberoam.com
Traffic
Traffic Discovery
Discovery
www.cyberoam.com
Stateful
Stateful Inspection
Inspection Firewall
Firewall
Unified Security
Application Firewall
Identity-based Firewall
Layer 8 Geo-based Traffic Control
- Control incoming/outgoing traffic
from/to a specific country
Firewall
Rule
Connectivity
Policies
Productivity
Policies
FastPath Technology
- To improve processing speed and
reduce CPU overhead
Security
Policies
Unified Security
Rules for all security features
from firewall page
Easy navigation and increased
administrative productivity
www.cyberoam.com
Configure
Configure rules
rules for
for all
all features
features from
from Firewall
Firewall page
page
Identity
++
Security
++
Productivity
++
Connectivity
www.cyberoam.com
Threat
Threat Protection
Protection Features
Features
Security Center
Anti-Spam (Inbound/Outbound)
- Three level scanning:
IP Reputation filtering
Real-time Blackhole List (RBL)
Recurrent Pattern Detection (RPDTM) technology
www.cyberoam.com
On-appliance
On-appliance Web
Web Application
Application Firewall
Firewall (WAF)
(WAF)
Firewalls/IPS cannot protect a web application from unknown threats
Traditional
Firewall
Cyberoam UTM offering
WAF protection
Unauthorized
access blocked
Cost Effective
Organization's IT network
Easy to deploy
www.cyberoam.com
Virtual
Virtual Private
Private Network (VPN)
(VPN)
Embrace BYOD with mobile
VPN clients
iOS
IPSec VPN
L2TP VPN
PPTP VPN
SSL VPN
- Client less
- License free
Android
L2TP VPN
www.cyberoam.com
Web
Web &
& Content
Content Filtering
Filtering
Industrys most comprehensive URL database
44million+ URLs in 82+ categories
Controls access to HTTP/HTTPS websites
Blocks Google Cache pages
Blocks Embedded URLs
Blocks Malware hosting sites
Detects & Blocks Third Party Proxy and
Tunneling
Filters Websites
2.0 content
Internet
Proxy
Proxy
Allowed
Malware
Google
Blocked
Embedded
Web
&
Website
Web
Websites
Websites
hosting
cache
URLs
2.0
Tunneling
HTTP
2.0 /
HTTP/
HTTP
pages
sites
HTTPS
sites
HTTPS
/HTTPS
www.cyberoam.com
Web
Web &
& Content
Content Filtering
Filtering
Manage productivity by controlling access to unwanted sites
On-appliance web category database
Faster access
Surfing pattern privacy
Control Data Leakage
Blocks file uploads to web pages
Helps meet regulatory compliance requirements
Prevent productivity loss with identity-based approach
Customize blocked messages to educate users on corporate
policies
YouTube for
Schools
for Educational
Institutes
Best
Best of
of Breed
Breed Bandwidth Management // QoS
Bandwidth policies tied with
User/User
User
s group
Firewall
Rule
Web
Category
Applicatio
n
www.cyberoam.com
Best
Best of
of Breed
Breed Bandwidth Management // QoS
Create a bandwidth policy on a combination of
User or User Group /Department
Application or Application Category
Web category
Allows great flexibility and real L2-L8 visibility and control
Bandwidth sharing with priority
Schedule-based bandwidth allocation
Committed bandwidth
Burstable bandwidth
When
user is not
connected
CEO
Manager
ERP System
5 mbps
2 mbps
8 mbps
Manager
2mbps
Employee 1
3mbps
2mbps
Employee 2
3mbps
2mbps
www.cyberoam.com
Business
Business Continuity
Continuity Features
Features
High Availability
- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime
- Ensures continuous network security
Multiple Link Management with Automated Load Balancing
- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover
conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
Sales
Dept.
ISP1
(10 mbps)
Dev.
Dept.
Financ
e
Dept.
MPLS
ISP2
(5 mbps)
Organization's IT network
ISP3 (3G)
(3 mbps)
Failover Link
www.cyberoam.com
Business
Business Continuity
Continuity Features
Features
Layer 8 Policy-based Routing
- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications
www.cyberoam.com
Wireless
Wireless (WLAN)
(WLAN) Security
Security
High performance, integrated security over WLAN
- Secures wireless networks to the extent of wired networks
Faster performance, broader coverage with 3x3 MIMO Technology
- Dual band support: 2.4 GHz or 5 GHz
Multiple Virtual Access Points
Layer 8 over WLAN
- Identity-based policies in dynamic IP environment
- MAC-based filtering
- Supports IP-address pool
Enhances security
Engineering
Marketing
Sales
File server
Internet
ADS
ERP
www.cyberoam.com
Safeguard
Safeguard user
user privacy
privacy 4-Eye
4-Eye Authentication
Authentication
Prevent the risk of IT administrator from misusing privilege of
tracking user activities
2 people: Authorizer and Administrator
- Authorizer consent required for the Administrator to view user-specific activities
www.cyberoam.com
SMS
SMS (Text-based)
(Text-based) Authentication
Authentication
Needed for hotspots, airports, hotels, corporate offices
Default group can be created for guest users
Sending Internet access credentials using SMS for guest users
Hotels
Airports
www.cyberoam.com
Cyberoam
Cyberoam features
features assure
assure Security,
Security, Connectivity,
Connectivity, Productivity
Productivity
www.cyberoam.com
Customer
Customer Support
Support System
System
Web
Support
Chat
Support
Appliance Registration
and Upgrade
Subscribe security
Email
features
Support
Create support tickets
Request RMA
Phone
Support
Knowledge
base
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
www.cyberoam.com
Partner
Partner Support
Support System
System
Web
Support
Knowledge
base
www.cyberoam.com
Cyberoam
Cyberoam UTM
UTM Product
Product Range
Hardware UTM appliances
CRiV-1C, CRiV-2C,
CRiV-4C, CRiV-8C,
CRiV-12C
CR300i, CR200i,
CR100iNG, CR50iNG
Large Enterprises
CR2500iNG
CR1500ia, CR1500ia-10F,
CR1000ia, CR1000ia-10F,
CR750ia, CR750ia-1F/10F,
CR500ia, CR500ia-1F/10F/RP,
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
www.cyberoam.com
Cyberoam
Cyberoam Central
Central Console
Console (CCC)
(CCC)
Available as
- Hardware CCC Appliances, Virtual CCC Appliances
Mumbai
Branch Office
New York
Branch Office
Cyberoam
UTM
Cyberoam
UTM
Boston
Branch Office
Dubai
Head Office
Cyberoam
UTM
Cyberoam
UTM
www.cyberoam.com
Cyberoam
Cyberoam iView
iView Logging
Logging and
and Reporting
Reporting
Security
Management
Log
Management
Forensic
Analysis
Compliance
Management
Available as
Open Source software
Appliance
Identity
Logging
Reporting
Servers
Desktop systems
Applications
Firewalls
UTM
IDP / IPS
Switches
Routers
www.cyberoam.com
CCC
CCC & iView product range
CCC appliances
CRiVU200
CRiVU100
CR-iVU25
www.cyberoam.com
Training
Training &
& Certification
Certification
www.cyberoam.com
Recognized
Recognized as
as Visionary
Visionary in
in the
the Gartner
Gartner UTM
UTM MQ
MQ
2009
2010
2012
www.cyberoam.com
Proven
Proven track
track record
record of Innovation
Innovation
NASSCOM INNOVATION
AWARD 2011
www.cyberoam.com
Clientele
Clientele Worldwide
Worldwide
BFSI
Manufacturing
Government
Education
www.cyberoam.com
Clientele
Clientele Worldwide
Worldwide
Hotels
Others
www.cyberoam.com
Product
Product Certifications
Certifications
IPv6 Ready
Member of
Internet Watch
Foundation
UTM Level 5:
Cyberoam holds a unique &
complete UTM certification
ICSA Certified
High-Availability
Firewa
l
l
Premium
AntiSp
a
m
VPN
Anti-Virus
Premium
URL
Filte
ring
AntiSpy
war
e
Premium
IPS/IDP
www.cyberoam.com
Cyberoam
Cyberoam Live
Live Demo
Demo
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
www.cyberoam.com
Thank you
Contact: sales@cyberoam.com
www.cyberoam.com