Cyberoam NG series: Future-ready Security. The Future of networks…

Preview:

Citation preview

Cyberoam NG series: Future-ready Security

The Future of networks…

Where are Networks moving to?

• Superfast Internet: 1000 Mbps Internet speed a reality today!• More devices per user – More devices connecting to Internet• More web-applications being accessed• Increase in usage of data

How will Organizations Gain?

With Network Connectivity & Productivity taking a leap, what about Security?

SECURITYCONNECTIVITY PRODUCTIVITY

No one wants SECURITY to become a bottleneck in their network!

Presenting The Cyberoam NG seriesThe ‘Next-Generation’ appliances built for Future-ready Security in networks!

Cyberoam NG (Next-Generation) series offers ‘Future-Ready’ Security

• The Fastest ‘UTM’ appliances for SOHO and SMB segments• Offering Next-Generation Firewall protection for Large

Enterprises!

• Offering Future-Ready security to• SOHO, ROBO

– CR15iNG, CR25iNG, CR35iNG– Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG

• SMB– CR50iNG, CR100iNG

• Enterprise– CR2500iNG

The Cyberoam NG Series

Powerful Hardware

Superior Quality

Performance Leap

Value for Money

All-New Firmware

Future-Ready Security

Powerful Hardware for Future-Ready Security

• Superfast processing speed• A must for Gigabit Internet speeds!• Nano second security processing with Giga Hertz processors• Parallel security processing with Dual core

• Next-Gen Memory• High Internet speed and data transfer demand Next-Gen

memory• Larger memory size for Enterprise-grade security • DDR3 RAM for more number of data transfers per clock cycle• Faster, Next-Gen memory for higher I/O throughput

Powerful Hardware for Future-Ready Security

• Gigabit Ports for Gigabit Speeds• Any network security appliance with having less than Gigabit

port is nearly obsolete!– All network components have moved to Gigabit ports

• Gigabit Ethernet for future SOHO & SMB networks• Higher port density

• More Storage• Today, higher throughput leads to more activities,

generating more data. – More storage for more reports– Reports stored for longer duration

Superior Quality

• Better performance• Design & components supporting high speed I/O

throughput• Highly robust

• Designed to protect against power surge & fluctuations• Industrial grade components to withstand extreme

environments

Wi-Fi Security appliances for SOHO/ROBO networks

• Faster performance, broader coverage with 3x3 MIMO Technology• Dual band support: 2.4 GHz or 5 GHz• Higher performance by aggressively transmitting and

receiving data over Wi-Fi channels• Faster handling of video streaming and high bandwidth

downloads• High performance integrated security over WLAN

• Secures wireless networks to the extent of wired networks

Appliances starting with Gigabit Firewall Throughputs

* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

Best in class UTM throughputs

* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

CR2500iNG: Next-Generation Firewall throughput

36000 MbpsFirewall throughput

0 10000 20000 30000 40000

UTM throughput: 4000 Mbps• Supports upto 4000 users

Get Ready for Future Networks

• 6.5 times increase in Firewall throughputs• 5 times increase in UTM throughputs• Best in class throughput against competitor models

An Anti-aging remedy for your network offering the best value for money!

The NG Series-Loaded with All-New Firmware

The NG Series-All-New-GUI

The need for “Intelligent Software”

• Key challenges• Keep up with the exponentially rising Network Traffic• Reduce overall cost of networking & security equipments• Minimize power consumption

– Limitation of “Hardware”• Increasing clock frequencies to boost performance leads to

prohibitively high power consumption

– Shift to Multicore architecture to • Meet every increasing performance• Maintain manageable levels of power consumption

CyberoamOSwith ‘Intelligent Software’

‘Intelligent Software’: Doing more with less

• Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance

• Better use of Multicore architecture for Parallel processing • Optimize workload distribution across cores• Lockless path for packet forwarding

– A single core handles packets for each connection at any given time to avoid inter-locks

• Optimize Interrupt rate for minimum CPU overhead and latency• High rate of interrupts - A bottleneck in high-speed data

transfers

‘Intelligent Software’: Doing more with less

• Fastpath packets to improve processing speed and reduce CPU overhead

• Avoid firewalling for file packets once Firewall decision is taken (unless in event of rule change).

• E.g. 200 mb file. Once the Firewall decision is taken on the file, the rest file packets need not go through Firewalling decision.

The need for Next Generation Security features…

The need to be more application-layer aware than ever before-Explosion of Internet Applications-Risk: ‘Application Chaos’ in organization

Internet

NG series offers Advanced Application Controls

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Take control of which applications can run on your networkTake control of which applications can run on your network

Risk Level

Very Low (1)

Low (2)

Medium (3)

High (4)

Very High (5)

Application Characteristics

Excessive Bandwidth

Prone to misuse

Transfer files

Tunnel other apps

Widely used

Loss of Productivity

Can bypass firewall policy

Application Technology

Browser Based

Client Server

Network Protocol

P2P

Application Classification based on

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Application ClassificationApplication Classification

Applications are classified based on

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Proactive Protection ModelProactive Protection Model

Administrator can simply select filtering criteria Technology, Risk Level or Characteristics

Set action – regardless of application name Allow or Deny

Allow/Block all future applications included for respective criteria

No need of administrator intervention to add new applications to policy

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Proactive Protection ModelProactive Protection Model

Select P2P Applications

Set ActionBlock all future P2P

application without adding applications manually

VoIPBitTorrentCRM ERP

IM ApplicationWebmail

Internet

Medium Quality

High Quality

Low Quality

5000+ Applications

Control over

Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls

Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls

The increasing need to protect Web Applications from hackers

• Critical business applications and Services moving to the Web. Risk of web-application attack.

• Firewalls/IPS cannot protect a web application from unknown threats

Critical business applications

CRM

ERP

Intranet

HR

Mobile Apps

Email Server

NG series offers On-Appliance Web Application Firewall

On-Appliance Web Application FirewallOn-Appliance Web Application Firewall

Protect Web Servers and Web Applications from hackers No need to buy dedicated WAF appliance Cyberoam WAF blocks hackers from exploiting Web-Application

Vulnerabilities WAF Features include

– Positive protection model and No Signature Tables

– Intuitive website flow detector automatically adapts to website

changes– Protects against OWASP

top 10 vulnerabilities

– SSL Offloading

– Monitoring & Reporting

The need to support BYOD & handle security risks

• Device Explosion Trend: Multiple Internet Access Devices per User

• Each device has a unique IP address• Employee-owned smart devices to reach 350mn

by 2014, up from 150mn this yr

Embrace BYOD with Cyberoam

Mobile VPN for iOS and Android devicesMobile VPN for iOS and Android devices

• Cyberoam’s Layer 8 Identity based security extended to mobile devices• Securely connect your iPhone, iPad and Android devices to your corporate

network through VPN

L2TP VPN (New)

Android

IPSec VPN (New)L2TP VPNPPTP VPN

iOS

Support for new Connectivity Technologies – 4G/ LTE

• Making organizations ready for high speed future• Easy deployment for high speed internet connection

• Simple USB modem plug-in into Cyberoam appliance

• Maximize business connectivity• Automatic fail-over to 4G/LTE WWAN connection• Gateway failover over VPN

• VPN over 4G/LTE4G

Support for new Connectivity Technologies – 4G /LTESupport for new Connectivity Technologies – 4G /LTE

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

First-of-its-kind Reporting

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard

Traffic Dashboard

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard

Traffic Dashboard

Others: Rest of recordsN/A: Private IP

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard

Security Dashboard

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard

Security Dashboard

Others: Rest of recordsN/A: Private IP

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

• Graphical overview of Data transfer and Risk level

Country Maps for Source/Destination TrafficCountry Maps for Source/Destination Traffic

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Application ReportsApplication Reports

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security FeaturesOther Security Features

Fusion Technology driven SI Firewall- Interface for achieving Unified Security

Layer 8 Technology: Identity-based controls- Identity-based security from Layer 2 to Layer 8- Allows control over

- Who can connect to network, Who can access what, What have they accessed

- Ability to track the user activities; identify attackers /victims

- Take quick network security decisions

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security FeaturesOther Security Features

Intrusion Prevention System- Maximum security against emerging threats- Identity-based IPS policies per user or group- 3500+ signatures – broadest security cover

Gateway Anti-Virus, Anti-spyware- Prevent blended threats- 4 million+ signatures- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM

traffic

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security FeaturesOther Security Features

Gateway Anti-Spam- Real-time, most accurate spam protection- Recurrent Pattern Detection (RPD) technology- Scans SMTP, POP3, IMAP traffic

Web & Content Filtering- Complete Visibility & Control over HTTP & HTTPS- 82+ categories and 44 million+ URLs

‘IPv6 Ready’ Gold

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security FeaturesOther Security Features

Virtual Private Network (VPN) - Threat-free remote access- Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN

Multi-Link Management- For an ‘always-on’ network- Support for more than 2 ISP links- Supports Wireless WAN (3G USB modems, WiMax)- Gateway failover over VPN

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security FeaturesOther Security Features

Instant Messaging & Control- Identity-based controls for Yahoo messenger and

Windows Live Messenger- Control who can chat with whom, file transfer,

webcam

Bandwidth Management- Enhance network performance and productivity- Create a bandwidth policy on a combination of User,

Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control

Outbound Spam Protection- Protecting service providers against Outbound Spam

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

The Next-Generation Security Appliances built for Future Networks.

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Thank You!

Recommended