70
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan Manager – Business Development (Europe)

Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Embed Size (px)

Citation preview

Page 1: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity-Based Unified Threat Management

One Identity – One Security

Shailesh MecwanManager – Business Development (Europe)

Page 2: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Agenda of Presentation

• About Company• Challenges of UTM Scenario• Introduction to Cyberoam• Cyberoam Credentials / Awards/ Accreditations• Cyberoam Product Walk-thru

Page 3: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Est. in 1999 YoY Growth 200% 500+ Employees ISO 9001-2000 Certified Presence in USA, Asia, Middle East Cyberoam Channel network in more

than 75 Countries Invested by $90bn World’s Largest

Private Equity Group

Page 4: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Elitecore Products

Page 5: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

UTM : Unified Threat Management

A solution to fight against multiple attacks and threats

Page 6: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

A true UTM Appliance should have following features in single solution:

1. Firewall

2. VPN

3. Intrusion Detection & Prevention

4. Gateway Level Anti-virus for Mails, Website, File Transfers

5. Gateway level Anti-spam

6. Content Identification & Filtering

7. Bandwidth Management for Applications & Services

8. Load Balancing & Failover Facilities

UTM

UTM

Unified threat management (UTM) refers to a comprehensive security product which integrates a range of security features into a single appliance.

Page 7: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Benefits of UTM Appliances

Reduced complexity

All-in-one approach simplifies product selection, integration and support

Easy to deploy

Customers, VARs, VADs, MSSPs can easily install and maintain the products

Remote Management

Remote sites may not have security professionals – requires plug-and-play appliance for

easy installation and management

Better Man Power Management

Reduction in dependency and number of high end skilled Human resources

Managed Services

Security requirements & day to day operations can be outsourced to MSSPs

Page 8: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Lack of user Identity recognition and control Inadequate in handling threats that target the user – Phishing, Pharming

Unable to Identify source of Internal Threats Employee with malicious intent posed a serious internal threat Indiscriminate surfing exposes network to external threats 50 % of security problems originate from internal threats – Yankee Group Source of potentially dangerous internal threats remain anonymous

Unable to Handle Dynamic Environments Wi-Fi DHCP

Unable to Handle Blended Threats Threats arising out of internet activity done by internal members of organization External threats that use multiple methods to attack - Slammer

Lack of In-depth Features Sacrificed flexibility as UTM tried to fit in many features in single appliance. Inadequate Logging, reporting, lack of granular features in individual solutions

Challenges with Current UTM Products

Need for Id

entity based U

TM

Page 9: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Layer 8 Firewall

Page 10: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity-Based Technology

User

Page 11: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls.

Cyberoam – Identity Based Security

Page 12: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam Credentials

Page 13: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Gartner MarketScope (Q2 2008) SMB Multifunction Firewalls

Astaro x

Checkpoint x

Cisco x

Cyberoam x

eSoft

Fortinet x

IBM x

NetAsq x

Secure Computing x

Sonicwall x

StillSecure x

Untangle x

Watchguard x

Strong Positive

RATING

Strong Negative

Caution Promising Positive

x

Source: Gartner’s MarketScope Q2 2008

Page 14: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Gartner Magic Quadrant SMB Multifunction Firewalls 2009

Gartner Rates Cyberoam a Visionary

“Cyberoam has a strong presence in Asia, and, in 2008, saw significant growth in EMEA.”

“Cyberoam is fast to market with new features.”

Page 15: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks,understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”

Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight (2007)

Page 16: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

2008 - Emerging Vendor of the Year

Page 17: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Certifications

Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP

Premium

UTM Level 5: Cyberoam holds a unique & complete UTM certification

Premium

ICSA Certified Firewall

VPNC Certified for Basic VPN & AES Interoperability

ICSA Certified

High-Availabilit

y

Page 18: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

GLOBAL PRESENCE (Over 75 Countries)

Page 19: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

“console is well organized and intuitive to navigate”

“flexible and very powerful” “this appliance is a good value for almost

any size environment”.

“Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by

bandwidth usage, surf time or data transfer”.

March 2008 – UTM RoundupCyberoam CR1000i

Five Star Rating – Four Times in a Row!

July 2007 – UTM RoundupCyberoam CR250i

April 2009 – Product review Cyberoam CR200i

A lot of functionality, including good integration support, in a single easy-to-use appliance”also includes a solid web content filter and blocking for applications such as IM and P2P“

December 2008 – Product review Cyberoam CR100i

“Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”

Page 20: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Best Integrated SecurityAppliance Best Security Solution forEducation Best Unified Security

Tomorrow’s TechnologyToday 2007

2007 Finalist American Business Awards

2007, 2008 FinalistNetwork MiddleEast Award2008 Finalist ChannelMiddle East Award

VAR Editor’s Choice for Best UTM (2007)

Finalist - 2008 GlobalExcellence inNetwork SecuritySolution

CRN – EmergingTech Vendors 2007

Awards

ZDNET Asia- IT Leader ofthe Year 2008

SMB Product of the Year

2008 Emerging Vendor of the Year forNetwork Security

2008 – Best Content Filtering

Page 21: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Sample Clientele

Page 22: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

“ By offering identity-based policy making and visibility across all its security features, Cyberoam allows administrators to create customized user-based policies based on the user or department work profile. In addition, it offers instant visibility into "who is accessing what in the enterprise." In doing so, it enables enterprises to meet compliance requirements in addition to facilitating instant action in case of a security breach even in dynamic IP environments such as DHCP and Wi-Fi.”

2008 Emerging Vendor of the Year – Asia-Pacific Frost & Sullivan “One of the biggest strength behind the success of Cyberoam is its innovative product line –

identity-based integrated security appliances. “

Cyberoam differentiates on identity-based network access - which provides access control linking IP addresses with directory identity. Cyberoam's products have unique features and serve some distinct vertical markets. They are also potentially disruptive to competitors that are trying to enter emerging markets.”

The UTM solution marketplace, a fairly nascent sector, is populated with over ten key vendors. In this crowded and extremely competitive market, Cyberoam performs well alongside its competitors with its identity-centric approach (which enables a more flexible and intuitive approach to security management in Butler Group’s opinion), and the combination of functional capabilities and strategies that are in close alignment with UTM’s target market.”

Page 23: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Business alliances

Page 24: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam Product walk thru

Page 25: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity-Based Firewall

Page 26: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Normal Firewall

• Rule matching criteria - Source address

- Destination address - Service (port) - Schedule

• Action - Accept

- NAT - Drop - Reject

- Identity

Cyberoam - Identity Based UTM

• Unified Threat Controls (per Rule Matching Criteria) - IDP Policy - Internet Access Policy - Bandwidth Policy - Anti Virus & Anti Spam - Routing decision

• However, fails in DHCP, Wi-Fi environment

Page 27: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 28: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

MAC Base Filtering (Layer 2 to Layer 8 Security)

Page 29: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

MAC Based User Identity Control

Page 30: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity-Based Content Filtering

Page 31: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Database of millions of sites in 82+ categories

Blocks phishing, pharming, spyware URLs

Data Leakage Prevention (HTTP upload control & reporting)

Web and Application Filtering Features

Block & Control Applications such as P2P, Streaming, Videos/Flash

Local Content Filter Database to reduces latency and dependence

on network connectivity.

Page 32: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Google content categorization based on user policy:

Cache Pages

Translated Pages (http://translate.google.com)

Enforcement of Google Safe Search Based on User Policy.

Customized blocked message to educate users about organizational

policies and reduce support calls

Web and Application Filtering Features

Page 33: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based Policies

Page 34: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Advantages:

Restrict bandwidth for non work related categories.

Ensure bandwidth for productive categories.

Category Based Bandwidth Management

Page 35: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

   Key Features  

          

 Pasted from <http://cyberoam.com/bandwidthmanagement.html>

 

Application and Identity-based bandwidth allocation

Committed and burstable bandwidth

Time-based, schedule-based bandwidth allocation

Restrict Bandwidth usage to a combination of source, destination and

service/service group

Identity-based Bandwidth Management

Page 36: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

External Authentication

Page 37: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Authentication and External Integration

Page 38: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Automated Single Sign On (SSO) for Active Directory

Agent based Clientless Single Sign On.

Platform Independent:

Windows All Versions

Macintosh (Mac OS X)

All Linux OS

Just need to install one agent software on Active Directory Controller.

Page 39: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Advanced Multiple Gateway Features

Schedule based bandwidth assignment

Gateway Alerts on Dashboard

Bandwidth Utilization Graphs

Active-Active Auto Link Failover & Load Balancing

Active-Passive Auto Link Failover

Source & Destination Routing

Support for more than 2+ ISP links

Page 40: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Gateway Anti-Virus

Page 41: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Scans WEB, FTP, Pop3, SMTP & IMAP traffic Self-service quarantine area Signature update ever 30 Mins Identity-based HTTP virus reports Disclaimer Addition to outbound emails Spyware and other malware protection including “Phishing” emails Block attachment based on Extensions (exe, .bat, .wav etc)

Gateway Anti- Virus Features

Page 42: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Gateway Anti-Spam

Page 43: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

IP Reputation Filtering to block 85% of incoming messages at entry-point

even before these messages enter the network.

Spam filtering with (RPD) Recurrent Pattern Detection technology

Virus Outbreak Detection (VOD) for zero hour protection

Self-Service quarantine area

User based Spam Digest

Change recipients of emails

Scans SMTP, POP3, IMAP traffic

Content-agnostic

Gateway Anti-Spam Features

Page 44: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Antispam Quarantine Area:

Page 45: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Intrusion Prevention System (IPS)

Page 46: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Multiple and Custom IPS policies Identity-based policies

Identity-based intrusion reporting

Ability to define multiple policies

Reveals User Identity in Internal Threats scenario

IPS Features

Page 47: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam IPS can log / block all type of applications:

Anonymous Surfing:

UltraSurf, TOR, Hotspot, FreeGate, JAP

All external proxies (Regardless of IP / Port)

P2P Applications:

BitTorrent, Limewire, Ares, Bearshare, Shareazaa

Morpheus,

File transfer over MSN, Yahoo, Google Talk

Anonymous VOIP:

Justvoip, LowRateVOIP

IPS Features

Page 48: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity Based “On Appliance” Reporting

Page 49: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam Reports are placed on Appliance

Other UTMsReporting Module/

Device

Page 50: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Policy violation attempts

Page 51: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identification of User Surfing Patterns

Page 52: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Application Wise Usage reports

Page 53: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

User Wise Usage reports

Page 54: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Web Category Visit wise Report

Page 55: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Category – Data Transfer reports

Page 56: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Data Leakage Report (HTTP Upload)

Page 57: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Mail Spam Summary Report (On Appliance)

Page 58: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Traffic Discovery

Page 59: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Reports in Compliance with:

CIPA HIPAA GLBA SOX FISMA PCI

Page 60: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 61: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam supports SSL-VPN, IPSec, L2TP, PPTP

Threat Free Tunneling (TFT) VPN Firewall Management VPN Bandwidth Management VPN Protection – Antivirus / Antispam / IPS / Content Filtering / DoS

VPN Topologies: Road-Warrior (Remote Access), Site to Site Hub & Spoke

Branch Office Internet Traffic Tunneling over VPN Inter Branch Office Communication

VPN Failover

Main Mode / Aggressive Mode Identity based VPN control using xAuth Local digital certification authority (CA) and support external CA

VPN Features

Page 62: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Client and Location independent access Authentication - AD, LDAP, RADIUS, Cyberoam Multi-layered Client Authentication - Certificate, Username/Password User & Group policy enforcement Network access - Split and Full tunneling End user Web Portal - Clientless access SSL VPN Tunneling Client - Granular access control to all the Enterprise Network resources Administrative controls: Session timeout, Dead Peer Detection, Portal customization

License Free SSL-VPN:

Page 63: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam can be deployed in two modes:

Deployment Modes

Bridge / Transparent Mode

Gateway / Route / NAT Mode

Cyberoam can be used as a HTTP Proxyin both the modes.

Page 64: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Other Network / System Features

• High Availability (Active-Active / Active-Passive)

• Stateful Failover

• VPN Failover

• Dynamic Routing (RIP, OSPF, BGP)

• NTP Support

• Multiple Configurable Syslog Server Support

• GUI based Real Time Firewall Log

• Roll Back (Roll back to last upgraded version)

Page 65: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

What is Multi-core:

More than one processors working together to achieve high processing power.

Benefits:

Purpose-built Hardware

True Parallel Processing

Each processor is programmed to run tasks parallel

In case of a new attack, Cyberoam appliances do not suffer from

performance degradation associated with switching from ASIC-

based acceleration to general-purpose processors.

Multicore Processor-based Cyberoam

Page 66: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam in Numbers

More than virus signatures in the anti-virus database

URLs categorized in categories

Spam Detection

False Positives

IPS Signatures

2 Million

44+ Million

82+

* 98%* 1 in million

3500+

Page 67: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Large Enterprises

CR 1500iCR 1000i CR 500i

Small to Medium Enterprises

CR 300iCR 200i CR 100ia

Small Offices

CR 50ia CR 25i CR 15i

Cyberoam CRi UTM Appliance Range

Page 68: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam Demo:

http://demo.cyberoam.com

Page 69: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Question/Answer Session

Page 70: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Identity-Based Unified Threat Management One Identity – One Security Shailesh Mecwan

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Thank you!