You are on page 1of 53

www.cyberoam.

com

Cyberoam USP
Presenter:
<Name>
<Position>, Cyberoam

Our Products

© Copyright
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights
Reserved.2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam Introduction
Technology Powerhouse
450+ Employees
Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for UTM features
Patent-pending Identity-based Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

One
One stop
stop shop:
shop: Cyberoam’s
Cyberoam’s Holistic
Holistic Security
Security Solutions
Solutions

Network Security

Centralized security
Management

Network Monitoring &
Analysis

Securing Home users

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam UTM
UTM –– Comprehensive
Comprehensive Network Security
Security

Layer 8 security
Support for
3G/4G/WiMax

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

com .Cyberoam Cyberoam UTMs UTMs offer… offer…  Gigabit Firewall Throughputs  Powerful Hardware  Superior Quality  Value for Money  Cyberoam OS © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.cyberoam. www.

Ltd. All Rights Reserved.Cyberoam Cyberoam Architecture Architecture Powerful Hardware Intelligent Firmware  Multicore Gigahertz processors for Nano second security processing  Tight integration with Hardware  Gigabit Ports to integrate with Gigabit network  Faster. www. Next-Gen Memory and High Capacity Storage for superior performance  Industrial grade components to withstand extreme environments  Network & Crypto Acceleration © Copyright 2013 Cyberoam Technologies Pvt.com .cyberoam.

cyberoam.Cyberoam Cyberoam Innovation: Layer Layer 88 Security Security Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.com .

Cyberoam Authorizes Cyberoam Audits Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity–based Logs + Reports • Compliance Reports • • • • • Ability to track the user activities.com . Ltd. identify attackers /victims Take quick network security decisions www.AAA AAA over over single single UTM UTM appliance appliance Identity-based AAA Users Employees Management Cyberoam Authenticates • • • • User Name IP Address MAC Id Session Id Customers Partners Control user network activities • • • Who can connect to the network Who can access what What have they accessed © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.cyberoam.

110 Richard Steve Ancy Administrator © Copyright 2013 Cyberoam Technologies Pvt.168.168.105 192.com . Ltd. Internet  Applies security policies based on actual identity of users.3.3.cyberoam.  User-specific rules for multiple users to share a common IP address www.Identity-based Identity-based Security Security Corporate LAN DHCP 192. All Rights Reserved.

Ltd. www. Time.Prioritize Prioritize applications applications with with Layer Layer 77 and and Layer Layer 88 controls controls Internet Application Traffic Cyberoam Appliance Visibility Control Manage Bandwidth Business Business Critical Critical Socio Socio business business Non Non Critical Critical Infected Applications Blocked worms Spyware Undesirable Undesirable Logs & Reports Controls over applications based on User Identity.cyberoam. All Rights Reserved.com . Application and Bandwidth © Copyright 2013 Cyberoam Technologies Pvt.

Granular Granular classification of applications applications Category Risk Level Characteristics Technology File Transfer Very Low (1) Excessive Bandwidth Browser Based Gaming Low (2) General Internet Medium (3) Prone to misuse Client Server Instant Messenger High (4) Transfer files Network Protocol Infrastructure Very High (5) Tunnel other apps P2P Network Services P2P Widely used Proxy and Tunnel Loss of Productivity Remote Access Can bypass firewall policy Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved.cyberoam. Ltd. www.

Ltd. All Rights Reserved.cyberoam. www.Granular Granular classification of applications applications Proactive Protection model: Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Select P2P Applications Set Action Block all future P2P applications without adding applications manually © Copyright 2013 Cyberoam Technologies Pvt.com .

. video. file transfer • Control who can chat with whom Prevent data leakage • Block specific keywords • Block regular expressions (RegEx) e.cyberoam. file transfer) Archive Communication Data Protection Control who can chat with whom Productivity Control loss of productivity • Control access over chat.. Ltd. video.Instant Instant Messaging Messaging Controls Controls Control communication medium (chat. All Rights Reserved.com .g. voice. Messages based on keywords www. social security no. ABN routing numbers © Copyright 2013 Cyberoam Technologies Pvt. credit card no. IPs. voice. Forensic Analysis • IM audit logs • Filter logs based on Users.

cyberoam. Ltd. protocol. Compliance Management www.com . All Rights Reserved.Real-time visibility into bandwidth utilization by user. application Security Management Forensic Analysis 1200+ 1200+ Reports Reports Data Protection © Copyright 2013 Cyberoam Technologies Pvt.On-appliance On-appliance Logging Logging & Reporting Reporting  Real time visibility into user and network activities  Traffic Discovery .

cyberoam. www. Ltd.com .Layer-8 Layer-8 User-based User-based Reports Reports © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.

com . Ltd.cyberoam.Layer-8 Layer-8 User-based User-based Reports Reports © Copyright 2013 Cyberoam Technologies Pvt. www. All Rights Reserved.

All Rights Reserved.com .Dual Dual Dashboard Dashboard –– Traffic Traffic & Security Dashboard Traffic Dashboard © Copyright 2013 Cyberoam Technologies Pvt. Ltd.cyberoam. www.

Dual Dual Dashboard Dashboard –– Traffic Traffic & Security Dashboard Security Dashboard © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. All Rights Reserved. Ltd. www.com .

cyberoam.com . www. Ltd.Application Application Reports © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.

cyberoam.com .Compliance Compliance Reports © Copyright 2013 Cyberoam Technologies Pvt. www. Ltd. All Rights Reserved.

All Rights Reserved. Ltd.Interactive Interactive World World Traffic Traffic Map Map Interactive World Traffic Map for Source and Destination traffic © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. www.com .

All Rights Reserved.Traffic Traffic Discovery Discovery © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.com . www. Ltd.

Ltd. All Rights Reserved.com . www.Traffic Traffic Discovery Discovery © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.

cyberoam.Control incoming/outgoing traffic from/to a specific country Firewall Rule Connectivity Policies Productivity Policies  FastPath Technology . Ltd.To improve processing speed and reduce CPU overhead Security Policies Unified Security  Rules for all security features from firewall page  Easy navigation and increased administrative productivity © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved. www.Stateful Stateful Inspection Inspection Firewall Firewall  Unified Security  Application Firewall  Identity-based Firewall  Layer 8 Geo-based Traffic Control .

All Rights Reserved.com . Ltd. www.cyberoam.Configure Configure rules rules for for all all features features from from Firewall Firewall page page Identity ++ Security ++ Productivity ++ Connectivity © Copyright 2013 Cyberoam Technologies Pvt.

Protection against flood attacks .Allows multiple IPS policies .Threat Threat Protection Protection Features Features Intrusion Prevention System . IMAP traffic Virus outbreak detection for zero-hour protection © Copyright 2013 Cyberoam Technologies Pvt.SYN Flood .IPS Signature to prevent attacks . Ltd.TCP Flood .Protocol Anomaly Continuously updated via - Cyberoam Security Center ~98% spam detection Self-service Quarantine and Spam Digest Scans SMTP.Identity-based alerts & reports .Identity-based IPS policies per user.4500+ signatures – broadest security cover Gateway Anti-Virus. All Rights Reserved.com . IMAP and IM traffic . Antispyware 4 million+ signatures Bi-directional scanning: Web & Email Self-service Virus Quarantine Scans HTTP.Packet Rate Limit . www.Three level scanning:  IP Reputation filtering  Real-time Blackhole List (RBL)  Recurrent Pattern Detection (RPDTM) technology DoS & DDoS Protection . SMTP. POP3.Layer 8 and IPS Tuner driven . POP3. HTTPS.Instant visibility Cyberoam into Attacker/Victim - Security Center Anti-Spam (Inbound/Outbound) . group and IP address .ICMP Flood .UDP Flood . FTP.cyberoam.

Ltd. WAF protection on Cyberoam UTM  Protects web-apps and web servers from hackers protection model and No  Positive Web & Application Signature Tables Database Server Server  Intuitive website flow detector Automatically adapts to website changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting Organization's IT network Easy to deploy Does not require any changes in setup www.cyberoam. All Rights Reserved.On-appliance On-appliance Web Web Application Application Firewall Firewall (WAF) (WAF)  Firewalls/IPS cannot protect a web application from unknown threats Traditional Firewall Cyberoam UTM offering WAF protection Unauthorized access blocked Cost Effective No need to buy dedicated hardware WAF © Copyright 2013 Cyberoam Technologies Pvt.com .

Spam.Virtual Virtual Private Private Network (VPN) (VPN) Embrace BYOD with mobile VPN clients  Support for IPSec. Ltd. Intrusion attempts iOS  Advanced features for business continuity . SSL VPN  Threat Free Tunneling (TFT) Technology Supported VPN Clients  MacOS  iOS  Android Devices .Scans VPN traffic for Malware. Inappropriate content. All Rights Reserved.VPN failover IPSec VPN L2TP VPN PPTP VPN SSL VPN . PPTP.cyberoam.License free © Copyright 2013 Cyberoam Technologies Pvt.com . Android L2TP VPN www. L2TP.MPLS failover to VPN .Client less .

0 Tunneling HTTP 2. All Rights Reserved. Regular Web category updates Cyberoam Security Center Proxy Proxy Allowed Malware Google Blocked Embedded Web & Website Web Websites Websites hosting cache URLs 2. Ltd.com .Web Web & & Content Content Filtering Filtering Industry’s most comprehensive URL database 44million+ URLs in 82+ categories Controls access to HTTP/HTTPS websites Blocks Google Cache pages Blocks Embedded URLs Blocks Malware hosting sites Detects & Blocks Third Party Proxy and Tunneling Filters Websites 2.0 content Internet © Copyright 2013 Cyberoam Technologies Pvt.0 / HTTP/ HTTP pages sites HTTPS sites HTTPS /HTTPS www.cyberoam.

Web Web & & Content Content Filtering Filtering  Manage productivity by controlling access to unwanted sites  On-appliance web category database  Faster access  Surfing pattern privacy  Control Data Leakage  Blocks file uploads to web pages  Helps meet regulatory compliance requirements  Prevent productivity loss with identity-based approach  Customize blocked messages to educate users on corporate policies “YouTube for Schools” for Educational Institutes © Copyright 2013 Cyberoam Technologies Pvt.  Allows access to selected educational content  Blocks all inappropriate. comments & links www.cyberoam. peripheral content such as ads. Ltd. All Rights Reserved.com .

cyberoam.Best Best of of Breed Breed Bandwidth Management // QoS Bandwidth policies tied with © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved. User/User User s group Firewall Rule Web Category Applicatio n www. Ltd.com .

Best Best of of Breed Breed Bandwidth Management // QoS  Create a bandwidth policy on a combination of  User or User Group /Department  Application or Application Category  Web category  Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Committed bandwidth • Allocate dedicated bandwidth Burstable bandwidth • Share the unutilized bandwidth Marketing Group 6mbps When user is not connected CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager 2mbps © Copyright 2013 Cyberoam Technologies Pvt. Ltd.cyberoam. Employee 1 3mbps 2mbps Employee 2 3mbps 2mbps www. All Rights Reserved.com .

cyberoam. Dept. Ltd.Multiple WAN and WWAN (3G/4G.com .Maximizes network uptime .Active-Active & Active-Passive .Gateway failover over VPN Sales Dept. MPLS ISP2 (5 mbps) Organization's IT network © Copyright 2013 Cyberoam Technologies Pvt.Business Business Continuity Continuity Features Features  High Availability .Active-Active and Active-Passive Auto Link Failover . ISP1 (10 mbps) Dev.Ensures continuous network security  Multiple Link Management with Automated Load Balancing . Financ e Dept.Reduces single-point-of-failure . All Rights Reserved. WiMax) link management with multiple failover conditions . ISP3 (3G) (3 mbps) Failover Link www.

All Rights Reserved.Routes traffic based on Source IP addresses. Protocols & Users . www.cyberoam.Business Business Continuity Continuity Features Features  Layer 8 Policy-based Routing . Ltd.Assures QoS for key users and applications © Copyright 2013 Cyberoam Technologies Pvt.com .

Wireless Wireless (WLAN) (WLAN) Security Security  High performance. broader coverage with 3x3 MIMO Technology .Identity-based policies in dynamic IP environment .MAC-based filtering .4 GHz or 5 GHz  Multiple Virtual Access Points  Layer 8 over WLAN . integrated security over WLAN . All Rights Reserved.cyberoam.Supports IP-address pool  Enhances security Engineering Marketing Sales File server Internet ADS ERP © Copyright 2013 Cyberoam Technologies Pvt.com . Ltd.Secures wireless networks to the extent of wired networks  Faster performance.Dual band support: 2. www.

Authorizer consent required for the Administrator to view user-specific activities © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.Safeguard Safeguard user user privacy privacy –– 4-Eye 4-Eye Authentication Authentication  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator .com .cyberoam. www. Ltd.

www.com .SMS SMS (Text-based) (Text-based) Authentication Authentication  Needed for hotspots. Ltd. hotels. corporate offices  Default group can be created for guest users  Sending Internet access credentials using SMS for guest users SMS for Guest users Hotels Airports © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.cyberoam. airports.

Cyberoam Cyberoam features features assure assure Security. Productivity Productivity Organizations cannot afford to compromise on any of these. Security. Connectivity. Connectivity.com . The right SCP balance is essential! © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.cyberoam. Ltd. www.

com . www.cyberoam. All Rights Reserved.Customer Customer Support Support System System Web Support • Support available across all time zones • Global Support Excellence . Ltd.ITIL compliance (ISO 20000) Chat Support • Appliance Registration and Upgrade • Subscribe security Email features Support • Create support tickets • Request RMA Phone Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt.

All Rights Reserved.com .Partner Partner Support Support System System Web Support Region specific dedicated Technical Account Managers (TAM) Chat & Inventory • Ordering Support management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Email Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt. Ltd.cyberoam. www.

CR1500ia-10F. CR1000ia. Ltd. All Rights Reserved.Cyberoam Cyberoam UTM UTM Product Product Range Hardware UTM appliances Virtual UTM appliances Small and Remote Offices CR35wiNG. CR25iNG. CR15iNG Small and Medium Enterprises CRiV-1C. CR15wiNG.cyberoam. www. CRiV-12C CR300i. CR750ia. CRiV-8C. CR500ia-1F/10F/RP. CRiV-2C.com . CR25wiNG. CR500ia. CR750ia-1F/10F. CR1000ia-10F. CR200i. CR100iNG. CR35iNG. © Copyright 2013 Cyberoam Technologies Pvt. CRiV-4C. CR50iNG Large Enterprises CR2500iNG CR1500ia.

Cyberoam Cyberoam Central Central Console Console (CCC) (CCC)  CCC is for centralized.com .O. www.cyberoam.O.Hardware CCC Appliances. All Rights Reserved.) or Security Operations Center (S. Ltd. Virtual CCC Appliances Mumbai Branch Office New York Branch Office Cyberoam UTM Cyberoam UTM Boston Branch Office Dubai Head Office Cyberoam UTM Cyberoam UTM Cyberoam Central Console (CCC) © Copyright 2013 Cyberoam Technologies Pvt. integrated management and monitoring of Cyberoam UTM devices -  Offers complete control over distributed networks from head office (H.) of MSSPs Available as .C.

www.cyberoam. Compliance. Ltd.com . All Rights Reserved. Forensics © Copyright 2013 Cyberoam Technologies Pvt.Cyberoam Cyberoam iView iView –– Logging Logging and and Reporting Reporting  Ability to log and report activities from various devices/vendors Security Management Log Management Forensic Analysis Compliance Management Available as  Open Source software  Appliance Identity Logging Reporting Servers Desktop systems Logs & Events Applications Firewalls UTM IDP / IPS Switches Routers Cyberoam iView’s Logging & Reporting Facilitates Security.

CCC15 Virtual CCC appliances For VMware Server: CCC VMS 200. CCC VMS 50.CCC CCC & iView product range CCC appliances iView – Logging & Reporting Hardware CCC appliances CCC1000. CCC200. CCC VMS 15 CRiVU200 CRiVU100 CR-iVU25 For VMware Workstation: CCC VMW 200. CCC VMW 50. www. Ltd. CCC VMS 100.cyberoam. All Rights Reserved. CCC50. CCC100.com . CCC500. CCC VMW 100. CCC VMW 15 © Copyright 2013 Cyberoam Technologies Pvt.

Ltd.com .Training Training & & Certification Certification Developing competencies with Cyberoam UTM appliances CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCN CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE CYBEROAM CERTIFIED TRAINER (CCT) © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. All Rights Reserved. www.

cyberoam.Recognized Recognized as as ‘Visionary’ ‘Visionary’ in in the the Gartner Gartner UTM UTM MQ MQ 2009 2010 2012 Magic Quadrant for SMB Multifunction Firewalls Magic Quadrant for Unified Threat Management Magic Quadrant for Unified Threat Management © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved. Ltd. www.

All Rights Reserved. For Cyberoam. Ltd.” www. NASSCOM INNOVATION AWARD 2011 © Copyright 2013 Cyberoam Technologies Pvt.that allows connection of names.com .cyberoam. Greatest strength: Product and support through most media 24/7. needs and how customers view Cyberoam products. analyzing and responding to customer attitudes. “One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model . customer commitment means measuring. This allows greatly improved granularity of system administration. This could be users. domains and more.Proven Proven track track record record of Innovation Innovation Innovation: Go-to-market strategy in a global market that is quite crowded in its product space.

www. All Rights Reserved.com .cyberoam.Clientele Clientele Worldwide Worldwide BFSI Manufacturing Government Education Pharma & Healthcare Telecom & ISP © Copyright 2013 Cyberoam Technologies Pvt. Ltd.

Ltd.cyberoam.Clientele Clientele Worldwide Worldwide Hotels Retail & Services IT/BPO & Media Others © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved. www.

com .cyberoam. All Rights Reserved. AntiSp a m VPN Anti-Virus Premium URL Filte ring AntiSpy war e Premium IPS/IDP www.Product Product Certifications Certifications ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability Firewa l l Premium EAL4+ Pending Approval © Copyright 2013 Cyberoam Technologies Pvt. Ltd.

Ltd.cyberoam.Cyberoam Cyberoam Live Live Demo Demo Link: http://demo.com Credentials: guest /guest Get a 30 day FREE Evaluation of Cyberoam Virtual appliance © Copyright 2013 Cyberoam Technologies Pvt.com . www.cyberoam. All Rights Reserved.

All Rights Reserved.com © Copyright 2013 Cyberoam Technologies Pvt. www.Thank you Contact: sales@cyberoam.cyberoam.com . Ltd.