www.cyberoam.

com

Cyberoam USP
Presenter:
<Name>
<Position>, Cyberoam

Our Products

© Copyright
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights
Reserved.2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam Introduction
Technology Powerhouse
450+ Employees
Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for UTM features
Patent-pending Identity-based Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

One
One stop
stop shop:
shop: Cyberoam’s
Cyberoam’s Holistic
Holistic Security
Security Solutions
Solutions

Network Security

Centralized security
Management

Network Monitoring &
Analysis

Securing Home users

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam UTM
UTM –– Comprehensive
Comprehensive Network Security
Security

Layer 8 security
Support for
3G/4G/WiMax

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

cyberoam. All Rights Reserved. www. Ltd.Cyberoam Cyberoam UTMs UTMs offer… offer…  Gigabit Firewall Throughputs  Powerful Hardware  Superior Quality  Value for Money  Cyberoam OS © Copyright 2013 Cyberoam Technologies Pvt.com .

cyberoam. Next-Gen Memory and High Capacity Storage for superior performance  Industrial grade components to withstand extreme environments  Network & Crypto Acceleration © Copyright 2013 Cyberoam Technologies Pvt. www.Cyberoam Cyberoam Architecture Architecture Powerful Hardware Intelligent Firmware  Multicore Gigahertz processors for Nano second security processing  Tight integration with Hardware  Gigabit Ports to integrate with Gigabit network  Faster. Ltd. All Rights Reserved.com .

www.cyberoam. Ltd. All Rights Reserved.com .Cyberoam Cyberoam Innovation: Layer Layer 88 Security Security Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies © Copyright 2013 Cyberoam Technologies Pvt.

Cyberoam Authorizes Cyberoam Audits Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity–based Logs + Reports • Compliance Reports • • • • • Ability to track the user activities. identify attackers /victims Take quick network security decisions www.cyberoam. All Rights Reserved.AAA AAA over over single single UTM UTM appliance appliance Identity-based AAA Users Employees Management Cyberoam Authenticates • • • • User Name IP Address MAC Id Session Id Customers Partners Control user network activities • • • Who can connect to the network Who can access what What have they accessed © Copyright 2013 Cyberoam Technologies Pvt.com . Ltd.

3. Ltd.com .  User-specific rules for multiple users to share a common IP address www.105 192.168.Identity-based Identity-based Security Security Corporate LAN DHCP 192. All Rights Reserved.3. Internet  Applies security policies based on actual identity of users.cyberoam.110 Richard Steve Ancy Administrator © Copyright 2013 Cyberoam Technologies Pvt.168.

All Rights Reserved. Ltd. www.cyberoam.com . Application and Bandwidth © Copyright 2013 Cyberoam Technologies Pvt. Time.Prioritize Prioritize applications applications with with Layer Layer 77 and and Layer Layer 88 controls controls Internet Application Traffic Cyberoam Appliance Visibility Control Manage Bandwidth Business Business Critical Critical Socio Socio business business Non Non Critical Critical Infected Applications Blocked worms Spyware Undesirable Undesirable Logs & Reports Controls over applications based on User Identity.

All Rights Reserved.com .cyberoam.Granular Granular classification of applications applications Category Risk Level Characteristics Technology File Transfer Very Low (1) Excessive Bandwidth Browser Based Gaming Low (2) General Internet Medium (3) Prone to misuse Client Server Instant Messenger High (4) Transfer files Network Protocol Infrastructure Very High (5) Tunnel other apps P2P Network Services P2P Widely used Proxy and Tunnel Loss of Productivity Remote Access Can bypass firewall policy Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… © Copyright 2013 Cyberoam Technologies Pvt. www. Ltd.

cyberoam. www. All Rights Reserved.Granular Granular classification of applications applications Proactive Protection model: Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Select P2P Applications Set Action Block all future P2P applications without adding applications manually © Copyright 2013 Cyberoam Technologies Pvt. Ltd.com .

All Rights Reserved. video. video.g. Forensic Analysis • IM audit logs • Filter logs based on Users.. voice. voice. Messages based on keywords www.Instant Instant Messaging Messaging Controls Controls Control communication medium (chat. credit card no..com . ABN routing numbers © Copyright 2013 Cyberoam Technologies Pvt. file transfer • Control who can chat with whom Prevent data leakage • Block specific keywords • Block regular expressions (RegEx) e. social security no.cyberoam. IPs. Ltd. file transfer) Archive Communication Data Protection Control who can chat with whom Productivity Control loss of productivity • Control access over chat.

application Security Management Forensic Analysis 1200+ 1200+ Reports Reports Data Protection © Copyright 2013 Cyberoam Technologies Pvt. Compliance Management www.On-appliance On-appliance Logging Logging & Reporting Reporting  Real time visibility into user and network activities  Traffic Discovery .com . All Rights Reserved.Real-time visibility into bandwidth utilization by user. Ltd. protocol.cyberoam.

Ltd.cyberoam. All Rights Reserved.com . www.Layer-8 Layer-8 User-based User-based Reports Reports © Copyright 2013 Cyberoam Technologies Pvt.

www.cyberoam.com . All Rights Reserved. Ltd.Layer-8 Layer-8 User-based User-based Reports Reports © Copyright 2013 Cyberoam Technologies Pvt.

Ltd. www.cyberoam.Dual Dual Dashboard Dashboard –– Traffic Traffic & Security Dashboard Traffic Dashboard © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved.

cyberoam. All Rights Reserved. Ltd. www.com .Dual Dual Dashboard Dashboard –– Traffic Traffic & Security Dashboard Security Dashboard © Copyright 2013 Cyberoam Technologies Pvt.

com . Ltd. www.Application Application Reports © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.cyberoam.

cyberoam. All Rights Reserved.com . Ltd.Compliance Compliance Reports © Copyright 2013 Cyberoam Technologies Pvt. www.

cyberoam. www. All Rights Reserved.Interactive Interactive World World Traffic Traffic Map Map Interactive World Traffic Map for Source and Destination traffic © Copyright 2013 Cyberoam Technologies Pvt.com . Ltd.

Ltd.com .Traffic Traffic Discovery Discovery © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.cyberoam. www.

www. Ltd.Traffic Traffic Discovery Discovery © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. All Rights Reserved.com .

All Rights Reserved.To improve processing speed and reduce CPU overhead Security Policies Unified Security  Rules for all security features from firewall page  Easy navigation and increased administrative productivity © Copyright 2013 Cyberoam Technologies Pvt.com . Ltd.Control incoming/outgoing traffic from/to a specific country Firewall Rule Connectivity Policies Productivity Policies  FastPath Technology . www.cyberoam.Stateful Stateful Inspection Inspection Firewall Firewall  Unified Security  Application Firewall  Identity-based Firewall  Layer 8 Geo-based Traffic Control .

Configure Configure rules rules for for all all features features from from Firewall Firewall page page Identity ++ Security ++ Productivity ++ Connectivity © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. All Rights Reserved.com . www. Ltd.

Threat Threat Protection Protection Features Features Intrusion Prevention System .Identity-based alerts & reports . SMTP.cyberoam.Instant visibility Cyberoam into Attacker/Victim - Security Center Anti-Spam (Inbound/Outbound) . group and IP address .com . FTP. www.Layer 8 and IPS Tuner driven .Packet Rate Limit .UDP Flood .IPS Signature to prevent attacks .Protocol Anomaly Continuously updated via - Cyberoam Security Center ~98% spam detection Self-service Quarantine and Spam Digest Scans SMTP.TCP Flood . HTTPS.Identity-based IPS policies per user. Antispyware 4 million+ signatures Bi-directional scanning: Web & Email Self-service Virus Quarantine Scans HTTP. POP3. IMAP and IM traffic . All Rights Reserved.Three level scanning:  IP Reputation filtering  Real-time Blackhole List (RBL)  Recurrent Pattern Detection (RPDTM) technology DoS & DDoS Protection . POP3.4500+ signatures – broadest security cover Gateway Anti-Virus.Protection against flood attacks . Ltd.Allows multiple IPS policies .ICMP Flood .SYN Flood . IMAP traffic Virus outbreak detection for zero-hour protection © Copyright 2013 Cyberoam Technologies Pvt.

com . All Rights Reserved. Ltd. WAF protection on Cyberoam UTM  Protects web-apps and web servers from hackers protection model and No  Positive Web & Application Signature Tables Database Server Server  Intuitive website flow detector Automatically adapts to website changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting Organization's IT network Easy to deploy Does not require any changes in setup www.cyberoam.On-appliance On-appliance Web Web Application Application Firewall Firewall (WAF) (WAF)  Firewalls/IPS cannot protect a web application from unknown threats Traditional Firewall Cyberoam UTM offering WAF protection Unauthorized access blocked Cost Effective No need to buy dedicated hardware WAF © Copyright 2013 Cyberoam Technologies Pvt.

SSL VPN  Threat Free Tunneling (TFT) Technology Supported VPN Clients  MacOS  iOS  Android Devices .Scans VPN traffic for Malware. All Rights Reserved. L2TP.cyberoam.VPN failover IPSec VPN L2TP VPN PPTP VPN SSL VPN .com .MPLS failover to VPN .License free © Copyright 2013 Cyberoam Technologies Pvt. Spam. Inappropriate content. PPTP. Ltd.Virtual Virtual Private Private Network (VPN) (VPN) Embrace BYOD with mobile VPN clients  Support for IPSec.Client less . Intrusion attempts iOS  Advanced features for business continuity . Android L2TP VPN www.

Regular Web category updates Cyberoam Security Center Proxy Proxy Allowed Malware Google Blocked Embedded Web & Website Web Websites Websites hosting cache URLs 2.0 content Internet © Copyright 2013 Cyberoam Technologies Pvt.com .cyberoam.Web Web & & Content Content Filtering Filtering Industry’s most comprehensive URL database 44million+ URLs in 82+ categories Controls access to HTTP/HTTPS websites Blocks Google Cache pages Blocks Embedded URLs Blocks Malware hosting sites Detects & Blocks Third Party Proxy and Tunneling Filters Websites 2.0 Tunneling HTTP 2. All Rights Reserved.0 / HTTP/ HTTP pages sites HTTPS sites HTTPS /HTTPS www. Ltd.

Ltd.  Allows access to selected educational content  Blocks all inappropriate.cyberoam. comments & links www. peripheral content such as ads. All Rights Reserved.Web Web & & Content Content Filtering Filtering  Manage productivity by controlling access to unwanted sites  On-appliance web category database  Faster access  Surfing pattern privacy  Control Data Leakage  Blocks file uploads to web pages  Helps meet regulatory compliance requirements  Prevent productivity loss with identity-based approach  Customize blocked messages to educate users on corporate policies “YouTube for Schools” for Educational Institutes © Copyright 2013 Cyberoam Technologies Pvt.com .

cyberoam. User/User User s group Firewall Rule Web Category Applicatio n www. All Rights Reserved.com . Ltd.Best Best of of Breed Breed Bandwidth Management // QoS Bandwidth policies tied with © Copyright 2013 Cyberoam Technologies Pvt.

Employee 1 3mbps 2mbps Employee 2 3mbps 2mbps www.com . All Rights Reserved.Best Best of of Breed Breed Bandwidth Management // QoS  Create a bandwidth policy on a combination of  User or User Group /Department  Application or Application Category  Web category  Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Committed bandwidth • Allocate dedicated bandwidth Burstable bandwidth • Share the unutilized bandwidth Marketing Group 6mbps When user is not connected CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager 2mbps © Copyright 2013 Cyberoam Technologies Pvt. Ltd.cyberoam.

com .Gateway failover over VPN Sales Dept.Maximizes network uptime .Multiple WAN and WWAN (3G/4G. Dept. ISP1 (10 mbps) Dev.Business Business Continuity Continuity Features Features  High Availability .Ensures continuous network security  Multiple Link Management with Automated Load Balancing .Active-Active & Active-Passive . WiMax) link management with multiple failover conditions .Reduces single-point-of-failure . ISP3 (3G) (3 mbps) Failover Link www. All Rights Reserved. Financ e Dept. Ltd.Active-Active and Active-Passive Auto Link Failover .cyberoam. MPLS ISP2 (5 mbps) Organization's IT network © Copyright 2013 Cyberoam Technologies Pvt.

All Rights Reserved.Assures QoS for key users and applications © Copyright 2013 Cyberoam Technologies Pvt.Business Business Continuity Continuity Features Features  Layer 8 Policy-based Routing . Ltd.Routes traffic based on Source IP addresses.com .cyberoam. Protocols & Users . www.

com .Identity-based policies in dynamic IP environment .MAC-based filtering .Dual band support: 2.Secures wireless networks to the extent of wired networks  Faster performance. Ltd.Wireless Wireless (WLAN) (WLAN) Security Security  High performance. broader coverage with 3x3 MIMO Technology . All Rights Reserved.cyberoam. www. integrated security over WLAN .Supports IP-address pool  Enhances security Engineering Marketing Sales File server Internet ADS ERP © Copyright 2013 Cyberoam Technologies Pvt.4 GHz or 5 GHz  Multiple Virtual Access Points  Layer 8 over WLAN .

Authorizer consent required for the Administrator to view user-specific activities © Copyright 2013 Cyberoam Technologies Pvt.com . www.cyberoam. All Rights Reserved.Safeguard Safeguard user user privacy privacy –– 4-Eye 4-Eye Authentication Authentication  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator . Ltd.

com .SMS SMS (Text-based) (Text-based) Authentication Authentication  Needed for hotspots. corporate offices  Default group can be created for guest users  Sending Internet access credentials using SMS for guest users SMS for Guest users Hotels Airports © Copyright 2013 Cyberoam Technologies Pvt. Ltd. airports. hotels. All Rights Reserved. www.cyberoam.

www. Ltd.Cyberoam Cyberoam features features assure assure Security. All Rights Reserved.com .cyberoam. Security. Connectivity. Connectivity. Productivity Productivity Organizations cannot afford to compromise on any of these. The right SCP balance is essential! © Copyright 2013 Cyberoam Technologies Pvt.

cyberoam. All Rights Reserved.Customer Customer Support Support System System Web Support • Support available across all time zones • Global Support Excellence .ITIL compliance (ISO 20000) Chat Support • Appliance Registration and Upgrade • Subscribe security Email features Support • Create support tickets • Request RMA Phone Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt. www.com . Ltd.

Ltd.Partner Partner Support Support System System Web Support Region specific dedicated Technical Account Managers (TAM) Chat & Inventory • Ordering Support management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Email Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved. www.cyberoam.com .

CR1500ia-10F. CR500ia-1F/10F/RP. CR200i. CR1000ia-10F. © Copyright 2013 Cyberoam Technologies Pvt. CR750ia-1F/10F. Ltd. CR15iNG Small and Medium Enterprises CRiV-1C. CR1000ia. CR100iNG. CR25wiNG. www.Cyberoam Cyberoam UTM UTM Product Product Range Hardware UTM appliances Virtual UTM appliances Small and Remote Offices CR35wiNG. CRiV-4C.com . CR50iNG Large Enterprises CR2500iNG CR1500ia. CR750ia. CR15wiNG. CR500ia. CRiV-12C CR300i. CR35iNG. CRiV-2C. CRiV-8C. All Rights Reserved. CR25iNG.cyberoam.

C.) of MSSPs Available as . Virtual CCC Appliances Mumbai Branch Office New York Branch Office Cyberoam UTM Cyberoam UTM Boston Branch Office Dubai Head Office Cyberoam UTM Cyberoam UTM Cyberoam Central Console (CCC) © Copyright 2013 Cyberoam Technologies Pvt.O.com . www. integrated management and monitoring of Cyberoam UTM devices -  Offers complete control over distributed networks from head office (H.Hardware CCC Appliances.) or Security Operations Center (S.O. Ltd.Cyberoam Cyberoam Central Central Console Console (CCC) (CCC)  CCC is for centralized.cyberoam. All Rights Reserved.

Cyberoam Cyberoam iView iView –– Logging Logging and and Reporting Reporting  Ability to log and report activities from various devices/vendors Security Management Log Management Forensic Analysis Compliance Management Available as  Open Source software  Appliance Identity Logging Reporting Servers Desktop systems Logs & Events Applications Firewalls UTM IDP / IPS Switches Routers Cyberoam iView’s Logging & Reporting Facilitates Security. Compliance.cyberoam.com . Forensics © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved. Ltd. www.

CCC100. CCC200. CCC VMS 100.com . CCC VMS 50. CCC500. CCC VMW 50. CCC VMW 100. CCC VMS 15 CRiVU200 CRiVU100 CR-iVU25 For VMware Workstation: CCC VMW 200. All Rights Reserved. www. Ltd. CCC50. CCC15 Virtual CCC appliances For VMware Server: CCC VMS 200.cyberoam.CCC CCC & iView product range CCC appliances iView – Logging & Reporting Hardware CCC appliances CCC1000. CCC VMW 15 © Copyright 2013 Cyberoam Technologies Pvt.

Ltd.Training Training & & Certification Certification Developing competencies with Cyberoam UTM appliances CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCN CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE CYBEROAM CERTIFIED TRAINER (CCT) © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. www.com . All Rights Reserved.

cyberoam. Ltd.com . All Rights Reserved.Recognized Recognized as as ‘Visionary’ ‘Visionary’ in in the the Gartner Gartner UTM UTM MQ MQ 2009 2010 2012 Magic Quadrant for SMB Multifunction Firewalls Magic Quadrant for Unified Threat Management Magic Quadrant for Unified Threat Management © Copyright 2013 Cyberoam Technologies Pvt. www.

that allows connection of names. analyzing and responding to customer attitudes.cyberoam. For Cyberoam. Ltd. All Rights Reserved. needs and how customers view Cyberoam products. This allows greatly improved granularity of system administration. NASSCOM INNOVATION AWARD 2011 © Copyright 2013 Cyberoam Technologies Pvt.Proven Proven track track record record of Innovation Innovation Innovation: Go-to-market strategy in a global market that is quite crowded in its product space. Greatest strength: Product and support through most media 24/7. domains and more. This could be users. customer commitment means measuring.” www. “One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model .com .

Clientele Clientele Worldwide Worldwide BFSI Manufacturing Government Education Pharma & Healthcare Telecom & ISP © Copyright 2013 Cyberoam Technologies Pvt.com . Ltd. www. All Rights Reserved.cyberoam.

www. Ltd.cyberoam.Clientele Clientele Worldwide Worldwide Hotels Retail & Services IT/BPO & Media Others © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved.

All Rights Reserved. Ltd.com . AntiSp a m VPN Anti-Virus Premium URL Filte ring AntiSpy war e Premium IPS/IDP www.Product Product Certifications Certifications ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability Firewa l l Premium EAL4+ Pending Approval © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.

Cyberoam Cyberoam Live Live Demo Demo Link: http://demo. Ltd.com Credentials: guest /guest Get a 30 day FREE Evaluation of Cyberoam Virtual appliance © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. www.cyberoam. All Rights Reserved.com .

Thank you Contact: sales@cyberoam. Ltd.cyberoam.com . All Rights Reserved.com © Copyright 2013 Cyberoam Technologies Pvt. www.