You are on page 1of 53

www.cyberoam.

com

Cyberoam USP
Presenter:
<Name>
<Position>, Cyberoam

Our Products

© Copyright
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights
Reserved.2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam Introduction
Technology Powerhouse
450+ Employees
Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for UTM features
Patent-pending Identity-based Management

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

One
One stop
stop shop:
shop: Cyberoam’s
Cyberoam’s Holistic
Holistic Security
Security Solutions
Solutions

Network Security

Centralized security
Management

Network Monitoring &
Analysis

Securing Home users

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam UTM
UTM –– Comprehensive
Comprehensive Network Security
Security

Layer 8 security
Support for
3G/4G/WiMax

© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

All Rights Reserved. Ltd. www.com .Cyberoam Cyberoam UTMs UTMs offer… offer…  Gigabit Firewall Throughputs  Powerful Hardware  Superior Quality  Value for Money  Cyberoam OS © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.

Cyberoam Cyberoam Architecture Architecture Powerful Hardware Intelligent Firmware  Multicore Gigahertz processors for Nano second security processing  Tight integration with Hardware  Gigabit Ports to integrate with Gigabit network  Faster. All Rights Reserved.com .cyberoam. Ltd. Next-Gen Memory and High Capacity Storage for superior performance  Industrial grade components to withstand extreme environments  Network & Crypto Acceleration © Copyright 2013 Cyberoam Technologies Pvt. www.

All Rights Reserved. Ltd.com .cyberoam. www.Cyberoam Cyberoam Innovation: Layer Layer 88 Security Security Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies © Copyright 2013 Cyberoam Technologies Pvt.

All Rights Reserved. Cyberoam Authorizes Cyberoam Audits Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity–based Logs + Reports • Compliance Reports • • • • • Ability to track the user activities.AAA AAA over over single single UTM UTM appliance appliance Identity-based AAA Users Employees Management Cyberoam Authenticates • • • • User Name IP Address MAC Id Session Id Customers Partners Control user network activities • • • Who can connect to the network Who can access what What have they accessed © Copyright 2013 Cyberoam Technologies Pvt. identify attackers /victims Take quick network security decisions www. Ltd.com .cyberoam.

3.cyberoam.168.3. Internet  Applies security policies based on actual identity of users. All Rights Reserved.Identity-based Identity-based Security Security Corporate LAN DHCP 192.110 Richard Steve Ancy Administrator © Copyright 2013 Cyberoam Technologies Pvt.com .  User-specific rules for multiple users to share a common IP address www. Ltd.105 192.168.

www. Application and Bandwidth © Copyright 2013 Cyberoam Technologies Pvt. Ltd.com .cyberoam. All Rights Reserved.Prioritize Prioritize applications applications with with Layer Layer 77 and and Layer Layer 88 controls controls Internet Application Traffic Cyberoam Appliance Visibility Control Manage Bandwidth Business Business Critical Critical Socio Socio business business Non Non Critical Critical Infected Applications Blocked worms Spyware Undesirable Undesirable Logs & Reports Controls over applications based on User Identity. Time.

All Rights Reserved.Granular Granular classification of applications applications Category Risk Level Characteristics Technology File Transfer Very Low (1) Excessive Bandwidth Browser Based Gaming Low (2) General Internet Medium (3) Prone to misuse Client Server Instant Messenger High (4) Transfer files Network Protocol Infrastructure Very High (5) Tunnel other apps P2P Network Services P2P Widely used Proxy and Tunnel Loss of Productivity Remote Access Can bypass firewall policy Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. www. Ltd.com .

All Rights Reserved.com . www. Ltd.Granular Granular classification of applications applications Proactive Protection model: Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Select P2P Applications Set Action Block all future P2P applications without adding applications manually © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.

Instant Instant Messaging Messaging Controls Controls Control communication medium (chat. Messages based on keywords www. voice.g. All Rights Reserved. credit card no. Ltd. social security no. ABN routing numbers © Copyright 2013 Cyberoam Technologies Pvt. video..cyberoam. video. voice. Forensic Analysis • IM audit logs • Filter logs based on Users.com . file transfer) Archive Communication Data Protection Control who can chat with whom Productivity Control loss of productivity • Control access over chat.. file transfer • Control who can chat with whom Prevent data leakage • Block specific keywords • Block regular expressions (RegEx) e. IPs.

Ltd. application Security Management Forensic Analysis 1200+ 1200+ Reports Reports Data Protection © Copyright 2013 Cyberoam Technologies Pvt. Compliance Management www.cyberoam.com .Real-time visibility into bandwidth utilization by user.On-appliance On-appliance Logging Logging & Reporting Reporting  Real time visibility into user and network activities  Traffic Discovery . All Rights Reserved. protocol.

www.cyberoam.com . All Rights Reserved.Layer-8 Layer-8 User-based User-based Reports Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd.

Ltd. www.com .Layer-8 Layer-8 User-based User-based Reports Reports © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.cyberoam.

All Rights Reserved.com . www. Ltd.Dual Dual Dashboard Dashboard –– Traffic Traffic & Security Dashboard Traffic Dashboard © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.

cyberoam. All Rights Reserved.Dual Dual Dashboard Dashboard –– Traffic Traffic & Security Dashboard Security Dashboard © Copyright 2013 Cyberoam Technologies Pvt.com . www. Ltd.

All Rights Reserved. www.cyberoam.Application Application Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd.com .

All Rights Reserved.Compliance Compliance Reports © Copyright 2013 Cyberoam Technologies Pvt. Ltd.cyberoam.com . www.

Interactive Interactive World World Traffic Traffic Map Map Interactive World Traffic Map for Source and Destination traffic © Copyright 2013 Cyberoam Technologies Pvt.com . www. Ltd. All Rights Reserved.cyberoam.

com .cyberoam. Ltd.Traffic Traffic Discovery Discovery © Copyright 2013 Cyberoam Technologies Pvt. www. All Rights Reserved.

cyberoam. Ltd.com . All Rights Reserved.Traffic Traffic Discovery Discovery © Copyright 2013 Cyberoam Technologies Pvt. www.

Control incoming/outgoing traffic from/to a specific country Firewall Rule Connectivity Policies Productivity Policies  FastPath Technology .com .To improve processing speed and reduce CPU overhead Security Policies Unified Security  Rules for all security features from firewall page  Easy navigation and increased administrative productivity © Copyright 2013 Cyberoam Technologies Pvt.Stateful Stateful Inspection Inspection Firewall Firewall  Unified Security  Application Firewall  Identity-based Firewall  Layer 8 Geo-based Traffic Control . All Rights Reserved.cyberoam. www. Ltd.

www.Configure Configure rules rules for for all all features features from from Firewall Firewall page page Identity ++ Security ++ Productivity ++ Connectivity © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.com . Ltd. All Rights Reserved.

group and IP address .cyberoam. Ltd.Instant visibility Cyberoam into Attacker/Victim - Security Center Anti-Spam (Inbound/Outbound) . All Rights Reserved.Allows multiple IPS policies .4500+ signatures – broadest security cover Gateway Anti-Virus.UDP Flood . Antispyware 4 million+ signatures Bi-directional scanning: Web & Email Self-service Virus Quarantine Scans HTTP.TCP Flood .Identity-based alerts & reports . POP3. SMTP. IMAP and IM traffic . IMAP traffic Virus outbreak detection for zero-hour protection © Copyright 2013 Cyberoam Technologies Pvt.Packet Rate Limit .Identity-based IPS policies per user.ICMP Flood . www.com .Protection against flood attacks . HTTPS.SYN Flood .Three level scanning:  IP Reputation filtering  Real-time Blackhole List (RBL)  Recurrent Pattern Detection (RPDTM) technology DoS & DDoS Protection .Layer 8 and IPS Tuner driven . POP3. FTP.IPS Signature to prevent attacks .Protocol Anomaly Continuously updated via - Cyberoam Security Center ~98% spam detection Self-service Quarantine and Spam Digest Scans SMTP.Threat Threat Protection Protection Features Features Intrusion Prevention System .

cyberoam. Ltd.com . WAF protection on Cyberoam UTM  Protects web-apps and web servers from hackers protection model and No  Positive Web & Application Signature Tables Database Server Server  Intuitive website flow detector Automatically adapts to website changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting Organization's IT network Easy to deploy Does not require any changes in setup www.On-appliance On-appliance Web Web Application Application Firewall Firewall (WAF) (WAF)  Firewalls/IPS cannot protect a web application from unknown threats Traditional Firewall Cyberoam UTM offering WAF protection Unauthorized access blocked Cost Effective No need to buy dedicated hardware WAF © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.

PPTP.cyberoam.Client less . SSL VPN  Threat Free Tunneling (TFT) Technology Supported VPN Clients  MacOS  iOS  Android Devices .License free © Copyright 2013 Cyberoam Technologies Pvt.Virtual Virtual Private Private Network (VPN) (VPN) Embrace BYOD with mobile VPN clients  Support for IPSec. Inappropriate content.com .MPLS failover to VPN . Spam. Intrusion attempts iOS  Advanced features for business continuity . L2TP.VPN failover IPSec VPN L2TP VPN PPTP VPN SSL VPN . Ltd. All Rights Reserved.Scans VPN traffic for Malware. Android L2TP VPN www.

cyberoam. Regular Web category updates Cyberoam Security Center Proxy Proxy Allowed Malware Google Blocked Embedded Web & Website Web Websites Websites hosting cache URLs 2.com .0 / HTTP/ HTTP pages sites HTTPS sites HTTPS /HTTPS www. Ltd. All Rights Reserved.0 Tunneling HTTP 2.0 content Internet © Copyright 2013 Cyberoam Technologies Pvt.Web Web & & Content Content Filtering Filtering Industry’s most comprehensive URL database 44million+ URLs in 82+ categories Controls access to HTTP/HTTPS websites Blocks Google Cache pages Blocks Embedded URLs Blocks Malware hosting sites Detects & Blocks Third Party Proxy and Tunneling Filters Websites 2.

peripheral content such as ads.Web Web & & Content Content Filtering Filtering  Manage productivity by controlling access to unwanted sites  On-appliance web category database  Faster access  Surfing pattern privacy  Control Data Leakage  Blocks file uploads to web pages  Helps meet regulatory compliance requirements  Prevent productivity loss with identity-based approach  Customize blocked messages to educate users on corporate policies “YouTube for Schools” for Educational Institutes © Copyright 2013 Cyberoam Technologies Pvt. comments & links www.  Allows access to selected educational content  Blocks all inappropriate.com . All Rights Reserved.cyberoam. Ltd.

Ltd.cyberoam. All Rights Reserved.Best Best of of Breed Breed Bandwidth Management // QoS Bandwidth policies tied with © Copyright 2013 Cyberoam Technologies Pvt.com . User/User User s group Firewall Rule Web Category Applicatio n www.

cyberoam. Employee 1 3mbps 2mbps Employee 2 3mbps 2mbps www.Best Best of of Breed Breed Bandwidth Management // QoS  Create a bandwidth policy on a combination of  User or User Group /Department  Application or Application Category  Web category  Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Committed bandwidth • Allocate dedicated bandwidth Burstable bandwidth • Share the unutilized bandwidth Marketing Group 6mbps When user is not connected CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager 2mbps © Copyright 2013 Cyberoam Technologies Pvt.com . Ltd. All Rights Reserved.

ISP1 (10 mbps) Dev. WiMax) link management with multiple failover conditions .Gateway failover over VPN Sales Dept.Multiple WAN and WWAN (3G/4G.Maximizes network uptime .com . Financ e Dept. All Rights Reserved. Ltd.cyberoam.Active-Active & Active-Passive .Business Business Continuity Continuity Features Features  High Availability . ISP3 (3G) (3 mbps) Failover Link www. MPLS ISP2 (5 mbps) Organization's IT network © Copyright 2013 Cyberoam Technologies Pvt. Dept.Reduces single-point-of-failure .Ensures continuous network security  Multiple Link Management with Automated Load Balancing .Active-Active and Active-Passive Auto Link Failover .

Routes traffic based on Source IP addresses.Business Business Continuity Continuity Features Features  Layer 8 Policy-based Routing . All Rights Reserved. Ltd.Assures QoS for key users and applications © Copyright 2013 Cyberoam Technologies Pvt.cyberoam. www. Protocols & Users .com .

cyberoam.Wireless Wireless (WLAN) (WLAN) Security Security  High performance.Supports IP-address pool  Enhances security Engineering Marketing Sales File server Internet ADS ERP © Copyright 2013 Cyberoam Technologies Pvt.MAC-based filtering . integrated security over WLAN .Secures wireless networks to the extent of wired networks  Faster performance.Identity-based policies in dynamic IP environment . www. All Rights Reserved.com . broader coverage with 3x3 MIMO Technology .4 GHz or 5 GHz  Multiple Virtual Access Points  Layer 8 over WLAN .Dual band support: 2. Ltd.

Ltd. All Rights Reserved.Authorizer consent required for the Administrator to view user-specific activities © Copyright 2013 Cyberoam Technologies Pvt. www.com .Safeguard Safeguard user user privacy privacy –– 4-Eye 4-Eye Authentication Authentication  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator .cyberoam.

corporate offices  Default group can be created for guest users  Sending Internet access credentials using SMS for guest users SMS for Guest users Hotels Airports © Copyright 2013 Cyberoam Technologies Pvt.com . All Rights Reserved. www. airports.SMS SMS (Text-based) (Text-based) Authentication Authentication  Needed for hotspots. Ltd. hotels.cyberoam.

Security. Ltd. Connectivity. All Rights Reserved.com . Productivity Productivity Organizations cannot afford to compromise on any of these. www. Connectivity.Cyberoam Cyberoam features features assure assure Security.cyberoam. The right SCP balance is essential! © Copyright 2013 Cyberoam Technologies Pvt.

com .Customer Customer Support Support System System Web Support • Support available across all time zones • Global Support Excellence . Ltd. All Rights Reserved.cyberoam.ITIL compliance (ISO 20000) Chat Support • Appliance Registration and Upgrade • Subscribe security Email features Support • Create support tickets • Request RMA Phone Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt. www.

www.com . All Rights Reserved. Ltd.Partner Partner Support Support System System Web Support Region specific dedicated Technical Account Managers (TAM) Chat & Inventory • Ordering Support management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Email Support Knowledge base © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.

CR35iNG. CR500ia.com . CRiV-2C. CRiV-8C. CR1500ia-10F. All Rights Reserved. CR200i. © Copyright 2013 Cyberoam Technologies Pvt. CR1000ia-10F. CR15iNG Small and Medium Enterprises CRiV-1C. CR15wiNG. CRiV-4C.cyberoam. CRiV-12C CR300i. CR750ia-1F/10F. CR25wiNG. CR25iNG. Ltd. CR750ia. www. CR1000ia. CR50iNG Large Enterprises CR2500iNG CR1500ia. CR500ia-1F/10F/RP. CR100iNG.Cyberoam Cyberoam UTM UTM Product Product Range Hardware UTM appliances Virtual UTM appliances Small and Remote Offices CR35wiNG.

C.O.) of MSSPs Available as .Cyberoam Cyberoam Central Central Console Console (CCC) (CCC)  CCC is for centralized. integrated management and monitoring of Cyberoam UTM devices -  Offers complete control over distributed networks from head office (H.) or Security Operations Center (S.O. Ltd.cyberoam. All Rights Reserved. Virtual CCC Appliances Mumbai Branch Office New York Branch Office Cyberoam UTM Cyberoam UTM Boston Branch Office Dubai Head Office Cyberoam UTM Cyberoam UTM Cyberoam Central Console (CCC) © Copyright 2013 Cyberoam Technologies Pvt. www.com .Hardware CCC Appliances.

www.com . All Rights Reserved.Cyberoam Cyberoam iView iView –– Logging Logging and and Reporting Reporting  Ability to log and report activities from various devices/vendors Security Management Log Management Forensic Analysis Compliance Management Available as  Open Source software  Appliance Identity Logging Reporting Servers Desktop systems Logs & Events Applications Firewalls UTM IDP / IPS Switches Routers Cyberoam iView’s Logging & Reporting Facilitates Security.cyberoam. Compliance. Forensics © Copyright 2013 Cyberoam Technologies Pvt. Ltd.

CCC VMW 100. CCC VMS 50.cyberoam. CCC50. www. CCC200. CCC100. Ltd.com . All Rights Reserved. CCC15 Virtual CCC appliances For VMware Server: CCC VMS 200. CCC VMW 50. CCC VMS 15 CRiVU200 CRiVU100 CR-iVU25 For VMware Workstation: CCC VMW 200.CCC CCC & iView product range CCC appliances iView – Logging & Reporting Hardware CCC appliances CCC1000. CCC VMS 100. CCC VMW 15 © Copyright 2013 Cyberoam Technologies Pvt. CCC500.

www. All Rights Reserved.cyberoam.Training Training & & Certification Certification Developing competencies with Cyberoam UTM appliances CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCN CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE CYBEROAM CERTIFIED TRAINER (CCT) © Copyright 2013 Cyberoam Technologies Pvt. Ltd.com .

Ltd.com . All Rights Reserved. www.cyberoam.Recognized Recognized as as ‘Visionary’ ‘Visionary’ in in the the Gartner Gartner UTM UTM MQ MQ 2009 2010 2012 Magic Quadrant for SMB Multifunction Firewalls Magic Quadrant for Unified Threat Management Magic Quadrant for Unified Threat Management © Copyright 2013 Cyberoam Technologies Pvt.

Ltd. customer commitment means measuring. “One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model .” www. analyzing and responding to customer attitudes. Greatest strength: Product and support through most media 24/7. All Rights Reserved.com .that allows connection of names. For Cyberoam.Proven Proven track track record record of Innovation Innovation Innovation: Go-to-market strategy in a global market that is quite crowded in its product space. needs and how customers view Cyberoam products. This allows greatly improved granularity of system administration.cyberoam. This could be users. NASSCOM INNOVATION AWARD 2011 © Copyright 2013 Cyberoam Technologies Pvt. domains and more.

www.cyberoam.com . Ltd.Clientele Clientele Worldwide Worldwide BFSI Manufacturing Government Education Pharma & Healthcare Telecom & ISP © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved.

com . www.Clientele Clientele Worldwide Worldwide Hotels Retail & Services IT/BPO & Media Others © Copyright 2013 Cyberoam Technologies Pvt. All Rights Reserved. Ltd.cyberoam.

Ltd. AntiSp a m VPN Anti-Virus Premium URL Filte ring AntiSpy war e Premium IPS/IDP www. All Rights Reserved.com .cyberoam.Product Product Certifications Certifications ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability Firewa l l Premium EAL4+ Pending Approval © Copyright 2013 Cyberoam Technologies Pvt.

www.com .Cyberoam Cyberoam Live Live Demo Demo Link: http://demo.com Credentials: guest /guest Get a 30 day FREE Evaluation of Cyberoam Virtual appliance © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.cyberoam. Ltd. All Rights Reserved.

Ltd.com © Copyright 2013 Cyberoam Technologies Pvt.cyberoam.Thank you Contact: sales@cyberoam. www. All Rights Reserved.com .