Академический Документы
Профессиональный Документы
Культура Документы
Cyberoam UTM
- An Overview
Rajesh Kannan
Sr. Presales Consultant (Security)
Sales, Distribution Channel & Customers across 75+ countries State-of-the-Art Development Center at Ahmedabad, Gujarat, India Communication - Networks Security - Cyberoam - Network to Endpoint Security - CRESTEL - Telecommunication OSS BSS - EliteAAA - Telecommunication - 24online - Bandwidth Management Solution
www.cyberoam.com
www.cyberoam.com
Threats
Internal Threats
Internet Communication - Chatting, File Sharing via IM, Webmail
Leakage of confidential information Entry point for spyware, malware Unsafe surfing raises legal liability Illegal music and video downloads Loss of productivity Bandwidth choking
www.cyberoam.com
External Threats
Threats enter via multiple protocols Spyware infects 25% systems
External Threats
Threats
Internal Threats
Spyware
Firewall Anti-Virus
Content Filtering
www.cyberoam.com
What is a UTM?
Unified Threat Management (UTM) is a comprehensive network security product which integrates multiple security features into a single appliance.
Security Features of a true UTM Appliance 1. Firewall
www.cyberoam.com
Why UTM?
Comprehensive Network Security Easy to deploy and easy to manage Cost-effective:
Increased RoI (Return on Investment) and Reduced TCO (Total Cost of Ownership)
www.cyberoam.com
Internet Internet
AV / AS Cluster AV / AS Cluster
Internet
Internet
www.cyberoam.com
About Cyberoam
Cyberoam is an Identity based UTM solution that offers Integrated Internet Security with fine granularity through its unique identity - based policies. It offers comprehensive threat protection with: Stateful Inspection Firewall VPN Virtual Private Network Gateway Anti-Virus & Anti-Spyware Gateway Anti-Spam Intrusion Prevention System Content & Application Filtering Bandwidth Management Multiple Link Management On-Appliance Comprehensive Reporting
www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Why Cyberoam ?
Cyberoam is the only UTM providing Identity Based Security using Layer 8 Technology.
www.cyberoam.com
Identity-based Security
Stamps User Identity Know Who is Doing What Allows Granular controls Ensures Business Flexibility based on work profile Protection in DHCP and Wi-Fi Environment and shared desktops scenarios Complete visibility across corporate & branch offices Allows users to carry their access rights anywhere in the network Single Sign on
www.cyberoam.com
User
www.cyberoam.com
Cyberoam Authorizes
Cyberoam Audits
Intrusion Prevention Identity - based Policies Logs + Reports Anti-Malware Anti-Spam Web Filtering Layer 7 Controls Bandwidth Management & QoS Instant Messaging Archiving & Control Internet Surfing Quota Internet Access Time Internet Data Quota
Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
Identity-Based Firewall
www.cyberoam.com
However, fails in DHCP, Wi-Fi Rule Matching Criteria) Unified Threat Controls (per environment - IDP Policy - Internet Access Policy - Bandwidth Policy - Anti Virus & Anti Spam - Routing decision
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
ICSA Labs Certified Active Active High Availability - Maximizes network uptime - Reduces single-point-of-failure - Ensures continuous Cyberoam security - Ensures business continuity
www.cyberoam.com
Third-party validation
- International Testing Program with 3000+ rigorous test cases
www.cyberoam.com
VPN
www.cyberoam.com
Cyberoam VPN
Site-to-Site (Net2Net) connecting Head Office and Branch Offices or Partners Client-to-Site (Road Warrior) connecting mobile workers, customers to the Head Office IPSec L2TP PPTP Next Generation VPN Standard - SSL VPN - Newly integrated featured, free of cost - Clientless VPN Connectivity - Fast, Secure and Reliable
Standards
www.cyberoam.com
www.cyberoam.com
Content Filtering
www.cyberoam.com
Web
Millions of websites categorized into 82+ categories Allows custom web categories
To Block Audio, Video or Executable file Types download
File Types
Applications
www.cyberoam.com
Local Database for the content filter reduces latency and dependence
on network connectivity. Customized blocked message to educate users about organizational policies and reduce support calls
www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Educate Users with Custom Denied Messages and Reduce Your Support Calls
http://www.screensaver.com
James
Dear Mark, The web site you are trying to access is listed within the category SpywareandP2P
It can result in download of spyware and adware which result in popups. They are a threat to you and the enterprise and can slow the network down.
www.cyberoam.com
Content Filtering
Database of millions of sites 82 + categories HTTP upload control Categorizes google cached pages and akamai pages with dynamic URLs Prevents surfing that bypass proxy eg: tunnel proxy utility, open proxy, web based proxy. Local database reduces latency and dependence on network connectivity Category wise customized denied messages
Premium
Certifications
Checkmark Premium Certified for URL Filtering Network Products Guide award - 2008
www.cyberoam.com
User Authentication
www.cyberoam.com
User Authentication
Cyberoam can authenticate users using any of the following: Cyberoam Local Database Windows NT PDC Active Directory LDAP Server RADIUS Server
Types Of Authentication
Normal - Using HTTP client - Using client.exe Clientless - No Authentication Required Single Sign On - Authentication is done in sync with users authentication in domain
Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
www.cyberoam.com
www.cyberoam.com
Bandwidth Management
www.cyberoam.com
Bandwidth Management
Committed and burstable bandwidth Time-based, schedule-based bandwidth allocation Restrict Bandwidth usage to a combination of source, destination and service/service group
www.cyberoam.com
www.cyberoam.com
Multi-Link Management
www.cyberoam.com
www.cyberoam.com
Multi-Link Configuration
www.cyberoam.com
3G/WiMAX USB Modem Support - High-speed wireless WAN (WWAN) - Wide ISP support - All gateway security features available
Can function as a main or failover link
3G
www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Gateway Anti-Virus
www.cyberoam.com
Scans WEB, FTP, Pop3, SMTP & IMAP traffic Self-service quarantine area Signature update ever 30 Mins Identity-based HTTP virus reports Disclaimer Addition to outbound emails Spyware and other malware protection including Phishing emails Block attachment based on Extensions (exe, .bat, .wav etc)
www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Gateway Anti-Spam
www.cyberoam.com
www.cyberoam.com
Protects against Image-based Spam and spam in different languages The spam catch rate of over 98%
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
IPS Features
Multiple and Custom IPS policies Identity-based policies Identity-based intrusion reporting
www.cyberoam.com
IPS Features
Cyberoam IPS can log / block all type of applications: Anonymous Surfing: UltraSurf, TOR, Hotspot, FreeGate, JAP All external proxies (Regardless of IP / Port) P2P Applications: BitTorrent, Limewire, Ares, Bearshare, Shareazaa Morpheus, File transfer over MSN, Yahoo, Google Talk Anonymous VOIP: Justvoip, LowRateVOIP
www.cyberoam.com
www.cyberoam.com
On-Appliance Reports
www.cyberoam.com
www.cyberoam.com
Traffic Discovery
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
Bundle Subscriptions:
Total Value Subscription (TVS) Security Value Subscription (SVS) Total Value Subscription Plus (TVSP) Security Value Subscription (SVSP)
www.cyberoam.com
2. 24 x 7 Premium Support
Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam Certifications
Premium Premium
Anti-Virus
Anti-Spyware
Anti-Spam
URL Filtering
Firewall
VPN
IPS/IDP
www.cyberoam.com
www.cyberoam.com
Awards
2008 Emerging Vendor of the Year for Network Security
Best Integrated Security Appliance Best Security Solution for Education Best Unified Security
2007, 2008 Finalist Network Middle East Award 2008 Finalist Channel Middle East Award
www.cyberoam.com
Global Clientele
www.cyberoam.com
www.cyberoam.com
www.cyberoam.com
BSNL
www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
BFSI Clientele
Bangladesh Bank
www.cyberoam.com
Education Clients
NIT Rourkela
SVNIT
NMIMS
AIIMS
www.cyberoam.com
Anna Univ
Osmania Univ.
Thank You
Contact: Rajesh Kannan Sr. Presales Consultant (Security) Cell: +91-9600072968 Email: rajesh.kannan@cyberoam.com
www.cyberoam.com