cyberoam utm with version x presentation slide - updated

Upload: areyoufree

Post on 03-Jun-2018

246 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    1/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

    Identity-Based Unified Threat Management

    One Identity One Security

    Presentation

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    2/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

    Agenda of Presentation

    About Company Challenges of UTM Scenario Introduction to Cyberoam Cyberoam Credentials / Awards/ Accreditations Cyberoam Product Walk-thru

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    3/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

    Est. in 1999

    500+ EmployeesISO 9001-2000 CertifiedPresence in USA, Asia, Middle EastProduct installations in 55+ Countries

    Invested by $90bn Worlds LargestPrivate Equity Group

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    4/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

    UTM : Unified Threat Management

    A solution to fight against multiple attacks and threats

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    5/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

    A true UTM Appliance should have following features in singlesolution:

    1. Firewall2. VPN

    3. Intrusion Detection & Prevention

    4. Gateway Level Anti-virus for Mails, Website, File Transfers

    5. Gateway level Anti-spam

    6. Content Identification & Filtering

    7. Bandwidth Management for Applications & Services

    8. Load Balancing & Failover Facilities

    UTM

    Unified threat management (UTM) refers to a comprehensivesecurity product which integrates a range of security featuresinto a single appliance.

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    6/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

    Benefits of UTM Appliances

    Reduced complexity All-in-one approach simplifies product selection, integration and support

    Easy to deployCustomers, VARs, VADs, MSSPs can easily install and maintain the products

    Remote ManagementRemote sites may not have security professionals requires plug-and-play appliance foreasy installation and management

    Better Man Power Management

    Reduction in dependency and number of high end skilled Human resources

    Managed ServicesSecurity requirements & day to day operations can be outsourced to MSSPs

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    7/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Lack of user Identity recognition and controlInadequate in handling threats that target the user Phishing, Pharming

    Unable to Identify source of Internal ThreatsEmployee with malicious intent posed a serious internal threatIndiscriminate surfing exposes network to external threats50 % of security problems originate from internal threats Yankee GroupSource of potentially dangerous internal threats remain anonymous

    Unable to Handle Dynamic Environments Wi-FiDHCP

    Unable to Handle Blended Threats

    Threats arising out of internet activity done by internal members of organizationExternal threats that use multiple methods to attack - Slammer

    Lack of In-depth FeaturesSacrificed flexibility as UTM tried to fit in many features in single appliance.Inadequate Logging, reporting, lack of granular features in individual solutions

    Challenges with Current UTM Products

    Need for Identity based UTM

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    8/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Layer 8 Firewall (Patent-pending Technology)

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    9/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Patent Pending: Identity-Based Technology

    User

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    10/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Cyberoam is the only Identity-based Unified ThreatManagement appliance that provides integrated Internetsecurity to enterprises and educational institutions throughits unique granular user-based controls.

    Cyberoam Identity Based Security

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    11/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Cyberoam Appliances CRi Series

    CRi series for SOHO (Small Office-Home Office)& ROBO (Remote Office-Branch Office)

    CR 15wi - WirelessCR 15iCR 25iaCR 35ia

    CRi series for Small to Medium Business

    CR 50iaCR 100iaCR 200i

    CRi series for Medium EnterprisesCR 300i CR 500iaCR 750ia

    CRi series for Large Enterprises

    CR 1000i

    CR 1500i

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    12/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Identity-based Firewall VPN Bandwidth Management Multiple Link Management On Appliance Reporting 8*5 Tech Support & 1 Year Warranty

    Subscriptions

    Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)

    Gateway Anti-spam SubscriptionWeb & Application Filtering SubscriptionIntrusion Prevention System (IPS) 8*5 Tech Support & 1 Year Warranty

    Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

    Basic Appliance

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    13/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    2008 - Emerging Vendor of the Year

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    14/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Certifications

    UTM Lev el 5 complete UTM certification

    Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP

    Premium

    ICSA CertifiedFirewall

    VPNC Certif ied for Basic VPN& AES Interoperabil i ty

    Certifications - pipeline

    ICSA Cert if icat ionfor HighAvai labi l i tyIPv6 com pliance

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    15/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    console is well organized andintuitive to navigate flexible and very powerful

    Fully loaded, with many greatfeatures packs a more serious punch can restrict or open internet access bybandwidth usage, surf time or datatransfer.

    March 2008 UTM Round upCyberoam CR1000i

    Five Star Rated Three Years RunningJuly 2007 UTM Roundup

    Cyberoam CR250i

    Finalist in SC Magazine Awards 2009, Europe

    Cyberoam has been short-listed as a finalist for the Best SME SecurityCategory

    Year 2009 UTM RoundupOne of the best UTM

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    16/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    deserves credit for its flexible configuration options,extensive security, content filtering, and bandwidthmanagement features.

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    17/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Get top tech companyFrom Zdnet Asia 2008/09

    Tomorrows Technology Today2007

    2007 Finalist American Business Awards

    2007 Finalist Network Middle East AwardBest Security ProductBest SMB Networking Vendor

    VAR Editors Choice for BestUTM (2007 left , 2008-right)

    Finalist - 2008 Global Excellencein Network Security Solution

    CRN Emerging Tech Vendors2007

    Awards

    Finalist PC pro awards 2009for the Business Hardware of the year

    Received Gold Award from IDGChannel World MagazineBest network security vendor 2009

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    18/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    GLOBAL PRESENCE (Over 55 Countries)

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    19/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Global Clientele

    USA Largest Chain Store

    http://www.lordandtaylor.com/gifts/OnlineShopping/LT?Dsp=1&cm_id=hdr_logo
  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    20/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Education:

    DY Patil Institute ofManagement

    http://www.pascack.k12.nj.us/7027513016124/blank/browse.asp?A=383&BMDRN=2000&BCOB=0&C=53316
  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    21/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    22/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    BFSI & Govt. Clientele

    BSNL

    b

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    23/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Malaysia Government Clients

    C b

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    24/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Malaysia Corporate Clients

    C b

    http://www.annjoo.com.my/http://upload.wikimedia.org/wikipedia/en/1/18/Tunku_Abdul_Rahman_College.jpg
  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    25/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Cyberoam Product walk thru

    f

    C b

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    26/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Normal Firewall

    Rule matching criteria- Source address- Destination address- Service (port)- Schedule

    Action- Accept

    - NAT- Drop- Reject

    - Identity

    Cyberoam - Identity Based UTM

    Unified Threat Controls (per Rule Matching Criteria)- IDP Policy- Internet Access Policy- Bandwidth Policy- Anti Virus & Anti Spam- Routing decision

    However, fails in DHCP, Wi-Fi environment

    C b U ifi d Th M

    f d hC b

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    27/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Next GenerationLayer 7 Firewall

    C b U ifi d Th M

    U ifi d Th MC b

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    28/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Port 443

    Port 80

    443

    80

    443

    8021

    1 st Generation Firewalls

    C b U ifi d Th t M t

    U ifi d Th MC beroam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    29/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    MailSkype WebBit

    Torrent

    Application Firewalls CR Version 9

    C b U ifi d Th t M t

    U ifi d Th t M tCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    30/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    CRMERPSalesforce YouTubeIM

    ApplicationWebmailCasualTraffic

    Application Firewall Crowd of Applications Bandwidth Management

    Next Generation Firewalls Version X

    C beroam Unified Threat Management

    U ifi d Th t M g tCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    31/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    CRM

    ERP

    Salesforce

    You

    Tube

    IMApplication

    Webmail

    CasualTraffic

    Application Firewall Crowd of Applications Bandwidth Management

    Next Generation Firewalls

    Cyberoam Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    32/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    New Architecture &

    Firmware

    Cyberoam Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    33/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Salient Features of theNG GUI

    Cyberoam Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    34/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Accordion Menu & TABs for easy navigation of menu items

    Cyberoam Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    35/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Easy Access Top Panel

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    36/80

    Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

    Identity-Based Content Filtering

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    37/80

    Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam

    Database of millions of sites in 82+ categories

    Blocks phishing, pharming, spyware URLs

    HTTP upload control & reporting

    Web and Application Filtering Features

    Block & Control Applications such as P2P, Streaming, Videos/Flash

    Local Content Filter Database to reduces latency and dependence

    on network connectivity.

    Customized blocked message to educate users about organizational

    policies and reduce support calls

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    38/80

    Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam

    Identity Based Policies

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    39/80

    Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam

    Educate Users with Custom Denied Messages andReduce Your Support Calls

    James

    http://www.screensaver.com

    Dear Mark,

    The web site you are trying to accessis listed within the category SpywareandP2P

    It can result in download of spyware and adware which result in popups.They are a threat to you and the enterprise and can slow the network down

    http://www.screensaver.comhttp://www.screensaver.com

    Dear Mark,

    The web site you are trying to accessis listed within the category SpywareandP2P

    It can result in download of spyware and adware which result in popups.They are a threat to you and the enterprise and can slow the network down

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    40/80

    Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam

    Application and Identity-based bandwidth allocation

    Committed and burstable bandwidth

    Time-based, schedule-based bandwidth allocation

    Restrict Bandwidth usage to a combination of source, destination and

    service/service group

    Identity-based Bandwidth Management

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    41/80

    Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam

    External Authentication

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    42/80

    y gU ed eat a age e tCybe oa

    Authentication and External Integration

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    43/80

    y ggy

    Advanced Multiple Gateway Features

    Schedule based bandwidth assignment

    Gateway Alerts on Dashboard

    Bandwidth Utilization Graphs

    Active-Active Auto Link Failover & Load Balancing

    Active-Passive Auto Link Failover

    Source & Destination Routing

    Support for more than 2+ ISP links

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    44/80

    y ggy

    Gateway Anti-Virus

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    45/80

    y ggy

    Scans WEB, FTP, Pop3, SMTP & IMAP traffic

    Self-service quarantine area Signature update ever 30 Mins Identity-based HTTP virus reports Disclaimer Addition to outbound emails Spyware and other malware protection including Phishing emails Block attachment based on Extensions (exe, .bat, .wav etc)

    Gateway Anti- Virus Features

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    46/80

    y ggy

    Gateway Anti-Spam

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    47/80

    y

    Spam filtering with (RPD) Recurrent Pattern Detection technology Virus Outbreak Detection (VOD) for zero hour protection

    Self-Service quarantine area

    Content-agnostic

    Change recipients of emails

    Scans SMTP, POP3, IMAP traffic

    Gateway Anti-Spam Features

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    48/80

    Protects against Image-based Spam and spam in different languages

    The spam catch rate of over 98%1 in Million false positives in spam

    Local cache is effective for >70% of all spam resolution cases

    RPD (Recurrent Pattern Detection)

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    49/80

    Intrusion Prevention System (IPS)

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    50/80

    Multiple and Custom IPS policies Identity-based policies

    Identity-based intrusion reporting Ability to define multiple policies

    Reveals User Identity in Internal Threats scenario

    IPS Features

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    51/80

    Cyberoam in Numbers

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    52/80

    Other Network / System Features

    High Availability (Active-Active / Active-Passive) Stateful Failover

    VPN Failover

    Dynamic Routing (RIP, OSPF, BGP)

    NTP Support

    Multiple Configurable Syslog Server Support

    GUI based Real Time Firewall Log

    Roll Back (Roll back to last upgraded version)

    And Much More

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    53/80

    What is Multi-core:

    More than one processors working together to achieve highprocessing power.

    Benefits:

    Purpose-built Hardware

    True Parallel Processing

    Each processor is programmed to run tasks parallel

    In case of a new attack, Cyberoam appliances do not suffer from

    performance degradation associated with switching from ASIC-based acceleration to general-purpose processors.

    Multicore Processor-based Cyberoam

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    54/80

    Cyberoam Reports are placed on Appliance

    Other UTMsReporting Module/

    Device

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    55/80

    Integrated iViewReporting

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    56/80

    Subscription free On-Appliance Reporting

    Real-time Monitoring and Alerting

    Over 1100+ Drilldown Reports

    Reports in HTML, MHTML, PDF, & CSV formats & Email Alerts

    Web 2.0 GUI and Reporting interface.

    iView(Cyberoam Aggregated Reporting & Logging Software)

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    57/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    58/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    59/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    60/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    61/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    62/80

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    63/80

    Instant MessagingLogging & Control

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    64/80

    Instant Messaging Logging & Control

    Yahoo & Windows Live Messaging

    Control Who Communicates with Whom

    Control Webcam usage

    Control Voice Usage

    Individual as well as Group Control

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    65/80

    Control who can chat with whom

    ArchiveCommunication

    Control communication medium(chat, video, voice)

    Data Protection

    Productivity

    Instant Messaging & Control

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    66/80

    Cyberoam supports IPSec, SSL VPN, L2TP, PPTP

    Threat Free Tunneling (TFT) VPN Firewall Management VPN Bandwidth Management VPN Protection Antivirus / Antispam / IPS / Content Filtering / DoS

    VPN Topologies: Road-Warrior (Remote Access), Site to Site Hub & Spoke VPN Failover

    Main Mode / Aggressive Mode

    Identity based VPN control using xAuth

    Local digital certification authority (CA) and support external CA

    VPN Features

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    67/80

    SSL VPN Enhancements

    Application Access Mode within Web Browzer HTTP, HTTPS

    RDP

    Telnet , SSH

    FTP

    SSL VPN Client

    Save Password

    Auto Start VPN Connection

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    68/80

    Stability& Performance

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    69/80

    Stability & Performance

    Firmware based approach

    ~10 second Soft Reboot Time

    Fast GUI Access

    Extensible Architecture vs ASIC

    Preparing for upcoming threats

    HTTP Proxy Enhancements for HTTP 1.1 protocol

    Extensive Logging and Log Viewer for Instant Troubleshooting

    Getting ready for the Enterprise.

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    70/80

    And Much More

    Role Based Access Control

    Multiple Authentication Support for User

    External Authentication for Administrator

    Customer My Account Revamp

    HTTP DDoS attack protection Naming Firewall Rules for easy troubleshooting

    HTTP & FTP scanning over custom ports

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    71/80

    And Much More

    Inline Captive Portal

    HTTPS

    Super Enhanced Packet Capture Log & Log Viewer

    VLAN over WAN

    Support for MD5 Authentication for RIP & OSPF Enhanced IPS Actions

    Drop Connection

    Drop Attack Source

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    72/80

    IPv6 Ready

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    73/80

    IPV

    Cyberoam With IPv6 Ready Logo Only 2

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    74/80

    IPv6 Ready

    Only the 2 nd UTM

    IPv4 IPv6 tunneling

    IPv6 IPv4 tunneling

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    75/80

    3G & Wimax USB Card Connectivity

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    76/80

    Version XSummary

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    77/80

    Security

    Productivity

    Connectivity

    Application Control

    SSL (HTTPS)Scanning

    Instant MessagingControl

    Firmware based Approach

    Usable GUI

    3G Support

    IPv6 Ready

    SSL VPN Application AccessMode

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    78/80

    Overview of Cyberoams Security Approach:

    Who do you give access to: An IP Address or a User?

    Whom do you wish to assign security policies:

    Username or IP Addresses?

    In case of an insider attempted breach, whom do you wish tosee: User Name or IP Address?

    How do you create network address based policies in a DHCP

    and a Wi-Fi network?

    How do you create network address based policies for shared

    desktops?

    Cyberoam: Identity-based Security

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    79/80

    Question/Answer Session

    Cyberoam - Unified Threat Management

    Unified Threat ManagementCyberoam

  • 8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated

    80/80

    Thank You