You are on page 1of 53

www.cyberoam.

com

Cyberoam USP
Presenter:
<Name>
<Position>, Cyberoam

Our Products

Copyright
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights
Reserved.2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam Introduction
Technology Powerhouse
450+ Employees
Backed by Worlds Largest PE Investor ($156bn) the Carlyle Group
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for UTM features
Patent-pending Identity-based Management

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

One
One stop
stop shop:
shop: Cyberoams
Cyberoams Holistic
Holistic Security
Security Solutions
Solutions

Network Security

Centralized security
Management

Network Monitoring &


Analysis

Securing Home users

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam UTM
UTM Comprehensive
Comprehensive Network Security
Security

Layer 8 security
Support for
3G/4G/WiMax

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam UTMs
UTMs offer
offer

Gigabit Firewall
Throughputs
Powerful Hardware
Superior Quality
Value for Money
Cyberoam OS

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam Architecture
Architecture

Powerful Hardware

Intelligent Firmware

Multicore Gigahertz processors for


Nano second security processing

Tight integration with


Hardware

Gigabit Ports to integrate with


Gigabit network
Faster, Next-Gen Memory and High
Capacity Storage for superior
performance
Industrial grade components to
withstand extreme environments

Network & Crypto


Acceleration

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam Innovation: Layer
Layer 88 Security
Security

Cyberoam's Layer 8 Technology


treats User Identity as the
8th Layer in the protocol stack
Cyberoam UTM offers security
across Layer 2-Layer 8 using
Identity-based policies

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

AAA
AAA over
over single
single UTM
UTM appliance
appliance

Identity-based AAA

Users
Employees
Management

Cyberoam
Authenticates

User Name
IP Address
MAC Id
Session Id

Customers
Partners

Control user network activities

Who can connect to the network


Who can access what
What have they accessed

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Cyberoam
Authorizes

Cyberoam
Audits

Internet surfing quota


Schedule control
Security Policies
Web Filtering
Application Visibility &
Control
QoS / Bandwidth
Management
IM Controls

Identitybased
Logs + Reports
Compliance
Reports

Ability to track the user


activities; identify attackers
/victims

Take quick network security


decisions

www.cyberoam.com

Identity-based
Identity-based Security
Security

Corporate LAN

DHCP
192.168.3.105
192.168.3.110
Richard
Steve
Ancy

Administrator

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Internet

Applies security policies based on actual


identity of users.

User-specific rules for multiple users to


share a common IP address

www.cyberoam.com

Prioritize
Prioritize applications
applications with
with Layer
Layer 77 and
and Layer
Layer 88 controls
controls
Internet
Application Traffic

Cyberoam Appliance

Visibility

Control

Manage Bandwidth
Business
Business Critical
Critical

Socio
Socio business
business

Non
Non Critical
Critical
Infected Applications Blocked
worms

Spyware

Undesirable
Undesirable

Logs & Reports

Controls over applications based on User Identity, Time, Application and Bandwidth
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Granular
Granular classification of applications
applications

Category

Risk Level

Characteristics

Technology

File Transfer

Very Low (1)

Excessive Bandwidth

Browser Based

Gaming

Low (2)

General Internet

Medium (3)

Prone to misuse

Client Server

Instant Messenger

High (4)

Transfer files

Network Protocol

Infrastructure

Very High (5)

Tunnel other apps

P2P

Network Services
P2P

Widely used

Proxy and Tunnel

Loss of Productivity

Remote Access

Can bypass firewall policy

Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Granular
Granular classification of applications
applications
Proactive Protection model:
Eliminates the need for manual intervention by administrators to update policies for new
applications added to the list
Select P2P
Applications
Set Action
Block all future P2P applications without
adding applications manually

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Instant
Instant Messaging
Messaging Controls
Controls

Control communication medium


(chat, video, voice, file transfer)

Archive
Communication

Data Protection

Control who can


chat with whom

Productivity
Control loss of productivity

Control access over chat, voice,


video, file transfer
Control who can chat with whom

Prevent data leakage

Block specific keywords


Block regular expressions (RegEx)
e.g. social security no., credit card
no., ABN routing numbers

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Forensic Analysis

IM audit logs
Filter logs based on Users, IPs,
Messages based on keywords
www.cyberoam.com

On-appliance
On-appliance Logging
Logging & Reporting
Reporting
Real time visibility into user and network activities
Traffic Discovery
- Real-time visibility into bandwidth utilization by user, protocol, application

Security
Management

Forensic
Analysis

1200+
1200+
Reports
Reports

Data
Protection

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Compliance
Management

www.cyberoam.com

Layer-8
Layer-8 User-based
User-based Reports
Reports

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Layer-8
Layer-8 User-based
User-based Reports
Reports

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Dual
Dual Dashboard
Dashboard Traffic
Traffic & Security Dashboard
Traffic Dashboard

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Dual
Dual Dashboard
Dashboard Traffic
Traffic & Security Dashboard
Security Dashboard

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Application
Application Reports

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Compliance
Compliance Reports

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Interactive
Interactive World
World Traffic
Traffic Map
Map

Interactive World Traffic Map for Source and Destination traffic

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Traffic
Traffic Discovery
Discovery

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Traffic
Traffic Discovery
Discovery

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Stateful
Stateful Inspection
Inspection Firewall
Firewall
Unified Security
Application Firewall
Identity-based Firewall
Layer 8 Geo-based Traffic Control
- Control incoming/outgoing traffic
from/to a specific country

Firewall
Rule

Connectivity
Policies
Productivity
Policies

FastPath Technology
- To improve processing speed and
reduce CPU overhead

Security
Policies

Unified Security
Rules for all security features
from firewall page
Easy navigation and increased
administrative productivity

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Configure
Configure rules
rules for
for all
all features
features from
from Firewall
Firewall page
page

Identity

++
Security

++
Productivity

++
Connectivity

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Threat
Threat Protection
Protection Features
Features

Intrusion Prevention System


- Layer 8 and IPS Tuner driven
- Identity-based IPS policies per user,
group and IP address
- Allows multiple IPS policies
- Identity-based alerts & reports
- 4500+ signatures broadest security
cover

Gateway Anti-Virus, Antispyware


4 million+ signatures
Bi-directional scanning: Web & Email
Self-service Virus Quarantine
Scans HTTP, FTP, SMTP, POP3, HTTPS,
IMAP and IM traffic
- Instant visibility Cyberoam
into Attacker/Victim
-

Security Center

Anti-Spam (Inbound/Outbound)
- Three level scanning:
IP Reputation filtering
Real-time Blackhole List (RBL)
Recurrent Pattern Detection (RPDTM) technology

DoS & DDoS Protection


- Packet Rate Limit
- Protection against flood attacks
- SYN Flood
- TCP Flood
- UDP Flood
- ICMP Flood
- IPS Signature to prevent attacks
- Protocol Anomaly

Continuously updated via

Cyberoam Security Center

~98% spam detection


Self-service Quarantine and Spam Digest
Scans SMTP, POP3, IMAP traffic
Virus outbreak detection for zero-hour
protection

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

On-appliance
On-appliance Web
Web Application
Application Firewall
Firewall (WAF)
(WAF)
Firewalls/IPS cannot protect a web application from unknown threats

Traditional
Firewall
Cyberoam UTM offering
WAF protection

Unauthorized
access blocked

Cost Effective

No need to buy dedicated hardware


WAF

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

WAF protection on Cyberoam UTM


Protects web-apps and web servers
from hackers
protection model and No
Positive
Web
&
Application
Signature Tables
Database
Server
Server
Intuitive website flow detector
Automatically adapts to website
changes
Protects against OWASP top 10
web-app vulnerabilities
SSL Offloading
Monitoring & Reporting

Organization's IT network

Easy to deploy

Does not require any changes


in setup

www.cyberoam.com

Virtual
Virtual Private
Private Network (VPN)
(VPN)
Embrace BYOD with mobile
VPN clients

Support for IPSec, L2TP,


PPTP, SSL VPN
Threat Free Tunneling (TFT)
Technology

Supported VPN Clients


MacOS
iOS
Android Devices

- Scans VPN traffic for Malware, Spam,


Inappropriate content, Intrusion attempts

iOS

Advanced features for business continuity


- MPLS failover to VPN
- VPN failover

IPSec VPN
L2TP VPN
PPTP VPN

SSL VPN
- Client less
- License free

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Android
L2TP VPN

www.cyberoam.com

Web
Web &
& Content
Content Filtering
Filtering
Industrys most comprehensive URL database
44million+ URLs in 82+ categories
Controls access to HTTP/HTTPS websites
Blocks Google Cache pages
Blocks Embedded URLs
Blocks Malware hosting sites
Detects & Blocks Third Party Proxy and
Tunneling
Filters Websites
2.0 content

Internet

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Regular Web category


updates
Cyberoam Security Center

Proxy
Proxy
Allowed
Malware
Google
Blocked
Embedded
Web
&
Website
Web
Websites
Websites
hosting
cache
URLs
2.0
Tunneling
HTTP
2.0 /
HTTP/
HTTP
pages
sites
HTTPS
sites
HTTPS
/HTTPS

www.cyberoam.com

Web
Web &
& Content
Content Filtering
Filtering
Manage productivity by controlling access to unwanted sites
On-appliance web category database
Faster access
Surfing pattern privacy
Control Data Leakage
Blocks file uploads to web pages
Helps meet regulatory compliance requirements
Prevent productivity loss with identity-based approach
Customize blocked messages to educate users on corporate
policies

YouTube for
Schools
for Educational
Institutes

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Allows access to selected


educational content
Blocks all inappropriate, peripheral
content such as ads, comments &
links
www.cyberoam.com

Best
Best of
of Breed
Breed Bandwidth Management // QoS
Bandwidth policies tied with

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

User/User
User
s group

Firewall
Rule

Web
Category

Applicatio
n

www.cyberoam.com

Best
Best of
of Breed
Breed Bandwidth Management // QoS
Create a bandwidth policy on a combination of
User or User Group /Department
Application or Application Category
Web category
Allows great flexibility and real L2-L8 visibility and control
Bandwidth sharing with priority
Schedule-based bandwidth allocation

Committed bandwidth

Allocate dedicated bandwidth

Burstable bandwidth

Share the unutilized bandwidth


Marketing
Group
6mbps

When
user is not
connected
CEO

Manager

ERP System

5 mbps

2 mbps

8 mbps

Manager
2mbps

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Employee 1
3mbps
2mbps

Employee 2
3mbps
2mbps

www.cyberoam.com

Business
Business Continuity
Continuity Features
Features
High Availability
- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime
- Ensures continuous network security
Multiple Link Management with Automated Load Balancing
- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover
conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
Sales
Dept.

ISP1
(10 mbps)

Dev.
Dept.

Financ
e
Dept.

MPLS

ISP2
(5 mbps)

Organization's IT network

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

ISP3 (3G)
(3 mbps)
Failover Link

www.cyberoam.com

Business
Business Continuity
Continuity Features
Features
Layer 8 Policy-based Routing
- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Wireless
Wireless (WLAN)
(WLAN) Security
Security
High performance, integrated security over WLAN
- Secures wireless networks to the extent of wired networks
Faster performance, broader coverage with 3x3 MIMO Technology
- Dual band support: 2.4 GHz or 5 GHz
Multiple Virtual Access Points
Layer 8 over WLAN
- Identity-based policies in dynamic IP environment
- MAC-based filtering
- Supports IP-address pool
Enhances security
Engineering
Marketing

Sales
File server

Internet

ADS
ERP

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Safeguard
Safeguard user
user privacy
privacy 4-Eye
4-Eye Authentication
Authentication
Prevent the risk of IT administrator from misusing privilege of
tracking user activities
2 people: Authorizer and Administrator
- Authorizer consent required for the Administrator to view user-specific activities

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

SMS
SMS (Text-based)
(Text-based) Authentication
Authentication
Needed for hotspots, airports, hotels, corporate offices
Default group can be created for guest users
Sending Internet access credentials using SMS for guest users

SMS for Guest users

Hotels

Airports

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam features
features assure
assure Security,
Security, Connectivity,
Connectivity, Productivity
Productivity

Organizations cannot afford to compromise on any of these.


The right SCP balance is essential!

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Customer
Customer Support
Support System
System

Web
Support

Support available across all


time zones
Global Support Excellence - ITIL
compliance (ISO 20000)

Chat
Support
Appliance Registration
and Upgrade
Subscribe security
Email
features
Support
Create support tickets
Request RMA

Phone
Support

Knowledge
base
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Partner
Partner Support
Support System
System

Web
Support

Region specific dedicated


Technical Account Managers
(TAM)

Chat & Inventory


Ordering
Support
management
Sales & Marketing tools &
resources
Presales Support
Track
Appliance/Subscription
Email
Support

Knowledge
base

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam UTM
UTM Product
Product Range
Hardware UTM appliances

Virtual UTM appliances

Small and Remote Offices


CR35wiNG, CR35iNG,
CR25wiNG, CR25iNG,
CR15wiNG, CR15iNG

Small and Medium Enterprises

CRiV-1C, CRiV-2C,
CRiV-4C, CRiV-8C,
CRiV-12C

CR300i, CR200i,
CR100iNG, CR50iNG

Large Enterprises
CR2500iNG
CR1500ia, CR1500ia-10F,
CR1000ia, CR1000ia-10F,
CR750ia, CR750ia-1F/10F,
CR500ia, CR500ia-1F/10F/RP,
Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam Central
Central Console
Console (CCC)
(CCC)

CCC is for centralized, integrated management and


monitoring of Cyberoam UTM devices
-

Offers complete control over distributed networks from


head office (H.O.) or Security Operations Center (S.O.C.)
of MSSPs

Available as
- Hardware CCC Appliances, Virtual CCC Appliances
Mumbai
Branch Office
New York
Branch Office

Cyberoam
UTM

Cyberoam
UTM

Boston
Branch Office

Dubai
Head Office
Cyberoam
UTM

Cyberoam
UTM

Cyberoam Central Console (CCC)


Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Cyberoam
Cyberoam iView
iView Logging
Logging and
and Reporting
Reporting

Ability to log and report


activities from various
devices/vendors

Security
Management
Log
Management

Forensic
Analysis
Compliance
Management

Available as
Open Source software
Appliance

Identity
Logging

Reporting

Servers
Desktop systems

Logs & Events

Applications

Firewalls

UTM

IDP / IPS
Switches

Routers

Cyberoam iViews Logging & Reporting Facilitates Security, Compliance, Forensics


Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

CCC
CCC & iView product range
CCC appliances

iView Logging & Reporting

Hardware CCC appliances


CCC1000, CCC500, CCC200,
CCC100,
CCC50, CCC15

Virtual CCC appliances


For VMware Server:
CCC VMS 200, CCC VMS 100, CCC VMS 50,
CCC VMS 15

CRiVU200
CRiVU100
CR-iVU25

For VMware Workstation:


CCC VMW 200, CCC VMW 100, CCC VMW 50,
CCC VMW 15

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Training
Training &
& Certification
Certification

Developing competencies with Cyberoam UTM


appliances

CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCN

CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE


CYBEROAM CERTIFIED TRAINER (CCT)

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Recognized
Recognized as
as Visionary
Visionary in
in the
the Gartner
Gartner UTM
UTM MQ
MQ

2009

2010

2012

Magic Quadrant for SMB


Multifunction Firewalls

Magic Quadrant for Unified


Threat Management

Magic Quadrant for Unified


Threat Management

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Proven
Proven track
track record
record of Innovation
Innovation

Innovation: Go-to-market strategy in a


global market that is quite crowded in its
product space.
Greatest strength: Product and support
through most media 24/7.
For Cyberoam, customer commitment means
measuring, analyzing and responding to
customer attitudes, needs and how
customers view Cyberoam products.

NASSCOM INNOVATION
AWARD 2011

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

One innovative solution to growth and


extensibility requirements has been adding
an abstraction layer a sort of Layer 8 on
the open systems interconnection (OSI)
model - that allows connection of names.
This could be users, domains and more. This
allows greatly improved granularity of
system administration.

www.cyberoam.com

Clientele
Clientele Worldwide
Worldwide
BFSI

Manufacturing

Government

Education

Pharma & Healthcare

Telecom & ISP

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Clientele
Clientele Worldwide
Worldwide
Hotels

Retail & Services

IT/BPO & Media

Others

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Product
Product Certifications
Certifications

ICSA Certified Firewall

IPv6 Ready

Member of
Internet Watch
Foundation

UTM Level 5:
Cyberoam holds a unique &
complete UTM certification

ICSA Certified
High-Availability

VPNC Certified for Basic


VPN & AES Interoperability

Firewa
l
l
Premium

EAL4+ Pending Approval

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

AntiSp
a
m

VPN

Anti-Virus

Premium

URL
Filte
ring

AntiSpy
war
e
Premium

IPS/IDP

www.cyberoam.com

Cyberoam
Cyberoam Live
Live Demo
Demo

Link:
http://demo.cyberoam.com
Credentials:
guest /guest

Get a 30 day FREE Evaluation of


Cyberoam Virtual appliance

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com

Thank you
Contact: sales@cyberoam.com

Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

www.cyberoam.com