SlideShare une entreprise Scribd logo
1  sur  46
www.cyberoam.com
http://firewall.firm.in
Cyberoam Next-Generation Security
Presenter: IT Monteur
Our Products
Modem Router Integrated Security
applianceNetwork Security Appliances - UTM, NGFW
(Hardware & Virtual)
www.cyberoam.com
Technology Powerhouse
550+ Employees
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for network security features
Patent-pending Identity-based Management
Cyberoam Introduction
www.cyberoam.com
Cyberoam Product Line
Network Security
Centralized security
Management
Network Monitoring
& Analysis
Virtual CloudPhysical
Cyberoam Central Console
Cyberoam iView
Cyberoam
Next-Gen Firewall/ Unified
Threat Management
SOHO, HOME
Cyberoam Central
Console
Cyberoam virtual
Next-Gen Firewall/ Unified
Threat Management
Cyberoam iView
software
Cyberoam Security
on Amazon Cloud
(currently in Beta)
www.cyberoam.com
Network Security Appliances – UTM, NGFW
(Hardware & Virtual)
www.cyberoam.com
Cyberoam Next-Generation Security
Core NGFW Features
Layer-8
Security
Firewall
Application
Filtering
Web & Content
Filtering
IPS VPN
Bandwidth
Management/QoS
On-appliance
reporting
Gateway Anti-Virus
Gateway Anti-Spam
(Inbound/outbound)
Wireless
Security
Web Application
Firewall
Support for
3G/4G/WiMAX
UTM Features
IPv6 Support
Multi-link
Management
www.cyberoam.com
Powerful Hardware
 Multicore Gigahertz processors for
Nano second security processing
 Gigabit Ports to integrate with Gigabit
network
Cyberoam Architecture
Intelligent Firmware
 Tight integration with
Hardware
 Network & Crypto
Acceleration
www.cyberoam.com
High Performance Security Appliances
Bringing Gigabit Firewall
throughputs within the reach of
small offices and branch offices
Top model CR2500iNG-XP offers
Firewall Throughput: 160 Gbps
NGFW Throughput: 10 Gbps
www.cyberoam.com
Cyberoam's Layer 8 Technology
treats “User Identity” as the
8th Layer in the protocol stack
Cyberoam network security appliances
offer security across Layer 2-Layer 8
using Identity-based policies
Cyberoam Innovation: Layer 8 Security
www.cyberoam.com
AAA over single Cyberoam appliance
Cyberoam
Audits
• Identity–based
Logs + Reports
• Compliance
Reports
Cyberoam
Authorizes
• Internet surfing quota
• Schedule control
• Security Policies
• Web Filtering
• Application Visibility &
Control
• QoS / Bandwidth
Management
• IM Controls
Cyberoam
Authenticates
• User Name
• IP Address
• MAC Id
• Session Id
Users
Customers
Employees
Management
Partners
Identity-based AAA
Control user network activities
• Who can connect to the network
• Who can access what
• What have they accessed
Ability to track the user activities;
identify attackers /victims
Take quick network security
decisions
www.cyberoam.com
Internet
Corporate LAN
DHCP
Administrator
Identity-based Security
192.168.3.110
Ancy
192.168.3.105
Richard
192.168.3.110
Ancy Logged out
 Applies security policies based on actual
identity of users.
 User-specific rules for multiple users to share
a common IP address
192.168.3.110
Steve
www.cyberoam.com
Application of Layer 8 Technology
Layer 8 security
Authentication
API
Port-based
Authentication
(802.1x)
Two Factor
Authentication
NTLM
VPN
BYOD Clients
- iOS, Android
Thin Client
www.cyberoam.com
Providing insights into BYOD buildup
Device usage visibility
Identify & flag BYOD
users
Enhancing BYOD
experience with Clients
www.cyberoam.com
Application Visibility & Control
Industry leading coverage for
Visibility & Control over 2200+
key applications
www.cyberoam.com
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Technology
Browser Based
Client Server
Network Protocol
P2P
Simple yet Powerful Granular Application Controls
Category
File Transfer
Gaming
General Internet
Instant Messenger
Infrastructure
Network Services
P2P
Proxy and Tunnel
Remote Access
Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more…
Eliminates the need for manual intervention by administrators to update policies for new
applications added to the list
Control over combination of
Bandwidth Time
User or
User Group
Application or
Application Category
In-House Security Capabilities
Faster turnaround time
e.g Adding application signatures for new applications and dynamic apps
designed to work around network like UltraSurf.
www.cyberoam.com
Blocked
Websites
HTTP
/HTTPS
Website
HTTP /
HTTPS
Web & Content Filtering
Allowed
Websites
HTTP/
HTTPS
Web
2.0
Web
2.0
Google
cache
pages
Google
cache
pages
Embedded
URLs
Embedded
URLs
Malware
hosting
sites
Malware
hosting
sites
Industry’s most comprehensive URL database
100 million+ URLs in 89+ categories
Controls access to HTTP/HTTPS websites
Blocks Google Cache pages
Blocks Embedded URLs
Detects & Blocks Third Party Proxy and Tunneling sites
Filters Web 2.0 content
Web
2.0
Blocks Malware hosting sites
Proxy
&
Tunneling
sites
Proxy
&
Tunneling
sites
Internet
Control over combination of
Bandwidth Time
User or
User Group
Website category
www.cyberoam.com
 1200+ reports
- Real time visibility into user and network
activities
 Helps with Security & Compliance
Management, Forensic Analysis
 Traffic Discovery
- Real-time visibility into bandwidth
utilization by user, protocol, application
Best-in-class on-appliance Reporting
Application Reports
Compliance Reports Interactive World Traffic Map
www.cyberoam.com
Layer-8 User-based Reports
www.cyberoam.com
Layer-8 User-based Reports
www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
User Threat Quotient (UTQ) Report: Spot risky users at a glance
User: jenny.lewis
Relative Threat Score: 20.1
Relative Risk Ranking: 1
www.cyberoam.com
Traffic Discovery
www.cyberoam.com
Stateful Inspection Firewall
 Unified Security
 Application Firewall
 Identity-based Firewall
 Layer 8 Geo-based Traffic Control
- Control incoming/outgoing traffic from/to
a specific country
 FastPath Technology
- To improve processing speed and reduce
CPU overhead
Security
Policies
Connectivity
Policies
Productivity
Policies
Firewall Rule
Unified Security
 Rules for all security features
from firewall page
 Easy navigation and increased
administrative productivity
www.cyberoam.com
Configure rules for all features from Firewall page
Identity
Security
Productivity
Connectivity
+
+
+
www.cyberoam.com
 Support for IPSec, L2TP, PPTP,
SSL VPN
 Threat Free Tunneling (TFT)
Technology
Supported VPN Clients
 MacOS
 iOS
 Android Devices
IPSec VPN
L2TP VPN
PPTP VPN
iOS
L2TP VPN
Android
Virtual Private Network (VPN)
SSL VPN
-Client-based &
Client less
-License free
- Scans VPN traffic for Malware, Spam,
Inappropriate content, Intrusion attempts
 Advanced features for business continuity
- MPLS failover to VPN
- VPN failover
Embrace BYOD with mobile VPN
clients
www.cyberoam.com
Intrusion Prevention System (IPS)
 Many SOHO/SMBs struggle with IPS
- What to allow or deny?
- Which IPS policy applies?
 Ready to use IPS Policy templates with Firewall Rule style naming convention
 Customizable security for Enterprise IT Pros
www.cyberoam.com
Intrusion Prevention System
- Layer 8 and IPS Tuner driven
- Identity-based IPS policies per user, group and
IP address
- Allows multiple IPS policies
- Identity-based alerts & reports
- 4500+ signatures – broadest security cover
Anti-Spam (Inbound/Outbound)
- Three level scanning:
 IP Reputation filtering
 Real-time Blackhole List (RBL)
 Recurrent Pattern Detection (RPDTM) technology
- ~99% spam detection
- Self-service Quarantine and Spam Digest
- Scans SMTP, POP3, IMAP traffic
- Virus outbreak detection for zero-hour protection
DoS & DDoS Protection
- Packet Rate Limit
- Protection against flood attacks
- SYN Flood
- TCP Flood
- UDP Flood
- ICMP Flood
- IPS Signature to prevent attacks
- Protocol Anomaly
Gateway Anti-Virus, Anti- spyware
- Bi-directional scanning: Web & Email
- Self-service Virus Quarantine
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and
IM traffic
- Instant visibility into Attacker/Victim
Continuously updated via
Cyberoam Security Center
Threat Protection Features
Cyberoam
Security Center
www.cyberoam.com
 Create a bandwidth policy on a combination of
- User or User Group /Department
- Application or Application Category
- Web category
- Allows great flexibility and real L2-L8 visibility and control
 Bandwidth sharing with priority
 Schedule-based bandwidth allocation
Best of Breed Bandwidth Management / QoS
Burstable bandwidth
• Share the unutilized bandwidth
Committed bandwidth
• Allocate dedicated bandwidth
CEO Manager ERP System
5 mbps 2 mbps 8 mbps
Manager
2mbps
Employee 2
2mbps
Employee 1
2mbps
Employee 2
3mbps
Employee 1
3mbps
Marketing
Group
6mbps
When user
is not
connected
www.cyberoam.com
 Firewalls/IPS cannot protect a web application from unknown threats
On-appliance Web Application Firewall (WAF)
Traditional
Firewall
Web &
Application
Server
Database
Server
Organization's IT network
Unauthorized
access blocked
Cost Effective
No need to buy dedicated hardware
WAF
Easy to deploy
Does not require any changes in
setup
Cyberoam’s on-appliance WAF
protection
Cyberoam’s on-appliance WAF
 Protects web-apps and web servers from
hackers
 Positive protection model and No Signature
Tables
 Intuitive website flow detector
Automatically adapts to website changes
 Protects against OWASP top 10 web-app
vulnerabilities
 SSL Offloading
 Monitoring & Reporting
www.cyberoam.com
 High Availability
- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime and ensures continuous network security
 Multiple Link Management with Automated Load Balancing
- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
 Layer 8 Policy-based Routing
- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications
Business Continuity Features
ISP2
(5 mbps)
Sales
Dept.
Dev.
Dept.
Finance
Dept.
ISP1
(10 mbps)
MPLS
ISP3 (3G)
(3 mbps)
Failover LinkOrganization's IT network
www.cyberoam.com
 User Authentication API for Hotspots
- Re-use Hotspot Authentication; avoid multiple logins
 Seamless Single Sign-on for Enterprises
- 3rd Party authentication solutions can be integrated with Cyberoam
 Manage Cyberoam with 3rd party policy management systems
Cyberoam API
www.cyberoam.com
 Prevent the risk of IT administrator from misusing privilege of tracking user activities
 2 people: Authorizer and Administrator
- Authorizer consent required for the Administrator to view user-specific activities
Safeguard user privacy – 4-Eye Authentication
www.cyberoam.com
FleXi Ports for flexible network connectivity
Combination of Fixed Ports
and Flexible Ports
Flexibility to choose Copper,
Fiber 1GbE / 10GbE modules
Modules can be purchased
individually as per need
Fixed Copper GbE Ports
www.cyberoam.com
Organizations cannot afford to compromise on any of these.
The right SCP balance is essential!
Cyberoam features assure Security, Connectivity, Productivity
www.cyberoam.com
Web
Support
Chat
Support
Email
Support
Phone
Support
Customer Support System
• Appliance Registration and Upgrade
• Subscribe security features
• Create support tickets
• Request RMA
• Support available across all time zones
• Global Support Excellence - ITIL compliance
(ISO 20000)
Knowledge
base
www.cyberoam.com
Web
Support
Chat
Support
Email
Support
Partner Support System
• Ordering & Inventory management
• Sales & Marketing tools &
resources
• Presales Support
• Track Appliance/Subscription
Knowledge
base
Region specific dedicated Technical Account
Managers (TAM)
www.cyberoam.com
Cyberoam Network Security Appliance Product Range
Hardware appliances
UTM, Next Generation Firewall
Virtual security appliances
CRiV-1C, CRiV-2C, CRiV-4C,
CRiV-8C, CRiV-12C
NGFW for Large Enterprises
CR2500iNG-XP
CR1500iNG-XP, CR1000iNG-XP
CR750iNG-XP, CR500iNG-XP
UTM for Small and Medium Enterprises
CR300iNG-XP, CR200iNG-XP
CR300iNG, CR200iNG,
CR100iNG, CR50iNG
UTM for Small and Remote Offices
CR35wiNG, CR35iNG,
CR25wiNG, CR25iNG,
CR15wiNG, CR15iNG, CR10iNG
www.cyberoam.com
Centralized Management & Monitoring
Cyberoam Central Console (CCC)
 Centralized security management & monitoring
of Cyberoam network security devices
 Manage up to 5 CR security appliances for
FREE using CCC virtual appliances
 Cloud CCC (CCMS – Cyberoam’s on-Cloud
Management Service) available to partners for
FREE
Cyberoam iView (Centralized logging & reporting)
 Log & reports activities from
̶ Multiple Cyberoam UTM /NGFW devices
̶ Other devices/vendors : Endpoint Systems,
other Firewalls, Routers and more
 Open Source Software available for FREE
 1200+ reports facilitate Log Management,
Security, Compliance and Forensics
Available as Hardware, Virtual & Cloud forms
Available as
www.cyberoam.com
Cyberoam Threat Research Labs (CTRL)
Identify emerging
threats and zero-day
vulnerabilities
Post vulnerabilities
to global bodies
In-house security
capabilities for IPS,
Application Control,
Web & Content Filtering
www.cyberoam.com
Product Certifications
ICSA Certified
High-Availability
ICSA Certified Firewall
VPNC Certified for Basic VPN &
AES Interoperability
UTM Level 5:
Cyberoam holds a unique &
complete UTM certification
Anti-SpywareAnti-VirusFirewall VPN
IPS/IDPAnti-Spam URL Filtering
www.cyberoam.com
Recognized as ‘Visionary’ in the Gartner UTM MQ
2009 2010 2012 2013
2014
Magic Quadrant for Unified
Threat Management
www.cyberoam.com
Pre-sales support
- Enterprise Security
planning services
- Migration assistance for
implementation
Training &
Certification
- Equip IT Managers and
security engineers to
proficiently manage
organization’s security
Post-sales support
- World’s only network security vendor
to have ISO 20000 certified (ITIL
Compliance) Global Support
- Multi-mode support through chat,
phone, email
Cyberoam - A complete Security solution provider
www.cyberoam.com
Education Pharma & Healthcare Telecom & ISP
GovernmentBFSI Manufacturing
Clientele Worldwide
www.cyberoam.com
Hotels Retail & Services
Others
IT/BPO & Media
Clientele Worldwide
www.cyberoam.com
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
Cyberoam Live Demo
Get a 30 day FREE Evaluation of
Cyberoam Virtual appliance
www.cyberoam.com
Thank you
Call us on +91 120 6498887 or Email: sales@itmonteur.net

Contenu connexe

Tendances

Web servers presentacion
Web servers presentacionWeb servers presentacion
Web servers presentacionKiwi Science
 
UnboundとDNSSEC(OSC2011 Tokyo/Spring)
UnboundとDNSSEC(OSC2011 Tokyo/Spring)UnboundとDNSSEC(OSC2011 Tokyo/Spring)
UnboundとDNSSEC(OSC2011 Tokyo/Spring)Takashi Takizawa
 
Angular JS ve Node JS Güvenliği
Angular JS ve Node JS GüvenliğiAngular JS ve Node JS Güvenliği
Angular JS ve Node JS GüvenliğiBGA Cyber Security
 
はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux Beginner for Linux long-lifetime in USB...
はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux  Beginner for Linux long-lifetime in USB...はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux  Beginner for Linux long-lifetime in USB...
はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux Beginner for Linux long-lifetime in USB...Netwalker lab kapper
 
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...Derek Buitenhuis
 
The TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThierry Zoller
 
Advanced HTTP Caching
Advanced HTTP CachingAdvanced HTTP Caching
Advanced HTTP CachingMartin Breest
 
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?BGA Cyber Security
 
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動するStargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動するKohei Tokunaga
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
AWS VPC by hellocloud.io
AWS VPC by hellocloud.ioAWS VPC by hellocloud.io
AWS VPC by hellocloud.ioHello Cloud
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementationMohibullah Saail
 
VM Console Enhancements
VM Console EnhancementsVM Console Enhancements
VM Console EnhancementsShapeBlue
 
Dredge ball-joint-brochure
Dredge ball-joint-brochureDredge ball-joint-brochure
Dredge ball-joint-brochureDREDGE YARD
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...xKinAnx
 
20221117_クラウドネイティブ向けYugabyteDB活用シナリオ
20221117_クラウドネイティブ向けYugabyteDB活用シナリオ20221117_クラウドネイティブ向けYugabyteDB活用シナリオ
20221117_クラウドネイティブ向けYugabyteDB活用シナリオMasaki Yamakawa
 
The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...
The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...
The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...Yasunori Goto
 

Tendances (20)

Web servers presentacion
Web servers presentacionWeb servers presentacion
Web servers presentacion
 
UnboundとDNSSEC(OSC2011 Tokyo/Spring)
UnboundとDNSSEC(OSC2011 Tokyo/Spring)UnboundとDNSSEC(OSC2011 Tokyo/Spring)
UnboundとDNSSEC(OSC2011 Tokyo/Spring)
 
Angular JS ve Node JS Güvenliği
Angular JS ve Node JS GüvenliğiAngular JS ve Node JS Güvenliği
Angular JS ve Node JS Güvenliği
 
はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux Beginner for Linux long-lifetime in USB...
はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux  Beginner for Linux long-lifetime in USB...はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux  Beginner for Linux long-lifetime in USB...
はじめてのSSD,MicroSD,USBメモリ延命方法 in Linux Beginner for Linux long-lifetime in USB...
 
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
 
The TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explainedThe TLS/SSLv3 renegotiation vulnerability explained
The TLS/SSLv3 renegotiation vulnerability explained
 
Advanced HTTP Caching
Advanced HTTP CachingAdvanced HTTP Caching
Advanced HTTP Caching
 
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?
 
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動するStargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
Stargz Snapshotter: イメージのpullを省略しcontainerdでコンテナを高速に起動する
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
AWS VPC by hellocloud.io
AWS VPC by hellocloud.ioAWS VPC by hellocloud.io
AWS VPC by hellocloud.io
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
VM Console Enhancements
VM Console EnhancementsVM Console Enhancements
VM Console Enhancements
 
Dredge ball-joint-brochure
Dredge ball-joint-brochureDredge ball-joint-brochure
Dredge ball-joint-brochure
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
20221117_クラウドネイティブ向けYugabyteDB活用シナリオ
20221117_クラウドネイティブ向けYugabyteDB活用シナリオ20221117_クラウドネイティブ向けYugabyteDB活用シナリオ
20221117_クラウドネイティブ向けYugabyteDB活用シナリオ
 
The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...
The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...
The Forefront of the Development for NVDIMM on Linux Kernel (Linux Plumbers c...
 
Dbts 分散olt pv2
Dbts 分散olt pv2Dbts 分散olt pv2
Dbts 分散olt pv2
 

En vedette

Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Introduction To Programming with Python-1
Introduction To Programming with Python-1Introduction To Programming with Python-1
Introduction To Programming with Python-1Syed Farjad Zia Zaidi
 
Watch guard best in-class security
Watch guard best in-class securityWatch guard best in-class security
Watch guard best in-class securityPrime Infoserv
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-TechsheetBaqar Kazmi
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Vitor Nakano
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 

En vedette (20)

Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Introduction To Programming with Python-1
Introduction To Programming with Python-1Introduction To Programming with Python-1
Introduction To Programming with Python-1
 
Firewall
FirewallFirewall
Firewall
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Watch guard best in-class security
Watch guard best in-class securityWatch guard best in-class security
Watch guard best in-class security
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-Techsheet
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)
 
Firewall Presentation
Firewall PresentationFirewall Presentation
Firewall Presentation
 
Red de redes
Red de redesRed de redes
Red de redes
 
CCNSP
CCNSPCCNSP
CCNSP
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Substituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scriptsSubstituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scripts
 
Logic Over Language
Logic Over LanguageLogic Over Language
Logic Over Language
 

Similaire à Cyberoam Firewall Presentation

Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overviewdragnetNZ
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTMsharetech
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devicesponealmickelson
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 

Similaire à Cyberoam Firewall Presentation (20)

Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devices
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Cyberoam Firewall Presentation

  • 1. www.cyberoam.com http://firewall.firm.in Cyberoam Next-Generation Security Presenter: IT Monteur Our Products Modem Router Integrated Security applianceNetwork Security Appliances - UTM, NGFW (Hardware & Virtual)
  • 2. www.cyberoam.com Technology Powerhouse 550+ Employees Sales, Distribution Channel and Customers across 125+ Countries Amongst the top 3 global players for network security features Patent-pending Identity-based Management Cyberoam Introduction
  • 3. www.cyberoam.com Cyberoam Product Line Network Security Centralized security Management Network Monitoring & Analysis Virtual CloudPhysical Cyberoam Central Console Cyberoam iView Cyberoam Next-Gen Firewall/ Unified Threat Management SOHO, HOME Cyberoam Central Console Cyberoam virtual Next-Gen Firewall/ Unified Threat Management Cyberoam iView software Cyberoam Security on Amazon Cloud (currently in Beta)
  • 4. www.cyberoam.com Network Security Appliances – UTM, NGFW (Hardware & Virtual)
  • 5. www.cyberoam.com Cyberoam Next-Generation Security Core NGFW Features Layer-8 Security Firewall Application Filtering Web & Content Filtering IPS VPN Bandwidth Management/QoS On-appliance reporting Gateway Anti-Virus Gateway Anti-Spam (Inbound/outbound) Wireless Security Web Application Firewall Support for 3G/4G/WiMAX UTM Features IPv6 Support Multi-link Management
  • 6. www.cyberoam.com Powerful Hardware  Multicore Gigahertz processors for Nano second security processing  Gigabit Ports to integrate with Gigabit network Cyberoam Architecture Intelligent Firmware  Tight integration with Hardware  Network & Crypto Acceleration
  • 7. www.cyberoam.com High Performance Security Appliances Bringing Gigabit Firewall throughputs within the reach of small offices and branch offices Top model CR2500iNG-XP offers Firewall Throughput: 160 Gbps NGFW Throughput: 10 Gbps
  • 8. www.cyberoam.com Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam network security appliances offer security across Layer 2-Layer 8 using Identity-based policies Cyberoam Innovation: Layer 8 Security
  • 9. www.cyberoam.com AAA over single Cyberoam appliance Cyberoam Audits • Identity–based Logs + Reports • Compliance Reports Cyberoam Authorizes • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls Cyberoam Authenticates • User Name • IP Address • MAC Id • Session Id Users Customers Employees Management Partners Identity-based AAA Control user network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions
  • 10. www.cyberoam.com Internet Corporate LAN DHCP Administrator Identity-based Security 192.168.3.110 Ancy 192.168.3.105 Richard 192.168.3.110 Ancy Logged out  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address 192.168.3.110 Steve
  • 11. www.cyberoam.com Application of Layer 8 Technology Layer 8 security Authentication API Port-based Authentication (802.1x) Two Factor Authentication NTLM VPN BYOD Clients - iOS, Android Thin Client
  • 12. www.cyberoam.com Providing insights into BYOD buildup Device usage visibility Identify & flag BYOD users Enhancing BYOD experience with Clients
  • 13. www.cyberoam.com Application Visibility & Control Industry leading coverage for Visibility & Control over 2200+ key applications
  • 14. www.cyberoam.com Risk Level Very Low (1) Low (2) Medium (3) High (4) Very High (5) Characteristics Excessive Bandwidth Prone to misuse Transfer files Tunnel other apps Widely used Loss of Productivity Can bypass firewall policy Technology Browser Based Client Server Network Protocol P2P Simple yet Powerful Granular Application Controls Category File Transfer Gaming General Internet Instant Messenger Infrastructure Network Services P2P Proxy and Tunnel Remote Access Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Control over combination of Bandwidth Time User or User Group Application or Application Category In-House Security Capabilities Faster turnaround time e.g Adding application signatures for new applications and dynamic apps designed to work around network like UltraSurf.
  • 15. www.cyberoam.com Blocked Websites HTTP /HTTPS Website HTTP / HTTPS Web & Content Filtering Allowed Websites HTTP/ HTTPS Web 2.0 Web 2.0 Google cache pages Google cache pages Embedded URLs Embedded URLs Malware hosting sites Malware hosting sites Industry’s most comprehensive URL database 100 million+ URLs in 89+ categories Controls access to HTTP/HTTPS websites Blocks Google Cache pages Blocks Embedded URLs Detects & Blocks Third Party Proxy and Tunneling sites Filters Web 2.0 content Web 2.0 Blocks Malware hosting sites Proxy & Tunneling sites Proxy & Tunneling sites Internet Control over combination of Bandwidth Time User or User Group Website category
  • 16. www.cyberoam.com  1200+ reports - Real time visibility into user and network activities  Helps with Security & Compliance Management, Forensic Analysis  Traffic Discovery - Real-time visibility into bandwidth utilization by user, protocol, application Best-in-class on-appliance Reporting Application Reports Compliance Reports Interactive World Traffic Map
  • 19. www.cyberoam.com Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard
  • 20. www.cyberoam.com Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard
  • 21. www.cyberoam.com User Threat Quotient (UTQ) Report: Spot risky users at a glance User: jenny.lewis Relative Threat Score: 20.1 Relative Risk Ranking: 1
  • 23. www.cyberoam.com Stateful Inspection Firewall  Unified Security  Application Firewall  Identity-based Firewall  Layer 8 Geo-based Traffic Control - Control incoming/outgoing traffic from/to a specific country  FastPath Technology - To improve processing speed and reduce CPU overhead Security Policies Connectivity Policies Productivity Policies Firewall Rule Unified Security  Rules for all security features from firewall page  Easy navigation and increased administrative productivity
  • 24. www.cyberoam.com Configure rules for all features from Firewall page Identity Security Productivity Connectivity + + +
  • 25. www.cyberoam.com  Support for IPSec, L2TP, PPTP, SSL VPN  Threat Free Tunneling (TFT) Technology Supported VPN Clients  MacOS  iOS  Android Devices IPSec VPN L2TP VPN PPTP VPN iOS L2TP VPN Android Virtual Private Network (VPN) SSL VPN -Client-based & Client less -License free - Scans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attempts  Advanced features for business continuity - MPLS failover to VPN - VPN failover Embrace BYOD with mobile VPN clients
  • 26. www.cyberoam.com Intrusion Prevention System (IPS)  Many SOHO/SMBs struggle with IPS - What to allow or deny? - Which IPS policy applies?  Ready to use IPS Policy templates with Firewall Rule style naming convention  Customizable security for Enterprise IT Pros
  • 27. www.cyberoam.com Intrusion Prevention System - Layer 8 and IPS Tuner driven - Identity-based IPS policies per user, group and IP address - Allows multiple IPS policies - Identity-based alerts & reports - 4500+ signatures – broadest security cover Anti-Spam (Inbound/Outbound) - Three level scanning:  IP Reputation filtering  Real-time Blackhole List (RBL)  Recurrent Pattern Detection (RPDTM) technology - ~99% spam detection - Self-service Quarantine and Spam Digest - Scans SMTP, POP3, IMAP traffic - Virus outbreak detection for zero-hour protection DoS & DDoS Protection - Packet Rate Limit - Protection against flood attacks - SYN Flood - TCP Flood - UDP Flood - ICMP Flood - IPS Signature to prevent attacks - Protocol Anomaly Gateway Anti-Virus, Anti- spyware - Bi-directional scanning: Web & Email - Self-service Virus Quarantine - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic - Instant visibility into Attacker/Victim Continuously updated via Cyberoam Security Center Threat Protection Features Cyberoam Security Center
  • 28. www.cyberoam.com  Create a bandwidth policy on a combination of - User or User Group /Department - Application or Application Category - Web category - Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Best of Breed Bandwidth Management / QoS Burstable bandwidth • Share the unutilized bandwidth Committed bandwidth • Allocate dedicated bandwidth CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager 2mbps Employee 2 2mbps Employee 1 2mbps Employee 2 3mbps Employee 1 3mbps Marketing Group 6mbps When user is not connected
  • 29. www.cyberoam.com  Firewalls/IPS cannot protect a web application from unknown threats On-appliance Web Application Firewall (WAF) Traditional Firewall Web & Application Server Database Server Organization's IT network Unauthorized access blocked Cost Effective No need to buy dedicated hardware WAF Easy to deploy Does not require any changes in setup Cyberoam’s on-appliance WAF protection Cyberoam’s on-appliance WAF  Protects web-apps and web servers from hackers  Positive protection model and No Signature Tables  Intuitive website flow detector Automatically adapts to website changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting
  • 30. www.cyberoam.com  High Availability - Active-Active & Active-Passive - Reduces single-point-of-failure - Maximizes network uptime and ensures continuous network security  Multiple Link Management with Automated Load Balancing - Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions - Active-Active and Active-Passive Auto Link Failover - Gateway failover over VPN  Layer 8 Policy-based Routing - Routes traffic based on Source IP addresses, Protocols & Users - Assures QoS for key users and applications Business Continuity Features ISP2 (5 mbps) Sales Dept. Dev. Dept. Finance Dept. ISP1 (10 mbps) MPLS ISP3 (3G) (3 mbps) Failover LinkOrganization's IT network
  • 31. www.cyberoam.com  User Authentication API for Hotspots - Re-use Hotspot Authentication; avoid multiple logins  Seamless Single Sign-on for Enterprises - 3rd Party authentication solutions can be integrated with Cyberoam  Manage Cyberoam with 3rd party policy management systems Cyberoam API
  • 32. www.cyberoam.com  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator - Authorizer consent required for the Administrator to view user-specific activities Safeguard user privacy – 4-Eye Authentication
  • 33. www.cyberoam.com FleXi Ports for flexible network connectivity Combination of Fixed Ports and Flexible Ports Flexibility to choose Copper, Fiber 1GbE / 10GbE modules Modules can be purchased individually as per need Fixed Copper GbE Ports
  • 34. www.cyberoam.com Organizations cannot afford to compromise on any of these. The right SCP balance is essential! Cyberoam features assure Security, Connectivity, Productivity
  • 35. www.cyberoam.com Web Support Chat Support Email Support Phone Support Customer Support System • Appliance Registration and Upgrade • Subscribe security features • Create support tickets • Request RMA • Support available across all time zones • Global Support Excellence - ITIL compliance (ISO 20000) Knowledge base
  • 36. www.cyberoam.com Web Support Chat Support Email Support Partner Support System • Ordering & Inventory management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Knowledge base Region specific dedicated Technical Account Managers (TAM)
  • 37. www.cyberoam.com Cyberoam Network Security Appliance Product Range Hardware appliances UTM, Next Generation Firewall Virtual security appliances CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C NGFW for Large Enterprises CR2500iNG-XP CR1500iNG-XP, CR1000iNG-XP CR750iNG-XP, CR500iNG-XP UTM for Small and Medium Enterprises CR300iNG-XP, CR200iNG-XP CR300iNG, CR200iNG, CR100iNG, CR50iNG UTM for Small and Remote Offices CR35wiNG, CR35iNG, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG, CR10iNG
  • 38. www.cyberoam.com Centralized Management & Monitoring Cyberoam Central Console (CCC)  Centralized security management & monitoring of Cyberoam network security devices  Manage up to 5 CR security appliances for FREE using CCC virtual appliances  Cloud CCC (CCMS – Cyberoam’s on-Cloud Management Service) available to partners for FREE Cyberoam iView (Centralized logging & reporting)  Log & reports activities from ̶ Multiple Cyberoam UTM /NGFW devices ̶ Other devices/vendors : Endpoint Systems, other Firewalls, Routers and more  Open Source Software available for FREE  1200+ reports facilitate Log Management, Security, Compliance and Forensics Available as Hardware, Virtual & Cloud forms Available as
  • 39. www.cyberoam.com Cyberoam Threat Research Labs (CTRL) Identify emerging threats and zero-day vulnerabilities Post vulnerabilities to global bodies In-house security capabilities for IPS, Application Control, Web & Content Filtering
  • 40. www.cyberoam.com Product Certifications ICSA Certified High-Availability ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability UTM Level 5: Cyberoam holds a unique & complete UTM certification Anti-SpywareAnti-VirusFirewall VPN IPS/IDPAnti-Spam URL Filtering
  • 41. www.cyberoam.com Recognized as ‘Visionary’ in the Gartner UTM MQ 2009 2010 2012 2013 2014 Magic Quadrant for Unified Threat Management
  • 42. www.cyberoam.com Pre-sales support - Enterprise Security planning services - Migration assistance for implementation Training & Certification - Equip IT Managers and security engineers to proficiently manage organization’s security Post-sales support - World’s only network security vendor to have ISO 20000 certified (ITIL Compliance) Global Support - Multi-mode support through chat, phone, email Cyberoam - A complete Security solution provider
  • 43. www.cyberoam.com Education Pharma & Healthcare Telecom & ISP GovernmentBFSI Manufacturing Clientele Worldwide
  • 44. www.cyberoam.com Hotels Retail & Services Others IT/BPO & Media Clientele Worldwide
  • 45. www.cyberoam.com Link: http://demo.cyberoam.com Credentials: guest /guest Cyberoam Live Demo Get a 30 day FREE Evaluation of Cyberoam Virtual appliance
  • 46. www.cyberoam.com Thank you Call us on +91 120 6498887 or Email: sales@itmonteur.net