Post on 26-Mar-2018
transcript
www.cyberoam.com
www.cyberoam.com
Our Products
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Network Security Appliances - UTM, NGFW (Hardware & Virtual)
Modem Router Integrated Security appliance
Automate your IT Security Services
Presenter: Cyberoam
www.cyberoam.com
It starts with debunking myths
Nothing can get past a firewall
We are compliant, hence we are secure!
www.cyberoam.com
Google Digital Attack Map – Growing Cyber Attacks
Rising number of cyber threats against advanced nations such as the US.
What happened to all state-of-the-art firewalls?
www.cyberoam.com
Inside the mind of today’s cyber criminal
1. Indulge in multi-step, elaborate targeted attacks
2. Motivation goes beyond money, involves
hacktivism, nation-state espionage, business
rivalry, fame etc
3. Run deep investigation for potential vulnerabilities
– from firewalls to unpatched servers to poorly
guarded web apps to vulnerable users in the
target organization
www.cyberoam.com
Why is Security everywhere in this slide?
Cyber-infrastructure Visualized
www.cyberoam.com
Anatomy of a typical targeted attack
www.cyberoam.com
Automating IT Security: From Plugging Security Holes to Driving Proactive Defense
www.cyberoam.com
What necessitates automating IT security?
Common security concerns…
How to auto-provision uniform security policies for HQ, Data Center and Remote Branch offices
Inability to assess vulnerability exposure of network due to web apps, risky users etc
Lack of understanding on network intrusion attacks, network segmentation
Struggle with IPS security configuration
Don’t know what to allow or deny?
www.cyberoam.com
Here’s how automated IT security saves the day!
www.cyberoam.com
How Cyberoam helps automate IT security?
www.cyberoam.com
We know how IT and IT consumerization has changed…
www.cyberoam.com
We know how network and data centers environments have evolved
www.cyberoam.com
Cyberoam – addressing key challenges
Complexity Centrally manage complicated network security policies for hundreds of users, applications and networking devices Evolving business Enable support and security for new business applications while monitoring controlling risk prone apps Connectivity with productivity High-availability, automatic fail-over for business continuity; intelligent QoS management and prioritization for users and apps Reporting and compliance Providing ready and in-depth support for displaying compliance and reports on user and network activities
www.cyberoam.com
Currently available security automation with Cyberoam
- Identifying users instead of just IP address - Scheduled reports over email - Email scanning and shifting to quarantine - Identifying risky users - Compliance - HA, Failover, Load balancing - Burstable bandwidth - Centralized Security Management - ConnectWise integration - Cyberoam API - Pro-active security protection in IPS
www.cyberoam.com
Cyberoam addresses a commonplace catch 22 faced by today's CXOs
www.cyberoam.com
• Centralized Security Management for remote / branch offices
www.cyberoam.com
Dubai Head Office
New York Branch Office
Mumbai Branch Office
Boston Branch Office
Cyberoam
Cyberoam
Cyberoam
Cyberoam
Cyberoam Central Console (CCC)
CCC is for centralized, integrated management and monitoring of Cyberoam network security devices
- Complete control over distributed networks / remote branch offices from head office (H.O.)
Centralized Security Management
www.cyberoam.com
Servers
Firewalls
IDP / IPS
Switches Routers
UTM / NGFW
Applications
Desktop systems
Logs & Events
Identity
Logging Reporting
Compliance Management
Forensic Analysis
Log Management
Security Management
Automated Logging and Reporting
Ability to log and report activities from various users, devices / vendors
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
www.cyberoam.com
Traffic Discovery
- Real-time visibility into bandwidth utilization by user, protocol, application
Real time visibility into user and network activities
Security Management
Forensic Analysis
Data Protection
Compliance Management
www.cyberoam.com
Application Security with Layer 7 and Layer 8 controls
Infected Applications Blocked
Internet
Application Traffic
Cyberoam Appliance
Visibility Control
worms Spyware
Manage Bandwidth
Undesirable
Business Critical
Socio business
Non Critical
Logs & Reports
Controls over applications based on User Identity, Time, Application and Bandwidth
www.cyberoam.com
Intrusion Prevention System
- Layer 8 and IPS Tuner driven
- Identity-based IPS policies per user, group and IP address
- Allows multiple IPS policies
- Identity-based alerts & reports
- 4500+ signatures – broadest security cover
Anti-Spam (Inbound/Outbound)
- Three level scanning:
IP Reputation filtering
Real-time Blackhole List (RBL)
Recurrent Pattern Detection (RPDTM) technology
- ~99% spam detection
- Self-service Quarantine and Spam Digest
- Scans SMTP, POP3, IMAP traffic
- Virus outbreak detection for zero-hour protection
DoS & DDoS Protection
- Packet Rate Limit
- Protection against flood attacks
- SYN Flood
- TCP Flood
- UDP Flood
- ICMP Flood
- IPS Signature to prevent attacks
- Protocol Anomaly
Gateway Anti-Virus, Anti- spyware
- Bi-directional scanning: Web & Email
- Self-service Virus Quarantine
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
- Instant visibility into Attacker/Victim
Continuously updated via
Cyberoam Security Center
Automated Threat Protection
Cyberoam Security Center
www.cyberoam.com
Eliminates the need for manual intervention by administrators to update policies for new applications added to the list
Proactive Protection model
Select P2P Applications
Block all future P2P applications without adding applications manually
Set Action
www.cyberoam.com
Ready to use IPS Policy templates
• Many SOHO/SMBs struggle with IPS
• How many IT managers know
• What to allow or deny?
• Which IPS policy applies?
• Ready to use IPS Policy templates with Firewall Rule style naming convention
Plug and Play IPS
www.cyberoam.com
Customizable security for Enterprise IT Pros
Severity
Critical (1)
Major (2)
Moderate (3)
Minor (4)
Warning (5)
Platform
Windows
Linux
Unix
Mac
Solaris
BSD
Other
Target
Client
Server
Category
Apache HTTP Server
Application & Software
Browsers
Database Management Sys.
DNS
ERP System
Exchange Mail Server
FTP
Industrial Control System
Malware Communication
Microsoft IIS web server
Misc
Multimedia
Office tools
OS & Services
Other Mail Server
Reconnaissance
VoIP & Instant Messaging
Web Services & Applications
And more…
www.cyberoam.com
Ready integration with Two-factor authentication platforms
www.cyberoam.com
Cyberoam can be integrated with the following SIEM Solutions:
Syslog to integrate with all the above SIEM solutions
Integration with leading SIEM platforms
1: RSA Envision
2: ArcSight
3: Cyberoam i-view
www.cyberoam.com
Simplified management and better delivery of security services
UTM, NGFW
appliances
Integration with leading MSSP business automation tools
Automatic Ticket Generation & Resolution for all CCC alerts right at ConnectWise dashboard level
Threat counts
Web & IPS threats
Mail threats
Total Virus & Spam Mail counts
Unhealthy surfing hits
Capacity utilization
notifications
Capacity utilization notifications for
CPU, Disk & Memory usage
Reminders for Security Subscriptions
renewal / expiry
Other key appliance status
information
Appliance management and status change
notifications for
Appliance Connectivity with CCC
Internet Link
VPN connection
HA Failover State
www.cyberoam.com
Cyberoam API - Enables Seamless Authentication
Re-use Hotspot
Authentication; avoid
multiple logins
User Authentication API
for Hotspots Seamless Single Sign-on for
Enterprises If you have an authentication, Cyberoam
can fit in
PMS
www.cyberoam.com
Enables balancing what matters
Business agility with security responsiveness
Automation for threat protection, business continuity
Ease of integration with third-party
systems and MSSP tools
Centralizes Security Management
Automated logging and reporting
www.cyberoam.com
Thank you
Contact: sales@cyberoam.com
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
Get a 30 day FREE Evaluation of
Cyberoam Virtual appliance