DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM

1,308 views
1,139 views

Published on

Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • GREAT SLIDES
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
1,308
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
50
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM

  1. 1. Securing You Future-ready Security Justinas Valentukevičius Channel Manager Baltics Unified Threat Managementwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  2. 2. Securing You Agenda of Presentation  Let’s meet - Brief introduction to Cyberoam  Next generation firewall or maybe Next generation UTM  Layer 8, WAF and other nice features in Cyberoam UTM  Announcement of NG Series and Virtual UTM  Technical live DEMO later today 15:15 PMwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  3. 3. Securing YouAbout Cyberoam Elitecore technologies founded in 1999 Cyberoam UTM introduced in 2006 (Baltics in 2010) 800+ Employees Sales, Distribution Channel and Customers across 110+ Countries Among the Top 3 UTM players in Gartner Patent Pending Identity-based Managementwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  4. 4. Securing YouCyberoam’s Holistic IT Security Portfolio Unified ThreatSecuring the IT network ManagementCentralized securitymanagement for remote/branch offices & clientsNetwork Monitoring & & OpenAnalysis SourceVirtual UTM (fromDecember 2012)www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  5. 5. Securing You Cyberoam pagal Gartner 2012 Magic Quadrant for Unified Threat Managementwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  6. 6. Securing You Evolutionwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  7. 7. Securing You Seriously, is it enough??www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  8. 8. Securing You Evolution of Network SecurityTrends in Security Basic security began with firewalls As threats increased, other solutions were introduced Virus attacks rose in number and intensity Spam rose Slammer fueled the need for Intrusion Detection & Prevention High number of employees start accessing the Internet Connectivity to branches, partners and remote workers Blended threats emerge to exploit extensive Internet usage  Average spam messages per day – the  6FirewallsHit on Saturday, January  Slammer employeesinfected with enjoyed a monopoly until  starting of the 21stbe view onlineviruses 18.5business emails contained %  1 systems 25 % in 5 0030to century – 25, pornography year– Forrester IBM2003,  Time spent deleting them – 2.8 Initial Firewalls at work spyware by this were Stateless  That’s a staggering cost of $281-$304 Lost revenue spilled over halfway mintues. which could  Firewallsnext weekin anot control are hit per  % percentlostsay they – 51.8the  into70companies adult day will invest in 65PC the Average time of websites mts initiation of communication  Emailcost of 9toolsand 5 more than anti-spywarethe bailout: pm became am and upgrades more prevalent   Later Stateful became more prevalent between Total  14 % spam recipients actually read  $1 billion mails grew 5,000 % last year Phishing  Pharmingpercent an employees  today, makes of entry  Till 30-40 no accountability has spam  been established advertised by spam 4 % buy products is not business Internet activity  21 % spam in Jan 2005 was porn relatedwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  9. 9. Securing Youwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  10. 10. Securing You Where are Networks moving to? • High speed Internet (Baltics among TOP countries) • More devices per user – More devices connecting to Internet (BYOD) • More web-applications being accessed • Increase in usage of datawww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  11. 11. Securing YouWhat is usual here, in Baltics? Usually we are really well technologically educated and so we understand the need of Enterprise solutions – and we need the best ! However… Usually we are relatively small in size Usually we are quite limited with our budgetWHAT WE ARE LOOKING FOR IS BEST TECHNOLOGY FORTHE AFFORDABLE PRICE !www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  12. 12. Securing You Next generation securitywww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  13. 13. Securing You Gartners Definition of the Next Generation Firewall (NGFW) “A wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks”. Next Generation Firewall indicates “the necessary evolution of a firewall” to deal with the changing IT environment in businesses and the consequent evolution in security threats posing to bring these very businesses down. NGFW created a buzz in security circles What is so different about them?www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  14. 14. Securing YouNext Generation Firewall Cyberoam Next Generation UTM FW with SI and integrated with IPS, VPN, Web/applicationStandard first-generation firewall capabilities like Filtering, IM Controls and Web Application Firewallpacket filtering, NAT, stateful protocol inspection + Providing Anti Virus and Anti Spyware, Anti Spam,and VPN capabilities Bandwidth Management, Multi Link Management, HA and On-appliance Reporting. IPS tightly integrated with FW.Integrated, rather than merely collocated, Policy creation of multiple features in a single FW interface.network intrusion prevention + All security modules are bound together keeping User Identity as the base. Granular application control Real-time VisualizationApplication awareness and full stack visibility Secure Application Layer Vulnerabilities Network Visibility based on users and not IP AddressesExtra firewall intelligence Integration with AD, LDAP and RADIUS Servers. Integrates hardware acceleration and automation into a wideSupport upgrade paths for integration of new range of packet processing and application-specificinformation feeds and new techniques to functionsaddress future threats + Virtual UTM series consolidates network security in virtualized environments www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  15. 15. Securing You Cyberoam Unified Threat Management  Gateway Integrated security over single platform  Unique Identity-based Layer 8 approach penetrates through each security modulewww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  16. 16. Securing You Human approach in Security • Numbers – Hard & Boring 192.168.10.122 172.17.12.123 10.12.11.23 to remember!  Names - Used daily!!!www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  17. 17. Securing You Cyberoam Layer 8 AAA Advantage Cyberoam Cyberoam Cyberoam Authenticates Authorizes AuditsUser Login • User Name • Internet surfing quota • Identity - based • IP Address • Schedule control Logs + Reports • MAC Id • Security Policies • Compliance Reports • Session Id • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  18. 18. Securing You  Fusion Technology driven SI Firewall - Interface for achieving Unified Security  Rules for all security features from firewall page  Identity-based policies enable security, connectivity, productivity - Easy to configure with Next-Gen UI  Easy navigation, custom controls, intuitive interface - Fewer security errors - Increases security - Enhances administrative productivity - Shorter learning curves: Indicates a feature that is either unique to Cyberoam or it wasfirst introduced in the Industry by Cyberoamwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  19. 19. Securing You  Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity - Supports  IPSec, L2TP, PPTP technologies  SSL-VPN - Client-type independent Web access mode - Application access mode - Client mode  Threat Free Tunneling (TFT) Technology  Scans traffic entering VPN tunnel for: - Malware - Spam - Inappropriate content - Intrusion attempts - Maintains secure endpoint and network environmentswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  20. 20. Securing YouMobile VPN for iOS and Android devices Cyberoam’s Layer 8 Identity based security extended to mobile devices Securely connect your iPhone, iPad and Android devices to your corporate network through VPN iOS Android IPSec VPN (New) L2TP VPN (New) L2TP VPN PPTP VPNwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  21. 21. Securing YouCyberoam CISCO VPN for iOSwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  22. 22. Securing YouSSL VPN user portal www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  23. 23. Securing You  Intrusion Prevention System - Layer 8 and IPS Tuner driven Cyberoam IPS Identity-based IPS policies per user or group  Identity-based alerts and reports - Visibility into applications usage - User, Source, Destination, Usage - Overview of threat status - Top alerts, top attackers, top victims  3500+ signatures – broadest security cover  Internet Threat Response Team  Allows multiple IPS policieswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  24. 24. Securing You  Gateway Anti-Malware - 4 million+ signatures - Bi-directional scanning of web & email - Self-service Virus Quarantine - Reduced window of vulnerability  Broadest security cover against all malware Anti-Virus - Scans  HTTP, FTP, SMTP, POP3  HTTPS, IMAP  Instant Messenger traffic - Layer 8 Impact Anti-Spyware  Identity-based virus reports - Instant visibility into attacker/victim Indicates feature offered only by  Identity-based Quarantine policies top-rated UTMswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  25. 25. Securing You  Gateway Anti-Spam - IP Reputation Filtering  Blocks 85% of incoming messages at gateway Premium - Saves bandwidth - Near 98% spam detection - False Positive rate of 1 in a million  Reduces fear of losing business emails - Self-Service quarantine area - User-based Spam Digest  Frees administrator time & management - Manage Email recipients  Data leakage prevention and archivingwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  26. 26. Securing You  Web Application Firewall SubscriptionFirewalls/IPS cannot protect a web application from unknown threatsCyberoam WAF Features include – Positive protection model and No Signature Tables – Intuitive website flow detector automatically adapts to website changes – Protects against OWASP top 10 vulnerabilities – SSL Offloading – Monitoring & Reportingwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  27. 27. Securing You  Cyberoam iView – On-Appliance Logging & Reporting - Ability to log and report activities - LAYER 8 - Identity-based logging and reporting – Pinpoints the user - Security Management  iView dashboard- Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  1000+ Reports - Log Management - Compliance Management  HIPAA, PCI DSS, GLBA, and more - Forensic Analysiswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  28. 28. Securing YouDual Dashboard – Traffic and Security Dashboard Traffic Dashboardwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  29. 29. Securing YouDual Dashboard – Traffic and Security Dashboard Security Dashboardwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  30. 30. Securing YouDual Dashboard – Traffic and Security Dashboard Security Dashboard N/A: Private IP Others: Rest of recordswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  31. 31. Securing YouCountry Maps for Source/Destination Traffic Graphical overview of Data transfer and Risk levelwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  32. 32. Securing You  Web & Content Filtering - Industry’s most comprehensive URL Premium database  82+ categories  44 million+ URLs - On-appliance web category database  Faster access  Surfing pattern privacy - Controls access to HTTP & HTTPS hosted websites  Increases productivitywww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  33. 33. Securing You Identity based Technology - The Reason Application Based Control. Username / IP Addresswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  34. 34. Securing Youwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  35. 35. Securing YouIM MANAGEMENT & CONTROL  Allow or block Skype  Control access to leading Instant Messengers (Yahoo, Windows Live)  Control over Chat, Webcam, File Transfer  Log & monitor chat  Filter content over IM: Blacklist certain keywords or regular expressions to prevent data leakagewww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  36. 36. Securing You  Best of Breed Bandwidth Management/QoS - Application and Identity-based bandwidth allocation - Category wise Bandwidth management - Restrict Bandwidth usage for a combination of source, destination and service/service group - Schedule-based bandwidth allocation - Committed and burstable bandwidthwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  37. 37. Securing YouIdentity Based Policieswww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  38. 38. Securing YouCyberoam UTM Product Range  Enterprise - CR 2500iNG - CR 1500i - CR 1000i - CR 750ia - CR 500ia  SME - CR 300i - CR 200i - CR 100ia - CR 50ia  Small offices - CR 35ia - CR 25ia - CR 15i - CR 15wi www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  39. 39. Securing YouThe Cyberoam NG Series and Virtualization  Powerful Hardware  Superior Quality Future-Ready Security  Performance Leap  Value for Money  All-New Firmware www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  40. 40. Securing You Cyberoam Certifications Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall IPv6 Member of ICSA Certified VPNC Certified for Basic Ready Internet Watch High-Availability VPN & AES Interoperability Foundationwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  41. 41. Securing You Reviews and Awards Cyberoam CR35ia outshines competitors in SOHO UTM Group Testwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  42. 42. Securing You THANK YOU ! Cyberoam Online Demo: http://livedemo.cyberoam.com (Username: guest, Password: guest) Contact information: Email: justinas.v@cyberoam.com Skype: justinas.cyberoam +370 615 43623www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  43. 43. Securing Youwww.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

×