SlideShare a Scribd company logo
1 of 46
www.cyberoam.com
http://firewall.firm.in
Cyberoam Next-Generation Security
Presenter: IT Monteur
Our Products
Modem Router Integrated Security
applianceNetwork Security Appliances - UTM, NGFW
(Hardware & Virtual)
www.cyberoam.com
Technology Powerhouse
550+ Employees
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for network security features
Patent-pending Identity-based Management
Cyberoam Introduction
www.cyberoam.com
Cyberoam Product Line
Network Security
Centralized security
Management
Network Monitoring
& Analysis
Virtual CloudPhysical
Cyberoam Central Console
Cyberoam iView
Cyberoam
Next-Gen Firewall/ Unified
Threat Management
SOHO, HOME
Cyberoam Central
Console
Cyberoam virtual
Next-Gen Firewall/ Unified
Threat Management
Cyberoam iView
software
Cyberoam Security
on Amazon Cloud
(currently in Beta)
www.cyberoam.com
Network Security Appliances – UTM, NGFW
(Hardware & Virtual)
www.cyberoam.com
Cyberoam Next-Generation Security
Core NGFW Features
Layer-8
Security
Firewall
Application
Filtering
Web & Content
Filtering
IPS VPN
Bandwidth
Management/QoS
On-appliance
reporting
Gateway Anti-Virus
Gateway Anti-Spam
(Inbound/outbound)
Wireless
Security
Web Application
Firewall
Support for
3G/4G/WiMAX
UTM Features
IPv6 Support
Multi-link
Management
www.cyberoam.com
Powerful Hardware
 Multicore Gigahertz processors for
Nano second security processing
 Gigabit Ports to integrate with Gigabit
network
Cyberoam Architecture
Intelligent Firmware
 Tight integration with
Hardware
 Network & Crypto
Acceleration
www.cyberoam.com
High Performance Security Appliances
Bringing Gigabit Firewall
throughputs within the reach of
small offices and branch offices
Top model CR2500iNG-XP offers
Firewall Throughput: 160 Gbps
NGFW Throughput: 10 Gbps
www.cyberoam.com
Cyberoam's Layer 8 Technology
treats “User Identity” as the
8th Layer in the protocol stack
Cyberoam network security appliances
offer security across Layer 2-Layer 8
using Identity-based policies
Cyberoam Innovation: Layer 8 Security
www.cyberoam.com
AAA over single Cyberoam appliance
Cyberoam
Audits
• Identity–based
Logs + Reports
• Compliance
Reports
Cyberoam
Authorizes
• Internet surfing quota
• Schedule control
• Security Policies
• Web Filtering
• Application Visibility &
Control
• QoS / Bandwidth
Management
• IM Controls
Cyberoam
Authenticates
• User Name
• IP Address
• MAC Id
• Session Id
Users
Customers
Employees
Management
Partners
Identity-based AAA
Control user network activities
• Who can connect to the network
• Who can access what
• What have they accessed
Ability to track the user activities;
identify attackers /victims
Take quick network security
decisions
www.cyberoam.com
Internet
Corporate LAN
DHCP
Administrator
Identity-based Security
192.168.3.110
Ancy
192.168.3.105
Richard
192.168.3.110
Ancy Logged out
 Applies security policies based on actual
identity of users.
 User-specific rules for multiple users to share
a common IP address
192.168.3.110
Steve
www.cyberoam.com
Application of Layer 8 Technology
Layer 8 security
Authentication
API
Port-based
Authentication
(802.1x)
Two Factor
Authentication
NTLM
VPN
BYOD Clients
- iOS, Android
Thin Client
www.cyberoam.com
Providing insights into BYOD buildup
Device usage visibility
Identify & flag BYOD
users
Enhancing BYOD
experience with Clients
www.cyberoam.com
Application Visibility & Control
Industry leading coverage for
Visibility & Control over 2200+
key applications
www.cyberoam.com
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Technology
Browser Based
Client Server
Network Protocol
P2P
Simple yet Powerful Granular Application Controls
Category
File Transfer
Gaming
General Internet
Instant Messenger
Infrastructure
Network Services
P2P
Proxy and Tunnel
Remote Access
Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more…
Eliminates the need for manual intervention by administrators to update policies for new
applications added to the list
Control over combination of
Bandwidth Time
User or
User Group
Application or
Application Category
In-House Security Capabilities
Faster turnaround time
e.g Adding application signatures for new applications and dynamic apps
designed to work around network like UltraSurf.
www.cyberoam.com
Blocked
Websites
HTTP
/HTTPS
Website
HTTP /
HTTPS
Web & Content Filtering
Allowed
Websites
HTTP/
HTTPS
Web
2.0
Web
2.0
Google
cache
pages
Google
cache
pages
Embedded
URLs
Embedded
URLs
Malware
hosting
sites
Malware
hosting
sites
Industry’s most comprehensive URL database
100 million+ URLs in 89+ categories
Controls access to HTTP/HTTPS websites
Blocks Google Cache pages
Blocks Embedded URLs
Detects & Blocks Third Party Proxy and Tunneling sites
Filters Web 2.0 content
Web
2.0
Blocks Malware hosting sites
Proxy
&
Tunneling
sites
Proxy
&
Tunneling
sites
Internet
Control over combination of
Bandwidth Time
User or
User Group
Website category
www.cyberoam.com
 1200+ reports
- Real time visibility into user and network
activities
 Helps with Security & Compliance
Management, Forensic Analysis
 Traffic Discovery
- Real-time visibility into bandwidth
utilization by user, protocol, application
Best-in-class on-appliance Reporting
Application Reports
Compliance Reports Interactive World Traffic Map
www.cyberoam.com
Layer-8 User-based Reports
www.cyberoam.com
Layer-8 User-based Reports
www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
User Threat Quotient (UTQ) Report: Spot risky users at a glance
User: jenny.lewis
Relative Threat Score: 20.1
Relative Risk Ranking: 1
www.cyberoam.com
Traffic Discovery
www.cyberoam.com
Stateful Inspection Firewall
 Unified Security
 Application Firewall
 Identity-based Firewall
 Layer 8 Geo-based Traffic Control
- Control incoming/outgoing traffic from/to
a specific country
 FastPath Technology
- To improve processing speed and reduce
CPU overhead
Security
Policies
Connectivity
Policies
Productivity
Policies
Firewall Rule
Unified Security
 Rules for all security features
from firewall page
 Easy navigation and increased
administrative productivity
www.cyberoam.com
Configure rules for all features from Firewall page
Identity
Security
Productivity
Connectivity
+
+
+
www.cyberoam.com
 Support for IPSec, L2TP, PPTP,
SSL VPN
 Threat Free Tunneling (TFT)
Technology
Supported VPN Clients
 MacOS
 iOS
 Android Devices
IPSec VPN
L2TP VPN
PPTP VPN
iOS
L2TP VPN
Android
Virtual Private Network (VPN)
SSL VPN
-Client-based &
Client less
-License free
- Scans VPN traffic for Malware, Spam,
Inappropriate content, Intrusion attempts
 Advanced features for business continuity
- MPLS failover to VPN
- VPN failover
Embrace BYOD with mobile VPN
clients
www.cyberoam.com
Intrusion Prevention System (IPS)
 Many SOHO/SMBs struggle with IPS
- What to allow or deny?
- Which IPS policy applies?
 Ready to use IPS Policy templates with Firewall Rule style naming convention
 Customizable security for Enterprise IT Pros
www.cyberoam.com
Intrusion Prevention System
- Layer 8 and IPS Tuner driven
- Identity-based IPS policies per user, group and
IP address
- Allows multiple IPS policies
- Identity-based alerts & reports
- 4500+ signatures – broadest security cover
Anti-Spam (Inbound/Outbound)
- Three level scanning:
 IP Reputation filtering
 Real-time Blackhole List (RBL)
 Recurrent Pattern Detection (RPDTM) technology
- ~99% spam detection
- Self-service Quarantine and Spam Digest
- Scans SMTP, POP3, IMAP traffic
- Virus outbreak detection for zero-hour protection
DoS & DDoS Protection
- Packet Rate Limit
- Protection against flood attacks
- SYN Flood
- TCP Flood
- UDP Flood
- ICMP Flood
- IPS Signature to prevent attacks
- Protocol Anomaly
Gateway Anti-Virus, Anti- spyware
- Bi-directional scanning: Web & Email
- Self-service Virus Quarantine
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and
IM traffic
- Instant visibility into Attacker/Victim
Continuously updated via
Cyberoam Security Center
Threat Protection Features
Cyberoam
Security Center
www.cyberoam.com
 Create a bandwidth policy on a combination of
- User or User Group /Department
- Application or Application Category
- Web category
- Allows great flexibility and real L2-L8 visibility and control
 Bandwidth sharing with priority
 Schedule-based bandwidth allocation
Best of Breed Bandwidth Management / QoS
Burstable bandwidth
• Share the unutilized bandwidth
Committed bandwidth
• Allocate dedicated bandwidth
CEO Manager ERP System
5 mbps 2 mbps 8 mbps
Manager
2mbps
Employee 2
2mbps
Employee 1
2mbps
Employee 2
3mbps
Employee 1
3mbps
Marketing
Group
6mbps
When user
is not
connected
www.cyberoam.com
 Firewalls/IPS cannot protect a web application from unknown threats
On-appliance Web Application Firewall (WAF)
Traditional
Firewall
Web &
Application
Server
Database
Server
Organization's IT network
Unauthorized
access blocked
Cost Effective
No need to buy dedicated hardware
WAF
Easy to deploy
Does not require any changes in
setup
Cyberoam’s on-appliance WAF
protection
Cyberoam’s on-appliance WAF
 Protects web-apps and web servers from
hackers
 Positive protection model and No Signature
Tables
 Intuitive website flow detector
Automatically adapts to website changes
 Protects against OWASP top 10 web-app
vulnerabilities
 SSL Offloading
 Monitoring & Reporting
www.cyberoam.com
 High Availability
- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime and ensures continuous network security
 Multiple Link Management with Automated Load Balancing
- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
 Layer 8 Policy-based Routing
- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications
Business Continuity Features
ISP2
(5 mbps)
Sales
Dept.
Dev.
Dept.
Finance
Dept.
ISP1
(10 mbps)
MPLS
ISP3 (3G)
(3 mbps)
Failover LinkOrganization's IT network
www.cyberoam.com
 User Authentication API for Hotspots
- Re-use Hotspot Authentication; avoid multiple logins
 Seamless Single Sign-on for Enterprises
- 3rd Party authentication solutions can be integrated with Cyberoam
 Manage Cyberoam with 3rd party policy management systems
Cyberoam API
www.cyberoam.com
 Prevent the risk of IT administrator from misusing privilege of tracking user activities
 2 people: Authorizer and Administrator
- Authorizer consent required for the Administrator to view user-specific activities
Safeguard user privacy – 4-Eye Authentication
www.cyberoam.com
FleXi Ports for flexible network connectivity
Combination of Fixed Ports
and Flexible Ports
Flexibility to choose Copper,
Fiber 1GbE / 10GbE modules
Modules can be purchased
individually as per need
Fixed Copper GbE Ports
www.cyberoam.com
Organizations cannot afford to compromise on any of these.
The right SCP balance is essential!
Cyberoam features assure Security, Connectivity, Productivity
www.cyberoam.com
Web
Support
Chat
Support
Email
Support
Phone
Support
Customer Support System
• Appliance Registration and Upgrade
• Subscribe security features
• Create support tickets
• Request RMA
• Support available across all time zones
• Global Support Excellence - ITIL compliance
(ISO 20000)
Knowledge
base
www.cyberoam.com
Web
Support
Chat
Support
Email
Support
Partner Support System
• Ordering & Inventory management
• Sales & Marketing tools &
resources
• Presales Support
• Track Appliance/Subscription
Knowledge
base
Region specific dedicated Technical Account
Managers (TAM)
www.cyberoam.com
Cyberoam Network Security Appliance Product Range
Hardware appliances
UTM, Next Generation Firewall
Virtual security appliances
CRiV-1C, CRiV-2C, CRiV-4C,
CRiV-8C, CRiV-12C
NGFW for Large Enterprises
CR2500iNG-XP
CR1500iNG-XP, CR1000iNG-XP
CR750iNG-XP, CR500iNG-XP
UTM for Small and Medium Enterprises
CR300iNG-XP, CR200iNG-XP
CR300iNG, CR200iNG,
CR100iNG, CR50iNG
UTM for Small and Remote Offices
CR35wiNG, CR35iNG,
CR25wiNG, CR25iNG,
CR15wiNG, CR15iNG, CR10iNG
www.cyberoam.com
Centralized Management & Monitoring
Cyberoam Central Console (CCC)
 Centralized security management & monitoring
of Cyberoam network security devices
 Manage up to 5 CR security appliances for
FREE using CCC virtual appliances
 Cloud CCC (CCMS – Cyberoam’s on-Cloud
Management Service) available to partners for
FREE
Cyberoam iView (Centralized logging & reporting)
 Log & reports activities from
̶ Multiple Cyberoam UTM /NGFW devices
̶ Other devices/vendors : Endpoint Systems,
other Firewalls, Routers and more
 Open Source Software available for FREE
 1200+ reports facilitate Log Management,
Security, Compliance and Forensics
Available as Hardware, Virtual & Cloud forms
Available as
www.cyberoam.com
Cyberoam Threat Research Labs (CTRL)
Identify emerging
threats and zero-day
vulnerabilities
Post vulnerabilities
to global bodies
In-house security
capabilities for IPS,
Application Control,
Web & Content Filtering
www.cyberoam.com
Product Certifications
ICSA Certified
High-Availability
ICSA Certified Firewall
VPNC Certified for Basic VPN &
AES Interoperability
UTM Level 5:
Cyberoam holds a unique &
complete UTM certification
Anti-SpywareAnti-VirusFirewall VPN
IPS/IDPAnti-Spam URL Filtering
www.cyberoam.com
Recognized as ‘Visionary’ in the Gartner UTM MQ
2009 2010 2012 2013
2014
Magic Quadrant for Unified
Threat Management
www.cyberoam.com
Pre-sales support
- Enterprise Security
planning services
- Migration assistance for
implementation
Training &
Certification
- Equip IT Managers and
security engineers to
proficiently manage
organization’s security
Post-sales support
- World’s only network security vendor
to have ISO 20000 certified (ITIL
Compliance) Global Support
- Multi-mode support through chat,
phone, email
Cyberoam - A complete Security solution provider
www.cyberoam.com
Education Pharma & Healthcare Telecom & ISP
GovernmentBFSI Manufacturing
Clientele Worldwide
www.cyberoam.com
Hotels Retail & Services
Others
IT/BPO & Media
Clientele Worldwide
www.cyberoam.com
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
Cyberoam Live Demo
Get a 30 day FREE Evaluation of
Cyberoam Virtual appliance
www.cyberoam.com
Thank you
Call us on +91 120 6498887 or Email: sales@itmonteur.net

More Related Content

What's hot

What's hot (20)

Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Wi max by pankaj jangid
Wi max by pankaj jangidWi max by pankaj jangid
Wi max by pankaj jangid
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Attendance System using ESP8266(Wi-Fi) with MySQL
Attendance System using ESP8266(Wi-Fi) with MySQLAttendance System using ESP8266(Wi-Fi) with MySQL
Attendance System using ESP8266(Wi-Fi) with MySQL
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 

Viewers also liked

Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Introduction To Programming with Python-1
Introduction To Programming with Python-1Introduction To Programming with Python-1
Introduction To Programming with Python-1Syed Farjad Zia Zaidi
 
Watch guard best in-class security
Watch guard best in-class securityWatch guard best in-class security
Watch guard best in-class securityPrime Infoserv
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-TechsheetBaqar Kazmi
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Vitor Nakano
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 

Viewers also liked (20)

Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Introduction To Programming with Python-1
Introduction To Programming with Python-1Introduction To Programming with Python-1
Introduction To Programming with Python-1
 
Firewall
FirewallFirewall
Firewall
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Watch guard best in-class security
Watch guard best in-class securityWatch guard best in-class security
Watch guard best in-class security
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-Techsheet
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)
 
Firewall Presentation
Firewall PresentationFirewall Presentation
Firewall Presentation
 
Red de redes
Red de redesRed de redes
Red de redes
 
CCNSP
CCNSPCCNSP
CCNSP
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Substituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scriptsSubstituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scripts
 
Logic Over Language
Logic Over LanguageLogic Over Language
Logic Over Language
 

Similar to Cyberoam Firewall Presentation

Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overviewdragnetNZ
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTMsharetech
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devicesponealmickelson
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 

Similar to Cyberoam Firewall Presentation (20)

Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devices
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Cyberoam Firewall Presentation

  • 1. www.cyberoam.com http://firewall.firm.in Cyberoam Next-Generation Security Presenter: IT Monteur Our Products Modem Router Integrated Security applianceNetwork Security Appliances - UTM, NGFW (Hardware & Virtual)
  • 2. www.cyberoam.com Technology Powerhouse 550+ Employees Sales, Distribution Channel and Customers across 125+ Countries Amongst the top 3 global players for network security features Patent-pending Identity-based Management Cyberoam Introduction
  • 3. www.cyberoam.com Cyberoam Product Line Network Security Centralized security Management Network Monitoring & Analysis Virtual CloudPhysical Cyberoam Central Console Cyberoam iView Cyberoam Next-Gen Firewall/ Unified Threat Management SOHO, HOME Cyberoam Central Console Cyberoam virtual Next-Gen Firewall/ Unified Threat Management Cyberoam iView software Cyberoam Security on Amazon Cloud (currently in Beta)
  • 4. www.cyberoam.com Network Security Appliances – UTM, NGFW (Hardware & Virtual)
  • 5. www.cyberoam.com Cyberoam Next-Generation Security Core NGFW Features Layer-8 Security Firewall Application Filtering Web & Content Filtering IPS VPN Bandwidth Management/QoS On-appliance reporting Gateway Anti-Virus Gateway Anti-Spam (Inbound/outbound) Wireless Security Web Application Firewall Support for 3G/4G/WiMAX UTM Features IPv6 Support Multi-link Management
  • 6. www.cyberoam.com Powerful Hardware  Multicore Gigahertz processors for Nano second security processing  Gigabit Ports to integrate with Gigabit network Cyberoam Architecture Intelligent Firmware  Tight integration with Hardware  Network & Crypto Acceleration
  • 7. www.cyberoam.com High Performance Security Appliances Bringing Gigabit Firewall throughputs within the reach of small offices and branch offices Top model CR2500iNG-XP offers Firewall Throughput: 160 Gbps NGFW Throughput: 10 Gbps
  • 8. www.cyberoam.com Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam network security appliances offer security across Layer 2-Layer 8 using Identity-based policies Cyberoam Innovation: Layer 8 Security
  • 9. www.cyberoam.com AAA over single Cyberoam appliance Cyberoam Audits • Identity–based Logs + Reports • Compliance Reports Cyberoam Authorizes • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls Cyberoam Authenticates • User Name • IP Address • MAC Id • Session Id Users Customers Employees Management Partners Identity-based AAA Control user network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions
  • 10. www.cyberoam.com Internet Corporate LAN DHCP Administrator Identity-based Security 192.168.3.110 Ancy 192.168.3.105 Richard 192.168.3.110 Ancy Logged out  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address 192.168.3.110 Steve
  • 11. www.cyberoam.com Application of Layer 8 Technology Layer 8 security Authentication API Port-based Authentication (802.1x) Two Factor Authentication NTLM VPN BYOD Clients - iOS, Android Thin Client
  • 12. www.cyberoam.com Providing insights into BYOD buildup Device usage visibility Identify & flag BYOD users Enhancing BYOD experience with Clients
  • 13. www.cyberoam.com Application Visibility & Control Industry leading coverage for Visibility & Control over 2200+ key applications
  • 14. www.cyberoam.com Risk Level Very Low (1) Low (2) Medium (3) High (4) Very High (5) Characteristics Excessive Bandwidth Prone to misuse Transfer files Tunnel other apps Widely used Loss of Productivity Can bypass firewall policy Technology Browser Based Client Server Network Protocol P2P Simple yet Powerful Granular Application Controls Category File Transfer Gaming General Internet Instant Messenger Infrastructure Network Services P2P Proxy and Tunnel Remote Access Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Control over combination of Bandwidth Time User or User Group Application or Application Category In-House Security Capabilities Faster turnaround time e.g Adding application signatures for new applications and dynamic apps designed to work around network like UltraSurf.
  • 15. www.cyberoam.com Blocked Websites HTTP /HTTPS Website HTTP / HTTPS Web & Content Filtering Allowed Websites HTTP/ HTTPS Web 2.0 Web 2.0 Google cache pages Google cache pages Embedded URLs Embedded URLs Malware hosting sites Malware hosting sites Industry’s most comprehensive URL database 100 million+ URLs in 89+ categories Controls access to HTTP/HTTPS websites Blocks Google Cache pages Blocks Embedded URLs Detects & Blocks Third Party Proxy and Tunneling sites Filters Web 2.0 content Web 2.0 Blocks Malware hosting sites Proxy & Tunneling sites Proxy & Tunneling sites Internet Control over combination of Bandwidth Time User or User Group Website category
  • 16. www.cyberoam.com  1200+ reports - Real time visibility into user and network activities  Helps with Security & Compliance Management, Forensic Analysis  Traffic Discovery - Real-time visibility into bandwidth utilization by user, protocol, application Best-in-class on-appliance Reporting Application Reports Compliance Reports Interactive World Traffic Map
  • 19. www.cyberoam.com Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard
  • 20. www.cyberoam.com Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard
  • 21. www.cyberoam.com User Threat Quotient (UTQ) Report: Spot risky users at a glance User: jenny.lewis Relative Threat Score: 20.1 Relative Risk Ranking: 1
  • 23. www.cyberoam.com Stateful Inspection Firewall  Unified Security  Application Firewall  Identity-based Firewall  Layer 8 Geo-based Traffic Control - Control incoming/outgoing traffic from/to a specific country  FastPath Technology - To improve processing speed and reduce CPU overhead Security Policies Connectivity Policies Productivity Policies Firewall Rule Unified Security  Rules for all security features from firewall page  Easy navigation and increased administrative productivity
  • 24. www.cyberoam.com Configure rules for all features from Firewall page Identity Security Productivity Connectivity + + +
  • 25. www.cyberoam.com  Support for IPSec, L2TP, PPTP, SSL VPN  Threat Free Tunneling (TFT) Technology Supported VPN Clients  MacOS  iOS  Android Devices IPSec VPN L2TP VPN PPTP VPN iOS L2TP VPN Android Virtual Private Network (VPN) SSL VPN -Client-based & Client less -License free - Scans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attempts  Advanced features for business continuity - MPLS failover to VPN - VPN failover Embrace BYOD with mobile VPN clients
  • 26. www.cyberoam.com Intrusion Prevention System (IPS)  Many SOHO/SMBs struggle with IPS - What to allow or deny? - Which IPS policy applies?  Ready to use IPS Policy templates with Firewall Rule style naming convention  Customizable security for Enterprise IT Pros
  • 27. www.cyberoam.com Intrusion Prevention System - Layer 8 and IPS Tuner driven - Identity-based IPS policies per user, group and IP address - Allows multiple IPS policies - Identity-based alerts & reports - 4500+ signatures – broadest security cover Anti-Spam (Inbound/Outbound) - Three level scanning:  IP Reputation filtering  Real-time Blackhole List (RBL)  Recurrent Pattern Detection (RPDTM) technology - ~99% spam detection - Self-service Quarantine and Spam Digest - Scans SMTP, POP3, IMAP traffic - Virus outbreak detection for zero-hour protection DoS & DDoS Protection - Packet Rate Limit - Protection against flood attacks - SYN Flood - TCP Flood - UDP Flood - ICMP Flood - IPS Signature to prevent attacks - Protocol Anomaly Gateway Anti-Virus, Anti- spyware - Bi-directional scanning: Web & Email - Self-service Virus Quarantine - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic - Instant visibility into Attacker/Victim Continuously updated via Cyberoam Security Center Threat Protection Features Cyberoam Security Center
  • 28. www.cyberoam.com  Create a bandwidth policy on a combination of - User or User Group /Department - Application or Application Category - Web category - Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Best of Breed Bandwidth Management / QoS Burstable bandwidth • Share the unutilized bandwidth Committed bandwidth • Allocate dedicated bandwidth CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager 2mbps Employee 2 2mbps Employee 1 2mbps Employee 2 3mbps Employee 1 3mbps Marketing Group 6mbps When user is not connected
  • 29. www.cyberoam.com  Firewalls/IPS cannot protect a web application from unknown threats On-appliance Web Application Firewall (WAF) Traditional Firewall Web & Application Server Database Server Organization's IT network Unauthorized access blocked Cost Effective No need to buy dedicated hardware WAF Easy to deploy Does not require any changes in setup Cyberoam’s on-appliance WAF protection Cyberoam’s on-appliance WAF  Protects web-apps and web servers from hackers  Positive protection model and No Signature Tables  Intuitive website flow detector Automatically adapts to website changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting
  • 30. www.cyberoam.com  High Availability - Active-Active & Active-Passive - Reduces single-point-of-failure - Maximizes network uptime and ensures continuous network security  Multiple Link Management with Automated Load Balancing - Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions - Active-Active and Active-Passive Auto Link Failover - Gateway failover over VPN  Layer 8 Policy-based Routing - Routes traffic based on Source IP addresses, Protocols & Users - Assures QoS for key users and applications Business Continuity Features ISP2 (5 mbps) Sales Dept. Dev. Dept. Finance Dept. ISP1 (10 mbps) MPLS ISP3 (3G) (3 mbps) Failover LinkOrganization's IT network
  • 31. www.cyberoam.com  User Authentication API for Hotspots - Re-use Hotspot Authentication; avoid multiple logins  Seamless Single Sign-on for Enterprises - 3rd Party authentication solutions can be integrated with Cyberoam  Manage Cyberoam with 3rd party policy management systems Cyberoam API
  • 32. www.cyberoam.com  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator - Authorizer consent required for the Administrator to view user-specific activities Safeguard user privacy – 4-Eye Authentication
  • 33. www.cyberoam.com FleXi Ports for flexible network connectivity Combination of Fixed Ports and Flexible Ports Flexibility to choose Copper, Fiber 1GbE / 10GbE modules Modules can be purchased individually as per need Fixed Copper GbE Ports
  • 34. www.cyberoam.com Organizations cannot afford to compromise on any of these. The right SCP balance is essential! Cyberoam features assure Security, Connectivity, Productivity
  • 35. www.cyberoam.com Web Support Chat Support Email Support Phone Support Customer Support System • Appliance Registration and Upgrade • Subscribe security features • Create support tickets • Request RMA • Support available across all time zones • Global Support Excellence - ITIL compliance (ISO 20000) Knowledge base
  • 36. www.cyberoam.com Web Support Chat Support Email Support Partner Support System • Ordering & Inventory management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Knowledge base Region specific dedicated Technical Account Managers (TAM)
  • 37. www.cyberoam.com Cyberoam Network Security Appliance Product Range Hardware appliances UTM, Next Generation Firewall Virtual security appliances CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C NGFW for Large Enterprises CR2500iNG-XP CR1500iNG-XP, CR1000iNG-XP CR750iNG-XP, CR500iNG-XP UTM for Small and Medium Enterprises CR300iNG-XP, CR200iNG-XP CR300iNG, CR200iNG, CR100iNG, CR50iNG UTM for Small and Remote Offices CR35wiNG, CR35iNG, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG, CR10iNG
  • 38. www.cyberoam.com Centralized Management & Monitoring Cyberoam Central Console (CCC)  Centralized security management & monitoring of Cyberoam network security devices  Manage up to 5 CR security appliances for FREE using CCC virtual appliances  Cloud CCC (CCMS – Cyberoam’s on-Cloud Management Service) available to partners for FREE Cyberoam iView (Centralized logging & reporting)  Log & reports activities from ̶ Multiple Cyberoam UTM /NGFW devices ̶ Other devices/vendors : Endpoint Systems, other Firewalls, Routers and more  Open Source Software available for FREE  1200+ reports facilitate Log Management, Security, Compliance and Forensics Available as Hardware, Virtual & Cloud forms Available as
  • 39. www.cyberoam.com Cyberoam Threat Research Labs (CTRL) Identify emerging threats and zero-day vulnerabilities Post vulnerabilities to global bodies In-house security capabilities for IPS, Application Control, Web & Content Filtering
  • 40. www.cyberoam.com Product Certifications ICSA Certified High-Availability ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability UTM Level 5: Cyberoam holds a unique & complete UTM certification Anti-SpywareAnti-VirusFirewall VPN IPS/IDPAnti-Spam URL Filtering
  • 41. www.cyberoam.com Recognized as ‘Visionary’ in the Gartner UTM MQ 2009 2010 2012 2013 2014 Magic Quadrant for Unified Threat Management
  • 42. www.cyberoam.com Pre-sales support - Enterprise Security planning services - Migration assistance for implementation Training & Certification - Equip IT Managers and security engineers to proficiently manage organization’s security Post-sales support - World’s only network security vendor to have ISO 20000 certified (ITIL Compliance) Global Support - Multi-mode support through chat, phone, email Cyberoam - A complete Security solution provider
  • 43. www.cyberoam.com Education Pharma & Healthcare Telecom & ISP GovernmentBFSI Manufacturing Clientele Worldwide
  • 44. www.cyberoam.com Hotels Retail & Services Others IT/BPO & Media Clientele Worldwide
  • 45. www.cyberoam.com Link: http://demo.cyberoam.com Credentials: guest /guest Cyberoam Live Demo Get a 30 day FREE Evaluation of Cyberoam Virtual appliance
  • 46. www.cyberoam.com Thank you Call us on +91 120 6498887 or Email: sales@itmonteur.net