SlideShare a Scribd company logo
1 of 4
Download to read offline
www.cyberoam.com
Virtualization is taking organizations beyond the boundaries of their physical
network infrastructure, empowering them to leverage their resources better
and more flexibly, while quickly responding to the changing needs of their
business. While higher efficiencies and lower total cost are few benefits of
virtualization, security in virtual environments is an issue that organizations
are struggling with, in the wake of virtualization!
Cyberoam offers industry-leading network security for virtualized
environments, with its range of virtual security appliances which can be
deployed as UTMs or Next Generation Firewalls (NGFW). Cyberoam virtual
network security appliances give you the flexibility to deploy a mix of physical
and virtual appliances in your network, which can be managed centrally.
With the ability to scan all traffic in the virtual environment, Cyberoam virtual
network security appliances protects virtual networks from attacks on
hypervisor management console, hypervisor & Guest OS, virtualized web-
facing applications and servers and allows organizations to secure Zero Trust
Networks with its comprehensive security features in virtualized form.
Get a complete virtual security solution with Cyberoam virtual network
security appliances, virtual Cyberoam Central Console and Cyberoam iView –
Logging & Reporting software.
If you are an MSSP, reduce your operational and capital expenditure, and
serve your customers better and at reduced costs, by having elastic network
infrastructure utilization with virtualization.
If you are an SMB with virtual infrastructure, you can now extend your
existing infrastructure to include security for your network without the need
to add hardware security appliances, thus saving cost and time.
Take Control of Your Security Infrastructure!
Cyberoam virtual network security appliances
Security in Virtual Data Center
Enterprise/MSSP “Security-in-a-Box”
Security in a Virtual Office or “Office-in-a-Box”
Cyberoam
virtual network
security Appliances
Virtual Security solution: Cyberoam virtual network security appliances
give complete control of security in virtual data-centers, Security-in-a-Box
and Office-in-a-Box set-ups to organizations. Get comprehensive security in
virtualized environments without the need for deploying a hardware security
appliance anymore.
Support for infrastructure scale-up as the business grows: By providing a
virtual network security solution to organizations and MSSPs, Cyberoam
virtual network security appliances allow security in virtual networks to be
scaled up as the business needs of organizations/MSSP customers grow.
Easy Upgrade: Cyberoam virtual network security appliances can be
upgraded in no time and with maximum ease, using a simple activation key,
to match the growing business needs of organizations/MSSP customers.
Benefit of shared infrastructure: By capitalizing on lean and peak periods of
activities in the networks, organizations and MSSPs can optimize the
resource utilization in their own/customer networks, using Cyberoam’s
security in virtualized form.
Choice of Virtual and Physical Infrastructure: Organizations and MSSPs
get the flexibility to choose between individual and a mix of physical and
virtualized environments without worrying about security, with Cyberoam’s
security solution for both physical and virtualized environments.
Deployment Flexibility: The licensing model for Cyberoam virtual network
security appliances is based on the number of vCPUs, giving deployment
flexibility to organizations and MSSPs, unlike most competitor models that
are based on concurrent sessions and number of users. Cyberoam virtual
network security appliances allow organizations to get maximum benefits of
Cyberoam’s multi-core processing architecture by flexibly allotting vCPUs
from the virtual infrastructure to the Cyberoam virtual network security
appliances.
No Hard Limits on Usage: If the number of network users in organizations or
MSSP customer networks increase beyond the recommended number for a
given model, Cyberoam virtual network security appliances continue to
secure these networks, allowing organizations and MSSPs to upgrade to a
higher model only when they want to.
Take control of what you want, how much you want,
how you want it, with Cyberoam virtual network
security appliances!
WHAT you want
! Security for dynamic virtual environments
and Cloud
! Choice of individual or mixed virtual and
physical network infrastructure
! Single virtual appliance to deploy and
manage for comprehensive network security
and single vendor to contact
! Easy scale-up of security infrastructure as
business grows
! Deployment flexibility with licensing based
on number of vCPUs
! Management and display of regulatory
compliance
Benefits
HOW MUCH you want
HOW you want
! Stateful Inspection Firewall
! Gateway Anti-Virus and Anti-spyware
! Intrusion Prevention System
! Gateway Anti-spam
! Web Filtering
! Application Visibility & Control
! Web Application Firewall
! Virtual Private Network (VPN)
! IM Archiving & Controls
! Bandwidth Management
! On-Appliance Reporting
! Identity-based Security
Cyberoam virtual network security
appliances features
Cyberoam Offers
1.Protection for Virtualized networks
Inter-VM traffic scanning
External hardware security devices are incapable of
scanning inter-VM traffic, creating blind spots in traffic
within the virtualized environments. With their ability to
scan Inter-VM traffic, Cyberoam virtual network security
appliances remove the network blind spots and allow
granular firewall and security policies over inter-VM traffic.
Hyperjacking & Hypervisor vulnerabilities
In cases where the hypervisor management console is
placed in live production virtual environment due to lack of
segmentation within virtual environments, the virtual
networks are prone to attacks that exploit vulnerabilities
on software layers like the hypervisor management
console, hypervisor & Guest OS, putting the security of
entire virtual network at risk.
Cyberoam virtual network security appliances enable
administrators to segment the hypervisor management
console in DMZ and route all traffic through Cyberoam
virtual network security appliances. The Intrusion
Prevention System on Cyberoam virtual network security
appliances scans Inter-VM traffic, VM to hypervisor traffic
and ensures threat-free traffic. Web Application Firewall
protection on Cyberoam virtual network security
appliances blocks attacks that exploit vulnerabilities in the
virtualized web applications.
Separation of duties
In case of external network security solutions, a level of
Separation Of Duties (SOD) is achieved by default because
the functions are hosted on separate physical systems that
are managed and configured by separate teams. However,
in case of collapsed DMZ, loss of SOD by default between
security/network security and operations leads to security
risks and potential conflict of interest between the roles.
Role-based administrator controls in Cyberoam virtual
network security appliances allow separation of
administrator duties. Cyberoam offers logs of
administrator events and audit trails with its Layer 8
identity-based security and on-appliance reporting.
Zero Trust Networks
In an office-in-a-box setup, since the virtual infrastructure
hosts the entire user workgroup, User-Identity based
control and visibility becomes even more important.
Cyberoam’s Layer 8 Identity-based security policies over
user authentication, service authorization and reporting
(AAA) secure the Zero Trust virtual networks. Deployed at
the perimeter or within the virtual infrastructure, Cyberoam
virtual network security appliances offer visibility and user-
based access control in the virtualized environment.
Ensure consistent security policy across your network –
virtual and physical, with Cyberoam.
2.Comprehensive security:
Cyberoam virtual network security appliances simplify the
security for your virtual environments by consolidating
multiple security functions in a single virtual appliance, and
can be deployed as UTM or Next Generation Firewall. Get
all security features found in Cyberoam’s hardware
appliances, viz. firewall, VPN, Gateway Anti-Spam,
Gateway Anti-Virus, IPS, Web Application Firewall, Web
Filtering, Application Visibility & Control and much more, to
make your virtualized environments as secure as your
physical network infrastructure.
3.Easy to deploy
Cyberoam virtual network security appliances are easy to
deploy with a licensing model that provides the flexibility to
allot the number of vCPUs for Cyberoam virtual network
security appliances based on your requirements. A simple
key activation to upgrade to higher models and no hard
limits on crossing recommended usage limits make
Cyberoam virtual network security appliances easy to
deploy in your virtualized set-ups.
4.Compliance Management
In case of collapsed DMZs that hold sensitive information
and office-in-a-box setup, compliance and privacy
requirements become difficult to achieve, especially in a
virtual environment. By segregating and securing traffic
and data between and around your virtual entities,
Cyberoam virtual network security appliances help you
stay regulatory compliant. The integrated logging and
reporting feature offers in-depth reports of activities in
your virtual infrastructure to support your organization to
display compliance.
5.Centralized Management of Hardware and Virtual
appliances
Centrally manage your physical and virtual infrastructure
using a single interface with Cyberoam Central Console,
available in hardware and virtual forms. Reduce the
expense of separate management consoles for your
physical and virtual environment needs as well as ensure
centralized, consistent and quick security actions across
your network.
DMZ / SIZ (Secure Internal Zone)
Hypervisor Management
Console
Virtual Infrastructure
Port B Port C
Port D
DMZ1 DMZ2
VM1 VM2
vSwitch 1
VM3 VM4
vSwitch 2
vSwitch 3
Vm5
Cyberoam virtual network
security appliances
Registered Trademark of Cyberoam Technologies Pvt. Ltd.
sales@cyberoam.com | www.cyberoam.com
Get a 30-day FREE evaluation of Cyberoam virtual network security appliances.
Scenarios
! VMware ESX/ESXi
! VMware Workstation
! VMware Player
! Hyper-V
! CRiV-1C (Support upto 1 vCPU)
! CRiV-2C (Support upto 2 vCPU)
! CRiV-4C (Support upto 4 vCPU)
! CRiV-8C (Support upto 8 vCPU)
! CRiV-12C (Support upto 12 vCPU)
Support for virtual platforms:
Model range
Cyberoam virtual network security appliances offer security in the following set-ups:
MSSP/ Enterprise Security-in-a-box
Customer/BO n
Customer/BO 2
Customer/BO 1
BO = Branch office
Virtual Data Center
vSwitch
vSwitch
vSwitch
Cyberoam virtual network
security appliances
Office-in-a-box
Cyberoam virtual network
security appliances
vSwitch
vSwitch
Awards & Certifications
Cyberoam Inc.
505 Thornall Street, Suite # 304, Edison, NJ -08837
Tel : 201 -301-2851 | Fax : 978-293 -0200
India
Cyberoam House, Saigulshan Complex, Opp. Sanskruti,
Beside White House, Panchwati Cross Road,
Ahmedabad - 380006. INDIA, Tel: +91-79-66216666
Toll Free Numbers
USA : India :+1-800-686-2360 1-800-301-00013|
APAC/MEA : Europe :+1-877-777-0368 +44-808-120-3958|

More Related Content

What's hot

WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATIONwill4468
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAdvantec Distribution
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ralbary
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAdvantec Distribution
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMAndris Soroka
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 

What's hot (10)

WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATION
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheet
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheet
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 

Viewers also liked

The Wild, Wacky And Weird Side
The Wild, Wacky And Weird SideThe Wild, Wacky And Weird Side
The Wild, Wacky And Weird Sideunarmeddignity832
 
Taylor: Overview of Retail and Consumer Marketing Capabilities
Taylor: Overview of Retail and Consumer Marketing CapabilitiesTaylor: Overview of Retail and Consumer Marketing Capabilities
Taylor: Overview of Retail and Consumer Marketing CapabilitiesTaylor
 
Intercultural Research Project
Intercultural Research ProjectIntercultural Research Project
Intercultural Research ProjectEdgar Rodr
 
Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013
Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013
Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013makezine
 
Independent Project Portfolio
Independent Project PortfolioIndependent Project Portfolio
Independent Project PortfolioEdgar Rodr
 
CapabilityStatement_LS_2016_Web
CapabilityStatement_LS_2016_WebCapabilityStatement_LS_2016_Web
CapabilityStatement_LS_2016_WebLeo Schoepflin
 
Comercio234
Comercio234Comercio234
Comercio234alexsala
 
Kelly Cringan Resume
Kelly Cringan ResumeKelly Cringan Resume
Kelly Cringan ResumeKelly Cringan
 
Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...
Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...
Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...Togglehead
 
Copy of RESUME(1)
Copy of RESUME(1)Copy of RESUME(1)
Copy of RESUME(1)kaushik dey
 
Mystic: Brand of Thermo Group CA
Mystic: Brand of Thermo Group CAMystic: Brand of Thermo Group CA
Mystic: Brand of Thermo Group CADaneil Micca
 

Viewers also liked (15)

The Wild, Wacky And Weird Side
The Wild, Wacky And Weird SideThe Wild, Wacky And Weird Side
The Wild, Wacky And Weird Side
 
Listrik2 edit
Listrik2 editListrik2 edit
Listrik2 edit
 
Taylor: Overview of Retail and Consumer Marketing Capabilities
Taylor: Overview of Retail and Consumer Marketing CapabilitiesTaylor: Overview of Retail and Consumer Marketing Capabilities
Taylor: Overview of Retail and Consumer Marketing Capabilities
 
Katipsoi zunontee
Katipsoi zunontee Katipsoi zunontee
Katipsoi zunontee
 
Intercultural Research Project
Intercultural Research ProjectIntercultural Research Project
Intercultural Research Project
 
Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013
Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013
Alden Hart and Rob Giesburt at Hardware Innovation Summit 2013
 
Independent Project Portfolio
Independent Project PortfolioIndependent Project Portfolio
Independent Project Portfolio
 
Mapa da Violência
Mapa da ViolênciaMapa da Violência
Mapa da Violência
 
CapabilityStatement_LS_2016_Web
CapabilityStatement_LS_2016_WebCapabilityStatement_LS_2016_Web
CapabilityStatement_LS_2016_Web
 
Chemistry
ChemistryChemistry
Chemistry
 
Comercio234
Comercio234Comercio234
Comercio234
 
Kelly Cringan Resume
Kelly Cringan ResumeKelly Cringan Resume
Kelly Cringan Resume
 
Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...
Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...
Social Media Case Study for Shopping Malls - Ambience Mall's 'Winterlicious' ...
 
Copy of RESUME(1)
Copy of RESUME(1)Copy of RESUME(1)
Copy of RESUME(1)
 
Mystic: Brand of Thermo Group CA
Mystic: Brand of Thermo Group CAMystic: Brand of Thermo Group CA
Mystic: Brand of Thermo Group CA
 

Similar to CyberoamVirtualSecurityBrochure

CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Emmerick Gortz
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wstawill4468
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wstawill4468
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 

Similar to CyberoamVirtualSecurityBrochure (20)

CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wsta
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wsta
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Cloud security
Cloud securityCloud security
Cloud security
 

CyberoamVirtualSecurityBrochure

  • 1. www.cyberoam.com Virtualization is taking organizations beyond the boundaries of their physical network infrastructure, empowering them to leverage their resources better and more flexibly, while quickly responding to the changing needs of their business. While higher efficiencies and lower total cost are few benefits of virtualization, security in virtual environments is an issue that organizations are struggling with, in the wake of virtualization! Cyberoam offers industry-leading network security for virtualized environments, with its range of virtual security appliances which can be deployed as UTMs or Next Generation Firewalls (NGFW). Cyberoam virtual network security appliances give you the flexibility to deploy a mix of physical and virtual appliances in your network, which can be managed centrally. With the ability to scan all traffic in the virtual environment, Cyberoam virtual network security appliances protects virtual networks from attacks on hypervisor management console, hypervisor & Guest OS, virtualized web- facing applications and servers and allows organizations to secure Zero Trust Networks with its comprehensive security features in virtualized form. Get a complete virtual security solution with Cyberoam virtual network security appliances, virtual Cyberoam Central Console and Cyberoam iView – Logging & Reporting software. If you are an MSSP, reduce your operational and capital expenditure, and serve your customers better and at reduced costs, by having elastic network infrastructure utilization with virtualization. If you are an SMB with virtual infrastructure, you can now extend your existing infrastructure to include security for your network without the need to add hardware security appliances, thus saving cost and time. Take Control of Your Security Infrastructure! Cyberoam virtual network security appliances Security in Virtual Data Center Enterprise/MSSP “Security-in-a-Box” Security in a Virtual Office or “Office-in-a-Box” Cyberoam virtual network security Appliances
  • 2. Virtual Security solution: Cyberoam virtual network security appliances give complete control of security in virtual data-centers, Security-in-a-Box and Office-in-a-Box set-ups to organizations. Get comprehensive security in virtualized environments without the need for deploying a hardware security appliance anymore. Support for infrastructure scale-up as the business grows: By providing a virtual network security solution to organizations and MSSPs, Cyberoam virtual network security appliances allow security in virtual networks to be scaled up as the business needs of organizations/MSSP customers grow. Easy Upgrade: Cyberoam virtual network security appliances can be upgraded in no time and with maximum ease, using a simple activation key, to match the growing business needs of organizations/MSSP customers. Benefit of shared infrastructure: By capitalizing on lean and peak periods of activities in the networks, organizations and MSSPs can optimize the resource utilization in their own/customer networks, using Cyberoam’s security in virtualized form. Choice of Virtual and Physical Infrastructure: Organizations and MSSPs get the flexibility to choose between individual and a mix of physical and virtualized environments without worrying about security, with Cyberoam’s security solution for both physical and virtualized environments. Deployment Flexibility: The licensing model for Cyberoam virtual network security appliances is based on the number of vCPUs, giving deployment flexibility to organizations and MSSPs, unlike most competitor models that are based on concurrent sessions and number of users. Cyberoam virtual network security appliances allow organizations to get maximum benefits of Cyberoam’s multi-core processing architecture by flexibly allotting vCPUs from the virtual infrastructure to the Cyberoam virtual network security appliances. No Hard Limits on Usage: If the number of network users in organizations or MSSP customer networks increase beyond the recommended number for a given model, Cyberoam virtual network security appliances continue to secure these networks, allowing organizations and MSSPs to upgrade to a higher model only when they want to. Take control of what you want, how much you want, how you want it, with Cyberoam virtual network security appliances! WHAT you want ! Security for dynamic virtual environments and Cloud ! Choice of individual or mixed virtual and physical network infrastructure ! Single virtual appliance to deploy and manage for comprehensive network security and single vendor to contact ! Easy scale-up of security infrastructure as business grows ! Deployment flexibility with licensing based on number of vCPUs ! Management and display of regulatory compliance Benefits HOW MUCH you want HOW you want ! Stateful Inspection Firewall ! Gateway Anti-Virus and Anti-spyware ! Intrusion Prevention System ! Gateway Anti-spam ! Web Filtering ! Application Visibility & Control ! Web Application Firewall ! Virtual Private Network (VPN) ! IM Archiving & Controls ! Bandwidth Management ! On-Appliance Reporting ! Identity-based Security Cyberoam virtual network security appliances features
  • 3. Cyberoam Offers 1.Protection for Virtualized networks Inter-VM traffic scanning External hardware security devices are incapable of scanning inter-VM traffic, creating blind spots in traffic within the virtualized environments. With their ability to scan Inter-VM traffic, Cyberoam virtual network security appliances remove the network blind spots and allow granular firewall and security policies over inter-VM traffic. Hyperjacking & Hypervisor vulnerabilities In cases where the hypervisor management console is placed in live production virtual environment due to lack of segmentation within virtual environments, the virtual networks are prone to attacks that exploit vulnerabilities on software layers like the hypervisor management console, hypervisor & Guest OS, putting the security of entire virtual network at risk. Cyberoam virtual network security appliances enable administrators to segment the hypervisor management console in DMZ and route all traffic through Cyberoam virtual network security appliances. The Intrusion Prevention System on Cyberoam virtual network security appliances scans Inter-VM traffic, VM to hypervisor traffic and ensures threat-free traffic. Web Application Firewall protection on Cyberoam virtual network security appliances blocks attacks that exploit vulnerabilities in the virtualized web applications. Separation of duties In case of external network security solutions, a level of Separation Of Duties (SOD) is achieved by default because the functions are hosted on separate physical systems that are managed and configured by separate teams. However, in case of collapsed DMZ, loss of SOD by default between security/network security and operations leads to security risks and potential conflict of interest between the roles. Role-based administrator controls in Cyberoam virtual network security appliances allow separation of administrator duties. Cyberoam offers logs of administrator events and audit trails with its Layer 8 identity-based security and on-appliance reporting. Zero Trust Networks In an office-in-a-box setup, since the virtual infrastructure hosts the entire user workgroup, User-Identity based control and visibility becomes even more important. Cyberoam’s Layer 8 Identity-based security policies over user authentication, service authorization and reporting (AAA) secure the Zero Trust virtual networks. Deployed at the perimeter or within the virtual infrastructure, Cyberoam virtual network security appliances offer visibility and user- based access control in the virtualized environment. Ensure consistent security policy across your network – virtual and physical, with Cyberoam. 2.Comprehensive security: Cyberoam virtual network security appliances simplify the security for your virtual environments by consolidating multiple security functions in a single virtual appliance, and can be deployed as UTM or Next Generation Firewall. Get all security features found in Cyberoam’s hardware appliances, viz. firewall, VPN, Gateway Anti-Spam, Gateway Anti-Virus, IPS, Web Application Firewall, Web Filtering, Application Visibility & Control and much more, to make your virtualized environments as secure as your physical network infrastructure. 3.Easy to deploy Cyberoam virtual network security appliances are easy to deploy with a licensing model that provides the flexibility to allot the number of vCPUs for Cyberoam virtual network security appliances based on your requirements. A simple key activation to upgrade to higher models and no hard limits on crossing recommended usage limits make Cyberoam virtual network security appliances easy to deploy in your virtualized set-ups. 4.Compliance Management In case of collapsed DMZs that hold sensitive information and office-in-a-box setup, compliance and privacy requirements become difficult to achieve, especially in a virtual environment. By segregating and securing traffic and data between and around your virtual entities, Cyberoam virtual network security appliances help you stay regulatory compliant. The integrated logging and reporting feature offers in-depth reports of activities in your virtual infrastructure to support your organization to display compliance. 5.Centralized Management of Hardware and Virtual appliances Centrally manage your physical and virtual infrastructure using a single interface with Cyberoam Central Console, available in hardware and virtual forms. Reduce the expense of separate management consoles for your physical and virtual environment needs as well as ensure centralized, consistent and quick security actions across your network. DMZ / SIZ (Secure Internal Zone) Hypervisor Management Console Virtual Infrastructure Port B Port C Port D DMZ1 DMZ2 VM1 VM2 vSwitch 1 VM3 VM4 vSwitch 2 vSwitch 3 Vm5 Cyberoam virtual network security appliances
  • 4. Registered Trademark of Cyberoam Technologies Pvt. Ltd. sales@cyberoam.com | www.cyberoam.com Get a 30-day FREE evaluation of Cyberoam virtual network security appliances. Scenarios ! VMware ESX/ESXi ! VMware Workstation ! VMware Player ! Hyper-V ! CRiV-1C (Support upto 1 vCPU) ! CRiV-2C (Support upto 2 vCPU) ! CRiV-4C (Support upto 4 vCPU) ! CRiV-8C (Support upto 8 vCPU) ! CRiV-12C (Support upto 12 vCPU) Support for virtual platforms: Model range Cyberoam virtual network security appliances offer security in the following set-ups: MSSP/ Enterprise Security-in-a-box Customer/BO n Customer/BO 2 Customer/BO 1 BO = Branch office Virtual Data Center vSwitch vSwitch vSwitch Cyberoam virtual network security appliances Office-in-a-box Cyberoam virtual network security appliances vSwitch vSwitch Awards & Certifications Cyberoam Inc. 505 Thornall Street, Suite # 304, Edison, NJ -08837 Tel : 201 -301-2851 | Fax : 978-293 -0200 India Cyberoam House, Saigulshan Complex, Opp. Sanskruti, Beside White House, Panchwati Cross Road, Ahmedabad - 380006. INDIA, Tel: +91-79-66216666 Toll Free Numbers USA : India :+1-800-686-2360 1-800-301-00013| APAC/MEA : Europe :+1-877-777-0368 +44-808-120-3958|