SlideShare a Scribd company logo
www.cyberoam.com
http://firewall.firm.in
Cyberoam Next-Generation Security
Presenter: IT Monteur
Our Products
Modem Router Integrated Security
applianceNetwork Security Appliances - UTM, NGFW
(Hardware & Virtual)
www.cyberoam.com
Technology Powerhouse
550+ Employees
Sales, Distribution Channel and Customers across 125+ Countries
Amongst the top 3 global players for network security features
Patent-pending Identity-based Management
Cyberoam Introduction
www.cyberoam.com
Cyberoam Product Line
Network Security
Centralized security
Management
Network Monitoring
& Analysis
Virtual CloudPhysical
Cyberoam Central Console
Cyberoam iView
Cyberoam
Next-Gen Firewall/ Unified
Threat Management
SOHO, HOME
Cyberoam Central
Console
Cyberoam virtual
Next-Gen Firewall/ Unified
Threat Management
Cyberoam iView
software
Cyberoam Security
on Amazon Cloud
(currently in Beta)
www.cyberoam.com
Network Security Appliances – UTM, NGFW
(Hardware & Virtual)
www.cyberoam.com
Cyberoam Next-Generation Security
Core NGFW Features
Layer-8
Security
Firewall
Application
Filtering
Web & Content
Filtering
IPS VPN
Bandwidth
Management/QoS
On-appliance
reporting
Gateway Anti-Virus
Gateway Anti-Spam
(Inbound/outbound)
Wireless
Security
Web Application
Firewall
Support for
3G/4G/WiMAX
UTM Features
IPv6 Support
Multi-link
Management
www.cyberoam.com
Powerful Hardware
 Multicore Gigahertz processors for
Nano second security processing
 Gigabit Ports to integrate with Gigabit
network
Cyberoam Architecture
Intelligent Firmware
 Tight integration with
Hardware
 Network & Crypto
Acceleration
www.cyberoam.com
High Performance Security Appliances
Bringing Gigabit Firewall
throughputs within the reach of
small offices and branch offices
Top model CR2500iNG-XP offers
Firewall Throughput: 160 Gbps
NGFW Throughput: 10 Gbps
www.cyberoam.com
Cyberoam's Layer 8 Technology
treats “User Identity” as the
8th Layer in the protocol stack
Cyberoam network security appliances
offer security across Layer 2-Layer 8
using Identity-based policies
Cyberoam Innovation: Layer 8 Security
www.cyberoam.com
AAA over single Cyberoam appliance
Cyberoam
Audits
• Identity–based
Logs + Reports
• Compliance
Reports
Cyberoam
Authorizes
• Internet surfing quota
• Schedule control
• Security Policies
• Web Filtering
• Application Visibility &
Control
• QoS / Bandwidth
Management
• IM Controls
Cyberoam
Authenticates
• User Name
• IP Address
• MAC Id
• Session Id
Users
Customers
Employees
Management
Partners
Identity-based AAA
Control user network activities
• Who can connect to the network
• Who can access what
• What have they accessed
Ability to track the user activities;
identify attackers /victims
Take quick network security
decisions
www.cyberoam.com
Internet
Corporate LAN
DHCP
Administrator
Identity-based Security
192.168.3.110
Ancy
192.168.3.105
Richard
192.168.3.110
Ancy Logged out
 Applies security policies based on actual
identity of users.
 User-specific rules for multiple users to share
a common IP address
192.168.3.110
Steve
www.cyberoam.com
Application of Layer 8 Technology
Layer 8 security
Authentication
API
Port-based
Authentication
(802.1x)
Two Factor
Authentication
NTLM
VPN
BYOD Clients
- iOS, Android
Thin Client
www.cyberoam.com
Providing insights into BYOD buildup
Device usage visibility
Identify & flag BYOD
users
Enhancing BYOD
experience with Clients
www.cyberoam.com
Application Visibility & Control
Industry leading coverage for
Visibility & Control over 2200+
key applications
www.cyberoam.com
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Technology
Browser Based
Client Server
Network Protocol
P2P
Simple yet Powerful Granular Application Controls
Category
File Transfer
Gaming
General Internet
Instant Messenger
Infrastructure
Network Services
P2P
Proxy and Tunnel
Remote Access
Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more…
Eliminates the need for manual intervention by administrators to update policies for new
applications added to the list
Control over combination of
Bandwidth Time
User or
User Group
Application or
Application Category
In-House Security Capabilities
Faster turnaround time
e.g Adding application signatures for new applications and dynamic apps
designed to work around network like UltraSurf.
www.cyberoam.com
Blocked
Websites
HTTP
/HTTPS
Website
HTTP /
HTTPS
Web & Content Filtering
Allowed
Websites
HTTP/
HTTPS
Web
2.0
Web
2.0
Google
cache
pages
Google
cache
pages
Embedded
URLs
Embedded
URLs
Malware
hosting
sites
Malware
hosting
sites
Industry’s most comprehensive URL database
100 million+ URLs in 89+ categories
Controls access to HTTP/HTTPS websites
Blocks Google Cache pages
Blocks Embedded URLs
Detects & Blocks Third Party Proxy and Tunneling sites
Filters Web 2.0 content
Web
2.0
Blocks Malware hosting sites
Proxy
&
Tunneling
sites
Proxy
&
Tunneling
sites
Internet
Control over combination of
Bandwidth Time
User or
User Group
Website category
www.cyberoam.com
 1200+ reports
- Real time visibility into user and network
activities
 Helps with Security & Compliance
Management, Forensic Analysis
 Traffic Discovery
- Real-time visibility into bandwidth
utilization by user, protocol, application
Best-in-class on-appliance Reporting
Application Reports
Compliance Reports Interactive World Traffic Map
www.cyberoam.com
Layer-8 User-based Reports
www.cyberoam.com
Layer-8 User-based Reports
www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
www.cyberoam.com
User Threat Quotient (UTQ) Report: Spot risky users at a glance
User: jenny.lewis
Relative Threat Score: 20.1
Relative Risk Ranking: 1
www.cyberoam.com
Traffic Discovery
www.cyberoam.com
Stateful Inspection Firewall
 Unified Security
 Application Firewall
 Identity-based Firewall
 Layer 8 Geo-based Traffic Control
- Control incoming/outgoing traffic from/to
a specific country
 FastPath Technology
- To improve processing speed and reduce
CPU overhead
Security
Policies
Connectivity
Policies
Productivity
Policies
Firewall Rule
Unified Security
 Rules for all security features
from firewall page
 Easy navigation and increased
administrative productivity
www.cyberoam.com
Configure rules for all features from Firewall page
Identity
Security
Productivity
Connectivity
+
+
+
www.cyberoam.com
 Support for IPSec, L2TP, PPTP,
SSL VPN
 Threat Free Tunneling (TFT)
Technology
Supported VPN Clients
 MacOS
 iOS
 Android Devices
IPSec VPN
L2TP VPN
PPTP VPN
iOS
L2TP VPN
Android
Virtual Private Network (VPN)
SSL VPN
-Client-based &
Client less
-License free
- Scans VPN traffic for Malware, Spam,
Inappropriate content, Intrusion attempts
 Advanced features for business continuity
- MPLS failover to VPN
- VPN failover
Embrace BYOD with mobile VPN
clients
www.cyberoam.com
Intrusion Prevention System (IPS)
 Many SOHO/SMBs struggle with IPS
- What to allow or deny?
- Which IPS policy applies?
 Ready to use IPS Policy templates with Firewall Rule style naming convention
 Customizable security for Enterprise IT Pros
www.cyberoam.com
Intrusion Prevention System
- Layer 8 and IPS Tuner driven
- Identity-based IPS policies per user, group and
IP address
- Allows multiple IPS policies
- Identity-based alerts & reports
- 4500+ signatures – broadest security cover
Anti-Spam (Inbound/Outbound)
- Three level scanning:
 IP Reputation filtering
 Real-time Blackhole List (RBL)
 Recurrent Pattern Detection (RPDTM) technology
- ~99% spam detection
- Self-service Quarantine and Spam Digest
- Scans SMTP, POP3, IMAP traffic
- Virus outbreak detection for zero-hour protection
DoS & DDoS Protection
- Packet Rate Limit
- Protection against flood attacks
- SYN Flood
- TCP Flood
- UDP Flood
- ICMP Flood
- IPS Signature to prevent attacks
- Protocol Anomaly
Gateway Anti-Virus, Anti- spyware
- Bi-directional scanning: Web & Email
- Self-service Virus Quarantine
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and
IM traffic
- Instant visibility into Attacker/Victim
Continuously updated via
Cyberoam Security Center
Threat Protection Features
Cyberoam
Security Center
www.cyberoam.com
 Create a bandwidth policy on a combination of
- User or User Group /Department
- Application or Application Category
- Web category
- Allows great flexibility and real L2-L8 visibility and control
 Bandwidth sharing with priority
 Schedule-based bandwidth allocation
Best of Breed Bandwidth Management / QoS
Burstable bandwidth
• Share the unutilized bandwidth
Committed bandwidth
• Allocate dedicated bandwidth
CEO Manager ERP System
5 mbps 2 mbps 8 mbps
Manager
2mbps
Employee 2
2mbps
Employee 1
2mbps
Employee 2
3mbps
Employee 1
3mbps
Marketing
Group
6mbps
When user
is not
connected
www.cyberoam.com
 Firewalls/IPS cannot protect a web application from unknown threats
On-appliance Web Application Firewall (WAF)
Traditional
Firewall
Web &
Application
Server
Database
Server
Organization's IT network
Unauthorized
access blocked
Cost Effective
No need to buy dedicated hardware
WAF
Easy to deploy
Does not require any changes in
setup
Cyberoam’s on-appliance WAF
protection
Cyberoam’s on-appliance WAF
 Protects web-apps and web servers from
hackers
 Positive protection model and No Signature
Tables
 Intuitive website flow detector
Automatically adapts to website changes
 Protects against OWASP top 10 web-app
vulnerabilities
 SSL Offloading
 Monitoring & Reporting
www.cyberoam.com
 High Availability
- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime and ensures continuous network security
 Multiple Link Management with Automated Load Balancing
- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
 Layer 8 Policy-based Routing
- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications
Business Continuity Features
ISP2
(5 mbps)
Sales
Dept.
Dev.
Dept.
Finance
Dept.
ISP1
(10 mbps)
MPLS
ISP3 (3G)
(3 mbps)
Failover LinkOrganization's IT network
www.cyberoam.com
 User Authentication API for Hotspots
- Re-use Hotspot Authentication; avoid multiple logins
 Seamless Single Sign-on for Enterprises
- 3rd Party authentication solutions can be integrated with Cyberoam
 Manage Cyberoam with 3rd party policy management systems
Cyberoam API
www.cyberoam.com
 Prevent the risk of IT administrator from misusing privilege of tracking user activities
 2 people: Authorizer and Administrator
- Authorizer consent required for the Administrator to view user-specific activities
Safeguard user privacy – 4-Eye Authentication
www.cyberoam.com
FleXi Ports for flexible network connectivity
Combination of Fixed Ports
and Flexible Ports
Flexibility to choose Copper,
Fiber 1GbE / 10GbE modules
Modules can be purchased
individually as per need
Fixed Copper GbE Ports
www.cyberoam.com
Organizations cannot afford to compromise on any of these.
The right SCP balance is essential!
Cyberoam features assure Security, Connectivity, Productivity
www.cyberoam.com
Web
Support
Chat
Support
Email
Support
Phone
Support
Customer Support System
• Appliance Registration and Upgrade
• Subscribe security features
• Create support tickets
• Request RMA
• Support available across all time zones
• Global Support Excellence - ITIL compliance
(ISO 20000)
Knowledge
base
www.cyberoam.com
Web
Support
Chat
Support
Email
Support
Partner Support System
• Ordering & Inventory management
• Sales & Marketing tools &
resources
• Presales Support
• Track Appliance/Subscription
Knowledge
base
Region specific dedicated Technical Account
Managers (TAM)
www.cyberoam.com
Cyberoam Network Security Appliance Product Range
Hardware appliances
UTM, Next Generation Firewall
Virtual security appliances
CRiV-1C, CRiV-2C, CRiV-4C,
CRiV-8C, CRiV-12C
NGFW for Large Enterprises
CR2500iNG-XP
CR1500iNG-XP, CR1000iNG-XP
CR750iNG-XP, CR500iNG-XP
UTM for Small and Medium Enterprises
CR300iNG-XP, CR200iNG-XP
CR300iNG, CR200iNG,
CR100iNG, CR50iNG
UTM for Small and Remote Offices
CR35wiNG, CR35iNG,
CR25wiNG, CR25iNG,
CR15wiNG, CR15iNG, CR10iNG
www.cyberoam.com
Centralized Management & Monitoring
Cyberoam Central Console (CCC)
 Centralized security management & monitoring
of Cyberoam network security devices
 Manage up to 5 CR security appliances for
FREE using CCC virtual appliances
 Cloud CCC (CCMS – Cyberoam’s on-Cloud
Management Service) available to partners for
FREE
Cyberoam iView (Centralized logging & reporting)
 Log & reports activities from
̶ Multiple Cyberoam UTM /NGFW devices
̶ Other devices/vendors : Endpoint Systems,
other Firewalls, Routers and more
 Open Source Software available for FREE
 1200+ reports facilitate Log Management,
Security, Compliance and Forensics
Available as Hardware, Virtual & Cloud forms
Available as
www.cyberoam.com
Cyberoam Threat Research Labs (CTRL)
Identify emerging
threats and zero-day
vulnerabilities
Post vulnerabilities
to global bodies
In-house security
capabilities for IPS,
Application Control,
Web & Content Filtering
www.cyberoam.com
Product Certifications
ICSA Certified
High-Availability
ICSA Certified Firewall
VPNC Certified for Basic VPN &
AES Interoperability
UTM Level 5:
Cyberoam holds a unique &
complete UTM certification
Anti-SpywareAnti-VirusFirewall VPN
IPS/IDPAnti-Spam URL Filtering
www.cyberoam.com
Recognized as ‘Visionary’ in the Gartner UTM MQ
2009 2010 2012 2013
2014
Magic Quadrant for Unified
Threat Management
www.cyberoam.com
Pre-sales support
- Enterprise Security
planning services
- Migration assistance for
implementation
Training &
Certification
- Equip IT Managers and
security engineers to
proficiently manage
organization’s security
Post-sales support
- World’s only network security vendor
to have ISO 20000 certified (ITIL
Compliance) Global Support
- Multi-mode support through chat,
phone, email
Cyberoam - A complete Security solution provider
www.cyberoam.com
Education Pharma & Healthcare Telecom & ISP
GovernmentBFSI Manufacturing
Clientele Worldwide
www.cyberoam.com
Hotels Retail & Services
Others
IT/BPO & Media
Clientele Worldwide
www.cyberoam.com
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
Cyberoam Live Demo
Get a 30 day FREE Evaluation of
Cyberoam Virtual appliance
www.cyberoam.com
Thank you
Call us on +91 120 6498887 or Email: sales@itmonteur.net

More Related Content

What's hot

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
saloni mittal
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless network
AnzaDar3
 
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
Priyanka Aash
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 
Wireshark
WiresharkWireshark
Wireshark
Alanoud Alqoufi
 
IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
Wireshark
WiresharkWireshark
Wireshark
Sourav Roy
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
IOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptxIOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptx
Ismail Bajarla
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
Simplilearn
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
Coursenvy.com
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
KAMALI PRIYA P
 
MQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of ThingsMQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of Things
Bryan Boyd
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
Jim Gilsinn
 

What's hot (20)

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless network
 
Wireshark
Wireshark Wireshark
Wireshark
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
Firewalls
FirewallsFirewalls
Firewalls
 
Wireshark
WiresharkWireshark
Wireshark
 
IoT security
IoT securityIoT security
IoT security
 
Wireshark
WiresharkWireshark
Wireshark
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Firewall
FirewallFirewall
Firewall
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
IOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptxIOT COMMUNICATION PROTOCOLS.pptx
IOT COMMUNICATION PROTOCOLS.pptx
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
MQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of ThingsMQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of Things
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 

Viewers also liked

Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat ManagementVCW Security Ltd
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
Firewall
Firewall Firewall
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Introduction To Programming with Python-1
Introduction To Programming with Python-1Introduction To Programming with Python-1
Introduction To Programming with Python-1
Syed Farjad Zia Zaidi
 
Firewall
FirewallFirewall
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
Rodrigo Martini
 
Watch guard best in-class security
Watch guard best in-class securityWatch guard best in-class security
Watch guard best in-class securityPrime Infoserv
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-TechsheetBaqar Kazmi
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SWITCHPOINT NV/SA
 
Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)
Vitor Nakano
 
Firewall Presentation
Firewall PresentationFirewall Presentation
Firewall Presentation
Firewall Advertising
 
Red de redes
Red de redesRed de redes
Red de redes
victor jurado capitan
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Sophos
 
Substituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scriptsSubstituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scripts
The HDF-EOS Tools and Information Center
 
Logic Over Language
Logic Over LanguageLogic Over Language
Logic Over Language
Purple, Rock, Scissors
 

Viewers also liked (20)

Cyberoam Unified Threat Management
Cyberoam Unified Threat ManagementCyberoam Unified Threat Management
Cyberoam Unified Threat Management
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Introduction To Programming with Python-1
Introduction To Programming with Python-1Introduction To Programming with Python-1
Introduction To Programming with Python-1
 
Firewall
FirewallFirewall
Firewall
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Watch guard best in-class security
Watch guard best in-class securityWatch guard best in-class security
Watch guard best in-class security
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cyberoam-Techsheet
Cyberoam-TechsheetCyberoam-Techsheet
Cyberoam-Techsheet
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)
 
Firewall Presentation
Firewall PresentationFirewall Presentation
Firewall Presentation
 
Red de redes
Red de redesRed de redes
Red de redes
 
CCNSP
CCNSPCCNSP
CCNSP
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Substituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scriptsSubstituting HDF5 tools with Python/H5py scripts
Substituting HDF5 tools with Python/H5py scripts
 
Logic Over Language
Logic Over LanguageLogic Over Language
Logic Over Language
 

Similar to Cyberoam Firewall Presentation

Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
niravmahida
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
dragnetNZ
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
DeServ - Tecnologia e Servços
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
sharetech
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devices
ponealmickelson
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 

Similar to Cyberoam Firewall Presentation (20)

Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devices
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Product Overview Nov 2010 V1
Product Overview Nov 2010 V1Product Overview Nov 2010 V1
Product Overview Nov 2010 V1
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

Cyberoam Firewall Presentation

  • 1. www.cyberoam.com http://firewall.firm.in Cyberoam Next-Generation Security Presenter: IT Monteur Our Products Modem Router Integrated Security applianceNetwork Security Appliances - UTM, NGFW (Hardware & Virtual)
  • 2. www.cyberoam.com Technology Powerhouse 550+ Employees Sales, Distribution Channel and Customers across 125+ Countries Amongst the top 3 global players for network security features Patent-pending Identity-based Management Cyberoam Introduction
  • 3. www.cyberoam.com Cyberoam Product Line Network Security Centralized security Management Network Monitoring & Analysis Virtual CloudPhysical Cyberoam Central Console Cyberoam iView Cyberoam Next-Gen Firewall/ Unified Threat Management SOHO, HOME Cyberoam Central Console Cyberoam virtual Next-Gen Firewall/ Unified Threat Management Cyberoam iView software Cyberoam Security on Amazon Cloud (currently in Beta)
  • 4. www.cyberoam.com Network Security Appliances – UTM, NGFW (Hardware & Virtual)
  • 5. www.cyberoam.com Cyberoam Next-Generation Security Core NGFW Features Layer-8 Security Firewall Application Filtering Web & Content Filtering IPS VPN Bandwidth Management/QoS On-appliance reporting Gateway Anti-Virus Gateway Anti-Spam (Inbound/outbound) Wireless Security Web Application Firewall Support for 3G/4G/WiMAX UTM Features IPv6 Support Multi-link Management
  • 6. www.cyberoam.com Powerful Hardware  Multicore Gigahertz processors for Nano second security processing  Gigabit Ports to integrate with Gigabit network Cyberoam Architecture Intelligent Firmware  Tight integration with Hardware  Network & Crypto Acceleration
  • 7. www.cyberoam.com High Performance Security Appliances Bringing Gigabit Firewall throughputs within the reach of small offices and branch offices Top model CR2500iNG-XP offers Firewall Throughput: 160 Gbps NGFW Throughput: 10 Gbps
  • 8. www.cyberoam.com Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack Cyberoam network security appliances offer security across Layer 2-Layer 8 using Identity-based policies Cyberoam Innovation: Layer 8 Security
  • 9. www.cyberoam.com AAA over single Cyberoam appliance Cyberoam Audits • Identity–based Logs + Reports • Compliance Reports Cyberoam Authorizes • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls Cyberoam Authenticates • User Name • IP Address • MAC Id • Session Id Users Customers Employees Management Partners Identity-based AAA Control user network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions
  • 10. www.cyberoam.com Internet Corporate LAN DHCP Administrator Identity-based Security 192.168.3.110 Ancy 192.168.3.105 Richard 192.168.3.110 Ancy Logged out  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address 192.168.3.110 Steve
  • 11. www.cyberoam.com Application of Layer 8 Technology Layer 8 security Authentication API Port-based Authentication (802.1x) Two Factor Authentication NTLM VPN BYOD Clients - iOS, Android Thin Client
  • 12. www.cyberoam.com Providing insights into BYOD buildup Device usage visibility Identify & flag BYOD users Enhancing BYOD experience with Clients
  • 13. www.cyberoam.com Application Visibility & Control Industry leading coverage for Visibility & Control over 2200+ key applications
  • 14. www.cyberoam.com Risk Level Very Low (1) Low (2) Medium (3) High (4) Very High (5) Characteristics Excessive Bandwidth Prone to misuse Transfer files Tunnel other apps Widely used Loss of Productivity Can bypass firewall policy Technology Browser Based Client Server Network Protocol P2P Simple yet Powerful Granular Application Controls Category File Transfer Gaming General Internet Instant Messenger Infrastructure Network Services P2P Proxy and Tunnel Remote Access Streaming Media VoIP Mobile Applications Social Networking Web Mail And more… Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Control over combination of Bandwidth Time User or User Group Application or Application Category In-House Security Capabilities Faster turnaround time e.g Adding application signatures for new applications and dynamic apps designed to work around network like UltraSurf.
  • 15. www.cyberoam.com Blocked Websites HTTP /HTTPS Website HTTP / HTTPS Web & Content Filtering Allowed Websites HTTP/ HTTPS Web 2.0 Web 2.0 Google cache pages Google cache pages Embedded URLs Embedded URLs Malware hosting sites Malware hosting sites Industry’s most comprehensive URL database 100 million+ URLs in 89+ categories Controls access to HTTP/HTTPS websites Blocks Google Cache pages Blocks Embedded URLs Detects & Blocks Third Party Proxy and Tunneling sites Filters Web 2.0 content Web 2.0 Blocks Malware hosting sites Proxy & Tunneling sites Proxy & Tunneling sites Internet Control over combination of Bandwidth Time User or User Group Website category
  • 16. www.cyberoam.com  1200+ reports - Real time visibility into user and network activities  Helps with Security & Compliance Management, Forensic Analysis  Traffic Discovery - Real-time visibility into bandwidth utilization by user, protocol, application Best-in-class on-appliance Reporting Application Reports Compliance Reports Interactive World Traffic Map
  • 19. www.cyberoam.com Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard
  • 20. www.cyberoam.com Dual Dashboard – Traffic & Security Dashboard Traffic Dashboard
  • 21. www.cyberoam.com User Threat Quotient (UTQ) Report: Spot risky users at a glance User: jenny.lewis Relative Threat Score: 20.1 Relative Risk Ranking: 1
  • 23. www.cyberoam.com Stateful Inspection Firewall  Unified Security  Application Firewall  Identity-based Firewall  Layer 8 Geo-based Traffic Control - Control incoming/outgoing traffic from/to a specific country  FastPath Technology - To improve processing speed and reduce CPU overhead Security Policies Connectivity Policies Productivity Policies Firewall Rule Unified Security  Rules for all security features from firewall page  Easy navigation and increased administrative productivity
  • 24. www.cyberoam.com Configure rules for all features from Firewall page Identity Security Productivity Connectivity + + +
  • 25. www.cyberoam.com  Support for IPSec, L2TP, PPTP, SSL VPN  Threat Free Tunneling (TFT) Technology Supported VPN Clients  MacOS  iOS  Android Devices IPSec VPN L2TP VPN PPTP VPN iOS L2TP VPN Android Virtual Private Network (VPN) SSL VPN -Client-based & Client less -License free - Scans VPN traffic for Malware, Spam, Inappropriate content, Intrusion attempts  Advanced features for business continuity - MPLS failover to VPN - VPN failover Embrace BYOD with mobile VPN clients
  • 26. www.cyberoam.com Intrusion Prevention System (IPS)  Many SOHO/SMBs struggle with IPS - What to allow or deny? - Which IPS policy applies?  Ready to use IPS Policy templates with Firewall Rule style naming convention  Customizable security for Enterprise IT Pros
  • 27. www.cyberoam.com Intrusion Prevention System - Layer 8 and IPS Tuner driven - Identity-based IPS policies per user, group and IP address - Allows multiple IPS policies - Identity-based alerts & reports - 4500+ signatures – broadest security cover Anti-Spam (Inbound/Outbound) - Three level scanning:  IP Reputation filtering  Real-time Blackhole List (RBL)  Recurrent Pattern Detection (RPDTM) technology - ~99% spam detection - Self-service Quarantine and Spam Digest - Scans SMTP, POP3, IMAP traffic - Virus outbreak detection for zero-hour protection DoS & DDoS Protection - Packet Rate Limit - Protection against flood attacks - SYN Flood - TCP Flood - UDP Flood - ICMP Flood - IPS Signature to prevent attacks - Protocol Anomaly Gateway Anti-Virus, Anti- spyware - Bi-directional scanning: Web & Email - Self-service Virus Quarantine - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic - Instant visibility into Attacker/Victim Continuously updated via Cyberoam Security Center Threat Protection Features Cyberoam Security Center
  • 28. www.cyberoam.com  Create a bandwidth policy on a combination of - User or User Group /Department - Application or Application Category - Web category - Allows great flexibility and real L2-L8 visibility and control  Bandwidth sharing with priority  Schedule-based bandwidth allocation Best of Breed Bandwidth Management / QoS Burstable bandwidth • Share the unutilized bandwidth Committed bandwidth • Allocate dedicated bandwidth CEO Manager ERP System 5 mbps 2 mbps 8 mbps Manager 2mbps Employee 2 2mbps Employee 1 2mbps Employee 2 3mbps Employee 1 3mbps Marketing Group 6mbps When user is not connected
  • 29. www.cyberoam.com  Firewalls/IPS cannot protect a web application from unknown threats On-appliance Web Application Firewall (WAF) Traditional Firewall Web & Application Server Database Server Organization's IT network Unauthorized access blocked Cost Effective No need to buy dedicated hardware WAF Easy to deploy Does not require any changes in setup Cyberoam’s on-appliance WAF protection Cyberoam’s on-appliance WAF  Protects web-apps and web servers from hackers  Positive protection model and No Signature Tables  Intuitive website flow detector Automatically adapts to website changes  Protects against OWASP top 10 web-app vulnerabilities  SSL Offloading  Monitoring & Reporting
  • 30. www.cyberoam.com  High Availability - Active-Active & Active-Passive - Reduces single-point-of-failure - Maximizes network uptime and ensures continuous network security  Multiple Link Management with Automated Load Balancing - Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover conditions - Active-Active and Active-Passive Auto Link Failover - Gateway failover over VPN  Layer 8 Policy-based Routing - Routes traffic based on Source IP addresses, Protocols & Users - Assures QoS for key users and applications Business Continuity Features ISP2 (5 mbps) Sales Dept. Dev. Dept. Finance Dept. ISP1 (10 mbps) MPLS ISP3 (3G) (3 mbps) Failover LinkOrganization's IT network
  • 31. www.cyberoam.com  User Authentication API for Hotspots - Re-use Hotspot Authentication; avoid multiple logins  Seamless Single Sign-on for Enterprises - 3rd Party authentication solutions can be integrated with Cyberoam  Manage Cyberoam with 3rd party policy management systems Cyberoam API
  • 32. www.cyberoam.com  Prevent the risk of IT administrator from misusing privilege of tracking user activities  2 people: Authorizer and Administrator - Authorizer consent required for the Administrator to view user-specific activities Safeguard user privacy – 4-Eye Authentication
  • 33. www.cyberoam.com FleXi Ports for flexible network connectivity Combination of Fixed Ports and Flexible Ports Flexibility to choose Copper, Fiber 1GbE / 10GbE modules Modules can be purchased individually as per need Fixed Copper GbE Ports
  • 34. www.cyberoam.com Organizations cannot afford to compromise on any of these. The right SCP balance is essential! Cyberoam features assure Security, Connectivity, Productivity
  • 35. www.cyberoam.com Web Support Chat Support Email Support Phone Support Customer Support System • Appliance Registration and Upgrade • Subscribe security features • Create support tickets • Request RMA • Support available across all time zones • Global Support Excellence - ITIL compliance (ISO 20000) Knowledge base
  • 36. www.cyberoam.com Web Support Chat Support Email Support Partner Support System • Ordering & Inventory management • Sales & Marketing tools & resources • Presales Support • Track Appliance/Subscription Knowledge base Region specific dedicated Technical Account Managers (TAM)
  • 37. www.cyberoam.com Cyberoam Network Security Appliance Product Range Hardware appliances UTM, Next Generation Firewall Virtual security appliances CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C NGFW for Large Enterprises CR2500iNG-XP CR1500iNG-XP, CR1000iNG-XP CR750iNG-XP, CR500iNG-XP UTM for Small and Medium Enterprises CR300iNG-XP, CR200iNG-XP CR300iNG, CR200iNG, CR100iNG, CR50iNG UTM for Small and Remote Offices CR35wiNG, CR35iNG, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG, CR10iNG
  • 38. www.cyberoam.com Centralized Management & Monitoring Cyberoam Central Console (CCC)  Centralized security management & monitoring of Cyberoam network security devices  Manage up to 5 CR security appliances for FREE using CCC virtual appliances  Cloud CCC (CCMS – Cyberoam’s on-Cloud Management Service) available to partners for FREE Cyberoam iView (Centralized logging & reporting)  Log & reports activities from ̶ Multiple Cyberoam UTM /NGFW devices ̶ Other devices/vendors : Endpoint Systems, other Firewalls, Routers and more  Open Source Software available for FREE  1200+ reports facilitate Log Management, Security, Compliance and Forensics Available as Hardware, Virtual & Cloud forms Available as
  • 39. www.cyberoam.com Cyberoam Threat Research Labs (CTRL) Identify emerging threats and zero-day vulnerabilities Post vulnerabilities to global bodies In-house security capabilities for IPS, Application Control, Web & Content Filtering
  • 40. www.cyberoam.com Product Certifications ICSA Certified High-Availability ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability UTM Level 5: Cyberoam holds a unique & complete UTM certification Anti-SpywareAnti-VirusFirewall VPN IPS/IDPAnti-Spam URL Filtering
  • 41. www.cyberoam.com Recognized as ‘Visionary’ in the Gartner UTM MQ 2009 2010 2012 2013 2014 Magic Quadrant for Unified Threat Management
  • 42. www.cyberoam.com Pre-sales support - Enterprise Security planning services - Migration assistance for implementation Training & Certification - Equip IT Managers and security engineers to proficiently manage organization’s security Post-sales support - World’s only network security vendor to have ISO 20000 certified (ITIL Compliance) Global Support - Multi-mode support through chat, phone, email Cyberoam - A complete Security solution provider
  • 43. www.cyberoam.com Education Pharma & Healthcare Telecom & ISP GovernmentBFSI Manufacturing Clientele Worldwide
  • 44. www.cyberoam.com Hotels Retail & Services Others IT/BPO & Media Clientele Worldwide
  • 45. www.cyberoam.com Link: http://demo.cyberoam.com Credentials: guest /guest Cyberoam Live Demo Get a 30 day FREE Evaluation of Cyberoam Virtual appliance
  • 46. www.cyberoam.com Thank you Call us on +91 120 6498887 or Email: sales@itmonteur.net