Presentazione prodotti Cyberoam

986 views

Published on

astato,checkpoint,cisco,cisco asa,cyberoam,firewall,firewall utm,firewall verona,firewall vicenza,fortigate,fortinet,juniper,juniper networks,sicurezza gestita,sicurezza informatica

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Per maggiori informazioni: http://www.teamsistemi.com/soluzioni/sicurezza-informatica/firewall-e-appliance-cyberoam.html

    Contattateci al Numero Verde gratuito 800-011630 oppure scriveteci a info@teamsistemi.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
986
On SlideShare
0
From Embeds
0
Number of Embeds
217
Actions
Shares
0
Downloads
23
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Presentazione prodotti Cyberoam

  1. 1. Comprehensive Network Security CYBEROAM Firewall UTM di Nuova GenerazioneOur Products Cyberoam – Endpoint Data Protection Data Protection & Encryption Application Control Device Management Asset ManagementUnified Threat Management Cyberoam Central Console (CCC) SSL VPNwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  2. 2. Comprehensive Network Security Cyberoam Unified Threat Management §  Gateway con funzionalità di sicurezza integrate in una singola piattaforma §  Approccio unico ed innovativo Identity-based Layer 8 presente su ogni modulo di sicurezzawww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  3. 3. Comprehensive Network SecurityLA DOMANDA DA PORRE:Come identificare l’utente e garantire l’accesso?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  4. 4. Comprehensive Network SecurityCome identificare l’utente e garantire l’accesso? §  “certi impiegati utilizzano I loro dispositivi mobili come l’Iphone & Blackberry per accedere alle risorse aziendali. Altri lavorano da casa.” §  “la nostra rete lavora con Citrix e vorremmo bloccare certi utenti per non fargli raggiungere determinate applicazioni ed applicare delle policy uniche sulla rete.” §  “come posso creare privilegi speciali per il reparto IT per consentirgli l’accesso solo a specifici server/applicazioni nella mia zona DMZ?” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  5. 5. Comprehensive Network SecurityCome identificare l’utente e garantire l’accesso? §  “come posso ottenere le informazioni su quali utenti accedono alla rete, quando e quali risorse raggiungono e da quale network si collegano (casa, ufficio)” §  “come posso ottenere AAA (Authenticate, Authorize e Audit) tramite un singolo apparato di sicurezza.” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  6. 6. Comprehensive Network SecuritySOLUZIONE – Cyberoam Identity Based Firewall UTM §  Cyberoam caratteristiche: §  Stateful Inspection Firewall §  Application based Firewall §  Identity based Firewall §  L’amministratore può definire delle policy basate su Username o IP Addresses e seguire l’utente ovunque si muova §  L’amministratore può definire le policy con username, IP address, MAC e session id (per Windows Terminal Server e Citrix) Terminal Server XenServerwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  7. 7. Comprehensive Network Securitywww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  8. 8. Comprehensive Network Security LA DOMANDA DA PORRE: Come fornire accesso privilegiato agli utenti?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  9. 9. Comprehensive Network SecurityCome attivare policy differenti per differenti utenti e ruoli? §  “politiche orizzontali per tutti i reparti non sono più funzionali.” §  “è necessario che le risorse umane abbiano accesso ai siti categorizzati come Job & Recruitment website.” §  “vorrei applicare una quota massima di download giornaliero ad una categoria di utenti.” §  “vorrei bloccare certi website per uno specifico gruppo di utenti. Anche se questi sono in HTTPS” §  “voglio consentire l’utilizzo di IM al nostro Management & Sales Team” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  10. 10. Comprehensive Network SecurityCome attivare policy differenti per differenti utenti e ruoli? §  “come posso autorizzare l’accesso a FACEBOOK a specifici utenti solo per un’ora al giorno nella pausa pranzo?” §  “come posso gestire l’accesso ai social network limitando la banda a disposizione a 2kbps in modo da non compromettere le attività business ed allo stesso tempo scoraggiare l’uso di questi siti?” §  “come posso bloccare l’uso di applicazioni P2P, Proxy ed applicazioni tipo Ultrasurf?” §  “come posso monitorare e registrare I log del data transfer via HTTPS?” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  11. 11. Comprehensive Network SecuritySOLUZIONE: WEB CONTENT & APPLICATION FILTER §  Blocco, Controllo & Monitor dell’accesso a internet ed alle applicazioni. Premium §  oltre 44 milioni website in 82+ categorie §  Blocca ed ispeziona §  HTTPS website §  Google Cached page §  Tutti i proxy conosciuti come Ultrasurf etc. §  Educa ad un sano uso delle risorse grazie alla possibilità di personalizzare i messaggi di accesso negato ai website.www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  12. 12. Comprehensive Network SecurityCONTROLLO COMPLETO CONUSER IDENTITYwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  13. 13. Comprehensive Network SecuritySOLUZIONE: APPLICATION CONTROL Blocca  oltre  5000+  Applicazioni   Username  /  IP  Address  www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  14. 14. Comprehensive Network SecuritySOLUZIONE: IM GESTIONE & CONTROLLO §  Log & Monitor dei maggiori sistemi di Instant Messenger §  Yahoo, §  Windows Live §  Filtra i conteuti su IM: Blacklist di certe keywords o frasi §  Blocca il trasferimento di file via IMwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  15. 15. Comprehensive Network SecurityIM Controlli per Yahoo MSG: Data Logging can chat(File Transfer Control) Who of Chat with whom! Leak Protection Conversations www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  16. 16. Comprehensive Network Security LA DOMANDA DA PORRE: Come puoi ottimizzare la disponibilita della rete e delle risorse?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  17. 17. Comprehensive Network SecurityCome ottimizzare la disponibilità di risorse e rete? §  “vorremmo assegnare una banda dedicata al nostro sistema VOIP/CRM/ERP” §  “devo garantire al mio CEO – dovunque si trovi – Wifi/Lan/remote office – una banda adeguata ed a lui riservata in ogni momento.” §  “vorrei assegnare un range di banda (128kbps – 1 Mbps) ad utenti e gruppi in modo da limitare l’utilizzo nei casi in cui ci siano molti utenti collegati e viceversa rendere disponibile banda quando questa non viene utilizzata da altri utenti.” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  18. 18. Comprehensive Network SecurityCome ottimizzare la disponibilità di risorse e rete? §  “come posso gestire una banda riservata alla video conferenza / sistema di Backup per solo 2 ore ed in specifiche date?” §  “ci interesserebbe assegnare delle priorità in base alle applicazioni. il CRM dovrebbe avere una priorità maggiore.” §  “come posso analizzare in real time quali applicazioni / utenti stanno utilizzando la banda?” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  19. 19. Comprehensive Network SecuritySOLUZIONE: BANDWIDTH MANAGEMENT §  Allocare/riservare banda per specifiche Applicazioni o utenti/gruppi §  Allocare/limitare banda in base alle categorie §  Pianificare l’allocazione/limitazione della banda su base temporale §  Allocare una banda dedicata o gestirla in base alla disponibilità della stessawww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  20. 20. Comprehensive Network Security You Tube Web mail IM Application ERP CRM Casual Traffic Sales force Bandwidth Management Application Firewall Crowd of Applicationswww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  21. 21. Comprehensive Network SecuritySOLUZIONE: TRAFFIC DISCOVERY §  Visibilità Real-time sull’uso della banda in base a: §  Utente §  Protocollo §  Applicazione §  Fornisce visibilità sull’uso improprio della banda e l’incidenza delle minaccewww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  22. 22. Comprehensive Network SecurityTraffic Discovery: Live Traffic Traffic Filtering by Firewall Rule-ID, IP Address, Port etc. Information Analysis including Bandwidth, Data Transfer Address Live traffic filtering by Application, User, IP Connection Filter traffic for specific application www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  23. 23. Comprehensive Network Security LA DOMANDA DA PORRE: Come garantire Business Continuity?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  24. 24. Comprehensive Network Security Come garantire Business Continuity? §  “l’accesso ad internet non dovrebbe intterompersi anche nel caso in cui una delle connessioni non funzioni” §  “vogliamo che il traffico del nostro ufficio amministrazione passi da un gateway diverso da quello standard” §  “come posso garantire che la mia connessione VPN sia sempre attiva - 100% uptime ?” §  “come posso utilizzare il mio modem 3G come back-up link e fare in modo che si attivi automaticamente quando l’ADSL non funziona?”www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  25. 25. Comprehensive Network Security SOLUZIONE: MULTIPLE LINK MANAGER§  Automatico Link Load balancing che assicura ROI §  Supporta più di 2 ISP link §  Supporta Wireless WAN (3G USB modem, Wimax)§  Link Failover§  Policy-based routing: Source IP/Users/Protocols§  VPN Failover§  High Availability §  Active Active §  Active Passivewww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  26. 26. Comprehensive Network SecurityAc2ve-­‐Ac2ve  gateway  load  balancing   ISP1 (MPLS) ISP2 (ADSL) ISP3 (3G) (10 mbps) (5 mbps) (1 mbps) Failover Link commerciali   IT  Staff   Amministrazione  www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  27. 27. Comprehensive Network Security LA DOMANDA DA PORRE: Come dare accesso remoto alla rete?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  28. 28. Comprehensive Network SecurityCome far accedere gli utenti remoti alla rete? §  “vorrei collegare tutte le filiali alla sede principale utilizzando connessioni sicure e che garantiscano zero downtime” §  “vorrei garantire ai nostri dipendenti accesso sicuro alle risorse interne utilizzando i loro smartphone iPhone” §  “vorrei limitare l’accesso dei telelavoratori a specifiche applicazioni” §  Come posso analizzare il traffico degli utenti remoti prima che si colleghino alla rete? www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  29. 29. Comprehensive Network SecuritySOLUZIONE: VIRTUAL PRIVATE NETWORK (VPN) §  Connessione stabile e sicura con le filiali §  Threat Free Tunneling (TFT) Technology §  Analizza il traffico in ingresso dai tunnel VPN per: §  Malware §  Spam §  Contenuti inappropriati §  Tentativi di intrusione §  Supporta §  IPSec, L2TP, PPTP technologies (client-based) §  SSL-VPN ablita l’accesso alle risorse interne da qualsiasi dispositivo (senza necessità di utilizzo di client)www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  30. 30. Comprehensive Network SecuritySSL VPN User Portal www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  31. 31. Comprehensive Network Security LA DOMANDA DA PORRE: Sono sufficienti i sistemi Desktop ANTI-VIRUS & ANTI-SPAM?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  32. 32. Comprehensive Network SecuritySono sufficienti i sistemi Desktop Anti-virus & Anti-spam? §  “vorrei ottimizzare l’uso della banda bloccando lo spam direttamente sul gateway” §  “vorrei offrire agli utenti la possibilità di rilasciare / inserire i loro messaggi dalla/nella quarantine area” §  “vorrei esaminare con l’anti virus anche il traffico dei website e delle applicazioni HTTPS” §  “Vorrei che il sistema firewall utilizzi un motore anti-virus efficace e sempre aggiornato per garantirci una protezione completa” §  “come posso creare delle regole Anti-Spam user-based? “ §  “come faccio ad essere SOX conforme?”www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  33. 33. Comprehensive Network SecuritySOLUZIONE: GATEWAY ANTI-MALWARE §  oltre 4 million+ signature §  Aggiornamento delle signature automatico ogni 30 min §  sistema anti-virus tra i migliori del mercato: Kaspersky Labs Anti-Virus §  Blocco degli allegati basandosi sull’estensione (*.exe, *.bat etc.) §  analisi §  HTTP, FTP, SMTP, POP3 §  HTTPS, IMAP Anti-Spyware §  Instant Messenger traffic www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  34. 34. Comprehensive Network SecuritySOLUZIONE : GATEWAY ANTI-SPAM §  Individua e blocca il 98% di tutti I messaggi spam §  Falso positivo: 1 in un milione Premium §  Tecnologia Recurrent Pattern Detection (RPD) tecnologia che blocca tutti I tipi di spam inclusi excel, pdf, multi-lingual spam etc. §  Self-Service Quarantine Area per gli utenti, che consente di verificare i messaggi messi in quarantena e ridurre gli sforzi dell’amministratore §  Gli utenti ricevono un report sullo spam giornaliero/ settimanale/mensile §  IP Reputation filtering: §  Stop dell’85% dello spam direttamente sul gateway prima che entri in azienda riducendo l’uso della banda e delle risorse www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  35. 35. Comprehensive Network SecurityCome posso proteggere la mia rete da attacchi esterni? §  “come posso proteggere la mia rete da attacchi DDOS & SQL Injection?” §  “posso bloccare una specifica applicazione per specifici utenti creando una una regola sul firewall?” §  “come faccio per essere avvisato immediatamente in caso di tentativo di attacco alla mia rete?” www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  36. 36. Comprehensive Network SecuritySOLUZIONE: INTRUSION PREVENTION SYSTEM (IPS) §  Oltre 3500+ signature per individuare e blocacre le intrusioni. §  Protezione completa contro attacchi DOS, DDOS, Syn Flood etc. §  Identity-based IPS policy per user o group §  Overview dello stato delle minacce: §  Top alerts, top attackers, top victims www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  37. 37. Comprehensive Network Security LA DOMANDA DA PORRE: Come ottenere una piena visibilità sulla rete?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  38. 38. Comprehensive Network SecurityHai una visibilità completa della tua rete? §  “come faccio ad identificare gli utenti più pericolosi o a rischio?” §  “chi riceve più spam?” §  “quali utenti stanno navigando in internet?” §  “voglio monitorare le conversazioni IM” §  “voglio monitorare I file che vengono trasferiti su internet” §  “voglio sapere quali ricerche vengono fatte in google”www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  39. 39. Comprehensive Network SecuritySOLUZIONE: ON-APPLIANCE REPORTING §  oltre1000+ report disponibili. Powered By: §  Nessun acquisto addizionale di hardware/service per avere dei report. §  Colleziona i log delle attività del network §  Conformità ai vari standard §  CIPA – Children’s Internet Protection Act §  HIPAA – Health Insurance Portability & Accountability Act §  GLBA – Gramm-Leach-Bliley Act §  SOX – Sarbanex-Oxley §  FISMA – Federal Information Security Management Act §  PCI – Payment Card Industry Data Security Standards www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  40. 40. Comprehensive Network SecurityUser Dashboard www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  41. 41. Comprehensive Network SecurityCombined Report www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  42. 42. Comprehensive Network SecurityTop Categories www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  43. 43. Comprehensive Network SecurityTop Web Users www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  44. 44. Comprehensive Network SecuritySearch Engine – Google Search Results www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  45. 45. Comprehensive Network SecurityTop Spam Recipients www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  46. 46. Comprehensive Network Security Cyberoam Layer 8 Vantaggi Other UTMs Cyberoam Cyberoam Cyberoam Authenticates Authorizes AuditsUser Login •  User •  Access Time •  Identity - based •  IP Address •  Internet Quota Logs + Reports •  MAC Id •  Security Policies •  Session Id •  Web Filtering •  Layer 7 Controls •  QoS •  IM Controls www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  47. 47. Comprehensive Network SecurityCyberoam UTM rispondealle necessità delle aziende www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  48. 48. Comprehensive Network Security Possibili implementazioniwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  49. 49. Comprehensive Network SecurityBRIDGE MODE Router Firewall INT IP: 192.168.0.1/24 Network:192.168.0.x/ 24 Default Gateway: 192.168.0.1 Users www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  50. 50. Comprehensive Network SecurityGATEWAY MODE Router IP:61.0.5.1/29 INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24 EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1 DMZ Zone Console Switch SwitchNetwork:192.168.0.x/24 Web Server Mail Server Database Server IP:172.16.1.2 IP:172.16.1.3 IP:172.16.1.4 Gateway: 172.16.1.1 Gateway: Gateway: 172.16.1.1 Users 172.16.1.1 Default Gateway: 192.168.0.1 www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  51. 51. Comprehensive Network Security OVERVIEW: CYBEROAM APPLIANCE RANGE & SUBSCRIPTION SERVICESwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  52. 52. Comprehensive Network SecurityCYBEROAM UTM APPLIANCE RANGE §  Large Enterprises -  CR 1500ia -  CR 1000ia -  CR 750ia -  CR 500ia §  Small to Medium Enterprises -  CR 300i -  CR 200i -  CR 100ia -  CR 50ia §  Remote Offices -  CR 35ia -  CR 25ia -  CR 15i -  CR 15wi www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  53. 53. Comprehensive Network SecuritySUBSCRIPTION MODEL Basic Appliance Bundled Subscriptions§  Identity-based Firewall §  Gateway Anti-Virus Subscription§  VPN (Anti-malware, phishing, spyware protection§  Free SSL-VPN included)§  Bandwidth Management §  Gateway Anti-spam Subscription§  Multiple Link Management §  Web & Application Filtering Subscription§  On Appliance Reporting §  Intrusion Prevention System (IPS)§  Basic Anti-Spam (RBL Service) §  24 x 7 Tech Support & Warranty§  8x5 Tech Support & Warranty Subscription bundle Total Value Subscription (TVS) – Includes all the licenses Security Value Subscription (SVS) – Includes all licenses except Gateway level Antispam www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  54. 54. Comprehensive Network SecurityPRICING §  HARDWARE §  One Time Payment §  Need to renew 8x5 to get updates and keep the appliance under warranty §  SOFTWARE §  Yearly Renewal Required §  AV/AS/CF/IPS Database needs to update regularly to provide up-to-date protection www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  55. 55. Comprehensive Network Security Come scegliere il modello? USER MODEL MATRIX 2500 2250 Number of Users Supported 2000 1500 1500 1100 1000 750 500 450 300 50 75 150 25 25 40 0 0i 0i i ia ia ia wi i i a a a 5 00 00 0i 0i 0i 5 5 0 0 0 R1 5 R2 R3 R5 R2 R3 0 0 5 0 5 R1 R1 R5 R7 R1 R1 C C C C C C C C C C C C Appliance NamePlease Note: Chart is an approximation Only. Number of users may vary on the network load & configuration. www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  56. 56. Comprehensive Network SecurityOFFERTA SEMPLICE Descrizione List Price Qty Final Price (€) (€) Cyberoam 300i Appliance - Firewall, Bandwidth Management , Multiple Gateway & Load Balancing including 1 year of 8x5 Support & Warranty 3 Year Antivirus-Antispam for CR 300i 3 Year Web & Application Filtering for CR1500i 3 Year IPS for CR1500i 3 year TVS ( AV+AS+IPS+WAF with 8*5 support) 3 year SVS (AV+IPS+WAF with 8*5 support) Total www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  57. 57. Comprehensive Network SecurityIMPORTANTI RISORSE PER I PARTNER http://partner.cyberoam.com Partner Portal >> Knowledge-base www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  58. 58. Comprehensive Network SecurityIMPORTANTI RISORSE PER I PARTNER Stay updated with Cyberoam Newsletters http://www.cyberoam.com/newsletters.html www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  59. 59. Comprehensive Network SecurityIMPORTANTI RISORSE PER I PARTNER Register for Cyberoam Webinars Register for Cyberoam Cerfication http://training.cyberoam.com www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  60. 60. Comprehensive Network SecuritySUPPORTO DEDICATO AI PARTNER www.cyberoam.com/presalessupport/ §  Cyberoam Presales Consultants are available 24x7 for Channel Partners §  Dedicated Support §  Email §  Chat §  Telephone: Toll Free for some regions §  Presales Consultants help you with §  Installation Support, §  Network Consultation §  Documentation Support for Tenders/RFPs §  Feature Requests §  Training/Certification requests www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  61. 61. Comprehensive Network Security CYBEROAM CREDENTIALSwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  62. 62. Comprehensive Network Security Analysts Speak: “IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.” Source: Unified Threat Management Appliances and Identity- Based Security: The Next Level in Network Security, IDC Vendor Spotlightwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  63. 63. Comprehensive Network Security Gartner posiziona Cyberoam come “Visionary” nel Magic Quadrant di ottobre 2010Cyberoam si posiziona al 5 posto pronta a diventare leaderwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  64. 64. Comprehensive Network Security Cyberoam Certifications Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified ICSA Certified VPNC Certified for Basic VPN & AES Firewall High-Availability Interoperabilitywww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  65. 65. Comprehensive Network Security Cyberoam is IPV6 Certified§  IPv6 (Future Ready Connectivity) §  ‘IPv6 Ready’ gold logo -  Cyberoam identifies and processes IPv6 traffic §  Third-party validation -  International Testing Program with IPV4 3000+ rigorous test cases §  IPv6 compliance to become mandatory in government and other enterprises -  Driven by diplomatic initiatives www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  66. 66. Comprehensive Network Security SC Magazine Five Star Rating – Five Times in a Row! July 2010 – UTM Group Test Cyberoam CR50ia §  A Solid Product and the Price is Right §  CR50ia is more than a Usual UTM April 2009 – Product review Cyberoam CR200i §  A lot of functionality, including good integration support, in a single easy-to-use appliance” §  also includes a solid web content filter and blocking for applications such as IM and P2P“ December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ” March 2008 – UTM Roundup Cyberoam CR1000i §  “Fully loaded, with many great features” §  “packs a more serious punch” July 2007 – UTM Roundup Cyberoam CR250i §  “flexible and very powerful” §  “this appliance is a good value for almost any size environment”.www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  67. 67. Comprehensive Network Security AwardsZDNET Asia- IT Leader Winner 2008 – Best Of the Year 2008 Network Middle-East Awards 2010 Content Filtering Tomorrow’s Technology Today 2007Most Valued Principal Channels Favorite VARIndia Editor’s Choice SMB ProductChannelWorld Security Company for Best UTM (2007) of the Year (2008) Best Integrated Security Appliance Best Security Solution for EducationCR50ia (2010), Best Unified SecurityCR15i (2009) CR1500i (2009) CR50ia (2009) CR15i (2009) www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  68. 68. Comprehensive Network Security Partial Clientelewww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  69. 69. Comprehensive Network Security Partial Clientelewww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  70. 70. Comprehensive Network Security Product Line Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Cyberoam End Point Data Protectionwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  71. 71. Comprehensive Network Security ALCUNI CASE DI IMPLEMENTAZIONEwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  72. 72. Comprehensive Network Security Scenario 1 Una finanziaria con uffici in differenti città: 150 dipendenti §  Filiali da 15 dipendenti Necessità: §  Soluzioni di sicurezza per proteggere la rete §  Gestire centralmente tutti i report Quale soluzione corrisponde a queste necessità?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  73. 73. Comprehensive Network Security Scenario 1: La soluzione Sede principale CR200i §  AV & AS §  IPS per Mail Server §  Web & App Filter iView & CCC At Branch Offices §  CR15wiwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  74. 74. Comprehensive Network Security Scenario 2 Azienda commerciale §  Sede principale: 50 impiegati necessità: §  Garantire accesso remoto sicuro al loro CRM Quale soluzione corrisponde a questa necessità?www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  75. 75. Comprehensive Network Security Scenario 2: La soluzione Sede principale CR50ia §  SSL VPN §  CRM Access per gli utenti remotiwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  76. 76. Comprehensive Network Security Scenario 3 Università §  1500 Studenti che accedono ad internet §  2 ISP Link da 50 Mbps di banda necessità: §  Garantire accesso basandosi sul profuilo utente. §  Controllo per evitare l’accesso ai siti non desiderati ed a quelli che presentano un eccessivo consumo di banda §  Giochi §  Musica §  Youtube, Facebook §  P2P §  Load Balancing per i due link ed auto fail over. §  Lo staff riceve molto spam ed email infette. §  Il mail server viene inserito nei DB spammer per via delle attività anomale di alcuni PC studenti infettati da viruswww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  77. 77. Comprehensive Network Security Soluzione: Scenario 3 Università 2 x CR1500ia per HA §  1 link per i server §  2 link per Internet Browsing AV & AS per: §  Outgoing & Incoming Mail traffic CF per: §  Blocco di IM, P2P, Music etc.www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  78. 78. Comprehensive Network Security Scenario 4 A piccola azienda §  Sede principale: 50 dipendenti §  3 sedi remote: 15 dipendenti §  DSL Line su tutte le sedi necessità: §  Tutte le sedi necessitano di essere connesse in modo sicurowww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  79. 79. Comprehensive Network Security Soluzione Scenario 4 Tutte le sedi: Dynamic DNS Support Site-to-Site VPN CR15wi per gli uffici remoti e CR100ia per la sede principalewww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  80. 80. Comprehensive Network Security GRAZIE! Per maggiori informazioni: Oppure scrivici a info@teamsistemi.com. Ti invitiamo inoltre a visitare il nostro sito: www.teamsistemi.comwww.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

×