• No results found

Cyberoam Next-Generation Security for Enterprises

N/A
N/A
Protected

Academic year: 2021

Share "Cyberoam Next-Generation Security for Enterprises"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Cyberoam

Next-Generation Security

for

Enterprises

With organizations experiencing newer trends like high Internet speeds, virtualization, application explosion, increasing use of Web applications and BYOD, they ought to prepare for emerging security risks in their networks along with increasing concerns on insider threats, vanishing ‘trust boundaries’, compliance management and more. Growing businesses and rapidly expanding network horizons have lead to an increased demand for next-generation security, higher performance, easy security management and quick compliance, in enterprises. Cyberoam’s next-generation security caters to the security anxiety and demand for advanced network security in organizations today.

(2)

The Cyberoam Solution for Network Security

Cyberoam is an award-winning global IT security company with a presence in 125+ countries. With an array of globally acclaimed and certified products, Cyberoam offers reliable solutions for varied needs of SOHO/ROBO, SMBs and Enterprises, including network security, centralized security management and centralized visibility. Trusted by thousands of customers across the globe for its innovative products and technology, Cyberoam enjoys a proven track record of serving many well-known customers across various industries.

Cyberoam’s Security Product Portfolio:

L7 L8 L6 L5 L4 L3 L2 L1 Application Presentation Session Transport Network Data Link Physical USER 00-17-BB-8C-E3-E7 192.168.1.1 TCP, UDP L2TP, PPTP ASCII, EBCDIC, ICA

Cyberoam's treats

“User Identity” as the 8th Layer in the protocol stack

Layer 8 Technology

Cyberoam Next Generation Firewall (NGFW) offers security across Layer 2-Layer 8 using Identity-based policies

Network Security

Offers flexibility of hardware and virtual network security appliances for security in physical as well as virtual networks

Centralized Security Management

Allows enterprises/MSSPs to manage multiple, dispersed Cyberoam security installations across remote or branch offices

Cyberoam’s Layer 8 Technology treats User Identity as the 8th layer or the “human layer” in the network protocol stack. This allows organizations to uniquely identify users, control user activities in the network, and enable policy-setting and reporting by username, even in dynamic IP environments like DHCP and Wi-Fi. Cyberoam’s Layer 8 Technology adds speed to security in a network by offering instant visibility into the source of attacks by identifying victims/attackers by username, which allows proactive remediation of security incidents. With Layer 8 identification and controls, Cyberoam enables security management, data protection, forensic analysis and compliance management in organizations.

CYBEROAM’S LAYER 8 IDENTITY-BASED SECURITY

Centralized Visibility

Offers real-time visibility into user and network activities across the enterprise network

Training & Support

Enables faster resolution of issues with customer support and efficient deployment and

management of Cyberoam solutions with trainings

(3)

Cyberoam integrates multiple security features on a single appliance to offer comprehensive network security. Cyberoam security appliances work at the network gateway and protect networks against application threats, vulnerabilities in web applications, BYOD challenges, data leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and other evolving external threats. With the flexibility of hardware as well as virtual security appliances, Cyberoam protects both the physical and virtual organizational networks.

NETWORK SECURITY

Next-Generation security features on

Cyberoam network security appliances:

ŸStateful Inspection Firewall ŸApplication Visibility & Control ŸWeb Application Firewall ŸVPN (SSL VPN & IPSec) Ÿ Intrusion Prevention System Ÿ Anti-Virus & Anti-Spyware ŸAnti-Spam

ŸOutbound Spam Protection ŸWeb Filtering

ŸBandwidth Management Ÿ3G / 4G / WiMAX Connectivity * ŸIM Archiving & Controls ŸMultiple Link Management ŸOn-Appliance Reporting ŸIPv6 Ready ŸWi-Fi Appliances * ŸFleXi Ports *

* Features not available on virtual network security appliances

S e c u r i n g Y o u

Security

Connectivity

Productivity

Cyberoam network security appliances ensure Security, without compromising on the equally essential, Connectivity and Productivity. Organizations can achieve a balanced growth with a network security appliance that offers policy controls over its features to help achieve security, connectivity and productivity, without compromising any one of them. With such an ideal combination of best-of-breed assembly of features over a single interface, organisations get a complete networking solution in Cyberoam.

CYBEROAM SECURITY APPLIANCES ASSURE

KEY HIGHLIGHTS:

!

Sales, channel and customer presence across 125+ countries

!

Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group

!

450+ employees globally; Industry leading R&D

!

Patent-pending Identity-based Layer 8 Technology

!

Common Criteria EAL4+ certified security

!

Recognized as a ‘Network Security Innovator’ by SC Magazine

!

Recognized as ‘Visionary’ in Gartner’s UTM Magic Quadrant

st

!

World’s 1 network security and UTM vendor with ISO 20000:2011 certified Customer Support

Services

(4)

Cyberoam NG series – Future-ready Security

Ÿ Offers protection against newly evolving threats with Intrusion Prevention System, Gateway Anti-Virus/Anti-Spyware, Gateway Anti-Spam, offering security at par with best-of-breed solutions

Advanced Threat Protection [IPS, AV, AS]

Ÿ Patent-pending Layer 8 technology penetrates through all security modules of Cyberoam network security appliances, offering Identity-based controls over user authentication, service authorization and reporting (AAA)

Layer 8 Technology for Identity-based Security

The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with increasing number of users like customers and partners connecting to an office network from outside is leading to de-perimeterization of networks. Besides, trends like rise in number of network users and devices, application explosion, virtualization, increasing use of web applications and more are leading to loss of security controls for organizations over their networks.

Cyberoam offers future-ready security to SOHO/ROBO, SMEs and Enterprises with its NG Series network security appliances, available as Next-Generation Firewalls and UTMs. Cyberoam’s security appliances offer next-generation security features to help organizations secure their networks against risk emerging from adoption of IT trends.

Cyberoam NGFW Hardware Appliance Range:

CR NG Series

CR ia Series

500iNG-XP, 750iNG-XP, 2500iNG

500ia, 500ia-1F/10F/RP, 750ia, 750ia-1F/10F, 1000ia, 1000ia-10F, 1500ia, 1500ia-10F

Ÿ Industry-leading coverage for 2000+ key applications

Ÿ Prioritizes applications based on combination of User, Time, Applications and Bandwidth

Ÿ Granular application controls with classification based on risk level, characteristics, technology

Ÿ Pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications

Application Visibility & Control

Ÿ On-appliance reporting with real-time logs and reports, saving the cost of a dedicated reporting solution

Ÿ Offers 1200+ reports offer real-time visibility into user and network activities

Ÿ Helps organizations with security management, compliance management and forensic analysis

Ÿ One-click compliance reports on PCI DSS, HIPAA, SOX and more

On-appliance reporting

Cyberoam NGFWs with Layer 8 Identity-based technology

offer actionable intelligence and controls to enterprises that allow complete security control, over L2-L8 for their future-ready security. Cyberoam NGFW protection offers Layer 8 Identity-based security, Application visibility & control, IPS, VPN (IPSec and SSL), website filtering, and QoS. Based on the security needs, enterprise customers can avail additional security features like Web Application Firewall, Gateway Anti-Virus, Anti-Spam, and more.

Cyberoam offers the fastest UTM appliances for SOHO/SMB and Branch offices with comprehensive network security. Cyberoam NG series offers future-ready security through its enterprise-grade security features, gigabit ports and best-in-class hardware & software. Multiple security features integrated over a single, Layer 8 Identity-based platform making security simple, yet highly effective.

Next-Generation Firewalls (NGFW)

Unified Threat Management Appliances

Key Features

Cyberoam UTM Hardware Appliance Range:

CR NG Series

CR ia Series

15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG, 100iNG, 200iNG, 200iNG-XP, 300iNG, 300iNG-XP

(5)

Future-Ready Security.

Ÿ QoS/Bandwidth allocation to users, user groups, Applications, Website Categories and Firewall rules

Ÿ Prioritize business critical applications and users, ensuring assured QoS for business-critical applications like VoIP and CRM

Ÿ Option to commit bandwidth at all times or assign idle bandwidth automatically to other applications /users /website categories

QoS or Bandwidth management

Ÿ Ensures secure remote access with IPSec VPN, LT2P, PPTP and SSL VPN over its network security appliances

Ÿ Threat-free Tunneling technology scans traffic for malware, intrusion attempts

Ÿ Offers Mobile VPN clients for Android and iOS devices, simplifying communications

Ÿ Comprehensive URL database with 100 million URLs in 89+ categories

ŸCreate policy on a combination of user, website category, time and bandwidth

ŸBlocks harmful websites, preventing malware, phishing, pharming attacks and enhances productivity by limiting access to unproductive content

VPN

Web filtering

Ÿ Available as an on-appliance subscription module

Ÿ Protects websites and web-based applications against OWASP Top 10 web application attacks like SQL injection, cross-site scripting (XSS), URL parameter tampering, and more

Ÿ Follows a positive security model through Intuitive Website Flow Detector - automatically identifies and blocks all application layer attacks without relying on signature tables or pattern-matching techniques

Web Application Firewall (WAF)

Extensible Security Architecture (ESA)

Cyberoam’s Extensible Security Architecture helps organizations tackle unknown threats of the future by offering the agility to prolong the life and performance of its security appliances to support newer security features and enhancements.

Scalability

Besides the Extensible Security Architecture that supports future security needs without the need to change the appliance, organizations can add another appliance in cluster/HA to support more number of users.

Flexibility

The FleXi Ports available in the FleXi Port (XP) security appliances, offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing organizations to upgrade to new technologies easily and cost-effectively, making them future-ready.

High Performance Security Appliances

Cyberoam offers high performance for enterprises with its powerful hardware appliances and CybeoamOS that has the ability to extract highest level of performance from a multi-core platform and tightly integrates with the hardware for network and crypto acceleration.

Cyberoam offers the “fastest UTM appliances” for SOHO/ SMB segments.With the entry-level NG series appliance starting with gigabit firewall throughputs, organizations get assured high performance security, even for small and branch offices.

Actionable Intelligence & Controls

Cyberoam’s Human Layer 8 acts like a standard abstract layer, which binds with the existing Layers 2-7, enabling enterprises to regain lost security controls and put security checks where they want to from L2-L8, along with complete visibility into user and network activities.

OS

Intelligent Firmware - CyberoamOS

Integrated seamlessly with the hardware, for network and crypto acceleration, CyberoamOS extracts the highest level of performance from a multi-core platform and offers minimum latency. It comes with Next-Generation security features to protect against newly evolving threats.

(6)

Cyberoam virtual network security appliance range:

CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C

Cyberoam virtual security appliances offer:

1. Security for virtualized networks by scanning traffic within virtual networks; protecting hypervisor management console, hypervisor and Guest OS; and securing zero trust networks.

2. Comprehensive network security with multiple security features, in a single virtual appliance that makes virtual environments as secure as the physical infrastructure.

3. Ease of deployment and upgrade.

4. One-click compliance reports and logging/reporting that helps in compliance management.

5. Centralized Security Management of branch offices using physical/virtual network security appliances over a single interface of Cyberoam Central Console (CCC), available in both virtual and hardware forms.

6. Centralized Visibility into network and user activities with logging and reporting offered by Cyberoam iView software.

7. Complete virtual security solution with Cyberoam’s virtual network security appliances, virtual CCC, and Cyberoam iView software for centralized logging and reporting.

Cyberoam virtual security appliances support multiple virtualization platforms like VMware and Hyper-V.

Virtual Security

Cyberoam virtual network security appliances are designed to address the security needs for virtualised environments like virtual data-centers, ‘Security-in-a-Box’ set-up for MSSPs/Enterprises, and ‘Office-in-a-Box’. Cyberoam virtual network security appliance can be deployed as Next Generation Firewalls or UTMs.

(7)

Centralized Security Management across Branch Offices

Centralized Visibility across Networks

Enterprises can centrally manage security across

dispersed branch offices using Cyberoam security appliances with Cyberoam Central Console (CCC), available as hardware and virtual appliances.

Enterprises can get complete centralized real-time visibility into network and user activities with logs and reports offered by Cyberoam iView.

Cyberoam iView Appliance Range:

Hardware appliances

- CR-iVU25, CR-iVU100, CR-iVU200

Software

Centrally push policies, security subscriptions and

firmware/signature upgrades with change management for uniform policies and protection against zero hour threats. Enables quick management with the flexibility to group

Cyberoam security appliances deployed across offices based on geography, appliance models, firmware versions, and security subscriptions

Role-based administrative controls with logs /views of administrator actions

Pro-active alerts on subscription expiry, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, and more

Enables pre-provisioning (auto-appliance discovery) of Cyberoam devices with configuration templates to create policies in minimum time

1200+ reports help with log and security management, compliance management, and forensic analysis Logs, reports and alerts across multiple devices,

protocols and locations provide user and network activity information to identify security breaches, enabling quick action and minimizing network downtime

One-click compliance reports on HIPAA, PCI DSS, GLBA, SOX and drill-down reports /alerts for security breach, data leakage helps to meet compliance needs Helps with forensic analysis by reconstructing the

sequence of events of security breach with logs and reports, reducing cost of investigation and minimizing network downtime

Compatibility with a wide range of devices including Proxy Firewalls, Custom Applications and any Syslog-compatible devices enables organizations to store logs and reports of multiple devices

CCC Appliance Range: Hardware CCC Appliances - CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000 Virtual CCC Appliances - CCCV15, CCCV50, CCCV100, CCCV200, CCCV500

(8)

Awards and Certifications

Registered Trademark of Cyberoam Technologies Pvt. Ltd.

sales@cyberoam.com | www.cyberoam.com

S e c u r i n g Y o u

Cyberoam Technologies

505 Thornall Street, Suite # 304 Edison, NJ - 08837, USA, Tel: +1-847-235-4684 Toll Free Number: +1-800-686-2360

Cyberoam Threat Research Labs consists of a dedicated team of researchers that ensure detection and identification of security threats at early stages of propagation and protect Cyberoam customers against numerous zero day vulnerabilities and malware attacks. CTRL ensures appropriate security protection by continuously releasing suitable signatures, timely security upgrade and research reports.

Cyberoam Threat Research Lab

Training and Support

Cyberoam offers trainings and product updates to its customers for efficient deployment, configuration and management of Cyberoam solutions.

Training

Cyberoam’s dedicated global pre-sales team offers security planning and migration assistance for Cyberoam deployment and implementation to enterprises

Pre-sales Support

Cyberoam’s ISO 20000:2011 certified Global Support Team offers 24x7 or 8x5 support – as subscribed by the customers, over phone, email and chat.

Post-Sales Support www.check-mark.com CERTIFIED VPNC Interop Basic AES Interop CERTIFIED VPNC SSL Advanced Network Extension SSL Basic Network Extension SSL JavaScript SSL Firefox SSL Exchange SSL Portal RECOMMENDS BEST BUY EDITOR’S C H O I C E www.itpro.co.uk PRO

PC

RECOMMENDED

References

Related documents

In this paper an attempt has been made in order to provide a system for the accurate estimation of the good operating condition of the core and of peripheral modules in data

The BSA E-Filing System has identity and authentication management controls, access control, role based security, access auditing, network security and security zones implemented

•  Access Controls •  Audit Controls •  Integrity Controls •  Identity Authentication •  Transmission Security Standards Technical Safeguards.. Security

comfortable sensation in your hands, and if you feel them you think, "Of course I notice them." If you don't feel them you think, "Maybe I'm just not

For example, the following code would produce an error if the “ActiveDocument” in CATIA was a product document and not a part document..

However, note that if the file does not include images, Remote Operator will display a red 'X' in place of graphics.. The HMI cache files are in

McAfee Next Generation Firewall and McAfee Security Management Center offer an optimal solution for enterprises, as they meet the needs of both network/network operations and

Linked as a virtual power plant with smart grid applications the technology can help balancing the electricity system above a base load agreement by both