Automate your IT Security Services -...

30
www.cyberoam.com www.cyberoam.com Our Products © Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Network Security Appliances - UTM, NGFW (Hardware & Virtual) Modem Router Integrated Security appliance Automate your IT Security Services Presenter: Cyberoam

Transcript of Automate your IT Security Services -...

Page 1: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

www.cyberoam.com

Our Products

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Network Security Appliances - UTM, NGFW (Hardware & Virtual)

Modem Router Integrated Security appliance

Automate your IT Security Services

Presenter: Cyberoam

Page 2: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

It starts with debunking myths

Nothing can get past a firewall

We are compliant, hence we are secure!

Page 3: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Google Digital Attack Map – Growing Cyber Attacks

Rising number of cyber threats against advanced nations such as the US.

What happened to all state-of-the-art firewalls?

Page 4: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Inside the mind of today’s cyber criminal

1. Indulge in multi-step, elaborate targeted attacks

2. Motivation goes beyond money, involves

hacktivism, nation-state espionage, business

rivalry, fame etc

3. Run deep investigation for potential vulnerabilities

– from firewalls to unpatched servers to poorly

guarded web apps to vulnerable users in the

target organization

Page 5: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Why is Security everywhere in this slide?

Cyber-infrastructure Visualized

Page 6: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Anatomy of a typical targeted attack

Page 7: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Automating IT Security: From Plugging Security Holes to Driving Proactive Defense

Page 8: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

What necessitates automating IT security?

Common security concerns…

How to auto-provision uniform security policies for HQ, Data Center and Remote Branch offices

Inability to assess vulnerability exposure of network due to web apps, risky users etc

Lack of understanding on network intrusion attacks, network segmentation

Struggle with IPS security configuration

Don’t know what to allow or deny?

Page 9: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Here’s how automated IT security saves the day!

Page 10: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

How Cyberoam helps automate IT security?

Page 11: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

We know how IT and IT consumerization has changed…

Page 12: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

We know how network and data centers environments have evolved

Page 13: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Cyberoam – addressing key challenges

Complexity Centrally manage complicated network security policies for hundreds of users, applications and networking devices Evolving business Enable support and security for new business applications while monitoring controlling risk prone apps Connectivity with productivity High-availability, automatic fail-over for business continuity; intelligent QoS management and prioritization for users and apps Reporting and compliance Providing ready and in-depth support for displaying compliance and reports on user and network activities

Page 14: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Currently available security automation with Cyberoam

- Identifying users instead of just IP address - Scheduled reports over email - Email scanning and shifting to quarantine - Identifying risky users - Compliance - HA, Failover, Load balancing - Burstable bandwidth - Centralized Security Management - ConnectWise integration - Cyberoam API - Pro-active security protection in IPS

Page 15: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Cyberoam addresses a commonplace catch 22 faced by today's CXOs

Page 16: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

• Centralized Security Management for remote / branch offices

Page 17: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Dubai Head Office

New York Branch Office

Mumbai Branch Office

Boston Branch Office

Cyberoam

Cyberoam

Cyberoam

Cyberoam

Cyberoam Central Console (CCC)

CCC is for centralized, integrated management and monitoring of Cyberoam network security devices

- Complete control over distributed networks / remote branch offices from head office (H.O.)

Centralized Security Management

Page 18: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Servers

Firewalls

IDP / IPS

Switches Routers

UTM / NGFW

Applications

Desktop systems

Logs & Events

Identity

Logging Reporting

Compliance Management

Forensic Analysis

Log Management

Security Management

Automated Logging and Reporting

Ability to log and report activities from various users, devices / vendors

Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

Page 19: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Traffic Discovery

- Real-time visibility into bandwidth utilization by user, protocol, application

Real time visibility into user and network activities

Security Management

Forensic Analysis

Data Protection

Compliance Management

Page 20: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Application Security with Layer 7 and Layer 8 controls

Infected Applications Blocked

Internet

Application Traffic

Cyberoam Appliance

Visibility Control

worms Spyware

Manage Bandwidth

Undesirable

Business Critical

Socio business

Non Critical

Logs & Reports

Controls over applications based on User Identity, Time, Application and Bandwidth

Page 21: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Intrusion Prevention System

- Layer 8 and IPS Tuner driven

- Identity-based IPS policies per user, group and IP address

- Allows multiple IPS policies

- Identity-based alerts & reports

- 4500+ signatures – broadest security cover

Anti-Spam (Inbound/Outbound)

- Three level scanning:

IP Reputation filtering

Real-time Blackhole List (RBL)

Recurrent Pattern Detection (RPDTM) technology

- ~99% spam detection

- Self-service Quarantine and Spam Digest

- Scans SMTP, POP3, IMAP traffic

- Virus outbreak detection for zero-hour protection

DoS & DDoS Protection

- Packet Rate Limit

- Protection against flood attacks

- SYN Flood

- TCP Flood

- UDP Flood

- ICMP Flood

- IPS Signature to prevent attacks

- Protocol Anomaly

Gateway Anti-Virus, Anti- spyware

- Bi-directional scanning: Web & Email

- Self-service Virus Quarantine

- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic

- Instant visibility into Attacker/Victim

Continuously updated via

Cyberoam Security Center

Automated Threat Protection

Cyberoam Security Center

Page 22: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Eliminates the need for manual intervention by administrators to update policies for new applications added to the list

Proactive Protection model

Select P2P Applications

Block all future P2P applications without adding applications manually

Set Action

Page 23: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Ready to use IPS Policy templates

• Many SOHO/SMBs struggle with IPS

• How many IT managers know

• What to allow or deny?

• Which IPS policy applies?

• Ready to use IPS Policy templates with Firewall Rule style naming convention

Plug and Play IPS

Page 24: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Customizable security for Enterprise IT Pros

Severity

Critical (1)

Major (2)

Moderate (3)

Minor (4)

Warning (5)

Platform

Windows

Linux

Unix

Mac

Solaris

BSD

Other

Target

Client

Server

Category

Apache HTTP Server

Application & Software

Browsers

Database Management Sys.

DNS

ERP System

Exchange Mail Server

FTP

Industrial Control System

Malware Communication

Microsoft IIS web server

Misc

Multimedia

Office tools

OS & Services

Other Mail Server

Reconnaissance

VoIP & Instant Messaging

Web Services & Applications

And more…

Page 25: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Ready integration with Two-factor authentication platforms

Page 26: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Cyberoam can be integrated with the following SIEM Solutions:

Syslog to integrate with all the above SIEM solutions

Integration with leading SIEM platforms

1: RSA Envision

2: ArcSight

3: Cyberoam i-view

Page 27: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Simplified management and better delivery of security services

UTM, NGFW

appliances

Integration with leading MSSP business automation tools

Automatic Ticket Generation & Resolution for all CCC alerts right at ConnectWise dashboard level

Threat counts

Web & IPS threats

Mail threats

Total Virus & Spam Mail counts

Unhealthy surfing hits

Capacity utilization

notifications

Capacity utilization notifications for

CPU, Disk & Memory usage

Reminders for Security Subscriptions

renewal / expiry

Other key appliance status

information

Appliance management and status change

notifications for

Appliance Connectivity with CCC

Internet Link

VPN connection

HA Failover State

Page 28: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Cyberoam API - Enables Seamless Authentication

Re-use Hotspot

Authentication; avoid

multiple logins

User Authentication API

for Hotspots Seamless Single Sign-on for

Enterprises If you have an authentication, Cyberoam

can fit in

PMS

Page 29: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Enables balancing what matters

Business agility with security responsiveness

Automation for threat protection, business continuity

Ease of integration with third-party

systems and MSSP tools

Centralizes Security Management

Automated logging and reporting

Page 30: Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,

www.cyberoam.com

Thank you

Contact: [email protected]

Link:

http://demo.cyberoam.com

Credentials:

guest /guest

Get a 30 day FREE Evaluation of

Cyberoam Virtual appliance