Presentazione prodotti Cyberoam
-
Upload
team-sistemi -
Category
Technology
-
view
975 -
download
8
description
Transcript of Presentazione prodotti Cyberoam
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Our Products
Unified Threat Management Cyberoam Central Console (CCC) SSL VPN
Data Protection & Encryption Device Management
Application Control Asset Management
Cyberoam – Endpoint Data Protection
Firewall UTM di Nuova Generazione
CYBEROAM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam Unified Threat Management § Gateway con funzionalità
di sicurezza integrate in una singola piattaforma
§ Approccio unico ed innovativo Identity-based Layer 8 presente su ogni modulo di sicurezza
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Come identificare l’utente e garantire l’accesso?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Come identificare l’utente e garantire l’accesso?
§ “certi impiegati utilizzano I loro dispositivi mobili come l’Iphone & Blackberry per accedere alle risorse aziendali. Altri lavorano da casa.”
§ “la nostra rete lavora con Citrix e vorremmo bloccare certi utenti per non fargli raggiungere determinate applicazioni ed applicare delle policy uniche sulla rete.”
§ “come posso creare privilegi speciali per il reparto IT per consentirgli l’accesso solo a specifici server/applicazioni nella mia zona DMZ?”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ “come posso ottenere le informazioni su quali utenti accedono alla rete, quando e quali risorse raggiungono e da quale network si collegano (casa, ufficio)”
§ “come posso ottenere AAA (Authenticate, Authorize e Audit) tramite un singolo apparato di sicurezza.”
Come identificare l’utente e garantire l’accesso?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE – Cyberoam Identity Based Firewall UTM
§ Cyberoam caratteristiche: § Stateful Inspection Firewall § Application based Firewall § Identity based Firewall
§ L’amministratore può definire delle policy basate su Username o IP Addresses e seguire l’utente ovunque si muova
§ L’amministratore può definire le policy con username, IP address, MAC e session id (per Windows Terminal Server e Citrix)
Terminal Server
XenServer
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Come fornire accesso
privilegiato agli utenti?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Come attivare policy differenti per differenti utenti e ruoli?
§ “politiche orizzontali per tutti i reparti non sono più funzionali.”
§ “è necessario che le risorse umane abbiano accesso ai siti categorizzati come Job & Recruitment website.”
§ “vorrei applicare una quota massima di download giornaliero ad una categoria di utenti.”
§ “vorrei bloccare certi website per uno specifico gruppo di utenti. Anche se questi sono in HTTPS”
§ “voglio consentire l’utilizzo di IM al nostro Management & Sales Team”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Come attivare policy differenti per differenti utenti e ruoli?
§ “come posso autorizzare l’accesso a FACEBOOK a specifici utenti solo per un’ora al giorno nella pausa pranzo?”
§ “come posso gestire l’accesso ai social network limitando la banda a disposizione a 2kbps in modo da non compromettere le attività business ed allo stesso tempo scoraggiare l’uso di questi siti?”
§ “come posso bloccare l’uso di applicazioni P2P, Proxy ed applicazioni tipo Ultrasurf?”
§ “come posso monitorare e registrare I log del data transfer via HTTPS?”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: WEB CONTENT & APPLICATION FILTER
§ Blocco, Controllo & Monitor dell’accesso a internet ed alle applicazioni.
§ oltre 44 milioni website in 82+ categorie
§ Blocca ed ispeziona § HTTPS website § Google Cached page § Tutti i proxy conosciuti come Ultrasurf
etc. § Educa ad un sano uso delle risorse grazie
alla possibilità di personalizzare i messaggi di accesso negato ai website.
Premium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CONTROLLO COMPLETO CON USER IDENTITY
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Username / IP Address Blocca oltre 5000+ Applicazioni
SOLUZIONE: APPLICATION CONTROL
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: IM GESTIONE & CONTROLLO
§ Log & Monitor dei maggiori sistemi di Instant Messenger § Yahoo, § Windows Live
§ Filtra i conteuti su IM: Blacklist di certe keywords o frasi § Blocca il trasferimento di file via IM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Controlli per Yahoo MSG:
Data Leak Protection (File Transfer Control) Who can chat with whom! Logging of Chat Conversations
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Come puoi ottimizzare la disponibilita
della rete e delle risorse?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ “vorremmo assegnare una banda dedicata al nostro sistema VOIP/CRM/ERP”
§ “devo garantire al mio CEO – dovunque si trovi – Wifi/Lan/remote office – una banda adeguata ed a lui riservata in ogni momento.”
§ “vorrei assegnare un range di banda (128kbps – 1 Mbps) ad utenti e gruppi in modo da limitare l’utilizzo nei casi in cui ci siano molti utenti collegati e viceversa rendere disponibile banda quando questa non viene utilizzata da altri utenti.”
Come ottimizzare la disponibilità di risorse e rete?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ “come posso gestire una banda riservata alla video conferenza / sistema di Backup per solo 2 ore ed in specifiche date?”
§ “ci interesserebbe assegnare delle priorità in base alle applicazioni. il CRM dovrebbe avere una priorità maggiore.”
§ “come posso analizzare in real time quali applicazioni / utenti stanno utilizzando la banda?”
Come ottimizzare la disponibilità di risorse e rete?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: BANDWIDTH MANAGEMENT
§ Allocare/riservare banda per specifiche Applicazioni o utenti/gruppi § Allocare/limitare banda in base alle categorie § Pianificare l’allocazione/limitazione della banda
su base temporale § Allocare una banda dedicata o gestirla in base alla
disponibilità della stessa
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CRM
ERP
Sales force
You Tube
IM Application
Web mail
Casual Traffic
Application Firewall Crowd of Applications
Bandwidth Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: TRAFFIC DISCOVERY
§ Visibilità Real-time sull’uso della banda in base a: § Utente § Protocollo § Applicazione
§ Fornisce visibilità sull’uso improprio della banda e l’incidenza delle minacce
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Traffic Discovery:
Live Traffic Analysis including Bandwidth, Data Transfer Connection Information Live traffic filtering by Application, User, IP Address Filter traffic for specific application Traffic Filtering by Firewall Rule-ID, IP Address, Port etc.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Come garantire
Business Continuity?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Come garantire Business Continuity?
§ “l’accesso ad internet non dovrebbe intterompersi anche nel caso in cui una delle connessioni non funzioni”
§ “vogliamo che il traffico del nostro ufficio amministrazione passi da un gateway diverso da quello standard”
§ “come posso garantire che la mia connessione VPN sia sempre attiva - 100% uptime ?”
§ “come posso utilizzare il mio modem 3G come back-up link e fare in modo che si attivi automaticamente quando l’ADSL non funziona?”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: MULTIPLE LINK MANAGER
§ Automatico Link Load balancing che assicura ROI § Supporta più di 2 ISP link § Supporta Wireless WAN (3G USB modem, Wimax)
§ Link Failover
§ Policy-based routing: Source IP/Users/Protocols
§ VPN Failover
§ High Availability § Active Active § Active Passive
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Ac2ve-‐Ac2ve gateway load balancing
commerciali Amministrazione IT Staff
Failover Link
ISP1 (MPLS) (10 mbps)
ISP2 (ADSL) (5 mbps)
ISP3 (3G) (1 mbps)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Come dare accesso remoto alla rete?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Come far accedere gli utenti remoti alla rete?
§ “vorrei collegare tutte le filiali alla sede principale utilizzando connessioni sicure e che garantiscano zero downtime”
§ “vorrei garantire ai nostri dipendenti accesso sicuro alle risorse interne utilizzando i loro smartphone iPhone”
§ “vorrei limitare l’accesso dei telelavoratori a specifiche applicazioni”
§ Come posso analizzare il traffico degli utenti remoti prima che si colleghino alla rete?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: VIRTUAL PRIVATE NETWORK (VPN)
§ Connessione stabile e sicura con le filiali § Threat Free Tunneling (TFT) Technology
§ Analizza il traffico in ingresso dai tunnel VPN per: § Malware § Spam § Contenuti inappropriati § Tentativi di intrusione
§ Supporta § IPSec, L2TP, PPTP technologies (client-based) § SSL-VPN ablita l’accesso alle risorse interne da
qualsiasi dispositivo (senza necessità di utilizzo di client)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SSL VPN User Portal
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Sono sufficienti i sistemi Desktop ANTI-VIRUS & ANTI-SPAM?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ “vorrei ottimizzare l’uso della banda bloccando lo spam direttamente sul gateway”
§ “vorrei offrire agli utenti la possibilità di rilasciare / inserire i loro messaggi dalla/nella quarantine area”
§ “vorrei esaminare con l’anti virus anche il traffico dei website e delle applicazioni HTTPS”
§ “Vorrei che il sistema firewall utilizzi un motore anti-virus efficace e sempre aggiornato per garantirci una protezione completa”
§ “come posso creare delle regole Anti-Spam user-based? “
§ “come faccio ad essere SOX conforme?”
Sono sufficienti i sistemi Desktop Anti-virus & Anti-spam?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: GATEWAY ANTI-MALWARE
Anti-Virus
Anti-Spyware
§ oltre 4 million+ signature § Aggiornamento delle signature automatico ogni 30 min § sistema anti-virus tra i migliori del mercato: Kaspersky Labs § Blocco degli allegati basandosi sull’estensione
(*.exe, *.bat etc.) § analisi
§ HTTP, FTP, SMTP, POP3 § HTTPS, IMAP § Instant Messenger traffic
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE : GATEWAY ANTI-SPAM
Premium
§ Individua e blocca il 98% di tutti I messaggi spam § Falso positivo: 1 in un milione § Tecnologia Recurrent Pattern Detection (RPD)
tecnologia che blocca tutti I tipi di spam inclusi excel, pdf, multi-lingual spam etc.
§ Self-Service Quarantine Area per gli utenti, che consente di verificare i messaggi messi in quarantena e ridurre gli sforzi dell’amministratore
§ Gli utenti ricevono un report sullo spam giornaliero/settimanale/mensile
§ IP Reputation filtering: § Stop dell’85% dello spam direttamente sul gateway
prima che entri in azienda riducendo l’uso della banda e delle risorse
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ “come posso proteggere la mia rete da attacchi DDOS & SQL Injection?”
§ “posso bloccare una specifica applicazione per specifici utenti creando una una regola sul firewall?”
§ “come faccio per essere avvisato immediatamente in caso di tentativo di attacco alla mia rete?”
Come posso proteggere la mia rete da attacchi esterni?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: INTRUSION PREVENTION SYSTEM (IPS)
§ Oltre 3500+ signature per individuare e blocacre le intrusioni.
§ Protezione completa contro attacchi DOS, DDOS, Syn Flood etc.
§ Identity-based IPS policy per user o group § Overview dello stato delle minacce:
§ Top alerts, top attackers, top victims
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LA DOMANDA DA PORRE:
Come ottenere una piena visibilità
sulla rete?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Hai una visibilità completa della tua rete?
§ “come faccio ad identificare gli utenti più pericolosi o a rischio?”
§ “chi riceve più spam?”
§ “quali utenti stanno navigando in internet?”
§ “voglio monitorare le conversazioni IM”
§ “voglio monitorare I file che vengono trasferiti su internet”
§ “voglio sapere quali ricerche vengono fatte in google”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUZIONE: ON-APPLIANCE REPORTING
§ oltre1000+ report disponibili. § Nessun acquisto addizionale di hardware/service per
avere dei report. § Colleziona i log delle attività del network § Conformità ai vari standard
§ CIPA – Children’s Internet Protection Act § HIPAA – Health Insurance Portability & Accountability Act § GLBA – Gramm-Leach-Bliley Act § SOX – Sarbanex-Oxley § FISMA – Federal Information Security Management Act § PCI – Payment Card Industry Data Security Standards
Powered By:
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
User Dashboard
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Combined Report
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Categories
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Web Users
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Search Engine – Google Search Results
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Spam Recipients
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Other UTMs
User Login
Cyberoam Authenticates
• User • IP Address • MAC Id • Session Id
Cyberoam Authorizes
• Access Time • Internet Quota • Security Policies • Web Filtering • Layer 7 Controls • QoS • IM Controls
Cyberoam Audits
• Identity - based Logs + Reports
• MAC Id • Session Id
Cyberoam Layer 8 Vantaggi
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam UTM risponde alle necessità delle aziende
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Possibili implementazioni
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Default Gateway: 192.168.0.1 Users
Router
Network:192.168.0.x/24
Firewall INT IP: 192.168.0.1/24
BRIDGE MODE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Default Gateway: 192.168.0.1
Network:192.168.0.x/24
Router IP:61.0.5.1/29
Users
Mail Server IP:172.16.1.3
Gateway: 172.16.1.1
Database Server IP:172.16.1.4
Gateway: 172.16.1.1
Switch
Web Server IP:172.16.1.2
Gateway: 172.16.1.1
Switch Console
INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24
EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1
DMZ Zone
GATEWAY MODE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
OVERVIEW:
CYBEROAM APPLIANCE RANGE
& SUBSCRIPTION SERVICES
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ Large Enterprises - CR 1500ia - CR 1000ia - CR 750ia - CR 500ia
§ Small to Medium Enterprises - CR 300i - CR 200i - CR 100ia - CR 50ia
§ Remote Offices
- CR 35ia - CR 25ia - CR 15i - CR 15wi
CYBEROAM UTM APPLIANCE RANGE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ Identity-based Firewall § VPN § Free SSL-VPN § Bandwidth Management § Multiple Link Management § On Appliance Reporting § Basic Anti-Spam (RBL Service) § 8x5 Tech Support &
Warranty
Basic Appliance Bundled Subscriptions
§ Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)
§ Gateway Anti-spam Subscription § Web & Application Filtering Subscription § Intrusion Prevention System (IPS) § 24 x 7 Tech Support & Warranty
Total Value Subscription (TVS) – Includes all the licenses Security Value Subscription (SVS) – Includes all licenses except Gateway level Antispam
Subscription bundle
SUBSCRIPTION MODEL
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
PRICING
§ HARDWARE § One Time Payment § Need to renew 8x5 to get updates and keep the appliance under
warranty
§ SOFTWARE § Yearly Renewal Required § AV/AS/CF/IPS Database needs to update regularly to provide
up-to-date protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Come scegliere il modello?
USER MODEL MATRIX
2250
1500
1100
750
450300
15075504025250
500
1000
1500
2000
2500
CR15i
CR15wi
CR25ia
CR35ia
CR50ia
CR100ia
CR200i
CR300i
CR500ia
CR750ia
CR1000i
CR1500i
Appliance Name
Num
ber o
f Use
rs S
uppo
rted
Please Note: Chart is an approximation Only. Number of users may vary on the network load & configuration.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Descrizione List Price (€)
Qty Final Price (€)
Cyberoam 300i Appliance - Firewall, Bandwidth Management , Multiple Gateway & Load Balancing including 1 year of 8x5 Support & Warranty
3 Year Antivirus-Antispam for CR 300i 3 Year Web & Application Filtering for CR1500i 3 Year IPS for CR1500i 3 year TVS ( AV+AS+IPS+WAF with 8*5 support)
3 year SVS (AV+IPS+WAF with 8*5 support)
Total
OFFERTA SEMPLICE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IMPORTANTI RISORSE PER I PARTNER
http://partner.cyberoam.com Partner Portal >> Knowledge-base
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Stay updated with Cyberoam Newsletters http://www.cyberoam.com/newsletters.html
IMPORTANTI RISORSE PER I PARTNER
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IMPORTANTI RISORSE PER I PARTNER
Register for Cyberoam Webinars Register for Cyberoam Cerfication http://training.cyberoam.com
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SUPPORTO DEDICATO AI PARTNER
www.cyberoam.com/presalessupport/ § Cyberoam Presales Consultants are available 24x7 for
Channel Partners
§ Dedicated Support § Email
§ Chat
§ Telephone: Toll Free for some regions
§ Presales Consultants help you with § Installation Support,
§ Network Consultation
§ Documentation Support for Tenders/RFPs
§ Feature Requests
§ Training/Certification requests
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CYBEROAM
CREDENTIALS
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”
Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight
Analysts Speak:
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam si posiziona al 5 posto pronta a diventare
leader
Gartner posiziona Cyberoam come “Visionary” nel Magic Quadrant di ottobre 2010
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam Certifications
Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP
UTM Level 5: Cyberoam holds a unique & complete UTM certification
ICSA Certified Firewall
VPNC Certified for Basic VPN & AES Interoperability
ICSA Certified High-Availability
Premium Premium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
§ IPv6 (Future Ready Connectivity) § ‘IPv6 Ready’ gold logo
- Cyberoam identifies and processes IPv6 traffic
§ Third-party validation - International Testing Program with
3000+ rigorous test cases § IPv6 compliance to become
mandatory in government and other enterprises
- Driven by diplomatic initiatives
IPV4
Cyberoam is IPV6 Certified
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SC Magazine Five Star Rating – Five Times in a Row!
April 2009 – Product review Cyberoam CR200i § A lot of functionality, including good integration support, in a single easy-to-use appliance” § also includes a solid web content filter and blocking for applications such as IM and P2P“
December 2008 – Product review Cyberoam CR100i “Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”
March 2008 – UTM Roundup Cyberoam CR1000i § “Fully loaded, with many great features” § “packs a more serious punch”
July 2007 – UTM Roundup Cyberoam CR250i § “flexible and very powerful” § “this appliance is a good value for almost any size environment”.
July 2010 – UTM Group Test Cyberoam CR50ia § A Solid Product and the Price is Right § CR50ia is more than a Usual UTM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SMB Product of the Year
ZDNET Asia- IT Leader Of the Year 2008 2008 – Best
Content Filtering Winner
Network Middle-East Awards 2010
Awards
Most Valued Principal ChannelWorld VARIndia Editor’s Choice
for Best UTM (2007) Channel's Favorite Security Company
(2008)
Tomorrow’s Technology Today 2007
CR50ia (2010), CR15i (2009) CR1500i (2009) CR50ia (2009) CR15i (2009)
Best Integrated Security Appliance Best Security Solution for Education Best Unified Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Partial Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Partial Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Product Line
Unified Threat Management Cyberoam Central Console (CCC)
SSL VPN
Cyberoam End Point Data Protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
ALCUNI CASE DI IMPLEMENTAZIONE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 1
Una finanziaria con uffici in differenti città: 150 dipendenti § Filiali da 15 dipendenti
Necessità: § Soluzioni di sicurezza per proteggere la rete § Gestire centralmente tutti i report
Quale soluzione corrisponde a queste necessità?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 1: La soluzione
Sede principale CR200i
§ AV & AS § IPS per Mail
Server § Web & App Filter
iView & CCC
At Branch Offices
§ CR15wi
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 2
Azienda commerciale § Sede principale: 50 impiegati
necessità: § Garantire accesso remoto sicuro al loro CRM
Quale soluzione corrisponde a questa necessità?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 2: La soluzione
Sede principale CR50ia
§ SSL VPN § CRM Access per
gli utenti remoti
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 3
Università § 1500 Studenti che accedono ad internet § 2 ISP Link da 50 Mbps di banda
necessità: § Garantire accesso basandosi sul profuilo utente. § Controllo per evitare l’accesso ai siti non desiderati ed a quelli che
presentano un eccessivo consumo di banda § Giochi § Musica § Youtube, Facebook § P2P
§ Load Balancing per i due link ed auto fail over. § Lo staff riceve molto spam ed email infette. § Il mail server viene inserito nei DB spammer per via delle attività
anomale di alcuni PC studenti infettati da virus
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Soluzione: Scenario 3 Università 2 x CR1500ia per HA
§ 1 link per i server § 2 link per Internet
Browsing AV & AS per:
§ Outgoing & Incoming Mail traffic
CF per: § Blocco di IM,
P2P, Music etc.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 4
A piccola azienda § Sede principale: 50 dipendenti § 3 sedi remote: 15 dipendenti § DSL Line su tutte le sedi
necessità: § Tutte le sedi necessitano di essere connesse in modo sicuro
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Soluzione Scenario 4
Tutte le sedi: Dynamic DNS Support Site-to-Site VPN CR15wi per gli uffici
remoti e CR100ia per la sede principale
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
GRAZIE! Per maggiori informazioni: Oppure scrivici a [email protected]. Ti invitiamo inoltre a visitare il nostro sito:
www.teamsistemi.com