SlideShare a Scribd company logo
Securing You




                                Future-ready Security
                                    Justinas Valentukevičius
                                    Channel Manager Baltics


               Unified Threat
               Management




www.cyberoam.com                                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Agenda of Presentation

  Let’s meet - Brief introduction to Cyberoam

  Next generation firewall or maybe Next generation UTM

  Layer 8, WAF and other nice features in Cyberoam UTM

  Announcement of NG Series and Virtual UTM

  Technical live DEMO later today 15:15 PM




www.cyberoam.com                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



About Cyberoam

 Elitecore technologies founded in 1999

 Cyberoam UTM introduced in 2006 (Baltics in 2010)

 800+ Employees

 Sales, Distribution Channel and Customers across 110+ Countries

 Among the Top 3 UTM players in Gartner

 Patent Pending Identity-based Management


www.cyberoam.com                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Cyberoam’s Holistic IT Security Portfolio


                                           Unified Threat
Securing the IT network                    Management



Centralized security
management for remote
/branch offices & clients


Network Monitoring &                                                                                    & Open
Analysis                                                                                                Source




Virtual UTM (from
December 2012)


www.cyberoam.com                                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Cyberoam pagal Gartner

                                                                 2012
                                                       Magic Quadrant for Unified
                                                          Threat Management




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                        Evolution




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
                                                  Seriously, is it enough??




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Evolution of Network Security
Trends in Security

   Basic security began with firewalls
   As threats increased, other solutions were introduced
   Virus attacks rose in number and intensity
   Spam rose
   Slammer fueled the need for Intrusion Detection & Prevention
   High number of employees start accessing the Internet
   Connectivity to branches, partners and remote workers
   Blended threats emerge to exploit extensive Internet usage



                                                                         Average spam messages per day – the
                                                                         6FirewallsHit on Saturday, January
                                                                         Slammer employeesinfected with
                                                                                        enjoyed a monopoly until
                                                                         starting of the 21stbe view onlineviruses
                                                                           18.5business emails contained
                                                                             %
                                                                              1 systems
                                                                           25 % in 5 0030to century
                                                                        – 25, pornography year– Forrester
                                                                           IBM2003,
                                                                         Time spent deleting them – 2.8
                                                                            Initial Firewalls at work
                                                                           spyware by this were Stateless
                                                                         That’s a staggering cost of $281-$304
                                                                           Lost revenue spilled over halfway
                                                                           mintues. which could
                                                                         Firewallsnext weekin anot control are hit
                                                                        per  % percentlostsay they – 51.8the
                                                                         into70companies adult day will invest in
                                                                           65PC the
                                                                           Average time of          websites mts
                                                                          initiation of communication
                                                                         Emailcost of 9toolsand 5 more than
                                                                           anti-spywarethe bailout: pm
                                                                                   became am and upgrades
                                                                                            more prevalent
                                                                          Later Stateful became more prevalent
                                                                               between
                                                                           Total
                                                                         14 % spam recipients actually read
                                                                         $1 billion mails grew 5,000 % last year
                                                                           Phishing
                                                                         Pharmingpercent an employees'
                                                                              today, makes of entry
                                                                         Till 30-40 no accountability has
                                                                           spam
                                                                         been established advertised by spam
                                                                           4 % buy products is not business
                                                                               Internet activity
                                                                         21 % spam in Jan 2005 was porn
                                                                               related




www.cyberoam.com                                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




    Where are Networks moving to?

    • High speed Internet (Baltics among TOP countries)
    • More devices per user – More devices connecting to
      Internet (BYOD)
    • More web-applications being accessed
    • Increase in usage of data




www.cyberoam.com                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




What is usual here, in Baltics?

  Usually we are really well technologically
  educated and so we understand the need of
  Enterprise solutions – and we need the best !


  However…

  Usually we are relatively small in size

  Usually we are quite limited with our budget


WHAT WE ARE LOOKING FOR IS BEST TECHNOLOGY FOR
THE AFFORDABLE PRICE !

www.cyberoam.com                            © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                   Next generation security




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




      Gartner's Definition of the Next Generation Firewall (NGFW)

      “A wire-speed integrated network platform that performs deep inspection of
      traffic and blocking of attacks”.
      Next Generation Firewall indicates “the necessary evolution of a firewall”
      to deal with the changing IT environment in businesses and the consequent
      evolution in security threats posing to bring these very businesses down.




                                 NGFW created a buzz in security circles
                                 What is so different about them?




www.cyberoam.com                               © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


Next Generation Firewall                                       Cyberoam Next Generation UTM
                                                       FW with SI and integrated with IPS, VPN, Web/application
Standard first-generation firewall capabilities like   Filtering, IM Controls and Web Application Firewall
packet filtering, NAT, stateful protocol inspection    + Providing Anti Virus and Anti Spyware, Anti Spam,
and VPN capabilities                                   Bandwidth Management, Multi Link Management, HA
                                                       and On-appliance Reporting.
                                                       IPS tightly integrated with FW.
Integrated, rather than merely collocated,             Policy creation of multiple features in a single FW interface.
network intrusion prevention                           + All security modules are bound together keeping
                                                       User Identity as the base.
                                                       Granular application control
                                                       Real-time Visualization
Application awareness and full stack visibility
                                                       Secure Application Layer Vulnerabilities
                                                       Network Visibility based on users and not IP Addresses

Extra firewall intelligence                            Integration with AD, LDAP and RADIUS Servers.

                                                       Integrates hardware acceleration and automation into a wide
Support upgrade paths for integration of new           range of packet processing and application-specific
information feeds and new techniques to                functions
address future threats                                 + Virtual UTM series consolidates network security in
                                                       virtualized environments


     www.cyberoam.com                                             © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




 Cyberoam Unified Threat Management
  Gateway Integrated security
   over single platform
  Unique Identity-based Layer 8
   approach penetrates through
   each security module




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Human approach in Security


 • Numbers – Hard & Boring




                                                                                    192.168.10.122
                                                                                     172.17.12.123
                                                                                      10.12.11.23
   to remember!




                                   Names             - Used daily!!!



www.cyberoam.com                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



   Cyberoam Layer 8 AAA Advantage




                      Cyberoam                   Cyberoam                                        Cyberoam
                     Authenticates               Authorizes                                       Audits

User Login           • User Name              • Internet surfing quota         • Identity - based
                     • IP Address             • Schedule control                 Logs + Reports
                     • MAC Id                 • Security Policies              • Compliance Reports
                     • Session Id             • Web Filtering
                                              • Application Visibility & Control
                                              • QoS / Bandwidth Management
                                              • IM Controls




  www.cyberoam.com                                © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Fusion Technology driven SI Firewall
        - Interface for achieving Unified Security
                Rules for all security features from firewall page
                Identity-based policies enable security,
                 connectivity, productivity
        - Easy to configure with Next-Gen UI
                Easy navigation, custom controls, intuitive
                 interface
                   - Fewer security errors - Increases security
                   - Enhances administrative productivity
                   - Shorter learning curves


: Indicates a feature that is either unique to Cyberoam or it was
first introduced in the Industry by Cyberoam
www.cyberoam.com                                         © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Virtual Private Network (VPN)
    - Anywhere, any device secure remote connectivity
    - Supports
                IPSec, L2TP, PPTP technologies
                SSL-VPN
                   - Client-type independent Web access mode
                   - Application access mode
                   - Client mode
                Threat Free Tunneling (TFT) Technology
                Scans traffic entering VPN tunnel for:
                   -   Malware
                   -   Spam
                   -   Inappropriate content
                   -   Intrusion attempts
        - Maintains secure endpoint and network
          environments
www.cyberoam.com                                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Mobile VPN for iOS and Android devices

 Cyberoam’s Layer 8 Identity based security extended to mobile
  devices
 Securely connect your iPhone, iPad and Android devices to your
  corporate network through VPN

                        iOS                                   Android




                   IPSec VPN (New)                   L2TP VPN (New)
                      L2TP VPN
                      PPTP VPN

www.cyberoam.com                             © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Cyberoam CISCO VPN for iOS




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


SSL VPN user portal




  www.cyberoam.com                   © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Intrusion Prevention System
        - Layer 8 and IPS Tuner driven Cyberoam IPS
            Identity-based IPS policies per user or group
                Identity-based alerts and reports
                   - Visibility into applications usage
                        - User, Source, Destination, Usage
                   - Overview of threat status
                        - Top alerts, top attackers, top victims
                3500+ signatures – broadest security cover
                Internet Threat Response Team
                Allows multiple IPS policies




www.cyberoam.com                                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Gateway Anti-Malware
    - 4 million+ signatures
    - Bi-directional scanning of web & email
    - Self-service Virus Quarantine
    - Reduced window of vulnerability
                Broadest security cover against all malware                                               Anti-Virus


        - Scans
                HTTP, FTP, SMTP, POP3
                HTTPS, IMAP
                Instant Messenger traffic
        - Layer 8 Impact                                                                                 Anti-Spyware

                Identity-based virus reports
                   - Instant visibility into attacker/victim
                                                                         Indicates feature offered only by
                Identity-based Quarantine policies                                       top-rated UTMs

www.cyberoam.com                                          © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Gateway Anti-Spam
        - IP Reputation Filtering
                Blocks 85% of incoming messages at gateway                                                   Premium

                   - Saves bandwidth
        - Near 98% spam detection
        - False Positive rate of 1 in a million
                Reduces fear of losing business emails
        - Self-Service quarantine area
        - User-based Spam Digest
                Frees administrator time & management
        - Manage Email recipients
                Data leakage prevention and archiving



www.cyberoam.com                                 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Web Application Firewall Subscription
Firewalls/IPS cannot protect a web application from unknown threats


Cyberoam WAF Features include
       –     Positive protection model and No Signature Tables
       –     Intuitive website flow detector automatically
       adapts to website changes

       –     Protects against OWASP top
             10 vulnerabilities
       –     SSL Offloading
       –     Monitoring & Reporting




www.cyberoam.com                                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Cyberoam iView – On-Appliance Logging & Reporting
        - Ability to log and report activities
        - LAYER 8 - Identity-based logging and reporting –
          Pinpoints the user
        - Security Management
                iView dashboard- Shows network attacks on single screen
                Drill-down reports – 3rd level drill-down for attack details
                1000+ Reports
        - Log Management
        - Compliance Management
                HIPAA, PCI DSS, GLBA, and more
        - Forensic Analysis


www.cyberoam.com                                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Dual Dashboard – Traffic and Security Dashboard

 Traffic Dashboard




www.cyberoam.com                     © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Dual Dashboard – Traffic and Security Dashboard

 Security Dashboard




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Dual Dashboard – Traffic and Security Dashboard

 Security Dashboard




                                         N/A: Private IP              Others: Rest of records
www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Country Maps for Source/Destination Traffic

 Graphical overview of Data transfer and Risk level




www.cyberoam.com                      © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                    Web & Content Filtering

                      - Industry’s most comprehensive URL                                                   Premium

                        database
                            82+ categories
                            44 million+ URLs
                      - On-appliance web category database
                            Faster access
                            Surfing pattern privacy
                      - Controls access to HTTP & HTTPS
                        hosted websites
                            Increases productivity




www.cyberoam.com                          © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



                   Identity based Technology - The Reason


 Application Based Control.                            Username / IP Address




www.cyberoam.com                            © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



IM MANAGEMENT & CONTROL

                    Allow or block Skype
                    Control access to leading Instant Messengers
                     (Yahoo, Windows Live)
                        Control over Chat, Webcam, File Transfer
                    Log & monitor chat
                    Filter content over IM: Blacklist certain keywords or
                     regular expressions to prevent data leakage




www.cyberoam.com                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




  Best of Breed Bandwidth Management/QoS

        - Application and Identity-based bandwidth allocation
        - Category wise Bandwidth management
        - Restrict Bandwidth usage for a combination of source,
          destination and service/service group
        - Schedule-based bandwidth allocation
        - Committed and burstable bandwidth




www.cyberoam.com                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



Identity Based Policies




www.cyberoam.com                         © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


Cyberoam UTM Product Range
  Enterprise
        -   CR 2500iNG
        -   CR 1500i
        -   CR 1000i
        -   CR 750ia
        -   CR 500ia

  SME
        -   CR 300i
        -   CR 200i
        -   CR 100ia
        -   CR 50ia

  Small offices
        -   CR 35ia
        -   CR 25ia
        -   CR 15i
        -   CR 15wi
 www.cyberoam.com                       © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You


The Cyberoam NG Series and Virtualization



                                          Powerful Hardware

                                          Superior Quality
       Future-Ready
         Security                         Performance Leap

                                          Value for Money

                                          All-New Firmware




 www.cyberoam.com                    © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Cyberoam Certifications

                                                         Premium           Premium




                        Anti-Virus    Anti-Spyware   Anti-Spam     URL Filtering     Firewall            VPN              IPS/IDP

                       UTM Level 5: Cyberoam holds a unique & complete UTM certification




   ICSA Certified Firewall            IPv6             Member of           ICSA Certified                 VPNC Certified for Basic
                                     Ready           Internet Watch       High-Availability              VPN & AES Interoperability
                                                       Foundation




www.cyberoam.com                                                           © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You



 Reviews and Awards




                                                                             Cyberoam CR35ia
                                                                          outshines competitors in
                                                                           SOHO UTM Group Test


www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




                   THANK YOU !

                   Cyberoam Online Demo:
                   http://livedemo.cyberoam.com
                   (Username: guest, Password: guest)



                   Contact information:
                   Email: justinas.v@cyberoam.com
                   Skype: justinas.cyberoam
                   +370 615 43623



www.cyberoam.com                        © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You




www.cyberoam.com                  © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

More Related Content

PPTX
Cyberoam Unified Threat Management
PPT
Ccnsp trainer presentation
PPT
Ccnsptrainerpresentation 111019052032-phpapp01
PPT
Wifi Security for SOHOs: Cyberoam UTM CR15wi
PDF
Cr vs fortinet
PPT
Cyberoam SSL VPN
PDF
Cyberoam ssl vpn_management_guide
PDF
UTM Cyberoam
Cyberoam Unified Threat Management
Ccnsp trainer presentation
Ccnsptrainerpresentation 111019052032-phpapp01
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Cr vs fortinet
Cyberoam SSL VPN
Cyberoam ssl vpn_management_guide
UTM Cyberoam

What's hot (16)

PPT
Cyberoam layer8
PPTX
Cyberoam Firewall Presentation
PDF
PDF
PPTX
BYOD - Protecting Your School
PPTX
Complete Security
PDF
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
PPTX
Sophos Mobile Control - Product Overview
PPTX
Sophos EndUser Protection
PPTX
Take Control of End User Security
PDF
CyberoamVirtualSecurityBrochure
PPTX
Palo alto networks_customer_overview_november2011-short
PDF
CyberoamNGSeriesUTMBrochure
PPTX
Vfm palo alto next generation firewall
PPTX
Cornerstone Networking & Security- Astaro Product Line
Cyberoam layer8
Cyberoam Firewall Presentation
BYOD - Protecting Your School
Complete Security
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sophos Mobile Control - Product Overview
Sophos EndUser Protection
Take Control of End User Security
CyberoamVirtualSecurityBrochure
Palo alto networks_customer_overview_november2011-short
CyberoamNGSeriesUTMBrochure
Vfm palo alto next generation firewall
Cornerstone Networking & Security- Astaro Product Line

Viewers also liked (8)

PPTX
FIT 10 - Hargun - Cyberoam
PPTX
Amazon Network Security
PDF
Cyberoam cr300i
PPTX
Cyberoam security on amazon web services
PPT
PPTX
Firewall presentation
DOCX
PPTX
Introduction of firewall slides
FIT 10 - Hargun - Cyberoam
Amazon Network Security
Cyberoam cr300i
Cyberoam security on amazon web services
Firewall presentation
Introduction of firewall slides

Similar to DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM (20)

PDF
Business Driven Security Securing the Smarter Planet pcty_020710_rev
PPTX
Issa Charlotte 2009 Patching Your Users
PDF
Cyberoam: il futuro della network security!
PDF
VIPRE Business Takes a Bite out of Bloatware
PDF
Information security
PPTX
Juniper Provision - 13martie2012
PDF
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
PPTX
Issa Seattle 5 09 Social Engineering
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
5 network-security-threats
PDF
Ghosts In The Machine Today's Invisible Threats Oct 2009
PDF
Anti-Spam Topical White Paper from Finjan
PDF
Securing the Human (人を守るセキュリティ)
PDF
Network monitoring white paper
PDF
Security Threats for SMBs
PPT
Information security in todays world
PPT
Maximizing Security Training ROI
PDF
Buyers Guide to Endpoint Protection Platforms
PDF
Scansafe Annual Global Threat Report 2009
PDF
PaloAlto Enterprise Security Solution
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Issa Charlotte 2009 Patching Your Users
Cyberoam: il futuro della network security!
VIPRE Business Takes a Bite out of Bloatware
Information security
Juniper Provision - 13martie2012
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
Issa Seattle 5 09 Social Engineering
Five Network Security Threats And How To Protect Your Business Wp101112
5 network-security-threats
Ghosts In The Machine Today's Invisible Threats Oct 2009
Anti-Spam Topical White Paper from Finjan
Securing the Human (人を守るセキュリティ)
Network monitoring white paper
Security Threats for SMBs
Information security in todays world
Maximizing Security Training ROI
Buyers Guide to Endpoint Protection Platforms
Scansafe Annual Global Threat Report 2009
PaloAlto Enterprise Security Solution

More from Andris Soroka (20)

PPTX
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
PPTX
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
PPT
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
PPTX
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
PPTX
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
PDF
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
PPTX
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
PPTX
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
PPTX
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
PPTX
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
PDF
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
PPTX
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
PPTX
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
PDF
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
PPTX
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
PPTX
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
PDF
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
PPTX
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
PPTX
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
PPTX
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
project resource management chapter-09.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Hybrid model detection and classification of lung cancer
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
STKI Israel Market Study 2025 version august
observCloud-Native Containerability and monitoring.pptx
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
O2C Customer Invoices to Receipt V15A.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Programs and apps: productivity, graphics, security and other tools
Enhancing emotion recognition model for a student engagement use case through...
TLE Review Electricity (Electricity).pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
project resource management chapter-09.pdf
NewMind AI Weekly Chronicles - August'25-Week II
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
cloud_computing_Infrastucture_as_cloud_p
Developing a website for English-speaking practice to English as a foreign la...
Chapter 5: Probability Theory and Statistics
Hybrid model detection and classification of lung cancer
Group 1 Presentation -Planning and Decision Making .pptx

DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM

  • 1. Securing You Future-ready Security Justinas Valentukevičius Channel Manager Baltics Unified Threat Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 2. Securing You Agenda of Presentation  Let’s meet - Brief introduction to Cyberoam  Next generation firewall or maybe Next generation UTM  Layer 8, WAF and other nice features in Cyberoam UTM  Announcement of NG Series and Virtual UTM  Technical live DEMO later today 15:15 PM www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 3. Securing You About Cyberoam Elitecore technologies founded in 1999 Cyberoam UTM introduced in 2006 (Baltics in 2010) 800+ Employees Sales, Distribution Channel and Customers across 110+ Countries Among the Top 3 UTM players in Gartner Patent Pending Identity-based Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 4. Securing You Cyberoam’s Holistic IT Security Portfolio Unified Threat Securing the IT network Management Centralized security management for remote /branch offices & clients Network Monitoring & & Open Analysis Source Virtual UTM (from December 2012) www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 5. Securing You Cyberoam pagal Gartner 2012 Magic Quadrant for Unified Threat Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 6. Securing You Evolution www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 7. Securing You Seriously, is it enough?? www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 8. Securing You Evolution of Network Security Trends in Security  Basic security began with firewalls  As threats increased, other solutions were introduced  Virus attacks rose in number and intensity  Spam rose  Slammer fueled the need for Intrusion Detection & Prevention  High number of employees start accessing the Internet  Connectivity to branches, partners and remote workers  Blended threats emerge to exploit extensive Internet usage  Average spam messages per day – the  6FirewallsHit on Saturday, January  Slammer employeesinfected with enjoyed a monopoly until  starting of the 21stbe view onlineviruses 18.5business emails contained %  1 systems 25 % in 5 0030to century – 25, pornography year– Forrester IBM2003,  Time spent deleting them – 2.8 Initial Firewalls at work spyware by this were Stateless  That’s a staggering cost of $281-$304 Lost revenue spilled over halfway mintues. which could  Firewallsnext weekin anot control are hit per  % percentlostsay they – 51.8the  into70companies adult day will invest in 65PC the Average time of websites mts initiation of communication  Emailcost of 9toolsand 5 more than anti-spywarethe bailout: pm became am and upgrades more prevalent   Later Stateful became more prevalent between Total  14 % spam recipients actually read  $1 billion mails grew 5,000 % last year Phishing  Pharmingpercent an employees'  today, makes of entry  Till 30-40 no accountability has spam  been established advertised by spam 4 % buy products is not business Internet activity  21 % spam in Jan 2005 was porn related www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 9. Securing You www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 10. Securing You Where are Networks moving to? • High speed Internet (Baltics among TOP countries) • More devices per user – More devices connecting to Internet (BYOD) • More web-applications being accessed • Increase in usage of data www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 11. Securing You What is usual here, in Baltics? Usually we are really well technologically educated and so we understand the need of Enterprise solutions – and we need the best ! However… Usually we are relatively small in size Usually we are quite limited with our budget WHAT WE ARE LOOKING FOR IS BEST TECHNOLOGY FOR THE AFFORDABLE PRICE ! www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 12. Securing You Next generation security www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 13. Securing You Gartner's Definition of the Next Generation Firewall (NGFW) “A wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks”. Next Generation Firewall indicates “the necessary evolution of a firewall” to deal with the changing IT environment in businesses and the consequent evolution in security threats posing to bring these very businesses down. NGFW created a buzz in security circles What is so different about them? www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 14. Securing You Next Generation Firewall Cyberoam Next Generation UTM FW with SI and integrated with IPS, VPN, Web/application Standard first-generation firewall capabilities like Filtering, IM Controls and Web Application Firewall packet filtering, NAT, stateful protocol inspection + Providing Anti Virus and Anti Spyware, Anti Spam, and VPN capabilities Bandwidth Management, Multi Link Management, HA and On-appliance Reporting. IPS tightly integrated with FW. Integrated, rather than merely collocated, Policy creation of multiple features in a single FW interface. network intrusion prevention + All security modules are bound together keeping User Identity as the base. Granular application control Real-time Visualization Application awareness and full stack visibility Secure Application Layer Vulnerabilities Network Visibility based on users and not IP Addresses Extra firewall intelligence Integration with AD, LDAP and RADIUS Servers. Integrates hardware acceleration and automation into a wide Support upgrade paths for integration of new range of packet processing and application-specific information feeds and new techniques to functions address future threats + Virtual UTM series consolidates network security in virtualized environments www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 15. Securing You Cyberoam Unified Threat Management  Gateway Integrated security over single platform  Unique Identity-based Layer 8 approach penetrates through each security module www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 16. Securing You Human approach in Security • Numbers – Hard & Boring 192.168.10.122 172.17.12.123 10.12.11.23 to remember!  Names - Used daily!!! www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 17. Securing You Cyberoam Layer 8 AAA Advantage Cyberoam Cyberoam Cyberoam Authenticates Authorizes Audits User Login • User Name • Internet surfing quota • Identity - based • IP Address • Schedule control Logs + Reports • MAC Id • Security Policies • Compliance Reports • Session Id • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 18. Securing You  Fusion Technology driven SI Firewall - Interface for achieving Unified Security  Rules for all security features from firewall page  Identity-based policies enable security, connectivity, productivity - Easy to configure with Next-Gen UI  Easy navigation, custom controls, intuitive interface - Fewer security errors - Increases security - Enhances administrative productivity - Shorter learning curves : Indicates a feature that is either unique to Cyberoam or it was first introduced in the Industry by Cyberoam www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 19. Securing You  Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity - Supports  IPSec, L2TP, PPTP technologies  SSL-VPN - Client-type independent Web access mode - Application access mode - Client mode  Threat Free Tunneling (TFT) Technology  Scans traffic entering VPN tunnel for: - Malware - Spam - Inappropriate content - Intrusion attempts - Maintains secure endpoint and network environments www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 20. Securing You Mobile VPN for iOS and Android devices  Cyberoam’s Layer 8 Identity based security extended to mobile devices  Securely connect your iPhone, iPad and Android devices to your corporate network through VPN iOS Android IPSec VPN (New) L2TP VPN (New) L2TP VPN PPTP VPN www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 21. Securing You Cyberoam CISCO VPN for iOS www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 22. Securing You SSL VPN user portal www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 23. Securing You  Intrusion Prevention System - Layer 8 and IPS Tuner driven Cyberoam IPS Identity-based IPS policies per user or group  Identity-based alerts and reports - Visibility into applications usage - User, Source, Destination, Usage - Overview of threat status - Top alerts, top attackers, top victims  3500+ signatures – broadest security cover  Internet Threat Response Team  Allows multiple IPS policies www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 24. Securing You  Gateway Anti-Malware - 4 million+ signatures - Bi-directional scanning of web & email - Self-service Virus Quarantine - Reduced window of vulnerability  Broadest security cover against all malware Anti-Virus - Scans  HTTP, FTP, SMTP, POP3  HTTPS, IMAP  Instant Messenger traffic - Layer 8 Impact Anti-Spyware  Identity-based virus reports - Instant visibility into attacker/victim Indicates feature offered only by  Identity-based Quarantine policies top-rated UTMs www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 25. Securing You  Gateway Anti-Spam - IP Reputation Filtering  Blocks 85% of incoming messages at gateway Premium - Saves bandwidth - Near 98% spam detection - False Positive rate of 1 in a million  Reduces fear of losing business emails - Self-Service quarantine area - User-based Spam Digest  Frees administrator time & management - Manage Email recipients  Data leakage prevention and archiving www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 26. Securing You  Web Application Firewall Subscription Firewalls/IPS cannot protect a web application from unknown threats Cyberoam WAF Features include – Positive protection model and No Signature Tables – Intuitive website flow detector automatically adapts to website changes – Protects against OWASP top 10 vulnerabilities – SSL Offloading – Monitoring & Reporting www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 27. Securing You  Cyberoam iView – On-Appliance Logging & Reporting - Ability to log and report activities - LAYER 8 - Identity-based logging and reporting – Pinpoints the user - Security Management  iView dashboard- Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  1000+ Reports - Log Management - Compliance Management  HIPAA, PCI DSS, GLBA, and more - Forensic Analysis www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 28. Securing You Dual Dashboard – Traffic and Security Dashboard  Traffic Dashboard www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 29. Securing You Dual Dashboard – Traffic and Security Dashboard  Security Dashboard www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 30. Securing You Dual Dashboard – Traffic and Security Dashboard  Security Dashboard N/A: Private IP Others: Rest of records www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 31. Securing You Country Maps for Source/Destination Traffic  Graphical overview of Data transfer and Risk level www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 32. Securing You  Web & Content Filtering - Industry’s most comprehensive URL Premium database  82+ categories  44 million+ URLs - On-appliance web category database  Faster access  Surfing pattern privacy - Controls access to HTTP & HTTPS hosted websites  Increases productivity www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 33. Securing You Identity based Technology - The Reason Application Based Control. Username / IP Address www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 34. Securing You www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 35. Securing You IM MANAGEMENT & CONTROL  Allow or block Skype  Control access to leading Instant Messengers (Yahoo, Windows Live)  Control over Chat, Webcam, File Transfer  Log & monitor chat  Filter content over IM: Blacklist certain keywords or regular expressions to prevent data leakage www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 36. Securing You  Best of Breed Bandwidth Management/QoS - Application and Identity-based bandwidth allocation - Category wise Bandwidth management - Restrict Bandwidth usage for a combination of source, destination and service/service group - Schedule-based bandwidth allocation - Committed and burstable bandwidth www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 37. Securing You Identity Based Policies www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 38. Securing You Cyberoam UTM Product Range  Enterprise - CR 2500iNG - CR 1500i - CR 1000i - CR 750ia - CR 500ia  SME - CR 300i - CR 200i - CR 100ia - CR 50ia  Small offices - CR 35ia - CR 25ia - CR 15i - CR 15wi www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 39. Securing You The Cyberoam NG Series and Virtualization  Powerful Hardware  Superior Quality Future-Ready Security  Performance Leap  Value for Money  All-New Firmware www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 40. Securing You Cyberoam Certifications Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall IPv6 Member of ICSA Certified VPNC Certified for Basic Ready Internet Watch High-Availability VPN & AES Interoperability Foundation www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 41. Securing You Reviews and Awards Cyberoam CR35ia outshines competitors in SOHO UTM Group Test www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 42. Securing You THANK YOU ! Cyberoam Online Demo: http://livedemo.cyberoam.com (Username: guest, Password: guest) Contact information: Email: justinas.v@cyberoam.com Skype: justinas.cyberoam +370 615 43623 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
  • 43. Securing You www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.