Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.

1 Cyberoam - Unified Threat Management Unified Threat Man...
Author: Bruce Porter
0 downloads 19 Views

1 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN - Secure Remote Access

2 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy  Established in 1999.  500+ Employee Company.  ISO 9001-2000 Certified.  55 Distributors covering 75+ countries.  30000+ combined installation of Central Console (CCC) Unified Threat Management

3 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Agenda of Presentation The Business Need of SSL VPN About Cyberoam SSL VPN Product Walkthrough

4 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy The Business Need for SSL VPN Also, An Introduction to Virtual SSL VPN Appliances

5 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Secure, Remote Access is indispensable in today’s work environment Scenario 1: Employees and Mobile Workers

6 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Secure, Remote Access is indispensable in today’s work environment Scenario 2: Partners, Suppliers and Customers get Extranet access

7 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy IPSec PPTP L2TP SSL VPN Solutions Comparison: When to use What? Ideal for a limited number of employees accessing corporate resources through clients on trusted devices Use SSL VPN in  Different Locations: Home, Airport, Hotels, cyber cafe  Various Devices  laptops, home PC, PDA, mobile phone  Extranet access to customers, partners, suppliers  Web-enabled access – no need to install client on device

8 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy The Onset of Virtualization in SSL VPN… How is it done?  Utilizing virtualization environments like VMware  Building Virtual appliances within existing hardware  Running a large number of independent, virtual SSL VPN gateways  Implementing complex virtual datacenters so servers are consolidated across multiple physical servers

9 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy The Onset of Virtualization in SSL VPN… Benefits  Multiple SSL VPN instances can run on one single appliance  Appliance-wide or individual instances upgrades  Optimum hardware resource allocation  Resilience to hardware failure  Increases deployment scalability  Minimizes operating and maintenance costs  Eco-friendly

10 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Higher security due to 128-K Encryption and Authenticated Access Granularly restrict users to specific applications and resources Security checks on endpoint devices even before giving access Ease of Use Lower costs, Less Maintenance Least Admin intervention Access from any web-enabled device Minimum downtime Business Advantages of SSL VPN

11 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy About Cyberoam SSL VPN

12 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN – Secure Remote Access Employees, Customers, Partners and guest users Cyberoam SSL VPN Internal Resources Different Devices

13 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Roaming UserCyberoam SSL VPNServers (App./Web/FTP/File Share/WTS etc) Client Certificate Username/Password Server Certificate User gets a list of applications based on policies All Published Applications/Resources Cyberoam SSL VPN – How does it work?

14 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Why choose Cyberoam SSL VPN? Scalability and Performance  Unlimited user license  N+1 clustering with application load balancing Available as Virtualized Solution  Available as virtual appliances  Run a large number of independent virtual gateways from existing infrastructure Identity-based Security  Monitor user log-on activity including username, MAC address, IP address of endpoint  Know “who is doing what” in the network

15 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Key Features Multiple Applications Support  Microsoft Outlook, TCP, 802.11X and UDP, FTP, Citrix and Microsoft Terminal Servers and more Secure Firewall Traversal  Works alongside existing firewalls  Prevents exposure of UDP port ranges to hackers  Does not publish internal IP address to outside network

16 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Access Mode  Clientless VPN with a browser agent for seamless access to applications  Linux, Windows, MAC support Authentication and Authorization  Supports LDAP, AD, RADIUS etc.  E-mail based user-provisioning  Support for external two-factor& biometric authentication Key Features

17 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Device Profiling (Endpoint Security)  Product checks – Anti-virus, Firewall & Anti-spyware  Up to 1100+ products supported  MAC address and IP address checks  Quarantine policy for devices that fail profiling test  Remediation information sent to user for any failed access e.g. updating anti-virus software, configuring firewall etc. Key Features

18 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Auditing & Logging  Users logon activity including time of access, username, MAC address and IP address of endpoint Management  Web-based and Command Line Insole  Wizard-driven installation  Role-based administration  Monitor and disconnect live users  Real-time status and monitoring Key Features

19 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Product Walkthrough

20 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Dedicated SSL VPN appliance Deployment

21 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN Virtual Appliance No need to buy separate hardware!!  Based on VMWare virtualization platform  Install multiple virtual SSL VPN machines Cyberoam’s Virtualization platform, VMware allows virtual datacenters where servers are consolidated across multiple physical servers, for guaranteed efficiency and performance

22 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Virtual Appliance Deployment Diagram

23 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy  Bootstrap State ◦ Initial Installation  Configuration state ◦ State where firmware upgrades, license upgrades, backup-restore can be performed (Involves downtime)  Run State ◦ Resource configuration on-the-fly possible ◦ State in when users connect and access their resources Note: Appliance can be changed from Configuration state to Run State as and when needed or vice versa

24 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

25 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Create UsersCreate GroupsOrganize Users in GroupsRegister ApplicationsCreate Application GroupsOrganize applications into application groupsAccess FiltersAccess Control AD/LDAP GroupsEndpoint Security PoliciesDevice Profiling

26 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

27 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Create PolicyCreate ProfileSelect the Policies that apply for the Profile Mandatory ProfileQuarantine ProfileGeneral Profile

28 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

29 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

30 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

31 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

32 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

33 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Pricing and Support Virtual Appliance Mode  Base License – Default 5 user license available for 30 days FREE TRIAL  No Endpoint Security in Trial version Dedicated Appliance Mode  Concurrent user license (upgrade option available e.g.50 to 100 user license upgrade) Support Plans: 8X5 and 24X7 plans based on appliance + per user license Free Trial Download online with support + full access to all features

34 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy CR-SSL-800  Supports 1-50 concurrent users  Secure, remote Intranet & Extranet access  Designed For SMEs, MSSPs and more Comparison of Cyberoam Dedicated Appliance Offerings CR-SSL-1200  Supports 51-250 concurrent users  Secure, remote Intranet & Extranet access  Designed For SMEs, large enterprises, MSSPs and more CR-SSL-2400  Supports 251-1000 concurrent users  Secure, remote Intranet & Extranet access  Designed For large global enterprises, MSSPs

35 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy New Revenue Opportunities: Global SSL VPN market at $500 million in 2008 (Source: Gartner) Support: 24X7 Support and monitoring Centralized Policy Management Continuous access Familiar, easy-to-use interface Cyberoam Virtual Appliances allow MSSPs to service multiple clients through shared allocation of hardware resources Summary Benefits for MSSPs

36 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Reduced costs: Centralized management, minimum admin intervention, timely support Protect your Investments: Use existing networks, firewalls, servers Trusted Remote Access: Extend access to regional offices, partners, customers, telecommuters, wireless users Continuous access: Provide reliable access 24X7 Increase employee productivity (Intranet portals, ERP) Partner access to internal applications (Partner Extranet) Eliminate risks of organizational resource access from cyber cafes, customer site etc. Apply Uniform security policy Summary Benefits for Organizations– Cyberoam SSL VPN

37 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN Virtual Appliance Free Trial…  Register for a free online trial  A fully functional Cyberoam product  Free technical support  No financial obligations

38 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Question/Answer Session

39 Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Please visit us at www.secureone.com.my Thank You