Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.

1 www.cyberoam.com © Copyright 2011 Elitecore Technologie...
Author: Alan Mathews
0 downloads 12 Views

1 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data Protection Presented by: Shailesh Mecwan, Manager - Channel sales (Europe) Comprehensive Network Security CYBEROAM

2 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Agenda of Presentation  Why MSSP?  Drivers of MSSP business  Customer s’ criteria  Challenges of MSSP  How can Cyberoam help?  What is Cyberoam?  Cyberoam product range  Business Model  Questions and Answers

3 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  MSS market in Europe = USD 2.1 billion (in 2010)  Expected compound annual growth rate = 14 % Why get into Managed Security Services business in Europe?

4 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Drivers for employing Managed Security Services (MSS) Source: Forrester Research

5 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer’s criteria to evaluate MSSPs  Ability of the MSSP to present their coverage of services -Comprehensive Security Management  Depth of Security Expertise  Help in taking decisions in real-time  Quality of Service -Delivery Capabilities -SLA’s  Cost  Compliance Requirements

6 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges of MSSP  Providing best quality of services to clients with least effort and cost -Provide higher coverage of managed security services -Centralized control of client network’s security  Policy setting, Modification, Monitoring Performance, Reacting to situations in time, Pro-active security management  Have a system that -Is simple to configure and manage -helps meet the SLA’s -Help customers to display compliance  Ability to offer flexible security plans to clients

7 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You How can Cyberoam help?

8 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Stockholm Berlin Prague Group: Customer2 Cyberoam deployment scenario for MSSPs Vilnius Warsaw Paris Group: Customer1 MSSP Network Customer Appliances Boston Dubai New York Group: Customer3

9 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

10 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Internal threats  Identity theft  Data loss  Data deletion  Data modification External threats  Worms  Malicious code  Virus  Malware Social Engineering threats  Spam  Phishing  Pharming  Data theft  DoS attacks  Hacking USER Attack on Organization User – The Weakest Security Link

11 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

12 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You User Layer 8 – The Human Layer  Layer 8 Technology – Security around the User -Network security decisions based on Usernames and IP Addresses  Control Who is doing What in the network  Allows creation of User Identity-based security policies  Identifies traffic by username even in case of dynamic IP indicates a feature unique to Cyberoam

13 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Reduced complexity -All-in-one approach simplifies product selection, integration and support  Easy to deploy -Customers, VARs, VADs, MSSPs can easily install and maintain the products  Remote Management -Remote sites may not have security professionals – requires plug-and- play appliance for easy installation and management  Better Man Power Management -Reduction in dependency and number of high end skilled Human resources  Managed Services -Security requirements & day to day operations can be outsourced to MSSPs Benefits of UTM Appliances

14 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You 192.168.3.110 Ancy 192.168.3.105 Richard Internet Corporate LAN DHCP Administrator  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address 192.168.3.110 Steve 192.168.3.105 192.168.3.110 Identity-based security in DHCP environment

15 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Cyberoam’s Layer 8 Technology adds SPEED to security -Offers instant visibility into source of attacks -Identifies attackers/victims with usernames -Allows immediate remediation to restore security or enables proactive security -Quickly and easily configure and manage policies based on users Layer 8 – The Human Layer

16 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Gateway Integrated security over single platform  Layer 8 penetrates through each security module  Reduced TCO (Total Cost of Operations) -Best Quality of Security features -Lower expenditure -Ease of Management -Reduced cost of training and support -Ability to upgrade to future threats -Security subscriptions as needs grow Cyberoam UTM- Identity-based Security

17 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Know who is doing what in your Network with Cyberoam’s Layer 8 Technology Know who is doing what in your Network with Cyberoam’s Layer 8 Technology

18 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Other UTMs User Login Cyberoam Authenticates User IP Address MAC Id Session Id Cyberoam Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Cyberoam Audits Identity - based Logs + Reports Compliance Reports MAC Id Session Id Cyberoam Layer 8 Advantage

19 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam UTM solves Organizational Concerns

20 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam UTM Product Range SMEEnterprisesSmall Offices 15wi, 15i, 25ia, 25wi, 35ia, 35wi 50ia, 100ia, 200i, 300i500ia, 750ia, 1000ia, 1500ia

21 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

22 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Cyberoam Central Console is an centralized integrated management and monitoring appliance allows to manage multiple, dispersed Cyberoam UTM Installations.  Cyberoam Central Console helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam Installations centrally. Cyberoam Central Console (CCC Series)

23 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Boston Dubai New York Group: Customer2 Boston Dubai New York Group: Customer1 MSSP Network Customer Appliances Boston Dubai New York Group: Customer3 Virtual CCC deployment for MSSPs

24 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Benefits of Virtual CCC appliances -Eliminates need for dedicated hardware -Use existing VMware environment -Simplifies future upgrades -Reduces cost of ownership Virtual CCC Appliances

25 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Server-basedWorkstation-based Virtual Workstation Application Server, Email Server

26 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC - Easy, instant security policy enforcement  Simplified security management -Centralized policy creation and implementation for Cyberoam UTM features like Firewall, IPS etc.  Leads to uniform adoption of security practices across offices  Establish policies based on work-profiles across offices -Subscription and signature updates for Cyberoam UTM features like Gateway Anti-virus, Anti-Spam etc. -Protection against zero-hour threats

27 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Ease and flexibility of management  Easy grouping of Cyberoam UTM appliances -Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions -Dynamic views in CCC help in managing, searching and sorting appliances -Customizable and multiple dashboards

28 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Security against misuse of administrator privileges  Role-based administration privileges -For CCC appliance -Individual Cyberoam appliances -Groups of Cyberoam UTM appliances

29 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs & alerts for organization-wide security visibility  Logs and views of administrator actions as well as dispersed UTM appliances -Instant security visibility -Supports regulatory compliance -Investigative analysis -Keeping track of historical activity  Email alerts -Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits etc. -Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count etc.

30 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC Features & Benefits

31 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Use existing virtual environment to host CCC –VMware-based Virtual CCC appliances  Virtual CCC for VMware Server –CCC VMS 15, CCC VMS 50, CCC VMS 100, CCC VMS 200  Virtual CCC for VMware Workstation –CCC VMW 15, CCC VMW 50, CCC VMW 100, CCC VMW 200 Virtual CCC Appliance Product Range

32 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

33 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Servers Firewalls IDP / IPS Switches Routers UTM Applications Desktop systems Logs & Events Identity LoggingReporting Compliance Management Forensic Analysis Data Protection Security Management

34 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You iView - Cyberoam’s Logging and Reporting Tool  MSSPs can aggregate the reports of various customers  Free (Open Source)  Aggregation of logs and data from multiple CR appliances as well as competitor appliances, Squid, Access Gateway etc  Centralized storage of reports and log data  View reports of specific devices  Application Usage Reports  User-wise web surfing reports  Real-time Monitoring and Alerting  Over 1000+ Drilldown Reports  Reports in HTML, PDF, & CSV formats & Email Alerts  Web 2.0 GUI and Reporting interface  Role based user access of iView

35 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You iView - Compliance Reports  PCI (Payment Card Industry)  HIPPA (Health Insurance Portability and Accountability Act)  GLBA (Gramm-Leach-Bliley Act)  SOX (Sarbanes-Oxley Act)  FISMA (Federal Information Security Management Act)

36 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Business Model

37 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Business Model 100% Channel focused company  Quick product support  Better margin  Access to Sales Leads  Lead locking facility  Marketing support  Access to comprehensive Knowledgebase  Technical and Sales training (free of cost)  Access to market development funds  Access to Cyberoam Partner Portal

38 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Q&A If any??

39 www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you! [email protected] Phone: +91-9974060355 (24X7)* Skype: shailesh.elitecore