Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.

1 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual U...
Author: Leonard Fort
0 downloads 15 Views

1 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management

2 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Different Stages Virtualization Implementation  Already Implemented  In Process  In Planning

3 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Data Center  Simplify server management  Reduce infrastructure costs  Reduce physical server sprawl  Reduce power consumption  Implement scalable system to cater for future growth Benefits

4 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Workstation virtualization -Transform single host server into workgroup of multiple users  Reduce infrastructure costs  Centralized control  Works in a BYOD scenario Benefits Virtualization Strategy: Office in a Box

5 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Getting office into a box : Enterprise scenario Corporate office Branch office 1 Branch office 2

6 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization – You Gain Some, You Lose Some

7 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Scanning InterVM traffic -Cannot scan Inter-VM traffic with externally based security hardware -A single compromised virtual machine can infect the entire data center  Risk of attacks on  Hypervisor management console  Hypervisor & GuestOS  Exploitation of virtualized web-facing application vulnerabilities by hackers  Protecting virtualized servers from intrusion attacks  User-based access control -Tying service access and network usage to user Identity  Security hardware cannot offer inline protection -Traffic flows are invisible; creating blindspots in network -Cannot conduct forensic analysis and display compliance Security challenges in Virtualization Need of virtual security solution for virtual environment

8 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Solving Virtual Problems Cyberoam Virtual UTM – Solving Virtual Problems

9 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Resides on the Virtual layer  Scans all traffic inside virtual environment Cyberoam Virtual appliance VM2 Apps Linux OS VM1 Windows OS Apps VM3 Other OS Apps Cyberoam Virtual UTM appliance Hardware Hypervisor Best-of-breed security Stateful inspection firewall Intrusion Prevention System Gateway Antivirus Anti-spyware and Anti-spam Web filtering Application Visibility & Control Web Application Firewall (WAF) Virtual Private Network Logging & Reporting Layer 8 Identity-based security Best-of-breed security Stateful inspection firewall Intrusion Prevention System Gateway Antivirus Anti-spyware and Anti-spam Web filtering Application Visibility & Control Web Application Firewall (WAF) Virtual Private Network Logging & Reporting Layer 8 Identity-based security

10 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Apply granular firewall and Security policies to traffic in virtual network  Scan Inter-VM traffic  Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS  Secure zero trust networks with Layer 8 identity-based security  Block attacks that exploit vulnerabilities in virtualized web applications  Protect virtual servers from attacks with IPS  Helps display compliance with logs & reports Security in a Virtual Data Center

11 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Security in a Virtual Data Center Internet administrator Cyberoam vUTM vSwitch

12 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Enterprise/ MSSP Security in a Box BO/Customer 1 BO/Customer 3 BO/Customer 2 BO/Customer n Complete Virtual Security solution

13 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario1: MSSP + Hosting Services Provider administrator Cyberoam vUTM vSwitch Customer 2 Internet Cyberoam vUTM vSwitch Customer 1 Cyberoam vUTM vSwitch Customer 3 vSwitch Cyberoam vUTM vSwitch Central Console & Logging /Reporting

14 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario2: On-premise deployment On-premise deployment Internet administrator Cyberoam vUTM vSwitch MSSP At Customer premise

15 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario3: ISP as an MSSP vUTM - Customer 1 vUTM – Customer 2 vUTM – Customer 3 Customer 1 ISP Customer 2 Switch R3 R1 R2 R4 Internet

16 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more  Access control for users -Tying service access and network usage to user Identity  Provides multiple security features on single appliance Cyberoam protects Virtual Office or ‘Office in a box’

17 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Office-in-a-box setup administrator Cyberoam vUTM vSwitch LAN LaptopRepurposed PC Thin Client Switch Internet Switch

18 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers  Protection for virtualized networks -Protects hypervisor management console, hypervisor & Guest OS -Scan Inter-VM traffic -Secure zero trust networks  Comprehensive Security -Consolidate multiple security features on single virtual appliance -Secures virtual networks to the extent of physical networks  Ease to deployment -Offers flexibility to allot number of vCPUs -Easy to upgrade with simple activation key

19 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers  Compliance Management -Segregates and secures traffic and data between and around virtual entities to help stay regulatory compliant -Display compliance with indepth on-appliance reports  Centralized Management for Virtual & Physical appliances -Centrally manage physical and virtual infrastructure using single interface with CCC (Cyberoam Central Console)  Available as Virtual CCC and Hardware CCC -Ensure centralized, consistent and quick security actions across your network

20 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization platforms Supported  VMware ESX/ESXi 3.5/4.0/4.1/5.0  VMware Workstation 7.0 or 8.0  VMware Player 3.0 or 4.0

21 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM appliance models OfferingLicensing CRiV-1CSupports upto 1vCPU CRiV-2CSupports upto 2vCPU CRiV-4CSupports upto 4vCPU CRiV-8CSupports upto 8vCPU CRiV-12CSupports upto 12vCPU Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.

22 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s Security Portfolio Software

23 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Take Control of Your Security Infrastructure with Cyberoam  Take Control of -WHAT you want? -HOW MUCH you want? -HOW you want?

24 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtual UTM - Workflow

25 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Content  Introduction – Cyberoam Virtual UTM  Cyberoam Virtual UTM – Trial -Order -Registration  Cyberoam Virtual UTM – Upgrade -Order -Apply Upgrade  Resources

26 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Introduction Cyberoam Virtual UTM

27 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – CRiV Series  Platform support: -VMware ESX/ESXi 4.0/4.1/5.0 -VMware Workstation 8.0/9.0  Base Configuration Required: -One vCPU -1GB vRAM -3 vNIC -Primary Disk with 4GB size -Report Disk with 80GB size -1 Serial Port -1 USB Port

28 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Subscriptions Cyberoam Virtual UTM appliance range CRiV-TR (30days Trial) CRiV-1CCRiV-2CCRiV-4CCRiV-8CCRiV-12CCRiV-UNL Supported vCPU 3212481232 IPS ●○○○○○○ Gateway Anti-Spam ●○○○○○○ Gateway Anti Virus ●○○○○○○ Outbound Spam Protection ●○○○○○○ Web and Application Filter ●○○○○○○ Web Application Firewall ●○○○○○○ Support ● (8x5) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ● Available ○ Optional Cyberoam Virtual UTM Subscription

29 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial

30 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Order

31 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer

32 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit www.cyberoam.com & Click on “Try & Buy” STEP 01 Customer

33 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam sales team forwards customer lead to respective partner STEP 02 Customer

34 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial Steps For Partner

35 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit https://partner.cyberoam.com STEP 01 Partner

36 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 02 Partner

37 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 03 Partner

38 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner

39 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Registration

40 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer Continued

41 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit https://customer.cyberoam.com Existing Customers Login to Customer Portal New Customers create account and Login with credentials STEP 03 Customer

42 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 04 Customer

43 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Enter Trial Appliance Key and other details STEP 05 Customer

44 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Email to customer confirming registration of virtual appliance STEP 06 Customer

45 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Email to customer with steps to download Virtual UTM appliance STEP 07 Customer

46 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Download Virtual UTM OVF Install Cyberoam Virtual UTM (Refer Installation Guide for reference) Install Cyberoam Virtual UTM (Refer Installation Guide for reference) STEP 08 Customer

47 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Click on Registered appliance key to see appliance information STEP 09 Customer

48 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 10 Customer

49 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Upgrade from Trial to Full Version Upgrade to Higher model Upgrade from Trial to Full Version Upgrade to Higher model

50 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Order

51 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order

52 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Partner

53 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 01 STEP 02 STEP 03 Visit https://partner.cyberoam.com

54 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner shares Cyberoam Virtual UTM Upgrade Key with the customer Cyberoam Team sends Virtual UTM Upgrade Key to Partner

55 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Apply Upgrade

56 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer

57 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  From the Menu select “License upgrade”  Login to Virtual UTM’s CLI Console STEP 01 Customer

58 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  From the Menu select Purchased Model No. STEP 02 Customer

59 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  On successful activation previous appliance expires and new registered appliance is shown in customer portal  Enter Upgrade Key to activate the purchased appliance STEP 03 Customer

60 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources

61 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources  Cyberoam Virtual UTM – CRiV Series Installation Guide  Cyberoam Virtual UTM – CRiV Series Upgrade Guide

62 www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you