Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Introducing Quick Heal Terminator.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
Unified Logs and Reporting for Hybrid Centralized Management
CYBEROAM PARTNER PORTAL
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Designed By: Technical Training Department
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Norman Endpoint Protection Advanced security made easy.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You What’s new in CyberoamOS Ver Build 304 Unified.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
© 2007 NeoAccel, Inc. NeoAccel SGX Installation Guide Dear Customer: We are pleased to provide you with our training presentation for our SSL VPN-Plus.
Barracuda Load Balancer Server Availability and Scalability.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)
Honeypot and Intrusion Detection System
Vantage Report 3.0 Product Sales Guide
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Implementing Microsoft Exchange Online with Microsoft Office 365
Hands-On Virtual Computing
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Web Content Security Unlock the Power of the Web
Barracuda Web Filtering Service
Threat Management Gateway
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
(With Hybrid Network Support)
Internet Engineering Course
AT&T Firewall Battlecard
Microsoft Virtual Academy
Presentation transcript:

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Different Stages Virtualization Implementation  Already Implemented  In Process  In Planning

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Data Center  Simplify server management  Reduce infrastructure costs  Reduce physical server sprawl  Reduce power consumption  Implement scalable system to cater for future growth Benefits

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Workstation virtualization -Transform single host server into workgroup of multiple users  Reduce infrastructure costs  Centralized control  Works in a BYOD scenario Benefits Virtualization Strategy: Office in a Box

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Getting office into a box : Enterprise scenario Corporate office Branch office 1 Branch office 2

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization – You Gain Some, You Lose Some

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Scanning InterVM traffic -Cannot scan Inter-VM traffic with externally based security hardware -A single compromised virtual machine can infect the entire data center  Risk of attacks on  Hypervisor management console  Hypervisor & GuestOS  Exploitation of virtualized web-facing application vulnerabilities by hackers  Protecting virtualized servers from intrusion attacks  User-based access control -Tying service access and network usage to user Identity  Security hardware cannot offer inline protection -Traffic flows are invisible; creating blindspots in network -Cannot conduct forensic analysis and display compliance Security challenges in Virtualization Need of virtual security solution for virtual environment

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Solving Virtual Problems Cyberoam Virtual UTM – Solving Virtual Problems

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Resides on the Virtual layer  Scans all traffic inside virtual environment Cyberoam Virtual appliance VM2 Apps Linux OS VM1 Windows OS Apps VM3 Other OS Apps Cyberoam Virtual UTM appliance Hardware Hypervisor Best-of-breed security Stateful inspection firewall Intrusion Prevention System Gateway Antivirus Anti-spyware and Anti-spam Web filtering Application Visibility & Control Web Application Firewall (WAF) Virtual Private Network Logging & Reporting Layer 8 Identity-based security Best-of-breed security Stateful inspection firewall Intrusion Prevention System Gateway Antivirus Anti-spyware and Anti-spam Web filtering Application Visibility & Control Web Application Firewall (WAF) Virtual Private Network Logging & Reporting Layer 8 Identity-based security

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Apply granular firewall and Security policies to traffic in virtual network  Scan Inter-VM traffic  Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS  Secure zero trust networks with Layer 8 identity-based security  Block attacks that exploit vulnerabilities in virtualized web applications  Protect virtual servers from attacks with IPS  Helps display compliance with logs & reports Security in a Virtual Data Center

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Security in a Virtual Data Center Internet administrator Cyberoam vUTM vSwitch

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Enterprise/ MSSP Security in a Box BO/Customer 1 BO/Customer 3 BO/Customer 2 BO/Customer n Complete Virtual Security solution

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario1: MSSP + Hosting Services Provider administrator Cyberoam vUTM vSwitch Customer 2 Internet Cyberoam vUTM vSwitch Customer 1 Cyberoam vUTM vSwitch Customer 3 vSwitch Cyberoam vUTM vSwitch Central Console & Logging /Reporting

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario2: On-premise deployment On-premise deployment Internet administrator Cyberoam vUTM vSwitch MSSP At Customer premise

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario3: ISP as an MSSP vUTM - Customer 1 vUTM – Customer 2 vUTM – Customer 3 Customer 1 ISP Customer 2 Switch R3 R1 R2 R4 Internet

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more  Access control for users -Tying service access and network usage to user Identity  Provides multiple security features on single appliance Cyberoam protects Virtual Office or ‘Office in a box’

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Office-in-a-box setup administrator Cyberoam vUTM vSwitch LAN LaptopRepurposed PC Thin Client Switch Internet Switch

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers  Protection for virtualized networks -Protects hypervisor management console, hypervisor & Guest OS -Scan Inter-VM traffic -Secure zero trust networks  Comprehensive Security -Consolidate multiple security features on single virtual appliance -Secures virtual networks to the extent of physical networks  Ease to deployment -Offers flexibility to allot number of vCPUs -Easy to upgrade with simple activation key

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers  Compliance Management -Segregates and secures traffic and data between and around virtual entities to help stay regulatory compliant -Display compliance with indepth on-appliance reports  Centralized Management for Virtual & Physical appliances -Centrally manage physical and virtual infrastructure using single interface with CCC (Cyberoam Central Console)  Available as Virtual CCC and Hardware CCC -Ensure centralized, consistent and quick security actions across your network

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization platforms Supported  VMware ESX/ESXi 3.5/4.0/4.1/5.0  VMware Workstation 7.0 or 8.0  VMware Player 3.0 or 4.0

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM appliance models OfferingLicensing CRiV-1CSupports upto 1vCPU CRiV-2CSupports upto 2vCPU CRiV-4CSupports upto 4vCPU CRiV-8CSupports upto 8vCPU CRiV-12CSupports upto 12vCPU Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s Security Portfolio Software

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Take Control of Your Security Infrastructure with Cyberoam  Take Control of -WHAT you want? -HOW MUCH you want? -HOW you want?

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtual UTM - Workflow

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Content  Introduction – Cyberoam Virtual UTM  Cyberoam Virtual UTM – Trial -Order -Registration  Cyberoam Virtual UTM – Upgrade -Order -Apply Upgrade  Resources

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Introduction Cyberoam Virtual UTM

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – CRiV Series  Platform support: -VMware ESX/ESXi 4.0/4.1/5.0 -VMware Workstation 8.0/9.0  Base Configuration Required: -One vCPU -1GB vRAM -3 vNIC -Primary Disk with 4GB size -Report Disk with 80GB size -1 Serial Port -1 USB Port

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Subscriptions Cyberoam Virtual UTM appliance range CRiV-TR (30days Trial) CRiV-1CCRiV-2CCRiV-4CCRiV-8CCRiV-12CCRiV-UNL Supported vCPU IPS ●○○○○○○ Gateway Anti-Spam ●○○○○○○ Gateway Anti Virus ●○○○○○○ Outbound Spam Protection ●○○○○○○ Web and Application Filter ●○○○○○○ Web Application Firewall ●○○○○○○ Support ● (8x5) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ● Available ○ Optional Cyberoam Virtual UTM Subscription

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Order

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit & Click on “Try & Buy” STEP 01 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam sales team forwards customer lead to respective partner STEP 02 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial Steps For Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit STEP 01 Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 02 Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 03 Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Registration

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer Continued

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit Existing Customers Login to Customer Portal New Customers create account and Login with credentials STEP 03 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 04 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Enter Trial Appliance Key and other details STEP 05 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You to customer confirming registration of virtual appliance STEP 06 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You to customer with steps to download Virtual UTM appliance STEP 07 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Download Virtual UTM OVF Install Cyberoam Virtual UTM (Refer Installation Guide for reference) Install Cyberoam Virtual UTM (Refer Installation Guide for reference) STEP 08 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Click on Registered appliance key to see appliance information STEP 09 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 10 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Upgrade from Trial to Full Version Upgrade to Higher model Upgrade from Trial to Full Version Upgrade to Higher model

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Order

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 01 STEP 02 STEP 03 Visit

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner shares Cyberoam Virtual UTM Upgrade Key with the customer Cyberoam Team sends Virtual UTM Upgrade Key to Partner

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Apply Upgrade

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  From the Menu select “License upgrade”  Login to Virtual UTM’s CLI Console STEP 01 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  From the Menu select Purchased Model No. STEP 02 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You  On successful activation previous appliance expires and new registered appliance is shown in customer portal  Enter Upgrade Key to activate the purchased appliance STEP 03 Customer

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources  Cyberoam Virtual UTM – CRiV Series Installation Guide  Cyberoam Virtual UTM – CRiV Series Upgrade Guide

© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you