Presentation is loading. Please wait.

Presentation is loading. Please wait.

To offer Telecom Customers : Network Connectivity, Productivity & Security with Cyberoam CONNECTIVITY PRODUCTIVITY SECURITY.

Similar presentations


Presentation on theme: "To offer Telecom Customers : Network Connectivity, Productivity & Security with Cyberoam CONNECTIVITY PRODUCTIVITY SECURITY."— Presentation transcript:

1

2

3

4

5

6 To offer Telecom Customers : Network Connectivity, Productivity & Security with Cyberoam CONNECTIVITY PRODUCTIVITY SECURITY

7 Offer

8

9 Cyberoam Introduction Sales, Distribution Channel and Customers across 110+ Countries Backed by World’s Largest PE Investor ($90bn); The Carlyle Group Technology Powerhouse – Founded in 1999 800+ Employees Patent Pending Identity-based Management Amongst the top 3 global UTM players in terms of features

10 MNC Clientele

11 FEW CUSTOMER ACQUISITIONS (2011-12) Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC) Carlson Suites, USA (150 x CR15i ) Indian Army, India (50 x CR500ia, CR200i with CCC) National Stock Exchange. India (240 x CR50ia with CCC) LYDEC, Morocco ( Multiple CR’s) Ministry of Justice, Morocco, (84x CR1000ia) Casablanca Stock Exchange, Morocco (4 x 500ia) Iran Postal Services, GCC, (44 x CR200i) Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC) BTT Bank, GCC, (30 X CR300i) Abu Dhabi Government, Abu Dhabi (4 x CR1500ia) Giordano, UAE/Saudi, (50 x CR25ia) Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC) Ministry of Interior, Italy, (8 x CR1500ia, CCC) Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC) Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia) British Aid, Kenya (6 x CR1500ia) Imperial Logistics, South Africa (20 x CR15i) Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO And Many More….

12 2.5 Years in North Africa! Revenue grew 60% YOY 500+ success deployments Conducted 30 CCNSP & 7 CCNSE trainings 14+ CCSC Trainings 200+ CCNSPs on ground Number of end client focused events & seminars Successful Penetration in all the verticals.

13 North African Clientele And Many More….

14

15 Typical Requirements of MSSP Providing best quality of services to clients with least effort and cost -Provide higher coverage of managed security services -Centralized control of client network’s security without allocating dedicated resources for each client Rapid deployment at client site without interrupting client operations Easy Policy setting, Modification, Monitoring Performance, Reacting to situations in time Pro-active security management

16 Typical Requirements of MSSP Have a system that  Is simple to configure and manage  Helps meet the SLA’s  Help customers to display compliance Ability to offer flexible security plans to clients Ability to offer easy system upgrade alternative for growing businesses

17

18 Be an MSSP in 3 Simple Steps Use Cyberoam UTM (Internal Network) Sell Cyberoam UTM Manage Cyberoam with CCC/ VCC/ CCMS 1 2 3

19 Cyberoam Solution for MSSP

20 Cyberoam UTM – Layer 8 Technology

21 192.168.3.110 Ancy 192.168.3.105 Richard Internet Corporate LAN DHCP Administrator  Applies security policies based on actual identity of users.  User-specific rules for multiple users to share a common IP address 192.168.3.110 Steve 192.168.3.105 192.168.3.110 Layer 8 security in DHCP environment

22 Cyberoam’s Layer 8 (Identity-based) security Cyberoam Audits Identity–based Logs + Reports Compliance Reports Cyberoam Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Cyberoam Authenticates User Name IP Address MAC Id Session Id Users Customers Employees Management Partners Identity-based AAA

23 Cyberoam UTM Features are :  Fusion Technology driven SI Firewall -Interface for achieving Unified Security  Intrusion Prevention System -Maximum security against emerging threats -Identity-based IPS policies per user or group -3500+ signatures – broadest security cover  Gateway Anti-Virus, Anti-spyware -Prevent blended threats -4 million+ signatures -Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic

24 Other Cyberoam UTM Features are :  Virtual Private Network (VPN) -Threat-free remote access -Threat Free Tunneling (TFT) Technology -IPSec, L2TP, PPTP and SSL-VPN  Multi-Link Management -For an ‘always-on’ network -Support for more than 2 ISP links -Supports Wireless WAN (3G USB modems, WiMax) -Gateway failover over VPN

25 Other Cyberoam UTM Features are :  Gateway Anti-Spam -Real-time, most accurate spam protection -Recurrent Pattern Detection (RPD) technology -Scans SMTP, POP3, IMAP traffic  Outbound Spam Protection -Protecting service providers against -Outbound Spam  iView: Intelligent logging & reporting -Real-time visibility into network activities -On-appliance reporting. LAYER 8 - Identity-based reporting -1200+ reports

26 Other Cyberoam UTM Features are :  Instant Messaging & Control -Identity-based controls for Yahoo messenger and Windows Live Messenger -Control who can chat with whom, file transfer, webcam  Bandwidth Management -Enhance network performance and productivity -Application and Identity-based bandwidth allocation

27 Other Cyberoam UTM Features are :  3G/WiMAX Connectivity -Secure, Uninterruped WAN Connectivity -Configure Wireless WAN as primary or back-up link  ‘IPv6 Ready’ Gold  Web & Content Filtering -Complete Visibility & Control over HTTP & HTTPS -82+ categories and 44 million+ URLs

28 Multiple security features over single appliance Cyberoam UTM – One Stop Solution !!!

29 UTM appliance range Segment wise & Network size Small and Remote Offices Small to Medium Enterprises Large Enterprises CR35wiNG, CR35iNG, CR 25wiNG – 6P, CR 25iNG – 6P, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG CR200i, CR300i, CR100iNG, CR50iNG CR 2500iNG, CR1500ia, CR1500ia-10F CR1000ia, CR1000ia-10F CR750ia, CR750ia-1F/10F CR500ia, CR500ia – RP/1F/10F

30 Subscriptions Bifurcations  Identity-based Firewall  VPN  Free SSL-VPN  Bandwidth Management  Multiple Link Management  On Appliance Reporting  Basic Anti-Spam (RBL Service) Basic Appliance Subscriptions  Gateway Anti-Virus  Gateway Anti-spam  Web & Application Filtering  Intrusion Prevention System (IPS)  Web application firewall  8x5 Tech support & Warranty  24 x 7 Tech Support & Warranty

31 Cyberoam UTM – Subscriptions Enables MSSP to offer flexible service packages to their customers Customers with individual security needs: -Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) -Anti-Spam -Web & Application Filtering Subscription -Intrusion Prevention System Subscription Advanced Subscriptions include: -Web Application Firewall (WAF) Subscription -Outbound Spam Protection Subscription Support Subscriptions -8x5 support -24x7 support

32 Cyberoam UTM – Bundled Subscriptions For customers not having mail server in their network Security Value Subscription (SVS) / SVS Plus*  Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)  Web & Application Filtering Subscription  Intrusion Prevention System (IPS)  8x5 Tech Support & Warranty For customer having mail server in their network Total Value Subscription (TVS) / TVS Plus*  Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)  Gateway Anti-Spam Subscription  Web & Application Filtering Subscription  Intrusion Prevention System (IPS)  8x5 Tech Support & Warranty * SVS Plus and TVS Plus offers additional 24x7 support service to SVS and TVS services

33 Cyberoam UTM – Advance Subscriptions For customers having web server in their network Web Application Firewall (WAF) Subscription  Protection to corporate websites and web-based applications such as CRM, ERP, MIS, Payment Gateway and others  Website Flow Detector technology  OWASP Top 10 web application vulnerabilities For Service Providers to protect them from Outbound spam Outbound Spam Protection Subscription  Unique feature with Cyberoam UTM  Scanning with Recurrent Pattern Detection (RPD) Technology  Detection of Outbound Spam which is a part of global outbreak  Near 98% spam detection  False Positive rate of 1 in a million

34 CCC – Cyberoam Central Console  Centralized integrated management and monitoring appliance  Helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam installations centrally

35 Ease and flexibility of management  Easy grouping of Cyberoam UTM appliances -Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions -Dynamic views in CCC help in managing, searching and sorting appliances -Customizable and multiple dashboards

36 Group of UTM Appliances Ease and flexibility of management Based on Geography Based on Appliance Models Based on Client

37 Appliance Discovery Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click

38 Easy, instant security policy enforcement  Simplified security management -Centralized policy creation and implementation for all Cyberoam UTM features  Leads to uniform adoption of security practices across offices  Establish policies based on work- profiles across offices -Subscription and signature updates for Cyberoam UTM features like Gateway Anti-Virus, Anti-Spam, etc. -Protection against zero-hour threats

39 Easy, instant security policy enforcement Add UTM appliances Client based grouping of UTM appliances

40 Configure UTM appliance from CCC Easy, instant security policy enforcement

41 Update configuration of UTM appliances

42 Easy Signature Distribution

43 Security against misuse of administrator privileges  Role-based administration privileges -For CCC appliance -Individual Cyberoam appliances -Groups of Cyberoam UTM appliances

44 CCC Access profiles Profiles considered: VPN Administrator, Security Administrator, Global Administrator Role based administration privileges

45 CCC rights per access profile (example of VPN administrator rights) Role based administration privileges

46 CCC admin users Role based administration privileges

47 Access to each UTM appliance

48 Audit logs & alerts for organization-wide security visibility  Logs and views of administrator actions as well as dispersed UTM appliances -Instant security visibility -Supports regulatory compliance -Investigative analysis -Keeping track of historical activity  Email alerts -Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, etc. -Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count, etc.

49 Audit logs and alerts for greater security visibility CCC Logs

50 Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs

51 Audit logs and alerts for greater security visibility Alert configuration

52 Audit logs and alerts for greater security visibility Email Alert

53 Cyberoam’s Centralized Management Solution available as: Hardware Appliance Virtual CCC (VMWare Supported) Cloud Computing Managed Services

54 Hardware CCC Appliance  Dedicated appliance for centralized management  Manage from 15 to 1000 Cyberoam UTM appliances Virtual CCC Appliance  VMware based CCC Virtual appliances  Server-based Virtual environment and Workstation- based Virtual environment  Eliminate need for dedicated hardware, reduce cost of ownership, simplify future upgrades for users

55 Cyberoam’s On-Cloud Management Service (CCMS)  Managed security services hosted on Cyberoam’s Cloud - MSSPs don’t need to invest in core SoC  Customer account management, customer appliance monitoring and management from the web portal  MSSP engineer can offer services to clients from anywhere without being present at the SoC  MSSP can maximize their revenue with recurring business Abu Dhabi Dubai Sharjah Group: Customer2 Abu Dhabi Dubai Sharjah Group: Customer1 MSSP Network Customer Appliances

56 CCC Benefits  Real-time protection against newly identified threats  Complete control over distributed networks from central location  Quick policy setting and security management  Lower operational cost, complexity and time to maintain dispersed client networks  Enables MSSPs to have different personnel for managing distributed Cyberoam UTM appliances for quick, error-free security management

57 Cyberoam offers First-of-its-kind On-Appliance Reporting

58  Eliminates the need to purchase a dedicated reporting solution -1200+ indepth reports  Real time visibility into user and network activities  Logs and Reports help organizations with -Security management -Compliance Management -Forensic Analysis  Reports include dynamic and animated reports, in-line graphs, country maps First-of-its-kind On-appliance reporting

59 Interactive World Traffic Map

60 Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard

61 Dual Dashboard – Traffic and Security Dashboard Security Dashboard

62 Application Reports

63 Compliance Reports

64 Abu Dhabi Dubai Sharjah Group: Customer2 Abu Dhabi Dubai Sharjah Group: Customer1 MSSP Network Customer Appliances Abu Dhabi Dubai Sharjah Group: Customer3 Cyberoam Deployment for MSSP Cyberoam Central Management Hardware/Virtual/Cloud MPLS Network FTTx Network (GPON Technology) DSL or Wi-Max

65 Taking a look at each steps in MSSP operations  Client Requirement Identification  Deployment & Testing  Remotely managing Security of client setup  Reporting & Compliance Management Cyberoam can help MSSP at each step

66 Client Requirement Identification  Based on number of users  Cyberoam UTMs available for various size of organizations  Security requirement of client  Individual or bundled subscriptions

67 Deployment & Testing  Rapid client site deployment through pre-configured Deployment Kit  Cyberoam’s industry standard design easily fits in to client’s existing infrastructure Cyberoam Deployment Kit

68 Remote Security Management  Real-time visibility of client’s network with alerts  Multiple ways of remotely monitoring and managing client networks  Hardware appliance  VMware based virtual appliance  Cloud based centralized management Reporting and Compliance Management  Centrally manage logging and reporting of multiple client sites  Generate reports for each client  Comply to industry standard compliances as per client needs

69 Update  Protect client’s network against latest threats  Automatic subscription and signature updates

70 Before PurchaseWhile Installation After Sales: On Chat On Email On Phone After Sales: 24x7 to Resellers 8x5 to Enduser Cyberoam After Sales Services

71 Customer Engineer Team (CE) Dedicated Technical Account Manager (TAM) for every region Rest of World (ROW) (ANZ, APAC, ME, EU, LATAM, AFRICA) Rest of World (ROW) (ANZ, APAC, ME, EU, LATAM, AFRICA) North America & Canada SAARC Cyberoam Global Presales Team Presales Team Structure

72 Presales Support for Partner EMAIL: AFRICAPARTNERS@CYBEROAM.COM CHAT: HTTP://WWW.CYBEROAM.COM/PRESALESSUPPORT PHONE: +1-877-777-0368 (TOLL FREE) 24x7 AVAILABILITY KNOWLEDGE Base for Partners : For How To’s, FAQ’s, Release Notes http://kb.cyberoam.com

73  Post-sales Support - Email - Chat - Telephone: Toll Free Post-sales Support Post-sales Support for Customer’s

74 Developing competencies with Cyberoam UTM appliances CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE) CYBEROAM CERTIFIED TRAINER (CCT) CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP) Training & Certification Programs for Partner

75

76 West Africa Telecom, Liberia (MSSP) GLO – Nigeria’s Largest Telco Cobranet – Nigeria (MSSP) Busy Internet – Ghana (MSSP) Netcom – Nigeria (MSSP) Vodacom – Tanzania Biggest Telco SimbaNet – Tanzania

77 SimbaNet – Kenya (MSSP) Access Kenya – Kenya (MSSP) CS Lox Info – Thailand (MSSP) TRUE – Thailand ISP (MSSP) CAT – Thailand (MSSP) Baltnetos – Lithuania (MSSP) DootAll – Netherlands (MSSP)

78 Mobile 8 – Indonesia (MSSP) MTDS – Morocco AIRLINK – Morocco & many more..

79

80 2012 Magic Quadrant for Unified Threat Management NOT TO FORGET “Cyberoam maintains a high level of loyalty from its channel partners.” Source: Gartner MQ 2011 2012: Rated #3 in UTM market in terms of Competeness of Vision

81 Anti-VirusAnti-SpywareAnti-SpamURL FilteringFirewallVPNIPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified FirewallVPNC Certified for Basic VPN & AES Interoperability ICSA Certified High-Availability Premium IPv6 Ready Member of Internet Watch Foundation Host of Awards / Certifications

82 Authorised Distributor in North Africa Config Tunisia Cyberoam National Distributor Tel : +216 71 792 802 Fax : +216 71 792 611 Email: config.tunisie@config.tn Morocco | Tunisia | France Switzerland | Algeria Next Step IT Cyberoam Preferred Reseller Tel: + 216 71 90 60 41 Fax: + 216 71 90 60 43 Email: h.maalaoui@it-nextstep.com

83 Questions?

84 Yashesh Vaishnav Regional Manager Cyberoam www.cyberoam.com Email: yashesh.vaishnav@cyberoam.com


Download ppt "To offer Telecom Customers : Network Connectivity, Productivity & Security with Cyberoam CONNECTIVITY PRODUCTIVITY SECURITY."

Similar presentations


Ads by Google