Cyberoam iNG series slide

greenpepperwhinnySecurity

Nov 3, 2013 (3 years and 7 months ago)

102 views

Cyberoam NG series:

Future
-
ready Security

www.secureone.com.my | sales@secureone.com.my

The
Future

of
networks…

www.secureone.com.my | sales@secureone.com.my

Where are Networks moving to?


Superfast Internet: 1000 Mbps Internet speed a reality today!


More devices per user


More devices connecting to Internet


More web
-
applications being accessed


Increase in usage of data

www.secureone.com.my | sales@secureone.com.my

How will Organizations Gain?

With Network Connectivity & Productivity taking a leap,

what about Security?

SECURITY

CONNECTIVITY

PRODUCTIVITY

No one wants SECURITY to become a

bottleneck in their network!

www.secureone.com.my | sales@secureone.com.my

Presenting

The Cyberoam NG series

The ‘Next
-
Generation’ appliances built for
Future
-
ready Security in networks!


www.secureone.com.my | sales@secureone.com.my

Cyberoam NG (Next
-
Generation) series offers
‘Future
-
Ready’ Security



The
Fastest ‘UTM’ appliances
for SOHO and SMB segments


Offering
Next
-
Generation Firewall
protection for Large
Enterprises!



Offering Future
-
Ready security to


SOHO, ROBO


CR15iNG, CR25iNG, CR35iNG


Wi
-
Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG


SMB


CR50iNG, CR100iNG


Enterprise


CR2500iNG










The Cyberoam NG Series


Powerful Hardware


Superior Quality


Performance Leap


Value for Money


All
-
New Firmware

Future
-
Ready

Security


Powerful Hardware for Future
-
Ready Security



Superfast processing speed


A must for Gigabit Internet speeds!


Nano

second security processing with Giga Hertz processors


Parallel security processing with Dual core



Next
-
Gen Memory


High Internet speed and data transfer demand Next
-
Gen
memory


Larger memory size for Enterprise
-
grade security


DDR3 RAM for more number of data transfers per clock cycle


Faster, Next
-
Gen memory for higher I/O throughput



Powerful Hardware for Future
-
Ready Security



Gigabit Ports for Gigabit Speeds


Any network security appliance with having less than Gigabit
port is nearly obsolete!


All network components have moved to Gigabit ports


Gigabit Ethernet for future SOHO & SMB networks


Higher port density



More Storage


Today, higher throughput leads to more activities,

generating more data.


More storage for more reports


Reports stored for longer duration



Superior Quality


Better performance


Design & components supporting high speed I/O
throughput


Highly robust


Designed to protect against power surge & fluctuations


Industrial grade components to withstand extreme
environments


Wi
-
Fi Security appliances for SOHO/ROBO networks



Faster performance, broader coverage with 3x3 MIMO
Technology


Dual band support: 2.4 GHz or 5 GHz


Higher performance by aggressively transmitting and
receiving data over Wi
-
Fi channels


Faster handling of video streaming and high bandwidth
downloads


High performance integrated security over WLAN


Secures wireless networks to the extent of wired networks



Appliances starting with Gigabit Firewall Throughputs

* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

Best in class UTM throughputs

* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above


CR2500iNG: Next
-
Generation Firewall throughput

36000 Mbps

0
10000
20000
30000
40000
Firewall throughput
UTM throughput: 4000 Mbps


Supports
upto

4000 users

Get Ready for Future Networks


6.5 times increase in Firewall throughputs


5 times increase in UTM throughputs


Best in class throughput against competitor models


An Anti
-
aging remedy for your network offering the best value
for money!

The NG Series
-

Loaded with All
-
New Firmware

The NG Series
-

All
-
New
-
GUI

www.secureone.com.my | sales@secureone.com.my

www.secureone.com.my | sales@secureone.com.my

www.secureone.com.my | sales@secureone.com.my

www.secureone.com.my | sales@secureone.com.my

www.secureone.com.my | sales@secureone.com.my

www.secureone.com.my | sales@secureone.com.my

www.secureone.com.my | sales@secureone.com.my

The need for “Intelligent Software”



Key challenges


Keep up with the exponentially rising Network Traffic


Reduce overall cost of networking & security equipments


Minimize power consumption



Limitation of “Hardware”


Increasing clock frequencies to boost performance leads to
prohibitively high power consumption



Shift to
Multicore

architecture to


Meet every increasing performance


Maintain manageable levels of power consumption


CyberoamOS

with ‘Intelligent Software’

‘Intelligent Software’: Doing more with less



Tightly integrates with Hardware for Network & Crypto
Acceleration delivering high performance


Better use of
Multicore

architecture for Parallel processing


Optimize workload distribution across cores


Lockless path for packet forwarding


A single core handles packets for each connection at any
given time to avoid inter
-
locks


Optimize Interrupt rate for minimum CPU overhead and latency


High rate of interrupts
-

A bottleneck in high
-
speed data
transfers



‘Intelligent Software’: Doing more with less



Fastpath packets to improve processing speed and reduce CPU
overhead


Avoid firewalling for file packets once Firewall decision is
taken (unless in event of rule change).


E.g. 200
mb

file. Once the Firewall decision is taken on the file,
the rest file packets need not go through Firewalling decision.



The need for Next
Generation Security
features…

The need to be more application
-
layer aware than
ever before

-
Explosion of Internet Applications

-
Risk: ‘Application Chaos’ in organization

Internet

NG series offers

Advanced Application Controls

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Take control of which applications can run on your network

Risk Level

Very Low

(1)

Low (2)

Medium (3)

High (4)

Very High (5)

Application
Characteristics

Excessive Bandwidth

Prone to misuse

Transfer files

Tunnel other apps

Widely used

Loss of Productivity

Can bypass firewall policy

Application
Technology

Browser Based

Client Server

Network Protocol

P2P

Application Classification based on

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Application Classification

Applications are classified based on

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Proactive Protection
Model


Administrator can simply select filtering criteria


Technology, Risk Level or Characteristics



Set action


regardless of application name


Allow or Deny



Allow/Block all future applications included for respective criteria



No need of administrator intervention to add new applications to
policy

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Proactive Protection
Model

Select P2P
Applications

Set Action

Block all future P2P
application without adding
applications manually

www.secureone.com.my | sales@secureone.com.my


VoIP

Bit

Torrent

CRM


ERP

IM

Application

Web

mail

Internet

Medium Quality

High Quality


Low Quality

5000+ Applications

Control over

Prioritize applications with Cyberoam’s Layer 7 &
Layer 8 Visibility & Controls

www.secureone.com.my | sales@secureone.com.my

The increasing need to protect Web Applications
from hackers


Critical business applications and Services moving
to the Web. Risk of web
-
application attack.


Firewalls/IPS cannot protect a web application
from unknown threats




Critical business

applications

NG series offers

On
-
Appliance Web Application
Firewall

On
-
Appliance Web Application Firewall


Protect Web Servers and Web Applications from hackers


No need to buy dedicated WAF appliance


Cyberoam WAF blocks hackers from exploiting Web
-
Application
Vulnerabilities


WAF Features include


Positive protection model and No Signature Tables


Intuitive website flow detector automatically adapts to website
changes





Protects against OWASP
top 10 vulnerabilities


SSL Offloading


Monitoring & Reporting

www.secureone.com.my | sales@secureone.com.my

The need to support BYOD & handle security risks


Device Explosion Trend: Multiple Internet Access

Devices per User


Each device has a unique IP address


Employee
-
owned smart devices to reach 350mn
by 2014, up from 150mn this yr


Embrace BYOD with
Cyberoam

Mobile VPN for iOS and Android devices


Cyberoam’s

Layer 8 Identity based security extended to mobile devices


Securely connect your
iPhone
,
iPad

and Android devices to your corporate
network through VPN

L2TP VPN
(New)

Android

IPSec VPN
(New)

L2TP VPN

PPTP VPN

iOS

www.secureone.com.my | sales@secureone.com.my

Support for new Connectivity
Technologies


4G/ LTE


Making organizations ready for high speed future


Easy deployment for high speed internet connection


Simple USB modem plug
-
in into Cyberoam appliance



Maximize business connectivity


Automatic fail
-
over to 4G/LTE WWAN connection


Gateway failover over VPN



VPN over 4G/LTE

4G

Support for new Connectivity Technologies


4G /LTE

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

First
-
of
-
its
-
kind
Reporting

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard


Traffic and Security Dashboard

Traffic Dashboard

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard


Traffic and Security Dashboard

Traffic Dashboard

Others: Rest of records

N/A: Private IP

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard


Traffic and Security Dashboard

Security Dashboard

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Dual Dashboard


Traffic and Security Dashboard

Security Dashboard

Others: Rest of records

N/A: Private IP

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You


Graphical overview of Data transfer and Risk level

Country Maps for Source/Destination Traffic

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Application Reports

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other
Security Features


Fusion Technology driven SI Firewall

-
Interface for achieving Unified Security





Layer 8 Technology: Identity
-
based controls

-
Identity
-
based security from Layer 2 to Layer 8

-
Allows control over

-
Who can connect to network, Who can access what,
What have they accessed

-
Ability to track the user activities; identify attackers
/victims

-
Take quick network security decisions


www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other
Security Features



Intrusion Prevention System

-
Maximum security against emerging threats

-
Identity
-
based IPS policies per user or group

-
3500+ signatures


broadest security cover



Gateway Anti
-
Virus, Anti
-
spyware

-
Prevent blended threats

-
4 million+ signatures

-
Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM
traffic

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security Features


Gateway Anti
-
Spam

-
Real
-
time, most accurate spam protection

-
Recurrent Pattern Detection (RPD) technology

-
Scans SMTP, POP3, IMAP traffic




Web & Content Filtering

-
Complete

Visibility & Control

over HTTP & HTTPS

-
82+ categories and 44 million+ URLs





IPv6 Ready’ Gold



www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security Features


Virtual Private Network (VPN)

-
Threat
-
free remote access

-
Threat Free Tunneling (TFT) Technology

-
IPSec, L2TP, PPTP and SSL
-
VPN



Multi
-
Link Management

-
For an ‘always
-
on’ network

-
Support for more than 2 ISP links

-
Supports Wireless WAN (3G USB modems,
WiMax
)

-
Gateway failover over VPN


www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Other Security Features


Instant Messaging & Control

-
Identity
-
based controls for Yahoo messenger and
Windows Live Messenger

-
Control who can chat with whom, file transfer,
webcam



Bandwidth Management

-
Enhance
network performance and
productivity

-
Create a bandwidth policy on a combination of User,
Application, Category (application & web), allowing
great flexibility and real L2
-
L8 visibility and control



Outbound
Spam Protection

-
Protecting service providers against Outbound Spam


www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

The Next
-
Generation Security Appliances built for Future Networks.

www.secureone.com.my | sales@secureone.com.my

www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Thank You!