Cyberoam NG series: Future-Ready Security

greenpepperwhinnySecurity

Nov 3, 2013 (3 years and 9 months ago)

222 views

Cyberoam NG series:

Future
-
Ready Security

A glimpse into the future of networks…

Superfast Internet




Data moving at 10 times
current Internet speeds



Google launched a 1000 Mbps ‘Google
Fiber’ Internet service



IDNet launched UK 1000 Mbps Leased
Line Business Ethernet Service

Device Explosion:

Multiple Internet
devices per user




Each device with a unique IP address



Employee
-
owned smart devices to reach
350mn by 2014, up from 150mn


Cloud: Web Applications




Critical business applications
and Services moving to the Web



Cloud Computing will generate more
than $45.4 billion in revenue by 2015!

Cloud: Explosion of
Internet Applications




Infinite applications moving to the cloud



How will Organizations Gain?

With Network Connectivity & Productivity taking a leap,

what about Security?

SECURITY

CONNECTIVITY

PRODUCTIVITY

Can your Security keep pace?



The New Network Infrastructure

-

SOHO /SMB Network Infrastructure is moving to Gigabit!

-

Anything less than Gigabit is nearly obsolete!

-

Does your security appliance have Gigabit ports?

-

Does any security vendor offer network security appliances with


Gigabit ports to these segments?




Superfast Internet Speeds

-

Gigabit Internet speeds to be soon available from ISPs /Telco’s

-

Can your security appliance match high Internet speeds?

-

Does it offer Gigabit throughputs?




Device Explosion

-

More devices per employee connecting to the IT network

-

Changing approach from ‘Users’ to ‘Devices’

-

Can your security appliance support more number of Devices?



Can your Security keep pace?



Explosion of Internet applications

-

Leading to ‘Application Chaos’!

-

What level of application control granularity does your Security offer?




Critical business applications moving to Cloud

-

Internet
-
facing applications face risk of getting hacked

-

Does your security offer a web application protection?



No one wants SECURITY to become a

bottleneck in their network!

What can SOHO/SMB

do to prevent Security from
becoming a bottleneck in progress
?

Expand Security budgets
to buy Enterprise

security solutions

Or

IT Manager

Move to Future
-
Ready
security appliances

Presenting

The Cyberoam NG series


The ‘Next
-
Generation’ appliances built for Future
-
ready Security in networks!

Cyberoam NG series offers ‘Future
-
Ready’ Security



The
Fastest ‘UTM’ appliances
for SOHO and SMB segments


Offering
Next
-
Generation Firewall
protection for Large Enterprises!



Offering Future
-
Ready security to


SOHO, ROBO


CR15iNG, CR25iNG, CR35iNG


Wi
-
Fi appliances


CR15wiNG, CR25wiNG, CR35wiNG


Faster performance, broader coverage
with 3 x 3 MIMO


Dual band support


SMB


CR50iNG, CR100iNG


Enterprise


CR2500iNG










How Cyberoam NG series offers Future
-
Ready
Security?

Offering upto 5 times industry average throughput
for SOHO /SMB

* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

Appliances starting with Gigabit
Firewall Throughputs

Best in class UTM throughputs

Confidential. For internal use only

Cyberoam Technologies Pvt. Ltd.

Firewall throughputs

UTM throughputs

Cyberoam

CR15iNG vs. CR15i

ONE CR15iNG vs

Dell Sonicwall TZ series

Cyberoam CR15iNG vs

Fortinet FG20C, FG40C

Cyberoam CR15iNG vs

Watchguard
WG XTM25, WG XTM26

Cyberoam CR15iNG

Confidential. For internal use only

Cyberoam Technologies Pvt. Ltd.

Forti net

does not publ i sh UTM throughputs i n datasheet, shown as Not Avai l abl e (NA) above

Firewall throughputs

UTM throughputs

Cyberoam

CR25iNG vs. CR25ia

CR25iNG vs

Dell Sonicwall NSA220,
NSA 250M

Cyberoam CR25iNG vs

Fortinet FG60C

Cyberoam CR25iNG vs

Watchguard
WG XTM33

Cyberoam CR25iNG

Confidential. For internal use only

Cyberoam Technologies Pvt. Ltd.

Forti net

does not publ i sh UTM throughputs i n datasheet, shown as Not Avai l abl e (NA) above

Firewall throughputs

UTM throughputs

Cyberoam

CR35iNG vs. CR35ia

Power to secure SMB with
SOHO appliance!


CR35iNG vs

Dell Sonicwall NSA2400,

Power to secure SMB
with SOHO appliance!


Cyberoam CR35iNG vs

Fortinet FG80C

Cyberoam CR35iNG vs

Watchguard
WG XTM330, XTM 505

Cyberoam CR35iNG

Confidential. For internal use only

Cyberoam Technologies Pvt. Ltd.

Forti net

does not publ i sh UTM throughputs i n datasheet, shown as Not Avai l abl e (NA) above

Firewall throughputs

UTM throughputs

Cyberoam

CR50iNG vs. CR50ia

Size doesn’t matter!


CR50iNG vs

Dell Sonicwall NSA2400,
NSA 3500

Size doesn’t matter!


Cyberoam CR50iNG
vs Fortinet FG100D

Size doesn’t matter!


Cyberoam CR50iNG vs

Watchguard
XTM505, XTM 515

Cyberoam CR50iNG

Confidential. For internal use only

Cyberoam Technologies Pvt. Ltd.

Forti net

does not publ i sh UTM throughputs i n datasheet, shown as Not Avai l abl e (NA) above

Firewall throughputs

UTM throughputs

Cyberoam

CR100iNG vs. CR100ia

Size doesn’t matter!


CR100iNG vs

Dell Sonicwall NSA3500,
NSA 4500

Size doesn’t matter!


Cyberoam CR100iNG vs

Fortinet FG200B, FG300C

Size doesn’t matter!


Cyberoam CR100iNG vs

Watchguard
XTM515, XTM 525

Cyberoam CR100iNG

Confidential. For internal use only

Cyberoam Technologies Pvt. Ltd.

Forti net

does not publ i sh UTM throughputs i n datasheet, shown as Not Avai l abl e (NA) above

NG series offers Future
-
Ready Security



Powerful Hardware


Superfast processing speed : A must for Gigabit Internet
speeds!


Nano second security processing with multicore Gigahertz
processors


Gigabit Ports to enable Gigabit Speeds for SOHO /SMB
networks


A complete overhaul of appliance design


Faster, Next
-
Gen Memory and High Capacity Storage


Superior Quality for High Performance and Robustness


Design & components supporting high speed I/O
throughput and withstanding extreme environments






NG series offers Future
-
Ready Security



Increased port density


Cyberoam

NG series

Cyberoam
ia

series

CR15iNG

3
GbE

ports

CR15i

3 10/100 Ethernet ports

CR15wiNG

3
GbE

ports

CR15wi

3 10/100 Ethernet ports

CR25iNG
-
6P

6
GbE

ports

CR25ia

4
GbE

ports

CR25wiNG
-
6P

6
GbE

ports

CR25wi

4
GbE

ports

CR35iNG

6
GbE

ports

CR35ia

4
GbE

ports

CR35wiNG

6
GbE

ports

CR35wi

4
GbE

ports

CR50iNG

8
GbE

ports

2 hardware bypass segment

CR50ia

6
GbE

ports

1 hardware bypass segment

CR100iNG

8
GbE

ports

2 hardware bypass segment

CR100ia

6
GbE

ports

1 hardware bypass segment

Intelligent, Powerful firmware



Tightly integrates with Hardware for Network & Crypto
Acceleration delivering high performance


Better use of Multicore architecture for Parallel processing


Optimized workload distribution across cores


Lockless path for packet forwarding


A single core handles packets for each connection at any
given time to avoid inter
-
locks


Optimized Interrupt rates for minimum CPU overhead and
latency


High rate of interrupts
-

A bottleneck in high
-
speed data
transfers


Fastpath packets to improve processing speed and reduce CPU
overhead





CyberoamOS

offers advance features with entry
-
level appliances










CyberoamOS

installed on flash and reports are stored in HDD
*


Auto flash recovery
**


Auto OS failover from flash to HDD in case of flash failure
**



*available in models above CR15iNG/
wiNG

**Future implementation

Feature availability

Cyberoam

appliance

SSL
-
VPN

WAF

HA

CR15i/
wi

X

X

X

CRR15iNG/
wiNG



X

X

CR25ia

X

X

X

CR25iNG/iNG
-
6P







Intelligent, Powerful firmware

Take complete control over applications running on your
network

Prioritize applications with
Cyberoam’s

Layer 7 &
Layer 8 Visibility & Controls


VoIP

Bit

Torrent

CRM


ERP

IM

Application

Web

mail

Internet

Medium Quality

High Quality


Low Quality

Control over

Granular classification of applications

Risk Level

Very Low

(1)

Low (2)

Medium (3)

High (4)

Very High (5)

Application
Characteristics

Excessive Bandwidth

Prone to misuse

Transfer files

Tunnel other apps

Vulnerabilities

Widely used

Loss of Productivity

Can bypass firewall policy

Application
Technology

Browser Based

Client Server

Network Protocol

P2P

Proactive Protection model:

Eliminates the need for manual intervention by administrators to update policies
for new applications added to the list

On
-
Appliance Web Application Firewall



No need to buy dedicated WAF appliance


Protect Web Servers and Web Applications from hackers


Prevents hackers from exploiting Web
-
Application Vulnerabilities


Positive protection model and No Signature Tables


Intuitive website flow detector automatically adapts to website changes


Protects against OWASP top 10 vulnerabilities






Cyberoam’s

Layer 8 (Identity
-
based) security

User Login

Cyberoam

Authenticates




User Name



IP Address



MAC Id



Session Id

Cyberoam

Authorizes




Internet surfing quota



Schedule control



Security Policies



Web Filtering



Application Visibility & Control



QoS

/ Bandwidth Management



IM Controls

Cyberoam

Audits




Identity
-

based


Logs + Reports



Compliance Reports


Control over staff network activities


Who can connect to the network


Who can access what


What have they accessed

Ability to track the user
activities; identify
attackers /victims

Take quick network
security decisions

Best
-
in
-
class Reporting

-
1000+ in
-
depth reports

-

Real time visibility into user and
network activities

-
Helps with Security & Compliance
management, Forensic Analysis

-
Reports include dynamic and
animated reports, in
-
line graphs,
country maps




Country maps for Source/ Destination traffic

Dual Dashboard
-

Traffic & Security Dashboard

Application Reports

Support for new Connectivity Technologies


4G /LTE



Makes organizations ready for high speed future


Easy deployment for high speed Internet connection


Simple USB modem plug
-
in into Cyberoam appliance


Ensures business connectivity


Automatic fail
-
over to 4G/LTE WWAN connection


Gateway failover over VPN


VPN over 4G/LTE






4G

3
G

Threat Protection Features



Intrusion Prevention System

-
Maximum security against emerging threats

-
Identity
-
based IPS policies per user or group

-
4
500
+ signatures


broadest security cover



Gateway Anti
-
Virus, Anti
-
spyware

-
Prevents
blended threats

-
4 million+ signatures

-
Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM
traffic



Gateway Anti
-
Spam

-
Real
-
time, most accurate spam protection

-
Recurrent Pattern Detection (RPD) technology

-
Scans SMTP, POP3, IMAP traffic



Outbound Spam Protection

-
Protects service providers against Outbound Spam


Other
Security Features


Fusion Technology driven SI Firewall

-
Interface for achieving Unified Security



Virtual Private Network (VPN)

-
Threat
-
free remote access

-
Threat Free Tunneling (TFT) Technology

-
IPSec, L2TP, PPTP and SSL
-
VPN



Web & Content Filtering

-
Complete

Visibility & Control

over HTTP & HTTPS

-
82+ categories and 44 million+ URLs



Bandwidth Management

-
Helps enhance network performance and productivity

-
Create a bandwidth policy on a combination of User,
Application, Category (application & web), allowing great
flexibility and real L2
-
L8 visibility and control



www.cyberoam.com

© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Live NG Series Demo

View Demo

449501