Se c u rin g Y o u · Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based...

4
I n to d ay ’ s I n fo rm atio n age,n eed fo r c o n tin u o u s in tern et c o n n ec tiv ity c an n o t b e d en ied . A s an in d iv id u al u s er o r as an em p lo y ee in y o u r o rgan izatio n , b len d ed th reats are w aitin g to attac k YOU b y id en tify in g o n e v u ln erab le m o m en t w h en y o u r d efen s es are lo w . T h es e c an b e v iru s es , m alw are, s p am , T ro jan s an d in s id er attac k s lik e d ata th eft an d leak age. S ec u rin g YOU – th e Us er, th u s b ec o m es c ritic al!H o w d o y o u en s u re c o n tin u o u s s ec u rity again s t s o p h is tic ated I T s ec u rity th reats ? Cy b ero am ’ s id en tity - b as ed s ec u rity s o lu tio n s c an s ec u re y o u r ev ery m o v e at w o rk ,at h o m e an d w h ile y o u trav el fro m th e n etw o rk gatew ay to th e en d p o in ts . I t b in d s s ec u rity w ith y o u r id en tity an d w o rk s as y o u r p riv ate s ec u rity gu ard ,ev en w h en y o u are aw ay fro m w o rk o r at h o m e. I ts en d p o in t s ec u rity p ro tec ts y o u r s en s itiv e d ata b y s ec u rin g y o u r en d p o in ts , s to rage d ev ic es an d c o n tro llin gap p lic atio n s . Elitecore Product Se c u rin g Y o u w w w .c y b ero am .c o m S e c u r i n g Y o u www.ostindia.com

Transcript of Se c u rin g Y o u · Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based...

Page 1: Se c u rin g Y o u · Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in

In to d a y ’s In fo rm a tio n age, n eed fo r c o n tin u o u s in tern et

c o n n ec tiv ity c a n n o t b e d en ied . A s a n in d iv id u a l u s er o r a s

a n em p lo y ee in y o u r o rga n iz a tio n , b len d ed th rea ts a re

w a itin g to a tta c k YOU b y id en tify in g o n e v u ln era b le

m o m en t w h en y o u r d efen s es a re lo w . T h es e c a n b e

v iru s es , m a lw a re, s p a m , T ro ja n s a n d in s id er a tta c k s lik e

d a ta th eft a n d lea k age. S ec u rin g YOU – th e U s er, th u s

b ec o m es c ritic a l! H o w d o y o u en s u re c o n tin u o u s s ec u rity

aga in s t s o p h is tic a ted IT s ec u rity th rea ts ?

Cy b ero a m ’s id en tity -b a s ed s ec u rity s o lu tio n s c a n s ec u re

y o u r ev ery m o v e a t w o rk , a t h o m e a n d w h ile y o u tra v el –

fro m th e n etw o rk ga tew a y to th e en d p o in ts . It b in d s

s ec u rity w ith y o u r id en tity a n d w o rk s a s y o u r p riv a te

s ec u rity gu a rd , ev en w h en y o u a re a w a y fro m w o rk o r a t

h o m e. Its en d p o in t s ec u rity p ro tec ts y o u r s en s itiv e d a ta

b y s ec u rin g y o u r en d p o in ts , s to rage d ev ic es a n d

c o n tro llin ga p p lic a tio n s .Elitecore Product

Se c u rin g Y o u

w w w .c y b ero a m .c o m

S e c u r i n g Y o u

www.ostindia.com

Page 2: Se c u rin g Y o u · Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in

C y b e r o a m 's Id e n t it y -B a s e d S e c u r it y A d v a n t a g e s

Id en tifies a n d c o n tro ls u s ers th ro u gh id en tific a tio n ,

p o lic y -s ettin ga n d rep o rtin gb y u s ern a m e.

Offers s ec u rity ev en in d y n a m ic IP en v iro n m en ts lik e

D H CP a n d W i-F i.

A llo w s b in d in g o f u s er id en tity w ith IP a d d res s , M A C Id ,

S es s io n Id to p rev en t u n a u th o riz ed n etw o rk a c c es s .

A llo w s rea l-tim e th rea t c o n tro l th ro u gh id en tity -b a s ed

rep o rtin g o n u s age a n d th rea t p a ttern s o f in d iv id u a l

u s ers .

F a c ilita tes regu la to ry c o m p lia n c e fo r H IP A A , P CI-D S S ,

GL BA , CIP A , etc . w ith o n -a p p lia n c e rep o rtin g o f   w h o   is

a c c es s in g  w h a t  ,s h o rten in ga u d it a n d rep o rtin gc y c les .

C y b e r o a m 's F u t u r e -r e a d y A r c h it e c t u r e

Cy b ero a m 's M u lti-c o re tec h n o lo gy o ffers h igh s ec u rity

w ith o u t c o m p ro m is in g o n p erfo rm a n c e b y a llo w in g

p a ra llel p ro c es s in g o f m u ltip le s ec u rity fea tu res ,

th erefo re a llo w in g effec tiv e m a n agem en t o f d y n a m ic ,

c o n ten t-b a s ed th rea ts s u c h a s W eb 2.0 a p p lic a tio n s ,

Vo ic e o v er IP,s trea m in gm ed ia ,IM a n d P 2P.

Cy b ero a m U T M 's Ex ten s ib le S ec u rity A rc h itec tu re (ES A )

is b u ilt o n a n ex ten s ib le p la tfo rm th a t c a n o rga n ic a lly

gro w w ith fu tu re s ec u rity n eed s o f th e o rga n iz a tio n .

S u c h a n a p p ro a c h h a s th e agility to p ro lo n g th e life a n d

p erfo rm a n c e o f th e lega c y U T M a p p lia n c e b y s u p p o rtin g

f u t u re fe a t u re e n h a n c e m e n t s , f o r w h ic h t h e

d ev elo p m en t c a n b e d o n e v ery ra p id ly a n d w ith

m in im u m d ep lo y m en t effo rt.User Identity-based Security Policy Controls

Cyberoam UTM offers security acrossLayer 2-Layer 8 using Identity-based policies

Cyberoam's Layer 8 Technologytreats “User Identity” as the 8thLayer in the protocol stack

ApplicationPresentationSessionTransport

NetworkData LinkPhysical

USERL7L8

L6L5L4

L3L2L1

00-17-BB-8C-E3-E7

192.168.1.1

TCP, UDP

L2TP, PPTP

ASCII, EBCDIC, ICA

Cy b ero a m U n ified T h rea t M a n agem en t a p p lia n c es o ffer

c o m p reh en s iv e s ec u rity to s m a ll, m ed iu m a n d la rge

en terp ris es th ro u gh m u ltip le s ec u rity fea tu res in tegra ted

o v er a s in gle p la tfo rm . It is th e firs t U T M th a t em b ed s u s er

id en tity in th e firew a ll ru le m a tc h in g c riteria , o fferin g in s ta n t

v is ib ility a n d p ro a c tiv e c o n tro ls o v er s ec u rity b rea c h es a n d

elim in a tin gd ep en d en c e o n IP A d d res s es .

Cy b ero a m 's u n iq u e L a y er 8 tec h n o lo gy trea ts U S ER a s th e

8th la y er in th e n etw o rk s ta c k . A ls o k n o w n a s th e H u m a n

la y er, it p en etra tes th ro u gh ea c h o f Cy b ero a m 's s ec u rity

m o d u les , a llo w in g o rga n iz a tio n s to c rea te u s er id en tity -

b a s ed s ec u rity p o lic ies . T h is o ffers th em c o m p lete v is ib ility

a n d c o n tro l o v er u s er a c tiv ities , s h o w in g w h o is d o in g w h a t

a n y w h ere in th e n etw o rk a n d en a b les th em to ta k e n etw o rk

s ec u rity d ec is io n s b a s ed o n u s ern a m es a n d n o t ju s t IP

a d d res s es .

Cy b ero a m 's id en tity -b a s ed s ec u rity o ffers a h igh d egree o f

gra n u la rity , m a k in g p o lic y -s ettin g a n effic ien t p ro c es s

d o w n to th e u s er lev el th a t c a n b e ex ten d ed to a n y

c o m b in a tio n o f gro u p , jo b fu n c tio n o r a p p lic a tio n . T h e IP -

in d ep en d en t n a tu re o f Cy b ero a m a llo w s u s ers to c a rry th eir

o w n a c c es s righ ts a n d p o lic ies a n y w h ere in th e n etw o rk ,

ev en in d y n a m ic IP en v iro n m en ts lik e D H CP a n d W i-F i.

Cy b ero a m 's L a y er 8 tec h n o lo gy a d d s s p eed to th e w h o le

s ec u rity s et-u p b y o fferin g a d m in is tra to rs in s ta n t

v is ib ility in to s o u rc e o f a tta c k s , en a b lin g th em to id en tify

a tta c k er/v ic tim s b y u s ern a m e a n d a c h iev e im m ed ia te

rem ed ia tio n to a n y s ec u rity b rea c h c o n d itio n .

Cyberoam Identity-based Unified Threat Management

SME50ia , 100ia , 200i, 300i 500ia , 750ia , 1000ia , 1500ia

500ia -1F / 10F / R P, 750ia -1F / 10F ,1000ia -10F , 1500ia -10F

Enterprises15w i,15i, 25w i, 25ia , 35w i, 35ia

Small Offices

Identity-based Security PoliciesLayer 8 Technology

INTRUSION PREVENTION SYSTEM

MULTIPLE LINK MANAGEMENT

WEB & APPLICATION FILTERING

WEB APPLICATION FIREWALL

BANDWIDTH MANAGEMENT

GATEWAY ANTI-MALWARE

GATEWAY ANTI-SPAM

STATEFUL INSPECTION FIREWALL

VIRTUAL PRIVATE NETWORK-VPN

ON-APPLIANCE REPORTING

www.ostindia.com

Page 3: Se c u rin g Y o u · Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in

Cy b ero a m U T M o ffers s ec u rity w ith o u t c o m p ro m is in g o n c o n n ec tiv ity a n d p ro d u c tiv ity . It o ffers a c o m b in a tio n o f b es t-o f-b reed

a s s em b ly o f s o lu tio n s o v er a s in gle in terfa c e, res u ltin g in a c o m p lete, d ep en d a b le s h ield th a t n etw o rk th rea ts fin d ex trem ely

d iffic u lt to p en etra te.

Cyberoam UTM Features Assure Security, Connectivity and Productivity

T e c h n ic a l B e n e fit s F in a n c ia l B e n e fit s B u s in e s s B e n e fit s

R e a l tim e p ro te c tio n a g a in s t a ll

In te rn e t-b a s e d Th re a ts , in c lu d in g

b le n d e d a n d in te r n a l th re a ts

R a p id d e p lo y m e n t

M in im a l c o n fig u ra tio n

N e x t-g e n e ra tio n GU I e n h a n c e s

s e c u rity w ith its e a s y n a v ig a tio n a n d

c u s to m c o n tr o ls

Lo w c a p ita l e x p e n s e

Lo w o p e ra tio n a l e x p e n s e

H ig h e r R O I

Sa fe b u s in e s s e n v ir o n m e n t

Co n tr o l o v e r le g a l lia b ility

En h a n c e d p ro d u c tiv ity

M e e ts re g u la to ry c o m p lia n c e re q u ir e m e n ts

Cy b ero a m Cen tra l Co n s o le (CCC) is a c en tra liz ed s ec u rity

m a n agem en t a p p lia n c e th a t a llo w s en terp ris es a n d

M S S P s to m a n age m u ltip le, d is p ers ed Cy b ero a m U T M

in s ta lla tio n s a c ro s s rem o te o r b ra n c h o ffic es a n d c lien ts

res p ec tiv ely , o fferin g th e flex ib ility o f h a rd w a re CCC

a p p lia n c es a n d v irtu a lCCC a p p lia n c es .

CCC s im p lifies s ec u rity m a n agem en t b y en a b lin g

c en tra liz ed p o lic y c rea tio n a n d im p lem en ta tio n ,

s u b s c rip tio n a n d s ign a tu re u p d a tes fo r Cy b ero a m U T M

a p p lia n c es d ep lo y ed a t b ra n c h o ffic es a n d c lien t o ffic es

fo r a ll U T M fea tu res lik e F irew a ll, In tru s io n P rev en tio n

S y s tem , A n ti-Viru s s c a n n in g, a n d m o re, a llo w in g rea l-

tim e p ro tec tio n aga in s t z ero -h o u r th rea ts a n d red u c in g

res p o n s e tim e aga in s t n ew ly id en tified th rea ts .

CCC p ro v id es M S S P s a n d En terp ris es th e flex ib ility to

gro u p Cy b ero a m U T M a p p lia n c es d ep lo y ed a c ro s s

v a rio u s o ffic es b a s ed o n geo gra p h y, Cy b ero a m U T M

m o d els , firm w a re v ers io n , o rga n iz a tio n (fo r M S S P ) a n d

s erv ic e s u b s c rip tio n fo r th eir q u ic k m a n agem en t. W eb

2.0-b a s ed GUI o ffers d y n a m ic v iew s o n th e d a s h b o a rd

fo r ea s y m a n agem en t,s ea rc h a n d s o rtin go f a p p lia n c es

Security Management - Instant Enforcement ofSecurity Policies

Flexibility of Management

b y firm w a re v ers io n s , a p p lia n c e m o d els a n d a ll a p p lia n c es .

Orga n iz a tio n s c a n a ls o s o rt a p p lia n c e v iew s o n th e d a s h b o a rd

w ith c u s to m iz a b le s elec tio n c riteria o f s o rtin g.

CCC en a b les en terp ris es a n d M S S P s to s et ro le-b a s ed

a d m in is tra tio n fo r CCC h a rd w a re a n d v irtu a l a p p lia n c es a s w ell

a s in d iv id u a l Cy b ero a m U T M a p p lia n c e a n d fo r gro u p s o f

Cy b ero a m U T M a p p lia n c es .

T h e CCC L o g View er o ffers lo gs a n d v iew s o f a d m in is tra to r

a c tio n s o n CCC a s w ell a s d is p ers ed U T M a p p lia n c es . Em a il

a lerts c a n b e s et b a s ed o n ex p iry o f s u b s c rip tio n m o d u les ,

ex c es s d is k u s age, IP S a n d v iru s th rea t c o u n ts , u n h ea lth y

s u rfin gh its a n d o th er p a ra m eters .

Security against Misuse ofAdministrator Privileges

Audit Logs &Alerts

CCC Hardware Appliance Range

CCC Virtual Appliance Range :

:

CCC for VM w a re Server-based Virtual Environment

CCC for VM w a re Workstation-based Virtual Environment

CCC1 5, CCC50, CCC1 00, CCC200, CCC500, CCC1 000

CCC VM S 1 5, CCC VM S 50, CCC VM S 1 00, CCC VM S 200

CCC VM W 1 5, CCC VM W 50, CCC VM W 1 00,CCC VM W 200

Cyberoam Central Console (CCC) - Centralized Management

Security Connectivity Productivity

Employee Productivity

IT Resource Optimization

Administrator Productivity

- Content Filtering- Instant Messaging Archiving & Controls

- Bandwidth Management- Traffic Discovery- Application Layer 7 Management

- Next-Gen UI

Network Security

Content Security

Administrative Security

- Firewall- Intrusion Prevention System- Wireless security

- Anti-Virus/Anti-Spyware- Anti-Spam- HTTPS/SSL Content Security

- Web Application Firewall

- Next-Gen UI- iView- Logging & Reporting

Business Continuity

Network Availability

Future-ready Connectivity

- Multiple Link Management- High Availability

- VPN- 3G/WiMAX Connectivity

- “IPv6 Ready” Gold Logo

Page 4: Se c u rin g Y o u · Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in

Awards & Certifications

S e c u r i n g Y o u

www.check-mark.com 2008 - Emerging Vendor of the Year

CERTIFIEDVPNC

InteropBasic

AESInterop

CERTIFIEDVPNC

SSL AdvancedNetwork Extension

SSL BasicNetwork Extension

SSLJavaScript

SSLFirefox

SSLExchange

SSLPortal

PROP C

R E C O M M E N D E D

RECOMMENDS

BEST BUY

E D  IT O  R ’SC H O I C E

w w w .itp r o .c o .u k

T h e Cy b ero a m iView a p p lia n c e s eries o ffers v is ib ility in to

a c tiv ity w ith in th e o rga n iz a tio n fo r h igh lev els o f s ec u rity , d a ta

c o n fid en tia lity a n d regu la to ry c o m p lia n c e. It p ro v id es a n

o rga n iz a tio n -w id e s ec u rity p ic tu re o n a s in gle d a s h b o a rd

th ro u gh c en tra liz ed rep o rtin g o f m u ltip le d ev ic es a c ro s s

geo gra p h ic a l lo c a tio n s . T h is en a b les o rga n iz a tio n s to a p p ly

o r c o rrec t s ec u rity p o lic ies fro m a c en tra l lo c a tio n , en h a n c in g

s ec u rity .

It a llo w s effo rtles s , id en tity -b a s ed lo g m a n agem en t in n ea r

rea l-tim e. Orga n iz a tio n s c a n m a tc h u s er id en tity -b a s ed

in fo rm a tio n c o n ta in ed in lo gs w ith th eir righ ts a n d p riv ileges

to rev ea l d is c rep a n c ies in u s er a c tiv ities .

A q u ic k gla n c e a t th e iView d a s h b o a rd , its d rill-d o w n rep o rts

a n d id en t it y -b a s ed lo ggin g a n d re p o r t in g en a b le s

o rga n iz a tio n s to in s ta n tly lo c a te n etw o rk a tta c k s , th eir

s o u rc e a n d d es tin a tio n ,a llo w in gra p id a c tio n .

iView elim in a tes c o m p lia n c e c o m p lex ities w ith a o n e-s tep

a c c es s to c ritic a l in fo rm a tio n w ith m u ltip le rep o rts o n a s in gle

d a s h b o a rd th a t c a n b e d rilled d o w n to get th e th ird -lev el o f

in fo rm a tio n . Orga n iz a tio n s c a n ea s ily m o n ito r a c c es s a n d

s ec u rity v io la tio n s in th e n etw o rk , a c c elera tin g in c id en t

res p o n s e a n d fa c ilita tin gc o m p lia n c e.

iView h elp s o rga n iz a tio n s rec o n s tru c t th e s eq u en c e o f

ev en ts th a t o c c u rred a t th e tim e o f s ec u rity b rea c h th ro u gh

iView lo gs a n d rep o rts . T h ey c a n red u c e th e c o s t o f

in v es tiga tio n a n d a n a ly s is a n d m in im iz e n etw o rk d o w n tim e

w h ile ga th erin gh is to ric a l in fo rm a tio n .

Log Management

Security Management

Compliance Management

ForensicAnalysis

V IE W

Cyberoam T M

Cyberoam iViewIntelligent Logging andReporting Solution Cyberoam NetGenie

Cy b ero a m NetGen ie p ro v id es a s a fe In tern et ex p erien c e a n d

a d d res s es u n m et In tern et n eed s o f H o m e a n d S m a ll Offic e

s egm en ts . It p ro v id es m u ltip le fea tu res o n a s in gle a p p lia n c e

lik e p re-s et W i-F i s ec u rity , a d v a n c ed In tern et c o n tro ls , In -b u ilt

A n ti-Viru s , In tru s io n P rev en tio n S y s tem , In tern et s h a rin g o v er

3G m o d em d ev ic e,a n d W i-F i s ec u rity o v er m u ltip le d ev ic es .

Cy b ero a m NetGen ie in h o m es en a b les

p a ren ts to p ro v id e age-w is e In tern et

a c c e s s t o c h ild r e n a n d b lo c k

u n s a fe/a d u lt In tern et c o n ten t a lo n g

w ith m o n ito rin g th eir In tern et a c tiv ities

in rea l tim e. NetGen ie's s c h ed u le-

b a s ed In tern et c o n tro ls a llo w p a ren ts to c o n tro l w h en th eir

c h ild ren c a n v is it s p ec ific w eb s ite c a tego ries lik e s o c ia l

n etw o rk in g, w eb m a il a n d a p p lic a tio n s lik e S k y p e, Ga m es .

NetGen ie p ro tec ts h o m e w ireles s n etw o rk s aga in s t v iru s es

a n d h a c k ers o v er a ll In tern et-a c c es s d ev ic es lik e d es k to p s ,

la p to p s ,a n d s m a rtp h o n es u s ed to s u rf th e In tern et a t h o m e.

Cy b ero a m NetGen ie in s m a ll o ffic es

o ffers c o n tro ls o v er w h a t em p lo y ees

c a n a c c es s o v er th e In tern et to en s u re

h igh p ro d u c tiv ity in o ffic es . NetGen ie

o ffers a s ec u re W i-F i o ffic e n etw o rk

a n d p ro te c ts th e In tern et-a c c es s

d ev ic es lik e c o m p u te r s , ta b le t s ,

s m a rtp h o n es fro m v iru s es a n d h a c k ers w h en o n lin e. It

p ro v id es s ec u re a c c es s to rem o te res o u rc es lo c a ted a t

b ra n c h o r c en tra l o ffic es w ith Virtu a l P riv a te Netw o rk fea tu re.

Cyberoam NetGenie HOMESmart Wireless Router withFamily Protection

Cyberoam NetGenie SOHOUnified Threat Management

www.ostindia.com