1 White paper Cyberoam Cyberoam s Future-ready Extensible Security Architecture (ESA) Protect your investment with a security architecture built to accommodate tomorrow s security requirements
2 Cyberoam s Extensible Security Architecture (ESA) allows organizations to get maximum value out of their money on the purchase of a security appliance (UTM, Next Generation Firewall). The architecture was designed in response to the fact that most enterprise networks do not have one-size fits all environments, thus, any security appliance must organically grow to accommodate different threat scenarios in the future. With Cyberoam s extensible security, organizations stand protected against unknown, future attacks. As their business grows, so will their extensible security platform. Introduction According to a 2010 survey, sixty-three percent of US organizations have experienced at least one security incident during one year. With each passing day, the challenges faced by IT administrators are becoming more difficult as cyber threats continue to evolve into more stealthy, sophisticated attacks. They may strike in the form of newly-released viruses, spyware, worms etc., blended threats from a variety of entry points or clandestine hackers targeting a company's financial data. As the result of a changing security landscape, organizations are being forced to spend a lot of time and money fighting network threats. If they fail to respond with speed and accuracy, it could result in stolen customer records, compromised confidential information, IT downtime, slowed system performance, reduced employee productivity, loss of revenue and negative impact on corporate reputation. Even as the threats facing organizations are becoming more sophisticated and less conspicuous, enterprise IT teams are being forced to upgrade their security appliances with new features and update the protection level of existing Anti-Malware, IPS and more to tackle any new threat variants, demanding a more complex security system that eventually brings down the overall performance. In addition, IT teams are under increasing pressure to reduce costs, simplify management and continuously ensure that their IT security infrastructure is updated. The challenge today is to have a security appliance that ensures security against latest and upcoming threats without causing any performance dips while empowering customers to dynamically upgrade their security architecture to address the threats of tomorrow.
3 The need for extensibility in security appliances The commonsensical hardware approach in any enterprise-class security product should be to bring in add-on security capabilities across the legacy appliance in order to neutralize newly-emerging threats. This method, however, is self-limiting because it fails to address the real problem arising due to an organization s rapidly-changing security requirements declining performance of the underlying architecture due to its hardcoded configuration. Zeus Trojan s Enterprise Impact The Zeus Trojan has been around since 2004 in different forms and in different names - spreading in a variety of ways: in spam, exploit kits, or drive-by downloads from infected websites. The recent most variant of Zeus is being extensively used to steal bank account information. Once this Trojan is discovered in a network, getting rid of it is extremely difficult. According to an RSA security study, over 90 percent of Fortune 500 companies have been potentially impacted by Zeus as of Most security appliance vendors try to outdo each other when it comes to offering multiple security and networking services in a single, integrated platform. No matter their claims of in-depth defense, a self-contained, closed hardware unit implementing newer features tends to bring a lot of instability to the entire security arrangement because the legacy hardware was never designed in the first place to integrate with these additional features. The increased computing demands of newer features and applications, when turned on, creates a significant performance drop in the appliance. The performance issues become even more critical for time-sensitive security solutions such as newer AV/IPS signatures brought in to fight zerohour malware threats, SQL injection attacks, brute force attacks and crossscripting attacks. The appliance is simply not capable of coping with new security requirements without destabilizing the entire house of cards (see attached figure). In fact, closed or fixed architecture ASIC-based appliances lose their performance value with time because they cannot be upgraded in field to counter new threats; such systems deliver slow performance from the very next day the hardware was designed. Any fresh attack deteriorates the system speed even further. Hence, the user will eventually have to make a tough choice between declining system performance and protection against new attacks. The only solution in such a scenario is to add more expensive hardware, which means costly, time-consuming installation. The need for additional hardware also negatively impacts the bottom line. To offset this loss, some appliances use add-on security modules. Designed to implement or accelerate specific features, the newly-installed features typically cannot be reused for any other purpose and often sit idle as customer requirements keep fluctuating. To address scalability concerns, some security products contain blade solutions to minimize installation costs. Although, sharing the same hardware chassis reduces the need for additional rack space, any savings realized is negated by the lack of true integration between disparate blades, which often increases their overheads by complicating overall network management. Cyberoam's security appliances have built-in extensibility for future-proof security Cyberoam s Extensible Security Architecture (ESA) over its security appliance (UTM, NGFW) has been designed from the hilt to provide futureready security to organizations through an in-built extensible platform which can organically grow with their future security needs, therefore, removing the need to replenish the hardware during its network life cycle. Thus, organizations can protect their investments made on the hardware as the appliance s performance will not deteriorate with time.
4 The Cyberoam ESA design rapidly adapts itself to mitigate the threats of tomorrow such as Web 2.0, VoIP, streaming media, social networks and more. It has the ability to prolong the life and performance of the legacy security appliance by supporting future feature enhancements, for which the development can be done very rapidly and with minimum deployment effort. Basically, Cyberoam s security appliances achieve extensibility by running on an independent, multicore-aware software architecture, which ensures parallel execution of multiple network sessions. This enables the appliance to maintain a predictable degree of performance while dealing with unknown future threats, thereby providing higher levels of security. Extensibility in Action Many of us have played with LEGO blocks as children, and many continue to do so. To understand the extensible framework in network security, one can compare its structure to a set of LEGO blocks. Unlike customized toys which happen to be rigid and inflexible by not allowing new design creations, LEGO blocks allow the player to use their imagination to bring infinite building possibilities based on interlocking compatibility between bricks. One does not have to foresee future creations in advance. All that is needed is a foundation allowing anything to be built. Clearly, any product that embraces extensibility should adapt to an unlimited number of scenarios. At no point of time, the software has to depend on the appliance hardware, making it easily reprogrammable to deliver new patches and policies online to address any fresh attacks. All that is required is a routine upgrade (see attached figure) which consists of simply downloading the latest Cyberoam version release (with latest patches and newer features), uploading the firmware image, restarting and displaying a new log-in image. Once the firmware is uploaded, the appliance would undergo a soft reboot and would be running the latest build. With each new upgrade in place, organizations can achieve highly granular policy controls and a much larger range of protective services. The efficiencies of the extensible design advance the evolution of existing services and the deployment of new services without requiring a platform replacement or performance compromise. With the Cyberoam ESA in place, IT administrators can quickly and cost effectively turn on new feature capabilities as dedicated or multiple security services (AV, IPS, Instant Messaging controls, Applications Visibility etc.) tightly integrated into the operating system. Instead of adding extra equipment to meet customers networking demands, Cyberoam accommodates growth in security requirements for the organization with its ESA architecture. For MSSPs which want to add newer services for its clients, Cyberoam delivers the flexibility to bring on these services without causing the hardware performance to be degraded.
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
White paper Next Generation UTMs for SOHO-SMB Wire-Speed Security www.cyberoam.com I email@example.com Contents Summary 1 Introduction 2 Gigabit Internet Speeds 3 Generic Threats Fill the Fat Pipe 4 BYOD
G DATA TechPaper #0273 Mobile Device Management G DATA Application Development TechPaper_#0273_2015_04_21 Contents 1. 2. 3. 4. Introduction... 3 Mobile devices in the enterprise... 3 2.1. Benefits... 4
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
WHITE PAPER The Next Step in Network Security for Enterprises Sponsor: Juniper Networks Author: Mark Bouchard Introduction The mandate for enterprise IT is simple: facilitate transformation of the business
Advantages of Managed Security Services versus In-house Security Information Management (SIM) Introduction Proactively managing information security is a critical component to mitigating the risks to your
Sponsored by VSS Monitoring Optimized Network Monitoring for Real-World Threats July 2011 A SANS Whitepaper Written by: Dave Shackleford Threat Overview Page 2 Drivers, Deployments and Gaps Page 3 Optimizing
TECHNICAL WHITE PAPER: DATA AND SYSTEM PROTECTION Achieving High Availability with Symantec Enterprise Vault Chris Dooley January 3, 2007 Technical White Paper: Data and System Protection Achieving High
BEST PRACTICES WHITE PAPER Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI Table of Contents INTRODUCTION...1
ACHIEVING CYBER SECURITY READINESS WITHIN AN EVOLVING THREAT LANDSCAPE February 2013 Rev. A 02/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: firstname.lastname@example.org http://www.spirent.com
Microsoft System Center 2012 R2 Why Microsoft? For Virtualizing & Managing SharePoint July 2014 v1.0 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views
Special Publication 800-125 Guide to Security for Full Virtualization Technologies Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya Paul Hoffman NIST
Thought Leadership Paper Cloud Computing in the Hedge Fund Industry About Eze Castle Integration Eze Castle Integration is the leading provider of IT solutions and private cloud services to more than 600
IT service management and cloud computing AXELOS.com White Paper September 2014 Contents 1 Overview 3 2 What is ITIL? 3 3 What is cloud computing? 3 4 Why is cloud computing important? 4 5 Why is IT service
Outsourcing Network Support: The Surprising Strategy That Helps You Spend Less for Higher Uptime How small and medium-sized businesses (SMBs) are outsourcing network support to reduce spending, improve
10 Things Your Next Firewall Must Do Introduction Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices.
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
WHITE PAPER Mobile Device Security Emerging Threats, Essential Strategies Key Capabilities for Safeguarding Mobile Devices and Corporate Assets Copyright 2011, Juniper Networks, Inc. 1 Table of Contents
With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer
SOLUTION PROFILE HYBRID CLOUD STORAGE FROM MICROSOFT: LEVERAGING WINDOWS AZURE AND STORSIMPLE AUGUST 2013 Cloud computing does some things very well. It delivers applications and upgrades. It runs analysis
Small Business Network Security 101 Introduction By Ilana Nijnik email@example.com With broadband usage quickly becoming a standard in the business What you don t know world and network security hazards
Network World and Robin Layland present The 2013 Next Generation Firewall Challenge Next Generation Firewalls provide the needed protection against Advance Evasion Techniques 2013 The 2013 Next Generation
Securing Traditional and Cloud-Based Datacenters With Next-generation Firewalls February 2015 Table of Contents Executive Summary 3 Changing datacenter characteristics 4 Cloud computing depends on virtualization
CRM: Taking One-to-One Marketing to the Next Level An Executive White Paper Coravue, Inc. 7742 Redlands St., #3041 Los Angeles, CA 90293 USA (310) 305-1525 www.coravue.com Table of Contents Introduction...1
Migration Planning Kit Microsoft Windows Server 2003 This educational kit is intended for IT administrators, architects, and IT managers. The kit covers the reasons and process you should consider when
m Windows 7 Reviewer s Guide A First Look at Windows 7 DRAFT 2 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication.
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
Why Integrate Physical and Logical Security? White Paper Author John Carney, Senior Technical Manager, Cisco Government and Security Solutions This document is the first in a series of papers from Cisco