Automate your IT Security Services

Similar documents
Cyberoam Next-Generation Security. 11 de Setembro de 2015

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

Cyberoam Perspective BFSI Security Guidelines. Overview

Cyberoam Next-Generation Security for Enterprises

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Move over, TMG! Replacing TMG with Sophos UTM

Next Gen Firewall and UTM Buyers Guide

Clavister InSight TM. Protecting Values

Network protection and UTM Buyers Guide

INTRODUCTION TO FIREWALL SECURITY

Achieving PCI-Compliance through Cyberoam

Secure Cloud-Ready Data Centers Juniper Networks

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Fortigate Features & Demo

SonicWALL Unified Threat Management. Alvin Mann April 2009

Networking for Caribbean Development

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Cyberoam. Unified Threat Management. Comprehensive Network Security

Intelligent Logging & Reporting Cyberoam iview Appliance

PART D NETWORK SERVICES

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Advantages of Managed Security Services

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Astaro Gateway Software Applications

Information Technology Solutions

AVeS Cloud Security powered by SYMANTEC TM

Test Report November Cyberoam Identity Based UTM Appliance Unified Threat Management Technology Report

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Quick Heal Exchange Protection 4.0

Cyberoam Anti Spam Implementation Guide Version 9

Firewall and UTM Solutions Guide

How To Stop A Ddos Attack On A Website From Being Successful

Log Audit Ensuring Behavior Compliance Secoway elog System

Cyberoam Anti Virus Implementation Guide Version 9

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

WatchGuard Gateway AntiVirus

Simple security is better security Or: How complexity became the biggest security threat

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Features Business Perspective.

Chapter 9 Firewalls and Intrusion Prevention Systems

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

SonicOS 5.9 One Touch Configuration Guide

Mailwall Remote Features Tour Datasheet

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Firewall Log Format. Log ID is a Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11c12) e.g ,

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Firewalls & Intrusion Detection

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Gateway Security at Stateful Inspection/Application Proxy

Unified Threat Management

WatchGuard Training. Introduction to WatchGuard Dimension

Protecting the Infrastructure: Symantec Web Gateway

Norton Personal Firewall for Macintosh

Cyberoam Next-Generation Security for Enterprises

The SIEM Evaluator s Guide

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Cisco IOS Advanced Firewall

Did you know your security solution can help with PCI compliance too?

Concierge SIEM Reporting Overview

Cyberoam Anti Spam Configuration Guide Version 9

mbits Network Operations Centrec

Firewalls. Chapter 3

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

PacketTrap One Resource for Managed Services

Unified Threat Management, Managed Security, and the Cloud Services Model

End-user Security Analytics Strengthens Protection with ArcSight

Whitepaper. Securing Visitor Access through Network Access Control Technology

BitDefender Client Security Workstation Security and Management

Secure your Virtual World with Cyberoam

Network Configuration Settings

User Guide Version 9 Document version /03/2007

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

User Guide Version 9.5.8

Whitepaper. Business Service monitoring approach

Payment Card Industry Data Security Standard

The User is Evolving. July 12, 2011

High Availability Configuration Guide Version 9

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Symantec Protection Suite Small Business Edition

WhatsUp Gold v11 Features Overview

SANS Top 20 Critical Controls for Effective Cyber Defense

FISMA / NIST REVISION 3 COMPLIANCE

Transcription:

Automate your IT Security Services Presenter: Cyberoam Our Products Network Security Appliances - UTM, NGFW (Hardware & Virtual) Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Modem Router Integrated Security appliance

It starts with debunking myths Nothing can get past a firewall We are compliant, hence we are secure!

Google Digital Attack Map Growing Cyber Attacks Rising number of cyber threats against advanced nations such as the US. What happened to all state-of-the-art firewalls?

Inside the mind of today s cyber criminal 1. Indulge in multi-step, elaborate targeted attacks 2. Motivation goes beyond money, involves hacktivism, nation-state espionage, business rivalry, fame etc 3. Run deep investigation for potential vulnerabilities from firewalls to unpatched servers to poorly guarded web apps to vulnerable users in the target organization

Cyber-infrastructure Visualized Why is Security everywhere in this slide?

Anatomy of a typical targeted attack

Automating IT Security: From Plugging Security Holes to Driving Proactive Defense

What necessitates automating IT security? Common security concerns How to auto-provision uniform security policies for HQ, Data Center and Remote Branch offices Inability to assess vulnerability exposure of network due to web apps, risky users etc Lack of understanding on network intrusion attacks, network segmentation Struggle with IPS security configuration Don t know what to allow or deny?

Here s how automated IT security saves the day!

How Cyberoam helps automate IT security?

We know how IT and IT consumerization has changed

We know how network and data centers environments have evolved

Cyberoam addressing key challenges Complexity Centrally manage complicated network security policies for hundreds of users, applications and networking devices Evolving business Enable support and security for new business applications while monitoring controlling risk prone apps Connectivity with productivity High-availability, automatic fail-over for business continuity; intelligent QoS management and prioritization for users and apps Reporting and compliance Providing ready and in-depth support for displaying compliance and reports on user and network activities

Currently available security automation with Cyberoam - Identifying users instead of just IP address - Scheduled reports over email - Email scanning and shifting to quarantine - Identifying risky users - Compliance - HA, Failover, Load balancing - Burstable bandwidth - Centralized Security Management - ConnectWise integration - Cyberoam API - Pro-active security protection in IPS

Cyberoam addresses a commonplace catch 22 faced by today's CXOs

Centralized Security Management for remote / branch offices

Centralized Security Management CCC is for centralized, integrated management and monitoring of Cyberoam network security devices - Complete control over distributed networks / remote branch offices from head office (H.O.) New York Branch Office Mumbai Branch Office Cyberoam Cyberoam Boston Branch Office Cyberoam Dubai Head Office Cyberoam Cyberoam Central Console (CCC)

Automated Logging and Reporting Ability to log and report activities from various users, devices / vendors Security Management Log Management Forensic Analysis Compliance Management Identity Logging Reporting Servers Desktop systems Logs & Events Firewalls Applications IDP / IPS Switches Routers UTM / NGFW Cyberoam iview s Logging & Reporting Facilitates Security, Compliance, Forensics

Real time visibility into user and network activities Traffic Discovery - Real-time visibility into bandwidth utilization by user, protocol, application Security Management Forensic Analysis Data Protection Compliance Management

Application Security with Layer 7 and Layer 8 controls Internet Cyberoam Appliance Application Traffic Visibility Control Manage Bandwidth Business Critical Socio business Non Critical Infected Applications Blocked worms Spyware Undesirable Logs & Reports Controls over applications based on User Identity, Time, Application and Bandwidth

Automated Threat Protection Intrusion Prevention System - Layer 8 and IPS Tuner driven - Identity-based IPS policies per user, group and IP address - Allows multiple IPS policies - Identity-based alerts & reports - 4500+ signatures broadest security cover Gateway Anti-Virus, Anti- spyware - Bi-directional scanning: Web & Email - Self-service Virus Quarantine - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic - Instant visibility into Attacker/Victim Cyberoam Security Center Anti-Spam (Inbound/Outbound) DoS & DDoS Protection - Three level scanning: - Packet Rate Limit IP Reputation filtering - Protection against flood attacks Real-time Blackhole List (RBL) Continuously updated - SYN via Flood Recurrent Pattern Detection (RPD TM ) technology - TCP Flood - ~99% spam detection Cyberoam Security Center - UDP Flood - Self-service Quarantine and Spam Digest - ICMP Flood - Scans SMTP, POP3, IMAP traffic - IPS Signature to prevent attacks - Virus outbreak detection for zero-hour protection - Protocol Anomaly

Proactive Protection model Eliminates the need for manual intervention by administrators to update policies for new applications added to the list Select P2P Applications Set Action Block all future P2P applications without adding applications manually

Plug and Play IPS Ready to use IPS Policy templates Many SOHO/SMBs struggle with IPS How many IT managers know What to allow or deny? Which IPS policy applies? Ready to use IPS Policy templates with Firewall Rule style naming convention

Customizable security for Enterprise IT Pros Category Severity Platform Target Apache HTTP Server Application & Software Browsers Database Management Sys. DNS ERP System Critical (1) Major (2) Moderate (3) Minor (4) Warning (5) Windows Linux Unix Mac Client Server Exchange Mail Server FTP Industrial Control System Solaris BSD Malware Communication Microsoft IIS web server Other Misc Multimedia Office tools OS & Services Other Mail Server Reconnaissance VoIP & Instant Messaging Web Services & Applications And more

Ready integration with Two-factor authentication platforms

Integration with leading SIEM platforms Cyberoam can be integrated with the following SIEM Solutions: 1: RSA Envision 2: ArcSight 3: Cyberoam i-view Syslog to integrate with all the above SIEM solutions

Integration with leading MSSP business automation tools Simplified management and better delivery of security services Automatic Ticket Generation & Resolution for all CCC alerts right at ConnectWise dashboard level Threat counts Web & IPS threats Mail threats Total Virus & Spam Mail counts Unhealthy surfing hits Capacity utilization notifications Capacity utilization UTM, notifications NGFW for CPU, Disk & Memory appliances usage Reminders for Security Subscriptions renewal / expiry Other key appliance status information Appliance management and status change notifications for Appliance Connectivity with CCC Internet Link VPN connection HA Failover State

Cyberoam API - Enables Seamless Authentication User Authentication API for Hotspots Re-use Hotspot Authentication; avoid multiple logins Seamless Single Sign-on for Enterprises If you have an authentication, Cyberoam can fit in PMS

Enables balancing what matters Business agility with security responsiveness Automation for threat protection, business continuity Ease of integration with third-party systems and MSSP tools Centralizes Security Management Automated logging and reporting

Thank you Contact: sales@cyberoam.com Link: http://demo.cyberoam.com Credentials: guest /guest Get a 30 day FREE Evaluation of Cyberoam Virtual appliance