www.cyberoam.com S e c u r i n g Y o u Cyberoam Next-Generation Security for Enterprises With organizations experiencing newer trends like high Internet speeds, virtualization, application explosion, increasing use of Web applications and BYOD, they ought to prepare for emerging security risks in their networks along with increasing concerns on insider threats, vanishing trust boundaries, compliance management and more. Growing businesses and rapidly expanding network horizons have lead to an increased demand for next-generation security, higher performance, easy security management and quick compliance, in enterprises. Cyberoam s next-generation security caters to the security anxiety and demand for advanced network security in organizations today.
The Cyberoam Solution for Network Security Cyberoam is an award-winning global IT security company with a presence in 125+ countries. With an array of globally acclaimed and certified products, Cyberoam offers reliable solutions for varied needs of SOHO/ROBO, SMBs and Enterprises, including network security, centralized security management and centralized visibility. Trusted by thousands of customers across the globe for its innovative products and technology, Cyberoam enjoys a proven track record of serving many well-known customers across various industries. Cyberoam s Security Product Portfolio: Network Security Offers flexibility of hardware and virtual network security appliances for security in physical as well as virtual networks Centralized Security Management Allows enterprises/mssps to manage multiple, dispersed Cyberoam security installations across remote or branch offices Centralized Visibility Offers real-time visibility into user and network activities across the enterprise network Training & Support Enables faster resolution of issues with customer support and efficient deployment and management of Cyberoam solutions with trainings CYBEROAM S LAYER 8 IDENTITY-BASED SECURITY Cyberoam s Layer 8 Technology treats User Identity as the 8th layer or the human layer in the network protocol stack. This allows organizations to uniquely identify users, control user activities in the network, and enable policy-setting and reporting by username, even in dynamic IP environments like DHCP and Wi-Fi. Cyberoam s Layer 8 Technology adds speed to security in a network by offering instant visibility into the source of attacks by identifying victims/attackers by username, which allows proactive remediation of security incidents. With Layer 8 identification and controls, Cyberoam enables security management, data protection, forensic analysis and compliance management in organizations. L8 USER L7 L6 L5 Application Presentation Session ASCII, EBCDIC, ICA L2TP, PPTP Cyberoam's Layer 8 Technology treats User Identity as the 8th Layer in the protocol stack L4 L3 Transport Network TCP, UDP 192.168.1.1 Cyberoam Next Generation Firewall (NGFW) offers security across Layer 2-Layer 8 using Identitybased policies L2 Data Link 00-17-BB-8C-E3-E7 L1 Physical
NETWORK SECURITY S e c u r i n g Y o u Cyberoam integrates multiple security features on a single appliance to offer comprehensive network security. Cyberoam security appliances work at the network gateway and protect networks against application threats, vulnerabilities in web applications, BYOD challenges, data leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and other evolving external threats. With the flexibility of hardware as well as virtual security appliances, Cyberoam protects both the physical and virtual organizational networks. Next-Generation security features on Cyberoam network security appliances: ŸStateful Inspection Firewall ŸApplication Visibility & Control ŸWeb Application Firewall ŸVPN (SSL VPN & IPSec) Ÿ Intrusion Prevention System Ÿ Anti-Virus & Anti-Spyware ŸAnti-Spam ŸOutbound Spam Protection ŸWeb Filtering ŸBandwidth Management Ÿ3G / 4G / WiMAX Connectivity * ŸIM Archiving & Controls ŸMultiple Link Management ŸOn-Appliance Reporting ŸIPv6 Ready ŸWi-Fi Appliances * ŸFleXi Ports * * Features not available on virtual network security appliances CYBEROAM SECURITY APPLIANCES ASSURE Security Connectivity Productivity Cyberoam network security appliances ensure Security, without compromising on the equally essential, Connectivity and Productivity. Organizations can achieve a balanced growth with a network security appliance that offers policy controls over its features to help achieve security, connectivity and productivity, without compromising any one of them. With such an ideal combination of best-of-breed assembly of features over a single interface, organisations get a complete networking solution in Cyberoam. KEY HIGHLIGHTS:! Sales, channel and customer presence across 125+ countries! Backed by World s Largest PE Investor ($156bn) the Carlyle Group! 450+ employees globally; Industry leading R&D! Patent-pending Identity-based Layer 8 Technology! Common Criteria EAL4+ certified security! Recognized as a Network Security Innovator by SC Magazine! Recognized as Visionary in Gartner s UTM Magic Quadrant st! World s 1 network security and UTM vendor with ISO 20000:2011 certified Customer Support Services
Cyberoam NG series Future-ready Security The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with increasing number of users like customers and partners connecting to an office network from outside is leading to deperimeterization of networks. Besides, trends like rise in number of network users and devices, application explosion, virtualization, increasing use of web applications and more are leading to loss of security controls for organizations over their networks. Cyberoam offers future-ready security to SOHO/ROBO, SMEs and Enterprises with its NG Series network security appliances, available as Next-Generation Firewalls and UTMs. Cyberoam s security appliances offer next-generation security features to help organizations secure their networks against risk emerging from adoption of IT trends. Next-Generation Firewalls (NGFW) Cyberoam NGFWs with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security control, over L2-L8 for their future-ready security. Cyberoam NGFW protection offers Layer 8 Identity-based security, Application visibility & control, IPS, VPN (IPSec and SSL), website filtering, and QoS. Based on the security needs, enterprise customers can avail additional security features like Web Application Firewall, Gateway Anti-Virus, Anti-Spam, and more. Unified Threat Management Appliances Cyberoam offers the fastest UTM appliances for SOHO/SMB and Branch offices with comprehensive network security. Cyberoam NG series offers future-ready security through its enterprise-grade security features, gigabit ports and best-in-class hardware & software. Multiple security features integrated over a single, Layer 8 Identity-based platform making security simple, yet highly effective. Cyberoam NGFW Hardware Appliance Range: CR NG Series 500iNG-XP, 750iNG-XP, 2500iNG CR ia Series 500ia, 500ia-1F/10F/RP, 750ia, 750ia-1F/10F, 1000ia, 1000ia-10F, 1500ia, 1500ia-10F Cyberoam UTM Hardware Appliance Range: CR NG Series 15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG, 100iNG, 200iNG, 200iNG-XP, 300iNG, 300iNG-XP CR ia Series 15i, 25ia, 35ia, 15wi, 25wi, 35wi, 50ia, 100ia, 200i, 300i Key Features Layer 8 Technology for Identity-based Security ŸPatent-pending Layer 8 technology penetrates through all security modules of Cyberoam network security appliances, offering Identity-based controls over user authentication, service authorization and reporting (AAA) Advanced Threat Protection [IPS, AV, AS] Ÿ Offers protection against newly evolving threats with Intrusion Prevention System, Gateway Anti-Virus/Anti- Spyware, Gateway Anti-Spam, offering security at par with best-of-breed solutions Application Visibility & Control Ÿ Industry-leading coverage for 2000+ key applications Ÿ Prioritizes applications based on combination of User, Time, Applications and Bandwidth Ÿ Granular application controls with classification based on risk level, characteristics, technology ŸPro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications On-appliance reporting Ÿ On-appliance reporting with real-time logs and reports, saving the cost of a dedicated reporting solution Ÿ Offers 1200+ reports offer real-time visibility into user and network activities Ÿ Helps organizations with security management, compliance management and forensic analysis ŸOne-click compliance reports on PCI DSS, HIPAA, SOX and more
Future-Ready Security. High Performance Security Appliances Cyberoam offers high performance for enterprises with its powerful hardware appliances and CybeoamOS that has the ability to extract highest level of performance from a multi-core platform and tightly integrates with the hardware for network and crypto acceleration. Cyberoam offers the fastest UTM appliances for SOHO/ SMB segments.with the entry-level NG series appliance starting with gigabit firewall throughputs, organizations get assured high performance security, even for small and branch offices. Extensible Security Architecture (ESA) Cyberoam s Extensible Security Architecture helps organizations tackle unknown threats of the future by offering the agility to prolong the life and performance of its security appliances to support newer security features and enhancements. Scalability Besides the Extensible Security Architecture that supports future security needs without the need to change the appliance, organizations can add another appliance in cluster/ha to support more number of users. Actionable Intelligence & Controls Cyberoam s Human Layer 8 acts like a standard abstract layer, which binds with the existing Layers 2-7, enabling enterprises to regain lost security controls and put security checks where they want to from L2-L8, along with complete visibility into user and network activities. Flexibility The FleXi Ports available in the FleXi Port (XP) security appliances, offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing organizations to upgrade to new technologies easily and cost-effectively, making them future-ready. Intelligent Firmware - CyberoamOS OS Integrated seamlessly with the hardware, for network and crypto acceleration, CyberoamOS extracts the highest level of performance from a multi-core platform and offers minimum latency. It comes with Next-Generation security features to protect against newly evolving threats. VPN ŸEnsures secure remote access with IPSec VPN, LT2P, PPTP and SSL VPN over its network security appliances ŸThreat-free Tunneling technology scans traffic for malware, intrusion attempts ŸOffers Mobile VPN clients for Android and ios devices, simplifying communications Web filtering ŸComprehensive URL database with 100 million URLs in 89+ categories ŸCreate policy on a combination of user, website category, time and bandwidth ŸBlocks harmful websites, preventing malware, phishing, pharming attacks and enhances productivity by limiting access to unproductive content Web Application Firewall (WAF) Ÿ Available as an on-appliance subscription module Ÿ Protects websites and web-based applications against OWASP Top 10 web application attacks like SQL injection, cross-site scripting (XSS), URL parameter tampering, and more Ÿ Follows a positive security model through Intuitive Website Flow Detector - automatically identifies and blocks all application layer attacks without relying on signature tables or pattern-matching techniques QoS or Bandwidth management ŸQoS/Bandwidth allocation to users, user groups, Applications, Website Categories and Firewall rules ŸPrioritize business critical applications and users, ensuring assured QoS for business-critical applications like VoIP and CRM ŸOption to commit bandwidth at all times or assign idle bandwidth automatically to other applications /users /website categories
Virtual Security Cyberoam virtual network security appliances are designed to address the security needs for virtualised environments like virtual data-centers, Security-in-a-Box set-up for MSSPs/Enterprises, and Office-in-a-Box. Cyberoam virtual network security appliance can be deployed as Next Generation Firewalls or UTMs. Cyberoam virtual security appliances offer: 1. Security for virtualized networks by scanning traffic within virtual networks; protecting hypervisor management console, hypervisor and Guest OS; and securing zero trust networks. 2. Comprehensive network security with multiple security features, in a single virtual appliance that makes virtual environments as secure as the physical infrastructure. 3. Ease of deployment and upgrade. 4. One-click compliance reports and logging/reporting that helps in compliance management. 5. Centralized Security Management of branch offices using physical/virtual network security appliances over a single interface of Cyberoam Central Console (CCC), available in both virtual and hardware forms. 6. Centralized Visibility into network and user activities with logging and reporting offered by Cyberoam iview software. 7. Complete virtual security solution with Cyberoam s virtual network security appliances, virtual CCC, and Cyberoam iview software for centralized logging and reporting. Cyberoam virtual network security appliance range: CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C Cyberoam virtual security appliances support multiple virtualization platforms like VMware and Hyper-V.
Centralized Security Management across Branch Offices Centralized Visibility across Networks Enterprises can centrally manage security across dispersed branch offices using Cyberoam security appliances with Cyberoam Central Console (CCC), available as hardware and virtual appliances. Enterprises can get complete centralized real-time visibility into network and user activities with logs and reports offered by Cyberoam iview. Centrally push policies, security subscriptions and firmware/signature upgrades with change management for uniform policies and protection against zero hour threats. Enables quick management with the flexibility to group Cyberoam security appliances deployed across offices based on geography, appliance models, firmware versions, and security subscriptions Role-based administrative controls with logs /views of administrator actions Pro-active alerts on subscription expiry, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, and more Enables pre-provisioning (auto-appliance discovery) of Cyberoam devices with configuration templates to create policies in minimum time 1200+ reports help with log and security management, compliance management, and forensic analysis Logs, reports and alerts across multiple devices, protocols and locations provide user and network activity information to identify security breaches, enabling quick action and minimizing network downtime One-click compliance reports on HIPAA, PCI DSS, GLBA, SOX and drill-down reports /alerts for security breach, data leakage helps to meet compliance needs Helps with forensic analysis by reconstructing the sequence of events of security breach with logs and reports, reducing cost of investigation and minimizing network downtime Compatibility with a wide range of devices including Proxy Firewalls, Custom Applications and any Syslogcompatible devices enables organizations to store logs and reports of multiple devices CCC Appliance Range: Hardware CCC Appliances - CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000 Virtual CCC Appliances - CCCV15, CCCV50, CCCV100, CCCV200, CCCV500 Cyberoam iview Appliance Range: Hardware appliances - CR-iVU25, CR-iVU100, CR-iVU200 Software
Training and Support Cyberoam Threat Research Lab Pre-sales Support Cyberoam s dedicated global pre-sales team offers security planning and migration assistance for Cyberoam deployment and implementation to enterprises Post-Sales Support Cyberoam s ISO 20000:2011 certified Global Support Team offers 24x7 or 8x5 support as subscribed by the customers, over phone, email and chat. Cyberoam Threat Research Labs consists of a dedicated team of researchers that ensure detection and identification of security threats at early stages of propagation and protect Cyberoam customers against numerous zero day vulnerabilities and malware attacks. CTRL ensures appropriate security protection by continuously releasing suitable signatures, timely security upgrade and research reports. Training Cyberoam offers trainings and product updates to its customers for efficient deployment, configuration and management of Cyberoam solutions. Awards and Certifications VPNC CERTIFIED SSL Portal SSL Exchange VPNC CERTIFIED Basic Interop AES www.check-mark.com Interop Cyberoam Technologies 505 Thornall Street, Suite # 304 Edison, NJ - 08837, USA, Tel: +1-847-235-4684 Toll Free Number: +1-800-686-2360 PC SSL Firefox SSL JavaScript SSL Advanced Network Extension EDITOR S CHOICE PRO SSL Basic Network Extension BEST BUY RECOMMENDED RECOMMENDS www.itpro.co.uk S e c u r i n g Yo u sales@cyberoam.com www.cyberoam.com Registered Trademark of Cyberoam Technologies Pvt. Ltd.