Cyberoam s Future-ready Extensible Security Architecture (ESA) Cyberoam. White paper



Similar documents
Secure your Virtual World with Cyberoam

Cyberoam Next-Generation Security for Enterprises

Types of cyber-attacks. And how to prevent them

Cyberoam Perspective BFSI Security Guidelines. Overview

Total Business Continuity with Cyberoam High Availability

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

White paper. Cyberoam. Cyberoam s Layer 8 Technology Protecting the weakest link in your security chain the USER!

Cyberoam Next-Generation Security for Enterprises

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

The Key to Secure Online Financial Transactions

Unified Threat Management, Managed Security, and the Cloud Services Model

Beyond the Hype: Advanced Persistent Threats

Top five strategies for combating modern threats Is anti-virus dead?

Automate your IT Security Services

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Achieving PCI-Compliance through Cyberoam

WildFire. Preparing for Modern Network Attacks

The Hillstone and Trend Micro Joint Solution

Next-Generation Firewalls: Critical to SMB Network Security

Achieve Deeper Network Security

OVERVIEW. Enterprise Security Solutions

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Simplified Private Cloud Management

WEBSENSE TRITON SOLUTIONS

Advantages of Managed Security Services

NetDefend Firewall UTM Services

Securing Your Business s Bank Account

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

The Evolution of the Enterprise And Enterprise Security

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Content-ID. Content-ID URLS THREATS DATA

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Astaro Gateway Software Applications

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

Colt Smart Office. Flexible network services for the smaller business. / Next

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

WHITE PAPER. Understanding How File Size Affects Malware Detection

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Achieve Deeper Network Security and Application Control

Trust Digital Best Practices

Seven for 7: Best practices for implementing Windows 7

The Business Case for Security Information Management

Building a Business Case:

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Fighting Advanced Threats

Zone Labs Integrity Smarter Enterprise Security

How To Prevent Hacker Attacks With Network Behavior Analysis

McAfee Total Protection Reduce the Complexity of Managing Security

NetDefend Firewall UTM Services

Achieving SOX Compliance with Masergy Security Professional Services

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice

Virtual Patching: a Proven Cost Savings Strategy

Network protection and UTM Buyers Guide

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Next Gen Firewall and UTM Buyers Guide

Total Defense Endpoint Premium r12

What Do You Mean My Cloud Data Isn t Secure?

Top 10 Reasons Enterprises are Moving Security to the Cloud

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

The Attacker s Target: The Small Business

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

isheriff CLOUD SECURITY

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Endpoint protection for physical and virtual desktops

Netsweeper Whitepaper

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Managed Security Services for Data

IBM Endpoint Manager for Core Protection

Defensible Strategy To. Cyber Incident Response

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Out-of-Band Security Solution // Solutions Overview

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Non-Geeks Guide to. Network Threat Prevention

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Prioritize Access to Business Applications With Cyberoam s Application Visibility & Control

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

Protect Your Business and Customers from Online Fraud

Transcription:

White paper Cyberoam Cyberoam s Future-ready Extensible Security Architecture (ESA) Protect your investment with a security architecture built to accommodate tomorrow s security requirements

Cyberoam s Extensible Security Architecture (ESA) allows organizations to get maximum value out of their money on the purchase of a security appliance (UTM, Next Generation Firewall). The architecture was designed in response to the fact that most enterprise networks do not have one-size fits all environments, thus, any security appliance must organically grow to accommodate different threat scenarios in the future. With Cyberoam s extensible security, organizations stand protected against unknown, future attacks. As their business grows, so will their extensible security platform. Introduction According to a 2010 survey, sixty-three percent of US organizations have experienced at least one security incident during one year. With each passing day, the challenges faced by IT administrators are becoming more difficult as cyber threats continue to evolve into more stealthy, sophisticated attacks. They may strike in the form of newly-released viruses, spyware, worms etc., blended threats from a variety of entry points or clandestine hackers targeting a company's financial data. As the result of a changing security landscape, organizations are being forced to spend a lot of time and money fighting network threats. If they fail to respond with speed and accuracy, it could result in stolen customer records, compromised confidential information, IT downtime, slowed system performance, reduced employee productivity, loss of revenue and negative impact on corporate reputation. Even as the threats facing organizations are becoming more sophisticated and less conspicuous, enterprise IT teams are being forced to upgrade their security appliances with new features and update the protection level of existing Anti-Malware, IPS and more to tackle any new threat variants, demanding a more complex security system that eventually brings down the overall performance. In addition, IT teams are under increasing pressure to reduce costs, simplify management and continuously ensure that their IT security infrastructure is updated. The challenge today is to have a security appliance that ensures security against latest and upcoming threats without causing any performance dips while empowering customers to dynamically upgrade their security architecture to address the threats of tomorrow.

The need for extensibility in security appliances The commonsensical hardware approach in any enterprise-class security product should be to bring in add-on security capabilities across the legacy appliance in order to neutralize newly-emerging threats. This method, however, is self-limiting because it fails to address the real problem arising due to an organization s rapidly-changing security requirements declining performance of the underlying architecture due to its hardcoded configuration. Zeus Trojan s Enterprise Impact The Zeus Trojan has been around since 2004 in different forms and in different names - spreading in a variety of ways: in email spam, exploit kits, or drive-by downloads from infected websites. The recent most variant of Zeus is being extensively used to steal bank account information. Once this Trojan is discovered in a network, getting rid of it is extremely difficult. According to an RSA security study, over 90 percent of Fortune 500 companies have been potentially impacted by Zeus as of 2010. Most security appliance vendors try to outdo each other when it comes to offering multiple security and networking services in a single, integrated platform. No matter their claims of in-depth defense, a self-contained, closed hardware unit implementing newer features tends to bring a lot of instability to the entire security arrangement because the legacy hardware was never designed in the first place to integrate with these additional features. The increased computing demands of newer features and applications, when turned on, creates a significant performance drop in the appliance. The performance issues become even more critical for time-sensitive security solutions such as newer AV/IPS signatures brought in to fight zerohour malware threats, SQL injection attacks, brute force attacks and crossscripting attacks. The appliance is simply not capable of coping with new security requirements without destabilizing the entire house of cards (see attached figure). In fact, closed or fixed architecture ASIC-based appliances lose their performance value with time because they cannot be upgraded in field to counter new threats; such systems deliver slow performance from the very next day the hardware was designed. Any fresh attack deteriorates the system speed even further. Hence, the user will eventually have to make a tough choice between declining system performance and protection against new attacks. The only solution in such a scenario is to add more expensive hardware, which means costly, time-consuming installation. The need for additional hardware also negatively impacts the bottom line. To offset this loss, some appliances use add-on security modules. Designed to implement or accelerate specific features, the newly-installed features typically cannot be reused for any other purpose and often sit idle as customer requirements keep fluctuating. To address scalability concerns, some security products contain blade solutions to minimize installation costs. Although, sharing the same hardware chassis reduces the need for additional rack space, any savings realized is negated by the lack of true integration between disparate blades, which often increases their overheads by complicating overall network management. Cyberoam's security appliances have built-in extensibility for future-proof security Cyberoam s Extensible Security Architecture (ESA) over its security appliance (UTM, NGFW) has been designed from the hilt to provide futureready security to organizations through an in-built extensible platform which can organically grow with their future security needs, therefore, removing the need to replenish the hardware during its network life cycle. Thus, organizations can protect their investments made on the hardware as the appliance s performance will not deteriorate with time.

The Cyberoam ESA design rapidly adapts itself to mitigate the threats of tomorrow such as Web 2.0, VoIP, streaming media, social networks and more. It has the ability to prolong the life and performance of the legacy security appliance by supporting future feature enhancements, for which the development can be done very rapidly and with minimum deployment effort. Basically, Cyberoam s security appliances achieve extensibility by running on an independent, multicore-aware software architecture, which ensures parallel execution of multiple network sessions. This enables the appliance to maintain a predictable degree of performance while dealing with unknown future threats, thereby providing higher levels of security. Extensibility in Action Many of us have played with LEGO blocks as children, and many continue to do so. To understand the extensible framework in network security, one can compare its structure to a set of LEGO blocks. Unlike customized toys which happen to be rigid and inflexible by not allowing new design creations, LEGO blocks allow the player to use their imagination to bring infinite building possibilities based on interlocking compatibility between bricks. One does not have to foresee future creations in advance. All that is needed is a foundation allowing anything to be built. Clearly, any product that embraces extensibility should adapt to an unlimited number of scenarios. At no point of time, the software has to depend on the appliance hardware, making it easily reprogrammable to deliver new patches and policies online to address any fresh attacks. All that is required is a routine upgrade (see attached figure) which consists of simply downloading the latest Cyberoam version release (with latest patches and newer features), uploading the firmware image, restarting and displaying a new log-in image. Once the firmware is uploaded, the appliance would undergo a soft reboot and would be running the latest build. With each new upgrade in place, organizations can achieve highly granular policy controls and a much larger range of protective services. The efficiencies of the extensible design advance the evolution of existing services and the deployment of new services without requiring a platform replacement or performance compromise. With the Cyberoam ESA in place, IT administrators can quickly and cost effectively turn on new feature capabilities as dedicated or multiple security services (AV, IPS, Instant Messaging controls, Applications Visibility etc.) tightly integrated into the operating system. Instead of adding extra equipment to meet customers networking demands, Cyberoam accommodates growth in security requirements for the organization with its ESA architecture. For MSSPs which want to add newer services for its clients, Cyberoam delivers the flexibility to bring on these services without causing the hardware performance to be degraded.

Major business benefits of Cyberoam s ESA security! Security scalable as per growing business needs: Cyberoam offers a scalable platform for organizations to address their security needs of the future by offering easy integration of newer features with legacy hardware.! Optimal design: Cyberoam s ESA design ensures organizations can deal with the conflicting goals of performance, flexibility and security without compromising in any of them.! High performance: Since Cyberoam s ESA platform runs on a multicoreaware software architecture, it delivers significant performance and security advantages over ASIC processor-based security appliances. Cyberoam s purpose-build hardware and software architecture provides high speed access to look up signature tables and a high speed work area for buffering and processing. With an increased emphasis on application level and content security, the appliances have extra memory to allow effective management of dynamic attacks. They also have the flexibility to add signatures for new attacks when required without worrying about the hardware limits.! Optimizing the investment made on hardware: Cyberoam security has been designed to remove the need to purchase separate, costly and specialized hardware upgrades, therefore lowering OPEX and CAPEX while improving overall efficiencies and security. Cyberoam Product Portfolio CR NG series UTMs CR NG series NGFWs Virtual Security Appliances Cyberoam Central Console (CCC) CR iview (Logging & Reporting) Cyberoam Awards & Certifications VPNC CERTIFIED www.check-mark.com VPNC CERTIFIED Basic Interop AES Interop Portal Exchange Firefox JavaScript Basic Network Extension Advanced Network Extension BEST BUY PC PRO RECOMMENDED EDITOR S C H O I C E www.itpro.co.uk RECOMMENDS Toll Free Numbers USA : +1-877-777-0368 India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 Europe : +44-808-120-3958 C o p y r i g h t 1999-2014 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d. Cyberoam & Cyberoam logo are registered trademarks of Cyberoam Technologies Pvt. Ltd. Ltd. /TM: Registered trade marks of Cyberoam Technologies Pvt. Ltd. Technologies or of the owners of the Respective Products/Technologies. Although Cyberoam attempted to provide accurate information, Cyberoam assumes no responsibility for accuracy or completeness of information neither is this a legally binding representation. Cyberoam has the right to change, modify, transfer or otherwise revise the publication without notice.