Intelligent Logging & Reporting Cyberoam iview Appliance



Similar documents
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Automate your IT Security Services

Sophos Acquires Cyberoam

Cyberoam Next-Generation Security for Enterprises

Unified Threat Management, Managed Security, and the Cloud Services Model

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Cyberoam Next-Generation Security for Enterprises

Cyberoam Perspective BFSI Security Guidelines. Overview

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Achieving PCI-Compliance through Cyberoam

Emerging Trends in the Network Security Market in India, CY 2013

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Deploying Apple ios in Education

Cisco Small Business ISA500 Series Integrated Security Appliances

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Network protection and UTM Buyers Guide

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

Clavister InSight TM. Protecting Values

McAfee Web Reporter Turning volumes of data into actionable intelligence

Astaro Gateway Software Applications

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

What to Look for When Evaluating Next-Generation Firewalls

Payment Card Industry Data Security Standard

Cisco Advanced Services for Network Security

McAfee Endpoint Protection Products

Firewall and UTM Solutions Guide

Ensuring the security of your mobile business intelligence

SVN5800 Secure Access Gateway

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

INTRODUCING KERIO WINROUTE FIREWALL

McAfee - Overview. Anthony Albisser

Readiness Assessments: Vital to Secure Mobility

Discover Security That s Highly Intelligent.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

White paper. Cyberoam. Cyberoam s Layer 8 Technology Protecting the weakest link in your security chain the USER!

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Security Event Management. February 7, 2007 (Revision 5)

February Considerations When Choosing a Secure Web Gateway

Securing the Service Desk in the Cloud

Hosting topology SMS PASSCODE 2015

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Simple security is better security Or: How complexity became the biggest security threat

Q1 Labs Corporate Overview

Stable and Secure Network Infrastructure Benchmarks

Check Point taps the power of virtualization to simplify security for private clouds

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

FortiMail Filtering. Course for FortiMail v4.0. Course Overview

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

THE OPEN UNIVERSITY OF TANZANIA

Clean VPN Approach to Secure Remote Access for the SMB

Next Gen Firewall and UTM Buyers Guide

How To Protect Your Network From Attack From A Network Security Threat

Move over, TMG! Replacing TMG with Sophos UTM

AVG AntiVirus. How does this benefit you?

Boston Area Windows Server User Group April 2010

F-Secure Internet Gatekeeper Virtual Appliance

Remote Services. Managing Open Systems with Remote Services

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Dell SonicWALL report portfolio

Evaluation Guide. iprism Web Security V7.000

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Network/Cyber Security

Решения HP по информационной безопасности

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Sophos is a Network Security company too

RETHINKING CYBER SECURITY Changing the Business Conversation

Network Management Deployment Guide

SonicWALL Unified Threat Management. Alvin Mann April 2009

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM Security IBM Corporation IBM Corporation

isheriff CLOUD SECURITY

Log Audit Ensuring Behavior Compliance Secoway elog System

FortiClient dialup-client configurations

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

Sonicwall Reporting Server

SourceFireNext-Generation IPS

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Whitepaper. Starting Managed Security Services with the Stonesoft MSSP Solution

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Transcription:

Cyberoam iview Appliance

Cyberoam iview - Intelligent Logging & Reporting 1. Need for Centralized Logging & Reporting 2. Cyberoam iview 3. Integration with Vendors/Devices 4. Business Scenario 5. What s in it for Channel partners? 6. About Cyberoam

External Threat BCIT students medical database security breached Burnaby Student Health Services Medical Clinic by British Columbia Institute of Technology (BCIT) stored student personal information from dates October 2005 to June 2012 Server containing records of more than 12680 students was hacked Hacker accessed school servers for Uploading and Downloading of movies *Source: CBC News, July 2012

Internal Threat SunPower Sues SolarCity, Former Employees over Data Theft Former employee was able to access email account even after leaving the company Former employee downloaded critical information from salesforce.com shortly before leaving the company Former employees connected personal USB devices to collect data from SunPower s computers before leaving the company Theft of confidential and non-confidential information such as quotes, deals, proposals, contracts and other files *Source: Forbes.com, February 2012

Internal Threat Ex-Intel Employee Pleads Guilty to Data Theft Former employee was able to access Intel servers even after leaving the company Former employee downloaded valuable design and manufacturing documents estimated to be worth $200 to $400 million *Source: Reuters.com, April 2012

Internal Threat California students busted for high-tech grade-changing scam Students break into the school and placed Keyloggers to track and record key strokes of teachers computers to know their passwords Students used teachers login and password to access computers and improve their grades *Source: NBCNews.com, January 2012

Need for Centralized Logging & Reporting (SIEM)

Organizations require a complete security picture Logging & Reporting tells the Who, What, When, Where and How of organization s activities Centralized logging & reporting delivers visibility across - Devices Systems & Solutions Locations Irrespective of vendor-specific devices or solutions Security Information & Event Management (SIEM) Market $1.1bn SIEM market by 2011 Rise of 19.3% CAGR through 2012

Lower cost Re-use and customization of Open Source frameworks and solutions Reduces Total Cost of Ownership for users Allows creation of flexible architecture Resolves challenges related to products and application integration

Cyberoam iview

Intelligent Logging and Reporting solution Ability to log and report activities from various devices/vendors Unique ability Shows Who is doing What

Security Management Data Protection Forensic Analysis Compliance Management Identity Logging Reporting Servers Desktop systems Logs & Events Firewalls Applications IDP / IPS Switches Routers UTM Cyberoam iview s Logging & Reporting Facilitates Security, Compliance, Forensics

Cyberoam iview Appliance

Appliance Features RAID Technology Hardened OS for security against future attacks and system downtime Fine-tuned software for capacity and hardware Central reporting for multiple devices

Appliance Benefits Simplicity in deployment Turnkey Logging & Reporting Solution Eliminates need for Technical expertise to set up Terabytes of storage space Compliance needs Long-term reporting/archiving needs in Enterprises Data Redundancy Faster data retrieval, event investigation Storage reliability Safety of logs, reports in case of disk failure Reliable support through telephone, chat and email 8x5 and 24x7 support Annual Maintenance Contracts

Features of Cyberoam iview Log Management Near real-time log retrieval Archival and Search facility Security Management iview dashboard Shows network attacks on single screen Drill-down reports 3 rd level drill-down for attack details Identity-based logging and reporting Pinpoints the user 1000+ Reports

Features of Cyberoam iview Compliance Management Reduces compliance costs Single click access to reports - Simplified compliance management Easy visibility into access by users Forensic Analysis Reconstructing sequence of events in a security breach Reporting stands in the face of legal scrutiny

Benefits of Cyberoam iview Security Benefits Centralized control Identifies attacks based on Attack Reports (Type of Reports) Deviation from norm in access or usage of resources Allows quick investigation and determination of cause of breach Compliance Benefits Access and Usage logs of Activity in critical applications, databases Data transmitted to external entities Enables setting user identity-based thresholds for acceptable use

Benefits of Cyberoam iview Productivity Benefits Shows deviation in resource consumption Financial Benefits Low capital requirements Low technical manpower requirements

Screenshots

Main 2012 All Dashboard Rights Reserved www.cyberoam-iview.org Gives At-a-glance View of Organization s Security Scenario

2012 All Rights Reserved Multiple www.cyberoam-iview.org Traffic Reports on a Single Screen

2012 All Rights Reserved User www.cyberoam-iview.org Identity-based In-Depth Reporting

Integration with Vendors/Devices

Firewall Linux Iptables / Netfilter firewall UTMs Cyberoam Fortigate SonicWall Cisco ASA HTTP proxy Squid Access Gateway 24Online Web Server Apache End Point Security escan Smart Wireless Router NetGenie More products being added

Business Scenario

Cyberoam iview integrated with multiple devices & locations

What s in it for Channel partners?

Channel Partner Benefits Expanded customer base Existing Customers MSSPs Multiple security solutions in their portfolio New network devices being added continuously Added revenues and profitability Cyberoam support in meeting sales objectives

About Cyberoam

About Cyberoam Technology Powerhouse 800+ Employees Backed by World s Largest PE Investor ($90bn); The Carlyle Group Sales, Distribution Channel and Customers across 110+ Countries Amongst the top 3 global players for UTM features Patent Pending Identity-based Management

Cyberoam Product Range Securing the IT network Unified Threat Management Centralized security management for remote /branch offices & clients Network Monitoring & Analysis & Open Source Secure Internet surfing for home users

Cyberoam UTM Appliance Range Small Offices SME Enterprises 15wi, 15i, 25wi, 25ia, 35wi, 35ia 50ia, 100ia, 200i, 300i 500ia, 750ia, 1000ia, 1500ia 500ia-RP /1F /10F 750ia-1F / 10F 1000ia-10F, 1500ia-10F

Cyberoam Credentials

Recognized as Visionary in the Gartner UTM MQ 2012 Magic Quadrant for Unified Threat Management

Recognized as a Network UTM Innovator - Security Innovator Developing a UTM product line that covers all customer types, and applying unique technology and business practices to do it. Innovation: Go-to-market strategy in a global market that is quite crowded in its product space. Greatest strength: Product and support through most media 24/7. For Cyberoam, customer commitment means measuring, analyzing and responding to customer attitudes, needs and how customers view Cyberoam products. One innovative solution to growth and extensibility requirements has been adding an abstraction layer a sort of Layer 8 on the open systems interconnection (OSI) model - that allows connection of names. This could be users, domains and more. This allows greatly improved granularity of system administration.

Cyberoam Certifications Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability

SC Magazine Five Star Rating - Seven Times in a Row! April 2011 Product Review Cyberoam CR100ia Easy to deploy with a lot of granular controls. February 2011 Product Review Cyberoam CR750ia "A feature-packed and powerful UTM appliance well suited to larger businesses looking for good value and strong identity-based security measures" October 2010 Product Review Cyberoam CR15wi Remarkably good value, identity-based security, simple deployment, extensive security measures, top quality reporting software. July 2010 Product Review Cyberoam CR50ia A lot of features at a low cost. A solid product and the price is right. We give CR50ia our Best Buy this month. April 2009 Product Review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance also includes a solid web content filter and blocking for applications such as IM and P2P

Thank You Contact Cyberoam sales@cyberoam.com