Cyberoam iview Appliance
Cyberoam iview - Intelligent Logging & Reporting 1. Need for Centralized Logging & Reporting 2. Cyberoam iview 3. Integration with Vendors/Devices 4. Business Scenario 5. What s in it for Channel partners? 6. About Cyberoam
External Threat BCIT students medical database security breached Burnaby Student Health Services Medical Clinic by British Columbia Institute of Technology (BCIT) stored student personal information from dates October 2005 to June 2012 Server containing records of more than 12680 students was hacked Hacker accessed school servers for Uploading and Downloading of movies *Source: CBC News, July 2012
Internal Threat SunPower Sues SolarCity, Former Employees over Data Theft Former employee was able to access email account even after leaving the company Former employee downloaded critical information from salesforce.com shortly before leaving the company Former employees connected personal USB devices to collect data from SunPower s computers before leaving the company Theft of confidential and non-confidential information such as quotes, deals, proposals, contracts and other files *Source: Forbes.com, February 2012
Internal Threat Ex-Intel Employee Pleads Guilty to Data Theft Former employee was able to access Intel servers even after leaving the company Former employee downloaded valuable design and manufacturing documents estimated to be worth $200 to $400 million *Source: Reuters.com, April 2012
Internal Threat California students busted for high-tech grade-changing scam Students break into the school and placed Keyloggers to track and record key strokes of teachers computers to know their passwords Students used teachers login and password to access computers and improve their grades *Source: NBCNews.com, January 2012
Need for Centralized Logging & Reporting (SIEM)
Organizations require a complete security picture Logging & Reporting tells the Who, What, When, Where and How of organization s activities Centralized logging & reporting delivers visibility across - Devices Systems & Solutions Locations Irrespective of vendor-specific devices or solutions Security Information & Event Management (SIEM) Market $1.1bn SIEM market by 2011 Rise of 19.3% CAGR through 2012
Lower cost Re-use and customization of Open Source frameworks and solutions Reduces Total Cost of Ownership for users Allows creation of flexible architecture Resolves challenges related to products and application integration
Cyberoam iview
Intelligent Logging and Reporting solution Ability to log and report activities from various devices/vendors Unique ability Shows Who is doing What
Security Management Data Protection Forensic Analysis Compliance Management Identity Logging Reporting Servers Desktop systems Logs & Events Firewalls Applications IDP / IPS Switches Routers UTM Cyberoam iview s Logging & Reporting Facilitates Security, Compliance, Forensics
Cyberoam iview Appliance
Appliance Features RAID Technology Hardened OS for security against future attacks and system downtime Fine-tuned software for capacity and hardware Central reporting for multiple devices
Appliance Benefits Simplicity in deployment Turnkey Logging & Reporting Solution Eliminates need for Technical expertise to set up Terabytes of storage space Compliance needs Long-term reporting/archiving needs in Enterprises Data Redundancy Faster data retrieval, event investigation Storage reliability Safety of logs, reports in case of disk failure Reliable support through telephone, chat and email 8x5 and 24x7 support Annual Maintenance Contracts
Features of Cyberoam iview Log Management Near real-time log retrieval Archival and Search facility Security Management iview dashboard Shows network attacks on single screen Drill-down reports 3 rd level drill-down for attack details Identity-based logging and reporting Pinpoints the user 1000+ Reports
Features of Cyberoam iview Compliance Management Reduces compliance costs Single click access to reports - Simplified compliance management Easy visibility into access by users Forensic Analysis Reconstructing sequence of events in a security breach Reporting stands in the face of legal scrutiny
Benefits of Cyberoam iview Security Benefits Centralized control Identifies attacks based on Attack Reports (Type of Reports) Deviation from norm in access or usage of resources Allows quick investigation and determination of cause of breach Compliance Benefits Access and Usage logs of Activity in critical applications, databases Data transmitted to external entities Enables setting user identity-based thresholds for acceptable use
Benefits of Cyberoam iview Productivity Benefits Shows deviation in resource consumption Financial Benefits Low capital requirements Low technical manpower requirements
Screenshots
Main 2012 All Dashboard Rights Reserved www.cyberoam-iview.org Gives At-a-glance View of Organization s Security Scenario
2012 All Rights Reserved Multiple www.cyberoam-iview.org Traffic Reports on a Single Screen
2012 All Rights Reserved User www.cyberoam-iview.org Identity-based In-Depth Reporting
Integration with Vendors/Devices
Firewall Linux Iptables / Netfilter firewall UTMs Cyberoam Fortigate SonicWall Cisco ASA HTTP proxy Squid Access Gateway 24Online Web Server Apache End Point Security escan Smart Wireless Router NetGenie More products being added
Business Scenario
Cyberoam iview integrated with multiple devices & locations
What s in it for Channel partners?
Channel Partner Benefits Expanded customer base Existing Customers MSSPs Multiple security solutions in their portfolio New network devices being added continuously Added revenues and profitability Cyberoam support in meeting sales objectives
About Cyberoam
About Cyberoam Technology Powerhouse 800+ Employees Backed by World s Largest PE Investor ($90bn); The Carlyle Group Sales, Distribution Channel and Customers across 110+ Countries Amongst the top 3 global players for UTM features Patent Pending Identity-based Management
Cyberoam Product Range Securing the IT network Unified Threat Management Centralized security management for remote /branch offices & clients Network Monitoring & Analysis & Open Source Secure Internet surfing for home users
Cyberoam UTM Appliance Range Small Offices SME Enterprises 15wi, 15i, 25wi, 25ia, 35wi, 35ia 50ia, 100ia, 200i, 300i 500ia, 750ia, 1000ia, 1500ia 500ia-RP /1F /10F 750ia-1F / 10F 1000ia-10F, 1500ia-10F
Cyberoam Credentials
Recognized as Visionary in the Gartner UTM MQ 2012 Magic Quadrant for Unified Threat Management
Recognized as a Network UTM Innovator - Security Innovator Developing a UTM product line that covers all customer types, and applying unique technology and business practices to do it. Innovation: Go-to-market strategy in a global market that is quite crowded in its product space. Greatest strength: Product and support through most media 24/7. For Cyberoam, customer commitment means measuring, analyzing and responding to customer attitudes, needs and how customers view Cyberoam products. One innovative solution to growth and extensibility requirements has been adding an abstraction layer a sort of Layer 8 on the open systems interconnection (OSI) model - that allows connection of names. This could be users, domains and more. This allows greatly improved granularity of system administration.
Cyberoam Certifications Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability
SC Magazine Five Star Rating - Seven Times in a Row! April 2011 Product Review Cyberoam CR100ia Easy to deploy with a lot of granular controls. February 2011 Product Review Cyberoam CR750ia "A feature-packed and powerful UTM appliance well suited to larger businesses looking for good value and strong identity-based security measures" October 2010 Product Review Cyberoam CR15wi Remarkably good value, identity-based security, simple deployment, extensive security measures, top quality reporting software. July 2010 Product Review Cyberoam CR50ia A lot of features at a low cost. A solid product and the price is right. We give CR50ia our Best Buy this month. April 2009 Product Review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance also includes a solid web content filter and blocking for applications such as IM and P2P
Thank You Contact Cyberoam sales@cyberoam.com