Cyberoam Next-Generation Security for Enterprises



Similar documents
Cyberoam Next-Generation Security for Enterprises

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

Cyberoam Perspective BFSI Security Guidelines. Overview

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Automate your IT Security Services

Future-ready Security

Why Upgrade to the New CyberoamOS?

Achieving PCI-Compliance through Cyberoam

The Healthcare challenge to protect patient information - HIPAA Compliance

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

Clavister InSight TM. Protecting Values

Intelligent Logging & Reporting Cyberoam iview Appliance

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Move over, TMG! Replacing TMG with Sophos UTM

Vyatta Network OS for Network Virtualization

Secure your Virtual World with Cyberoam

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Astaro Gateway Software Applications

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Unified Threat Management, Managed Security, and the Cloud Services Model

Vulnerability Management

Trend Micro. Advanced Security Built for the Cloud

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

White paper. Cyberoam. Cyberoam s Layer 8 Technology Protecting the weakest link in your security chain the USER!

Simple security is better security Or: How complexity became the biggest security threat

Network protection and UTM Buyers Guide

virtual UTM Cyberoam Appliances Enterprise/MSSP Security-in-a-Box Security in a Virtual Office or Office-in-a-Box S e c u r i n g Y o u

Cyberoam s Future-ready Extensible Security Architecture (ESA) Cyberoam. White paper

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Current IBAT Endorsed Services

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

How To Buy Nitro Security

High performance security for low-latency networks

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Secure Cloud-Ready Data Centers Juniper Networks

Managed Security Services for Data

Your Security Partner of Choice

Cyberoam Technologies Pvt. Ltd. Cyberoam Firmware v Security Target. Evaluation Assurance Level (EAL): EAL4+ Document Version: 1.

SANS Top 20 Critical Controls for Effective Cyber Defense

Did you know your security solution can help with PCI compliance too?

Introducing IBM s Advanced Threat Protection Platform

Security is a top priority. The reasons for reliable network security keep growing.

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

How To Protect Your Cloud From Attack

Enterprise-Grade Security from the Cloud

NSFOCUS Web Application Firewall White Paper

IBM Global Technology Services Preemptive security products and services

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

Next Gen Firewall and UTM Buyers Guide

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

IT Security & Compliance. On Time. On Budget. On Demand.

IBM Internet Security Systems products and services

Next-Generation Firewalls: Critical to SMB Network Security

The Advantages of Security as a Service versus On-Premise Security

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Guideline on Auditing and Log Management

NSFOCUS Web Application Firewall

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

IBM Internet Security Systems

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Executive Brief on Enterprise Next-Generation Firewalls

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

V1.4. Spambrella Continuity SaaS. August 2

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Protecting Your Organisation from Targeted Cyber Intrusion

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Q1 Labs Corporate Overview

Applications erode the secure network How can malware be stopped?

BSNL IDC Hosted Firewall Service. Total Network Security

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Corporate Profile. Net Desire Technologies

PCI DSS 3.0 Compliance

How To Choose A Network Firewall

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Cisco ASA 5500 Series Firewall Edition for the Enterprise

FortiWeb 5.0, Web Application Firewall Course #251

Networking for Caribbean Development

10 Things Every Web Application Firewall Should Provide Share this ebook

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Symantec Protection Suite Add-On for Hosted and Web Security

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Readiness Assessments: Vital to Secure Mobility

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Cisco ASA 5500 Series Firewall Edition for the Enterprise

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Using Palo Alto Networks to Protect the Datacenter

The SIEM Evaluator s Guide

Achieve Deeper Network Security and Application Control

Clean VPN Approach to Secure Remote Access for the SMB

COORDINATED THREAT CONTROL

Reviewer s Guide. Document Version /12/2013. Document version /11/2005. Document version

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Symantec Messaging Gateway 10.6

Transcription:

www.cyberoam.com Cyberoam Next-Generation Security for Enterprises With enterprises experiencing newer trends like virtualization, application explosion, increasing use of Web Applications and BYOD, they ought to prepare for emerging security risks in their networks along with increasing concerns on insider threats, vanishing 'trust boundaries, compliance management and more. Growing businesses and rapidly expanding network horizons have lead to an increased demand for next-generation security, higher performance, easy security management and quick compliance, in enterprises. Cyberoam's next-generation security caters to the security anxiety and demand for advanced network security in enterprises today.

The Cyberoam Solution for Enterprise Security Cyberoam is an award-winning global IT security company with a presence in more than 125 countries. With an array of globally acclaimed and certified products, Cyberoam offers reliable solutions for varied needs of enterprises, including network security, centralized security management and centralized visibility. Trusted by thousands of customers across the globe for its innovative products and technology, Cyberoam enjoys a proven track record of serving many well-known names in the enterprise segment across various industries. Cyberoam s Enterprise Portfolio: Network Security Offers flexibility of hardware and virtual Next Generation Firewall appliances for security in physical as well as virtual enterprise networks Centralized Security Management Allows enterprises to manage multiple, dispersed Cyberoam installations across remote or branch offices Centralized Visibility Offers real-time visibility into user and network activities across the enterprise network Training & Support Enables faster resolution of issues with customer support and efficient deployment and management of Cyberoam solutions with trainings L8 USER L7 Application L6 Presentation ASCII, EBCDIC, ICA L5 Session L4 Transport L3 Network L2 Data Link L1 Physical CYBEROAM S LAYER 8 IDENTITY-BASED SECURITY Cyberoam s Layer 8 Technology treats User Identity as the 8th layer or the human layer in the network protocol stack. This allows enterprises to uniquely identify users, control user activities in the network, and enable policy-setting and reporting by username, even in dynamic IP environments like DHCP and Wi-Fi. Cyberoam s Layer 8 Technology adds speed to security in an enterprise network by offering instant visibility into the source of attacks by identifying victims/attackers by username, which allows proactive remediation of security incidents. With Layer 8 identification and controls, Cyberoam enables enterprises in security management, data protection, forensic analysis and compliance management. Cyberoam's Layer 8 Technology treats User Identity as the 8th Layer in the protocol stack L2TP, PPTP TCP, UDP 192.168.1.1 00-17-BB-8C-E3-E7 Cyberoam Next Generation Firewall (NGFW) offers security across Layer 2-Layer 8 using Identity-based policies

NETWORK SECURITY Cyberoam s enterprise security integrates multiple security features on a single appliance to offer comprehensive network security. Cyberoam works at the network gateway and protects networks against application threats, vulnerabilities in web applications, BYOD challenges, data leakage over websites and applications, sophisticated blended attacks, malware, spam, spyware and other evolving external threats. With the flexibility of hardware as well as virtual NGFW appliances, Cyberoam protects both the physical and virtual enterprise networks. Next-Generation security features on Cyberoam NGFW: Stateful Inspection Firewall Web Filtering Application Visibility & Control Bandwidth Management Web Application Firewall 3G / 4G / WiMAX Connectivity * VPN (SSL VPN & IPSec) IM Archiving & Controls Intrusion Prevention System Multiple Link Management Anti-Virus & Anti-Spyware On-Appliance Reporting Anti-Spam IPv6 Ready Outbound Spam Protection Wi-Fi Appliances * FleXi Ports* * Features not available on virtual security appliances KEY HIGHLIGHTS: Sales, channel and customer presence across 125+ countries Industry leading R&D; 550+ employees globally Patent-pending Identity-based Management Recognized as a Network - Security Innovator by SC Magazine World s 1st network security vendor with ISO 20000:2011 certified Global Customer Support Services

Cyberoam NG series - Next Generation Firewall (NGFW) Cyberoam offers future-ready security to enterprises with its NG Series NGFW appliances, consisting of next-generation security features, to help them secure their networks against threats emerging from newer trends like device & application explosion, increasing use of web applications and more. Gigabit Firewall Throughputs, also for Branch Offices With NG series appliances offering gigabit firewall throughputs, enterprises get assured high performance security, even for their branch offices. Security Appliances with Flexible Connectivity options Cyberoam s flexi Port NGFW appliances, available as part of its NG Series range, offer enterprises the network flexibility and configuration freedom with I/O slots that allow choice of Copper GbE and Fiber 1GbE/10GbE network connectivity. Intelligent Firmware Integrated seamlessly with the hardware for network and crypto acceleration, CyberoamOS extracts the highest level of performance from a multi-core platform and offers minimum latency. It comes with Next-Generation security features to protect against newly evolving threats. Extensible Security Architecture (ESA) Cyberoam s Extensible Security Architecture helps enterprises tackle unknown threats of the future by offering the agility to prolong the life and performance of its NGFW appliances to support newer enterprise security features and enhancements. OS Future-Ready Security. Cyberoam NGFW Hardware Appliance Range: CR NG Series 10iNG, 15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG, 100iNG, 200iNG, 300iNG, 500iNG-XP, 750iNG-XP, 1000iNG-XP, 1500iNG-XP, 2500iNG, 2500iNG-XP CR ia Series 500ia, 750ia, 1000ia, 1500ia, 500ia-1F/10F / RP, 750ia-1F/10F, 1000ia-10F, 1500ia-10F Key Features Application Visibility & Control Industry-leading coverage for 2000+ key applications in enterprises Prioritizes applications based on combination of User, Time, Applications and Bandwidth Granular application controls with classification based on risk level, characteristics, technology Pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications Layer 8 Technology for Identity-based Security Patent-pending Layer 8 technology penetrates through all security modules of Cyberoam NGFW, offering Identity-based controls over user authentication, service authorization and reporting (AAA) Advanced Threat Protection Offers protection against newly evolving threats with Intrusion Prevention System, Gateway Anti-Virus/Anti- Spyware, Gateway Anti-Spam, and Web & Content Filtering features, offering security at par with best-of-breed solutions Web Application Firewall (WAF) Available as a subscription module on Cyberoam NGFW Protects websites and web-based applications against OWASP Top 10 web application attacks like SQL injection, cross-site scripting (XSS), URL parameter tampering, and more Follows a positive security model through Intuitive Website Flow Detector - automatically identifies and blocks all application layer attacks without relying on signature tables or pattern-matching techniques

Virtual Security Designed to address the enterprise security needs for virtualized environments like virtual data centers, Enterprise Security in a box and Office in a box, Cyberoam virtual security solutions offer: 1. Security for virtualized networks by scanning traffic within virtual networks; protecting hypervisor management console, hypervisor and Guest OS; and securing zero trust networks with virtual NGFW appliances 2. Comprehensive network security with multiple security features on a single virtual NGFW appliance 3. Ease of deployment and upgrade 4. One-click compliance reports and logging/reporting that helps in compliance management 5. Centralized Security Management of branch offices using physical/virtual NGFW appliances over a single interface of Cyberoam Central Console (CCC), available in both virtual and hardware forms 6. Centralized Visibility into network and user activities with logging and reporting offered by Cyberoam iview software Cyberoam virtual security appliances support multiple virtualization platforms like VMware, Microsoft Hyper-V, KVM and Citrix XenServer. Cyberoam virtual NGFW appliance range: CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C VPN Ensures secure remote access with IPSec VPN, LT2P, PPTP and SSL VPN over its NGFW appliances Threat-free Tunneling technology scans traffic for malware, intrusion attempts Outbound Spam Protection Available as a subscription module on Cyberoam NGFW Protects from recurring incidents of outbound spam in enterprise networks, significantly reducing bandwidth consumption and optimizing network performance Recurrent Pattern Detection (RPD) technology offers real-time classification for fast detection and blocking of outbound spam

Enterprises and MSSPs can centrally manage security across dispersed branch offices and clients using Cyberoam NGFW with Cyberoam Central Console (CCC), available as hardware and virtual appliances. Centralized Security Management across Branch Offices Centrally push policies, security subscriptions and firmware/signature upgrades with change management for uniform policies and protection against zero hour threats. Meaningful grouping of security appliances based on clients, geography, security appliance model and more Create policy templates based on best practices for re-use while setting up security policies for new branch offices and customers Delegation of administrative rights based on user roles, enabling security against misuse of administrative privileges Timely notifications for alerts like reminders for security subscription expiry, threats count crossing a threshold, appliance connection status, VPN connection status change and more Enables leveraging existing Professional Services Automation (PSA) Tools, IT infrastructure monitoring and ticketing systems Integration with standalone Cyberoam iview allows auto-provisioning of managed appliances and automatically syncs CCC administrators in Cyberoam iview CCC Appliance Range: Hardware CCC NM Appliances - CCC15NM, CCC50NM, CCC100NM, CCC200NM, CCC500NM Hardware CCC Appliances - CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000 Virtual CCC Appliances - CCCV15, CCCV50, CCCV100, CCCV200, CCCV500 Enterprises can get complete centralized realtime visibility into network and user activities with logs and reports offered by Cyberoam iview. Centralized Visibility across Networks 1200+ reports help with security management, compliance management, and forensic analysis Logs, reports and alerts across multiple devices, protocols and locations provide user and network activity information to identify security breaches, enabling quick action and minimizing network downtime One-click compliance reports on HIPAA, PCI DSS, GLBA, SOX and drill-down reports /alerts for security breach, data leakage helps to meet compliance needs Helps with forensic analysis by reconstructing the sequence of events of security breach with logs and reports, reducing cost of investigation and minimizing network downtime Compatibility with a wide range of devices including Proxy Firewalls, Custom Applications and any Syslog-compatible devices enables organizations to store logs and reports of multiple devices Cyberoam iview Appliance Range: Hardware appliances - CR-iVU25NR, CR-iVU100NR, CR-iVU200NR Software

Training and Support Pre-sales Support Cyberoam s dedicated global pre-sales team offers security planning and migration assistance for Cyberoam deployment and implementation to enterprises Post-Sales Support Cyberoam s ISO 20000:2011 certified Global Support Team offers 24x7 or 8x5 support as subscribed by the customers, over phone, email and chat. Training Cyberoam offers trainings and product updates to its customers for efficient d e p l o y m e n t, c o n f i g u r a t i o n a n d management of Cyberoam solutions. Cyberoam Threat Research Labs Cyberoam Threat Research Labs consists of a dedicated team of researchers that ensure detection and identification of security threats at early stages of propagation and protect Cyberoam customers against numerous zero day vulnerabilities and malware attacks. CTRL ensures appropriate security protection by continuously releasing suitable signatures, timely security upgrade and research reports. Awards and Certifications Cyberoam Technologies 505 Thornall Street, Suite # 304 Edison, NJ - 08837, USA, Tel: +1-847-235-4684, Toll Free Number: +1-800-686-2360 sales@cyberoam.com www.cyberoam.com Registered Trademark of Cyberoam Technologies Pvt. Ltd.