Cyberoam iNG series slide

Download Report

Transcript Cyberoam iNG series slide

Cyberoam NG series:
Future-ready Security
www.secureone.com.my | [email protected]
The Future
of networks…
www.secureone.com.my | [email protected]
Where are Networks moving to?
•
•
•
•
Superfast Internet: 1000 Mbps Internet speed a reality today!
More devices per user – More devices connecting to Internet
More web-applications being accessed
Increase in usage of data
www.secureone.com.my | [email protected]
How will Organizations Gain?
CONNECTIVITY
PRODUCTIVITY
SECURITY
With Network Connectivity & Productivity taking a leap,
what about Security?
No one wants SECURITY to become a
bottleneck in their network!
www.secureone.com.my | [email protected]
Presenting
The Cyberoam NG series
The ‘Next-Generation’ appliances built for
Future-ready Security in networks!
www.secureone.com.my | [email protected]
Cyberoam NG (Next-Generation) series offers
‘Future-Ready’ Security
• The Fastest ‘UTM’ appliances for SOHO and SMB segments
• Offering Next-Generation Firewall protection for Large
Enterprises!
• Offering Future-Ready security to
• SOHO, ROBO
– CR15iNG, CR25iNG, CR35iNG
– Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG
• SMB
– CR50iNG, CR100iNG
• Enterprise
– CR2500iNG
The Cyberoam NG Series
 Powerful Hardware
Future-Ready
Security
 Superior Quality
 Performance Leap
 Value for Money
 All-New Firmware
Powerful Hardware for Future-Ready Security
• Superfast processing speed
• A must for Gigabit Internet speeds!
• Nano second security processing with Giga Hertz processors
• Parallel security processing with Dual core
• Next-Gen Memory
• High Internet speed and data transfer demand Next-Gen
memory
• Larger memory size for Enterprise-grade security
• DDR3 RAM for more number of data transfers per clock cycle
• Faster, Next-Gen memory for higher I/O throughput
Powerful Hardware for Future-Ready Security
• Gigabit Ports for Gigabit Speeds
• Any network security appliance with having less than Gigabit
port is nearly obsolete!
– All network components have moved to Gigabit ports
• Gigabit Ethernet for future SOHO & SMB networks
• Higher port density
• More Storage
• Today, higher throughput leads to more activities,
generating more data.
– More storage for more reports
– Reports stored for longer duration
Superior Quality
• Better performance
• Design & components supporting high speed I/O
throughput
• Highly robust
• Designed to protect against power surge & fluctuations
• Industrial grade components to withstand extreme
environments
Wi-Fi Security appliances for SOHO/ROBO networks
• Faster performance, broader coverage with 3x3 MIMO
Technology
• Dual band support: 2.4 GHz or 5 GHz
• Higher performance by aggressively transmitting and
receiving data over Wi-Fi channels
• Faster handling of video streaming and high bandwidth
downloads
• High performance integrated security over WLAN
• Secures wireless networks to the extent of wired networks
Appliances starting with Gigabit Firewall Throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
Best in class UTM throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
CR2500iNG: Next-Generation Firewall throughput
• Supports upto 4000 users
UTM throughput: 4000 Mbps
36000 Mbps
Firewall throughput
0
10000
20000
30000
40000
Get Ready for Future Networks
• 6.5 times increase in Firewall throughputs
• 5 times increase in UTM throughputs
• Best in class throughput against competitor models
An Anti-aging remedy for your network offering the best value
for money!
The NG SeriesLoaded with All-New Firmware
The NG SeriesAll-New-GUI
www.secureone.com.my | [email protected]
www.secureone.com.my | [email protected]
www.secureone.com.my | [email protected]
www.secureone.com.my | [email protected]
www.secureone.com.my | [email protected]
www.secureone.com.my | [email protected]
www.secureone.com.my | [email protected]
The need for “Intelligent Software”
• Key challenges
• Keep up with the exponentially rising Network Traffic
• Reduce overall cost of networking & security equipments
• Minimize power consumption
– Limitation of “Hardware”
• Increasing clock frequencies to boost performance leads to
prohibitively high power consumption
– Shift to Multicore architecture to
• Meet every increasing performance
• Maintain manageable levels of power consumption
CyberoamOS
with ‘Intelligent Software’
‘Intelligent Software’: Doing more with less
• Tightly integrates with Hardware for Network & Crypto
Acceleration delivering high performance
• Better use of Multicore architecture for Parallel processing
• Optimize workload distribution across cores
• Lockless path for packet forwarding
– A single core handles packets for each connection at any
given time to avoid inter-locks
• Optimize Interrupt rate for minimum CPU overhead and latency
• High rate of interrupts - A bottleneck in high-speed data
transfers
‘Intelligent Software’: Doing more with less
• Fastpath packets to improve processing speed and reduce CPU
overhead
• Avoid firewalling for file packets once Firewall decision is
taken (unless in event of rule change).
• E.g. 200 mb file. Once the Firewall decision is taken on the file,
the rest file packets need not go through Firewalling decision.
The need for Next
Generation Security
features…
The need to be more application-layer aware than
ever before
-Explosion of Internet Applications
-Risk: ‘Application Chaos’ in organization
Internet
NG series offers
Advanced Application Controls
Securing You
Take control of which applications can run on your network
Application Classification based on
Risk Level
Application
Characteristics
Application
Technology
Very Low (1)
Excessive Bandwidth
Browser Based
Low (2)
Prone to misuse
Client Server
Medium (3)
Transfer files
Network Protocol
High (4)
Tunnel other apps
P2P
Very High (5)
Widely used
Loss of Productivity
Can bypass firewall policy
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Application Classification
Applications are classified based on
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Proactive Protection Model
 Administrator can simply select filtering criteria
 Technology, Risk Level or Characteristics
 Set action – regardless of application name
 Allow or Deny
 Allow/Block all future applications included for respective criteria
 No need of administrator intervention to add new applications to
policy
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Proactive Protection Model
Select P2P
Applications
Set Action
www.cyberoam.com
www.secureone.com.my
| [email protected]
Block all future P2P
application without adding
applications manually
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Prioritize applications with Cyberoam’s Layer 7 &
Layer 8 Visibility & Controls
Medium Quality
Internet
IM
Web
Bit
5000+
VoIP
ERP
Applications
CRM
Application
Torrent
mail
Control over
www.secureone.com.my | [email protected]
High Quality
Low Quality
The increasing need to protect Web Applications
from hackers
• Critical business applications and Services moving
to the Web. Risk of web-application attack.
• Firewalls/IPS cannot protect a web application
from unknown threats
Critical business
applications
NG series offers
On-Appliance Web Application
Firewall
On-Appliance Web Application Firewall
 Protect Web Servers and Web Applications from hackers
 No need to buy dedicated WAF appliance
 Cyberoam WAF blocks hackers from exploiting Web-Application
Vulnerabilities
 WAF Features include
–
Positive protection model and No Signature Tables
–
Intuitive website flow detector automatically adapts to website
changes
–
Protects against OWASP
top 10 vulnerabilities
–
SSL Offloading
–
Monitoring & Reporting
www.secureone.com.my | [email protected]
The need to support BYOD & handle security risks
• Device Explosion Trend: Multiple Internet Access
Devices per User
• Each device has a unique IP address
• Employee-owned smart devices to reach 350mn
by 2014, up from 150mn this yr
Embrace BYOD with
Cyberoam
Mobile VPN for iOS and Android devices
• Cyberoam’s Layer 8 Identity based security extended to mobile devices
• Securely connect your iPhone, iPad and Android devices to your corporate
network through VPN
iOS
Android
IPSec VPN (New)
L2TP VPN
PPTP VPN
L2TP VPN (New)
www.secureone.com.my | [email protected]
Support for new Connectivity
Technologies – 4G/ LTE
Support for new Connectivity Technologies – 4G /LTE
• Making organizations ready for high speed future
• Easy deployment for high speed internet connection
• Simple USB modem plug-in into Cyberoam appliance
• Maximize business connectivity
• Automatic fail-over to 4G/LTE WWAN connection
• Gateway failover over VPN
• VPN over 4G/LTE
www.secureone.com.my | [email protected]
4G
Securing You
First-of-its-kind
Reporting
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
N/A: Private IP
www.cyberoam.com
www.secureone.com.my
| [email protected]
Others: Rest of records
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security Dashboard
Security Dashboard
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security Dashboard
Security Dashboard
N/A: Private IP
www.cyberoam.com
www.secureone.com.my
| [email protected]
Others: Rest of records
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Country Maps for Source/Destination Traffic
• Graphical overview of Data transfer and Risk level
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Application Reports
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security Features
 Fusion Technology driven SI Firewall
- Interface for achieving Unified Security
 Layer 8 Technology: Identity-based controls
- Identity-based security from Layer 2 to Layer 8
- Allows control over
- Who can connect to network, Who can access what,
What have they accessed
- Ability to track the user activities; identify attackers
/victims
- Take quick network security decisions
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security Features
 Intrusion Prevention System
- Maximum security against emerging threats
- Identity-based IPS policies per user or group
- 3500+ signatures – broadest security cover
 Gateway Anti-Virus, Anti-spyware
- Prevent blended threats
- 4 million+ signatures
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM
traffic
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security Features
 Gateway Anti-Spam
- Real-time, most accurate spam protection
- Recurrent Pattern Detection (RPD) technology
- Scans SMTP, POP3, IMAP traffic
 Web & Content Filtering
- Complete Visibility & Control over HTTP & HTTPS
- 82+ categories and 44 million+ URLs

‘IPv6 Ready’ Gold
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security Features
 Virtual Private Network (VPN)
- Threat-free remote access
- Threat Free Tunneling (TFT) Technology
- IPSec, L2TP, PPTP and SSL-VPN
 Multi-Link Management
- For an ‘always-on’ network
- Support for more than 2 ISP links
- Supports Wireless WAN (3G USB modems, WiMax)
- Gateway failover over VPN
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security Features
 Instant Messaging & Control
- Identity-based controls for Yahoo messenger and
Windows Live Messenger
- Control who can chat with whom, file transfer,
webcam
 Bandwidth Management
- Enhance network performance and productivity
- Create a bandwidth policy on a combination of User,
Application, Category (application & web), allowing
great flexibility and real L2-L8 visibility and control
 Outbound Spam Protection
- Protecting service providers against Outbound Spam
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
The Next-Generation Security Appliances built for Future Networks.
www.cyberoam.com
www.secureone.com.my
| [email protected]
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank You!
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.