Future-Ready Security

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Introducing Quick Heal Terminator.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat Management.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Cyberoam NG series: Future-ready Security Confidential. For internal use only Cyberoam Technologies Pvt. Ltd.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Unified Logs and Reporting for Hybrid Centralized Management
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Cyberoam NG series: Future-ready Security
Future is Ready. Are You?. A Glimpse into the Future of networks…
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Meet the Next Generation Firewall (NGFW)
Palo Alto Networks Product Overview Karsten Dindorp, Computerlinks.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You What’s new in CyberoamOS Ver Build 304 Unified.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Barracuda Load Balancer Server Availability and Scalability.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
ShareTech 2015 Next-Gen UTM.
Vantage Report 3.0 Product Sales Guide
Web Application Firewall (WAF) RSA ® Conference 2013.
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Network security Product Group 2 McAfee Network Security Platform.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
MOHAMAD NURHAKIM BIN ZAILAN 2TSK1. Wireless Gateways The wireless gateway is a device that allows a computer and other Internet-enabled devices.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Grow Your Business with the Security Leader
Network Security Solution
Barracuda Firewall The Next-Generation Firewall for Everyone
Grow Your Business with the Security Leader
Barracuda Web Filtering Service
GX6116 Product Announcement and High Performance Network Protection Strategy IBM Internet Security Systems Greg Adams.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Firewalls Chapter 8.
AT&T Dedicated Internet (ADI)
AT&T Firewall Battlecard
Presentation transcript:

Future-Ready Security Cyberoam NG series: Future-Ready Security

A glimpse into the future of networks… Superfast Internet Data moving at 10 times current Internet speeds Google launched a 1000 Mbps ‘Google Fiber’ Internet service IDNet launched UK 1000 Mbps Leased Line Business Ethernet Service Device Explosion: Multiple Internet devices per user Each device with a unique IP address Employee-owned smart devices to reach 350mn by 2014, up from 150mn Cloud: Web Applications Critical business applications and Services moving to the Web Cloud Computing will generate more than $45.4 billion in revenue by 2015! Cloud: Explosion of Internet Applications Infinite applications moving to the cloud

How will Organizations Gain? SECURITY CONNECTIVITY PRODUCTIVITY Connectivity, Productivity – leap, With Network Connectivity & Productivity taking a leap, what about Security?

Can your Security keep pace? The New Network Infrastructure SOHO /SMB Network Infrastructure is moving to Gigabit! Anything less than Gigabit is nearly obsolete! Does your security appliance have Gigabit ports? Does any security vendor offer network security appliances with Gigabit ports to these segments? Superfast Internet Speeds Gigabit Internet speeds to be soon available from ISPs /Telco’s Can your security appliance match high Internet speeds? Does it offer Gigabit throughputs? Device Explosion More devices per employee connecting to the IT network Changing approach from ‘Users’ to ‘Devices’ Can your security appliance support more number of Devices?

Can your Security keep pace? Explosion of Internet applications Leading to ‘Application Chaos’! What level of application control granularity does your Security offer? Critical business applications moving to Cloud Internet-facing applications face risk of getting hacked Does your security offer a web application protection?

No one wants SECURITY to become a bottleneck in their network!

Move to Future-Ready security appliances What can SOHO/SMB do to prevent Security from becoming a bottleneck in progress? Expand Security budgets to buy Enterprise security solutions Move to Future-Ready security appliances Or IT Manager

Presenting The Cyberoam NG series The ‘Next-Generation’ appliances built for Future-ready Security in networks!

Cyberoam NG series offers ‘Future-Ready’ Security The Fastest ‘UTM’ appliances for SOHO and SMB segments Offering Next-Generation Firewall protection for Large Enterprises! Offering Future-Ready security to SOHO, ROBO CR15iNG, CR25iNG, CR35iNG Wi-Fi appliances CR15wiNG, CR25wiNG, CR35wiNG Faster performance, broader coverage with 3 x 3 MIMO Dual band support SMB CR50iNG, CR100iNG Enterprise CR2500iNG

How Cyberoam NG series offers Future-Ready Security?

Offering upto 5 times industry average throughput for SOHO /SMB Appliances starting with Gigabit Firewall Throughputs Best in class UTM throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

Cyberoam CR15iNG Firewall throughputs UTM throughputs Cyberoam CR15iNG vs. CR15i ONE CR15iNG vs Dell Sonicwall TZ series Cyberoam CR15iNG vs Fortinet FG20C, FG40C Watchguard WG XTM25, WG XTM26 Cyberoam CR15iNG Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

Cyberoam CR25iNG Firewall throughputs UTM throughputs Cyberoam CR25iNG vs. CR25ia CR25iNG vs Dell Sonicwall NSA220, NSA 250M Cyberoam CR25iNG vs Fortinet FG60C Watchguard WG XTM33 Cyberoam CR25iNG Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

Cyberoam CR35iNG Firewall throughputs UTM throughputs Cyberoam CR35iNG vs. CR35ia Power to secure SMB with SOHO appliance! CR35iNG vs Dell Sonicwall NSA2400, Cyberoam CR35iNG vs Fortinet FG80C Watchguard WG XTM330, XTM 505 Cyberoam CR35iNG Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

Cyberoam CR50iNG Firewall throughputs UTM throughputs Cyberoam CR50iNG vs. CR50ia Size doesn’t matter! CR50iNG vs Dell Sonicwall NSA2400, NSA 3500 Size doesn’t matter! Cyberoam CR50iNG vs Fortinet FG100D Size doesn’t matter! Cyberoam CR50iNG vs Watchguard XTM505, XTM 515 Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

Cyberoam CR100iNG Firewall throughputs UTM throughputs Cyberoam CR100iNG vs. CR100ia Size doesn’t matter! CR100iNG vs Dell Sonicwall NSA3500, NSA 4500 Cyberoam CR100iNG vs Fortinet FG200B, FG300C Watchguard XTM515, XTM 525 Cyberoam CR100iNG Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above Cyberoam Technologies Pvt. Ltd. Confidential. For internal use only

NG series offers Future-Ready Security Powerful Hardware Superfast processing speed : A must for Gigabit Internet speeds! Nano second security processing with multicore Gigahertz processors Gigabit Ports to enable Gigabit Speeds for SOHO /SMB networks A complete overhaul of appliance design Faster, Next-Gen Memory and High Capacity Storage Superior Quality for High Performance and Robustness Design & components supporting high speed I/O throughput and withstanding extreme environments

NG series offers Future-Ready Security Increased port density Cyberoam NG series Cyberoam ia series CR15iNG 3 GbE ports CR15i 3 10/100 Ethernet ports CR15wiNG CR15wi CR25iNG-6P 6 GbE ports CR25ia 4 GbE ports CR25wiNG-6P CR25wi CR35iNG CR35ia CR35wiNG CR35wi CR50iNG 8 GbE ports 2 hardware bypass segment CR50ia 1 hardware bypass segment CR100iNG CR100ia

Intelligent, Powerful firmware Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance Better use of Multicore architecture for Parallel processing Optimized workload distribution across cores Lockless path for packet forwarding A single core handles packets for each connection at any given time to avoid inter-locks Optimized Interrupt rates for minimum CPU overhead and latency High rate of interrupts - A bottleneck in high-speed data transfers Fastpath packets to improve processing speed and reduce CPU overhead

Intelligent, Powerful firmware CyberoamOS offers advance features with entry-level appliances CyberoamOS installed on flash and reports are stored in HDD* Auto flash recovery** Auto OS failover from flash to HDD in case of flash failure** *available in models above CR15iNG/wiNG **Future implementation Feature availability Cyberoam appliance SSL-VPN WAF HA CR15i/wi X CRR15iNG/wiNG √ CR25ia CR25iNG/iNG-6P

Take complete control over applications running on your network

Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls Medium Quality ERP Web mail IM Application CRM VoIP Bit Torrent Internet High Quality Control over Low Quality

Granular classification of applications Risk Level Very Low (1) Low (2) Medium (3) High (4) Very High (5) Application Characteristics Excessive Bandwidth Prone to misuse Transfer files Tunnel other apps Vulnerabilities Widely used Loss of Productivity Can bypass firewall policy Application Technology Browser Based Client Server Network Protocol P2P Proactive Protection model: Eliminates the need for manual intervention by administrators to update policies for new applications added to the list

On-Appliance Web Application Firewall No need to buy dedicated WAF appliance Protect Web Servers and Web Applications from hackers Prevents hackers from exploiting Web-Application Vulnerabilities Positive protection model and No Signature Tables Intuitive website flow detector automatically adapts to website changes Protects against OWASP top 10 vulnerabilities

Cyberoam’s Layer 8 (Identity-based) security User Login Cyberoam Authenticates User Name IP Address MAC Id Session Id Cyberoam Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Cyberoam Audits Identity - based Logs + Reports Compliance Reports Control over staff network activities Who can connect to the network Who can access what What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions

Best-in-class Reporting 1000+ in-depth reports - Real time visibility into user and network activities Helps with Security & Compliance management, Forensic Analysis Reports include dynamic and animated reports, in-line graphs, country maps Country maps for Source/ Destination traffic Dual Dashboard - Traffic & Security Dashboard Application Reports

Support for new Connectivity Technologies – 4G /LTE Makes organizations ready for high speed future Easy deployment for high speed Internet connection Simple USB modem plug-in into Cyberoam appliance Ensures business connectivity Automatic fail-over to 4G/LTE WWAN connection Gateway failover over VPN VPN over 4G/LTE 3G 4G

Threat Protection Features Intrusion Prevention System Maximum security against emerging threats Identity-based IPS policies per user or group 4500+ signatures – broadest security cover Gateway Anti-Virus, Anti-spyware Prevents blended threats 4 million+ signatures Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic Gateway Anti-Spam Real-time, most accurate spam protection Recurrent Pattern Detection (RPD) technology Scans SMTP, POP3, IMAP traffic Outbound Spam Protection Protects service providers against Outbound Spam

Other Security Features Fusion Technology driven SI Firewall Interface for achieving Unified Security Virtual Private Network (VPN) Threat-free remote access Threat Free Tunneling (TFT) Technology IPSec, L2TP, PPTP and SSL-VPN Web & Content Filtering Complete Visibility & Control over HTTP & HTTPS 82+ categories and 44 million+ URLs Bandwidth Management Helps enhance network performance and productivity Create a bandwidth policy on a combination of User, Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control

Live NG Series Demo 449501 View Demo