Www.cyberoam.com © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Introducing Quick Heal Terminator.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Security and Organizational Governance Anand Lakshminarayanan Senior Product Manager Microsoft Corporation.
|ESDS SOFTWARE SOLUTION PVT. LTD.| Enterprise Datacenter Management Suite.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Unified Logs and Reporting for Hybrid Centralized Management
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Citrix Partner Update The Citrix Delivery Centre.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Cyberoam: Channel’s Most Preferred UTM Player Cyberoam: Channel’s.
CYBEROAM PARTNER PORTAL
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
Customer confidential 1 Privilege Management Sean Moore Solutions Specialist.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Product Demo. Terminal Services Log By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Technology.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Barracuda Load Balancer Server Availability and Scalability.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
WORLDTECH SOLUTIONS IT Infrastructure Optimization & Management Solutions.
Dell Connected Security Solutions Simplify & unify.
Vantage Report 3.0 Product Sales Guide
© Copyright 2011 Elitecore Technologies Ltd. All Rights Reserved. Securing You Partner Road Show Presentation Shailesh Mecwan Business.
Module 7: Fundamentals of Administering Windows Server 2008.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s On-Cloud Management Service - Stepup to.
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 Management Information Systems NYC Human Resources Administration Richard Siemer – Deputy Commissioner MIS.
© 2010 HM Cragg. All Rights Reserved Delivers a global view of power devices across the network from any PC with an Internet browser Delivers a.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Harish Chib Sr. VP – New Business Development.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Centralized Logging and Reporting for Enterprises.
Centralized Logging and Reporting for Managed Security Services Providers.
Barracuda NG Firewall ™
Centralized Management for Barracuda Networks products
2016 Citrix presentation.
Virtualization & Security real solutions
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Cloud Security for Endpoints
Presentation transcript:

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central Console (CCC) Virtual Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Agenda of Presentation  Need for Centralized Security Management  Would you prefer hardware or virtual CCC?  About Cyberoam Central Console (CCC)  How Cyberoam Central Console (CCC) Helps?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Enterprises and MSSPs – The IT Dilemma I am supposed to centrally manage security for remote offices / clients, but with less budget and headcount?!?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Need for Centralized Security Management

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges – Large enterprises with distributed networks  Security challenges -Zero hour threats at weakest points of entry, the remote and branch offices  Includes Viruses, worms, Trojans, blended threats, phishing, pharming  Lack of qualified technical manpower to handle threats delays effective response -Inadequate controls and visibility into remote network activity leads to poor governance -Possible misuse of remote administrator privileges

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges – Large enterprises with distributed networks  Productivity challenges -Higher costs in deploying, upgrading and managing multiple network security devices -Inability to pursue single, uniform security policy across branch offices  Inconsistency in applying IT Security practices across locations  Reduces response time against new threats  Can’t check individual devices for connectivity status, managing subscriptions etc. -Inability to push work profile-based policies to remote locations  E.g. Internet access policy, web surfing trends, corporate bandwidth policy

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Challenges – MSSPs  MSSPs face same set of challenges as enterprises + additional issues due to -Managing various clients having different security needs  Flexibility desired to build custom policies for different clients in quick time  Pro-active approach to avoid threats and vulnerabilities  Ability to offer flexible security plans to clients as per -Subscriptions modules -Licensing modules -Range of security solutions  Quality of Service -Delivery Capabilities -SLA’s

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Would you prefer hardware CCC or Virtual CCC? Would you prefer hardware CCC or Virtual CCC?

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Reasons why virtualization is important in tough economic enviornment Reasons why virtualization is important in tough economic enviornment Minimize Lost Revenue Due to Downtime 3 Reduce Datacenter Operating Cost (e.g. Power & Cooling) 2 Reduce Physical Infrastructure Cost 1

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Overall cost reduction -Reduce physial infrastructure cost -Reduce number of servers and related IT hardware -Reduce power and cooling requirements -Reduce Operating Cost Reasons why virtualization is important in tough economic enviornment Reasons why virtualization is important in tough economic enviornment A Server or Desktop Virtual Machine

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You About Cyberoam Central Console (CCC)

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  CCC is for centralized, integrated management and monitoring of Cyberoam UTM devices -Offers complete control over distributed networks from head office (H.O.) or Security Operations Center (S.O.C.) of MSSPs About Cyberoam Central Console (CCC) Virtual Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Benefits of Virtual CCC appliances –Eliminates need for dedicated hardware –Use existing VMware environment –Simplifies future upgrades –Reduces cost of ownership; CapEx and OpEx cost savings Virtual CCC Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You VMware Server EditionVMware Workstation Edition Virtual Workstation Application Server, Server

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Use existing virtual environment to host CCC –VMware-based Virtual CCC appliances  Virtual CCC for VMware Server –CCC VMS 15, CCC VMS 50, CCC VMS 100, CCC VMS 200  Virtual CCC for VMware Workstation –CCC VMW 15, CCC VMW 50, CCC VMW 100, CCC VMW 200 Virtual CCC Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC deployment for Managed Security Service Providers MSSP NetworkCustomer Appliances Group: Customer1 Boston Mumbai Dubai Group: Customer2 London Mumbai Sydney Group: Customer3 US Brazil Dubai Group: Customer4 NZ Mumbai Kenya Cyberoam UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC deployment for Enterprises Cyberoam UTM Appliance Corporate Head Office Branch Offices Boston Mumbai Dubai New York Cyberoam UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You How Cyberoam Central Console (CCC) Helps

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC - Easy, instant security policy enforcement  Simplified security management -Centralized policy creation and implementation for Cyberoam UTM features like Firewall, IPS etc.  Leads to uniform adoption of security practices across offices  Establish policies based on work-profiles across offices -Subscription and signature updates for Cyberoam UTM features like Gateway Anti-virus, Anti-Spam etc. -Protection against zero-hour threats

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Easy, instant security policy enforcement Add UTM appliances Grouping of UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Configure UTM appliance from CCC CCC – Easy, instant security policy enforcement

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Easy, instant security policy enforcement Update configuration of UTM appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Easy Signature Distribution

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Ease and flexibility of management  Easy grouping of Cyberoam UTM appliances -Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions -Dynamic views in CCC help in managing, searching and sorting appliances -Customizable and multiple dashboards

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Group of UTM Appliances CCC – Ease and flexibility of management Based on GeographyBased on Appliance ModelsBased on Client

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Appliance Discovery Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Security against misuse of administrator privileges  Role-based administration privileges -For CCC -e.g. by skillset (VPN administrator, Security Administrator) -Individual Cyberoam UTM appliances -Groups of Cyberoam UTM appliances -E.g. by client, by geography or mix

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC Access profiles Profiles considered: VPN Administrator, Security Administrator, Global Administrator CCC – Role based administration privileges

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC rights per access profile (example of VPN administrator rights) CCC – Role based administration privileges

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC admin users CCC – Role based administration privileges

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Role based administration privileges Access to each UTM appliance

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs & alerts for organization-wide security visibility  Logs and views of administrator actions as well as dispersed UTM appliances -Instant security visibility -Supports regulatory compliance -Investigative analysis -Keeping track of historical activity  alerts -Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits etc. -Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count etc.

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility CCC Logs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility Alert configuration

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC – Audit logs and alerts for greater security visibility Alert

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You CCC Features & Benefits

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Experience live demo of CCC

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You  Same set of features as CCC Virtual appliances  CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000 -Support up to 1000 Cyberoam UTM appliances CCC Hardware Appliances

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Q&A If any??

© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you!