Download presentation
Presentation is loading. Please wait.
Published byLeonard Fort Modified over 10 years ago
1
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management
2
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Different Stages Virtualization Implementation Already Implemented In Process In Planning
3
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Data Center Simplify server management Reduce infrastructure costs Reduce physical server sprawl Reduce power consumption Implement scalable system to cater for future growth Benefits
4
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Workstation virtualization -Transform single host server into workgroup of multiple users Reduce infrastructure costs Centralized control Works in a BYOD scenario Benefits Virtualization Strategy: Office in a Box
5
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Getting office into a box : Enterprise scenario Corporate office Branch office 1 Branch office 2
6
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization – You Gain Some, You Lose Some
7
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scanning InterVM traffic -Cannot scan Inter-VM traffic with externally based security hardware -A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control -Tying service access and network usage to user Identity Security hardware cannot offer inline protection -Traffic flows are invisible; creating blindspots in network -Cannot conduct forensic analysis and display compliance Security challenges in Virtualization Need of virtual security solution for virtual environment
8
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Solving Virtual Problems Cyberoam Virtual UTM – Solving Virtual Problems
9
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resides on the Virtual layer Scans all traffic inside virtual environment Cyberoam Virtual appliance VM2 Apps Linux OS VM1 Windows OS Apps VM3 Other OS Apps Cyberoam Virtual UTM appliance Hardware Hypervisor Best-of-breed security Stateful inspection firewall Intrusion Prevention System Gateway Antivirus Anti-spyware and Anti-spam Web filtering Application Visibility & Control Web Application Firewall (WAF) Virtual Private Network Logging & Reporting Layer 8 Identity-based security Best-of-breed security Stateful inspection firewall Intrusion Prevention System Gateway Antivirus Anti-spyware and Anti-spam Web filtering Application Visibility & Control Web Application Firewall (WAF) Virtual Private Network Logging & Reporting Layer 8 Identity-based security
10
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports Security in a Virtual Data Center
11
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Security in a Virtual Data Center Internet administrator Cyberoam vUTM vSwitch
12
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Enterprise/ MSSP Security in a Box BO/Customer 1 BO/Customer 3 BO/Customer 2 BO/Customer n Complete Virtual Security solution
13
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario1: MSSP + Hosting Services Provider administrator Cyberoam vUTM vSwitch Customer 2 Internet Cyberoam vUTM vSwitch Customer 1 Cyberoam vUTM vSwitch Customer 3 vSwitch Cyberoam vUTM vSwitch Central Console & Logging /Reporting
14
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario2: On-premise deployment On-premise deployment Internet administrator Cyberoam vUTM vSwitch MSSP At Customer premise
15
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario3: ISP as an MSSP vUTM - Customer 1 vUTM – Customer 2 vUTM – Customer 3 Customer 1 ISP Customer 2 Switch R3 R1 R2 R4 Internet
16
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more Access control for users -Tying service access and network usage to user Identity Provides multiple security features on single appliance Cyberoam protects Virtual Office or ‘Office in a box’
17
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Office-in-a-box setup administrator Cyberoam vUTM vSwitch LAN LaptopRepurposed PC Thin Client Switch Internet Switch
18
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers Protection for virtualized networks -Protects hypervisor management console, hypervisor & Guest OS -Scan Inter-VM traffic -Secure zero trust networks Comprehensive Security -Consolidate multiple security features on single virtual appliance -Secures virtual networks to the extent of physical networks Ease to deployment -Offers flexibility to allot number of vCPUs -Easy to upgrade with simple activation key
19
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers Compliance Management -Segregates and secures traffic and data between and around virtual entities to help stay regulatory compliant -Display compliance with indepth on-appliance reports Centralized Management for Virtual & Physical appliances -Centrally manage physical and virtual infrastructure using single interface with CCC (Cyberoam Central Console) Available as Virtual CCC and Hardware CCC -Ensure centralized, consistent and quick security actions across your network
20
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization platforms Supported VMware ESX/ESXi 3.5/4.0/4.1/5.0 VMware Workstation 7.0 or 8.0 VMware Player 3.0 or 4.0
21
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM appliance models OfferingLicensing CRiV-1CSupports upto 1vCPU CRiV-2CSupports upto 2vCPU CRiV-4CSupports upto 4vCPU CRiV-8CSupports upto 8vCPU CRiV-12CSupports upto 12vCPU Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
22
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s Security Portfolio Software
23
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Take Control of Your Security Infrastructure with Cyberoam Take Control of -WHAT you want? -HOW MUCH you want? -HOW you want?
24
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtual UTM - Workflow
25
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Content Introduction – Cyberoam Virtual UTM Cyberoam Virtual UTM – Trial -Order -Registration Cyberoam Virtual UTM – Upgrade -Order -Apply Upgrade Resources
26
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Introduction Cyberoam Virtual UTM
27
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – CRiV Series Platform support: -VMware ESX/ESXi 4.0/4.1/5.0 -VMware Workstation 8.0/9.0 Base Configuration Required: -One vCPU -1GB vRAM -3 vNIC -Primary Disk with 4GB size -Report Disk with 80GB size -1 Serial Port -1 USB Port
28
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Subscriptions Cyberoam Virtual UTM appliance range CRiV-TR (30days Trial) CRiV-1CCRiV-2CCRiV-4CCRiV-8CCRiV-12CCRiV-UNL Supported vCPU 3212481232 IPS ●○○○○○○ Gateway Anti-Spam ●○○○○○○ Gateway Anti Virus ●○○○○○○ Outbound Spam Protection ●○○○○○○ Web and Application Filter ●○○○○○○ Web Application Firewall ●○○○○○○ Support ● (8x5) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ○ (8x5/24x7) ● Available ○ Optional Cyberoam Virtual UTM Subscription
29
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial
30
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Order
31
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer
32
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit www.cyberoam.com & Click on “Try & Buy” STEP 01 Customer
33
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam sales team forwards customer lead to respective partner STEP 02 Customer
34
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial Steps For Partner
35
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit https://partner.cyberoam.com STEP 01 Partner
36
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 02 Partner
37
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 03 Partner
38
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner
39
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Registration
40
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer Continued
41
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit https://customer.cyberoam.com Existing Customers Login to Customer Portal New Customers create account and Login with credentials STEP 03 Customer
42
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 04 Customer
43
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Enter Trial Appliance Key and other details STEP 05 Customer
44
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Email to customer confirming registration of virtual appliance STEP 06 Customer
45
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Email to customer with steps to download Virtual UTM appliance STEP 07 Customer
46
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Download Virtual UTM OVF Install Cyberoam Virtual UTM (Refer Installation Guide for reference) Install Cyberoam Virtual UTM (Refer Installation Guide for reference) STEP 08 Customer
47
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Click on Registered appliance key to see appliance information STEP 09 Customer
48
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 10 Customer
49
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Upgrade from Trial to Full Version Upgrade to Higher model Upgrade from Trial to Full Version Upgrade to Higher model
50
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Order
51
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order
52
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Partner
53
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You STEP 01 STEP 02 STEP 03 Visit https://partner.cyberoam.com
54
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Partner shares Cyberoam Virtual UTM Upgrade Key with the customer Cyberoam Team sends Virtual UTM Upgrade Key to Partner
55
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Apply Upgrade
56
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer
57
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You From the Menu select “License upgrade” Login to Virtual UTM’s CLI Console STEP 01 Customer
58
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You From the Menu select Purchased Model No. STEP 02 Customer
59
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You On successful activation previous appliance expires and new registered appliance is shown in customer portal Enter Upgrade Key to activate the purchased appliance STEP 03 Customer
60
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources
61
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources Cyberoam Virtual UTM – CRiV Series Installation Guide Cyberoam Virtual UTM – CRiV Series Upgrade Guide
62
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.