Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyberoam NG series: Future-ready Security

Similar presentations


Presentation on theme: "Cyberoam NG series: Future-ready Security"— Presentation transcript:

1 Cyberoam NG series: Future-ready Security

2 The Future of networks…

3 Where are Networks moving to?
Superfast Internet: 1000 Mbps Internet speed a reality today! More devices per user – More devices connecting to Internet More web-applications being accessed Increase in usage of data

4 How will Organizations Gain?
SECURITY CONNECTIVITY PRODUCTIVITY Future IT trends like high-speed Internet, mutliple Internet devices per user, virtualization, and Cloud computing are sure to re-define the way businesses operate in future. Organizations will gain from connectivity and productivity benefits in their networks. Bu what about Security? These trends will be giving way to new security issues – leaving organizations more vulnerable to threats than ever before. With Network Connectivity & Productivity taking a leap, what about Security?

5 No one wants SECURITY to become a bottleneck in their network!
If security in their IT networks doesn’t evolve along with the technological revolution, these organizations will fail to become a part of the future! Security must not become a bottleneck in IT networks!

6 Presenting The Cyberoam NG series The ‘Next-Generation’ appliances built for Future-ready Security in networks!

7 Cyberoam NG (Next-Generation) series offers ‘Future-Ready’ Security
The Fastest ‘UTM’ appliances for SOHO and SMB segments Offering Next-Generation Firewall protection for Large Enterprises! Offering Future-Ready security to SOHO, ROBO CR15iNG, CR25iNG, CR35iNG Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG SMB CR50iNG, CR100iNG Enterprise CR2500iNG

8 Future-Ready Security
The Cyberoam NG Series Powerful Hardware Superior Quality Performance Leap Value for Money All-New Firmware Future-Ready Security

9 Powerful Hardware for Future-Ready Security
Superfast processing speed A must for Gigabit Internet speeds! Nano second security processing with Giga Hertz processors Parallel security processing with Dual core Next-Gen Memory High Internet speed and data transfer demand Next-Gen memory Larger memory size for Enterprise-grade security DDR3 RAM for more number of data transfers per clock cycle Faster, Next-Gen memory for higher I/O throughput

10 Powerful Hardware for Future-Ready Security
Gigabit Ports for Gigabit Speeds Any network security appliance with having less than Gigabit port is nearly obsolete! All network components have moved to Gigabit ports Gigabit Ethernet for future SOHO & SMB networks Higher port density More Storage Today, higher throughput leads to more activities, generating more data. More storage for more reports Reports stored for longer duration

11 Superior Quality Better performance
Design & components supporting high speed I/O throughput Highly robust Designed to protect against power surge & fluctuations Industrial grade components to withstand extreme environments

12 Wi-Fi Security appliances for SOHO/ROBO networks
Faster performance, broader coverage with 3x3 MIMO Technology Dual band support: 2.4 GHz or 5 GHz Higher performance by aggressively transmitting and receiving data over Wi-Fi channels Faster handling of video streaming and high bandwidth downloads High performance integrated security over WLAN Secures wireless networks to the extent of wired networks

13 Appliances starting with Gigabit Firewall Throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

14 Best in class UTM throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

15 CR2500iNG: Next-Generation Firewall throughput
Supports upto 4000 users UTM throughput: 4000 Mbps 36000 Mbps

16 Get Ready for Future Networks
6.5 times increase in Firewall throughputs 5 times increase in UTM throughputs Best in class throughput against competitor models An Anti-aging remedy for your network offering the best value for money!

17 The NG Series- Loaded with All-New Firmware

18 The NG Series- All-New-GUI

19

20

21

22

23

24

25

26 The need for “Intelligent Software”
Key challenges Keep up with the exponentially rising Network Traffic Reduce overall cost of networking & security equipments Minimize power consumption Limitation of “Hardware” Increasing clock frequencies to boost performance leads to prohibitively high power consumption Shift to Multicore architecture to Meet every increasing performance Maintain manageable levels of power consumption

27 CyberoamOS with ‘Intelligent Software’

28 ‘Intelligent Software’: Doing more with less
Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance Better use of Multicore architecture for Parallel processing Optimize workload distribution across cores Lockless path for packet forwarding A single core handles packets for each connection at any given time to avoid inter-locks Optimize Interrupt rate for minimum CPU overhead and latency High rate of interrupts - A bottleneck in high-speed data transfers

29 ‘Intelligent Software’: Doing more with less
Fastpath packets to improve processing speed and reduce CPU overhead Avoid firewalling for file packets once Firewall decision is taken (unless in event of rule change). E.g. 200 mb file. Once the Firewall decision is taken on the file, the rest file packets need not go through Firewalling decision.

30 The need for Next Generation Security features…

31 The need to be more application-layer aware than ever before
Explosion of Internet Applications Risk: ‘Application Chaos’ in organization Moreover, as infinite number of applications get hosted on the web, organizations will need to become more ‘Application aware’ and will need to control these applications to make sense of the ‘application chaos’! Internet

32 NG series offers Advanced Application Controls

33 Application Characteristics Application Technology
Take control of which applications can run on your network Application Classification based on Risk Level Very Low (1) Low (2) Medium (3) High (4) Very High (5) Application Characteristics Excessive Bandwidth Prone to misuse Transfer files Tunnel other apps Widely used Loss of Productivity Can bypass firewall policy Application Technology Browser Based Client Server Network Protocol P2P

34 Application Classification
Applications are classified based on

35 Proactive Protection Model
Administrator can simply select filtering criteria Technology, Risk Level or Characteristics Set action – regardless of application name Allow or Deny Allow/Block all future applications included for respective criteria No need of administrator intervention to add new applications to policy

36 Proactive Protection Model
Select P2P Applications Set Action Block all future P2P application without adding applications manually

37 Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls
Medium Quality 5000+ Applications VoIP Web mail IM Application Bit Torrent CRM ERP Internet High Quality Control over Low Quality

38 The increasing need to protect Web Applications from hackers
Critical business applications and Services moving to the Web. Risk of web-application attack. Firewalls/IPS cannot protect a web application from unknown threats HR Server ERP Mobile Apps Intranet CRM Cloud Computing is predicted to generate more than $45.4 billion in revenue by 2015! And this doesn’t seem to be a loose bet as critical business applications and services are increasingly moving to the web today… this includes, critical infrastructure services like the electric grid too! While this means reduced costs, and increased scalability and agility for organizations, there is a dark side to it – with everything moving to the web, hackers will be moving there too – creating a strong demand for applications security in future IT networks – a need stronger than ever before! Critical business applications

39 NG series offers On-Appliance Web Application Firewall

40 On-Appliance Web Application Firewall
Protect Web Servers and Web Applications from hackers No need to buy dedicated WAF appliance Cyberoam WAF blocks hackers from exploiting Web-Application Vulnerabilities WAF Features include Positive protection model and No Signature Tables Intuitive website flow detector automatically adapts to website changes Protects against OWASP top 10 vulnerabilities SSL Offloading Monitoring & Reporting

41 The need to support BYOD & handle security risks
Device Explosion Trend: Multiple Internet Access Devices per User Each device has a unique IP address Employee-owned smart devices to reach 350mn by 2014, up from 150mn this yr Get ready to see a device explosion in organizational networks! Why do I say so? Because, there were 1 billion Smart Devices shipped in 2011, and the number is expected to double by No wonder then that the employee-owned devices in organizations are expected to reach a stupendous figure of 350 million by 2014, up from 150 million this year. Cutting a long story short, each user will carry MULTIPLE Internet access devices within organizations.

42 Embrace BYOD with Cyberoam

43 Mobile VPN for iOS and Android devices
Cyberoam’s Layer 8 Identity based security extended to mobile devices Securely connect your iPhone, iPad and Android devices to your corporate network through VPN IPSec VPN (New) L2TP VPN PPTP VPN iOS L2TP VPN (New) Android

44 Support for new Connectivity Technologies – 4G/ LTE

45 4G Support for new Connectivity Technologies – 4G /LTE
Making organizations ready for high speed future Easy deployment for high speed internet connection Simple USB modem plug-in into Cyberoam appliance Maximize business connectivity Automatic fail-over to 4G/LTE WWAN connection Gateway failover over VPN VPN over 4G/LTE 4G

46 First-of-its-kind Reporting

47 Dual Dashboard – Traffic and Security Dashboard
Traffic Dashboard

48 Dual Dashboard – Traffic and Security Dashboard
Traffic Dashboard N/A: Private IP Others: Rest of records

49 Dual Dashboard – Traffic and Security Dashboard

50 Dual Dashboard – Traffic and Security Dashboard
N/A: Private IP Others: Rest of records

51 Country Maps for Source/Destination Traffic
Graphical overview of Data transfer and Risk level

52 Application Reports

53 Other Security Features
Fusion Technology driven SI Firewall Interface for achieving Unified Security Layer 8 Technology: Identity-based controls Identity-based security from Layer 2 to Layer 8 Allows control over Who can connect to network, Who can access what, What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions

54 Other Security Features
Intrusion Prevention System Maximum security against emerging threats Identity-based IPS policies per user or group 3500+ signatures – broadest security cover Gateway Anti-Virus, Anti-spyware Prevent blended threats 4 million+ signatures Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic

55 Other Security Features
Gateway Anti-Spam Real-time, most accurate spam protection Recurrent Pattern Detection (RPD) technology Scans SMTP, POP3, IMAP traffic Web & Content Filtering Complete Visibility & Control over HTTP & HTTPS 82+ categories and 44 million+ URLs ‘IPv6 Ready’ Gold

56 Other Security Features
Virtual Private Network (VPN) Threat-free remote access Threat Free Tunneling (TFT) Technology IPSec, L2TP, PPTP and SSL-VPN Multi-Link Management For an ‘always-on’ network Support for more than 2 ISP links Supports Wireless WAN (3G USB modems, WiMax) Gateway failover over VPN

57 Other Security Features
Instant Messaging & Control Identity-based controls for Yahoo messenger and Windows Live Messenger Control who can chat with whom, file transfer, webcam Bandwidth Management Enhance network performance and productivity Create a bandwidth policy on a combination of User, Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control Outbound Spam Protection Protecting service providers against Outbound Spam

58 The Next-Generation Security Appliances built for Future Networks.
Coming soon is Cyberoam’s NG series of UTM appliances – the next-generation of security appliances built for future networks!

59 Thank You!


Download ppt "Cyberoam NG series: Future-ready Security"

Similar presentations


Ads by Google