Download presentation
Presentation is loading. Please wait.
Published byGrant Simpson Modified over 9 years ago
1
Future is Ready. Are You?
2
A Glimpse into the Future of networks…
3
Super Fast Internet Data to move at 10 times current Internet speeds Google launched ‘Google Fiber’ service that offers a 1000 Mbps Internet service UK ISP, IDNet, launched 1000 Mbps Leased Line Business Ethernet Service 1000 Mbps
4
Device Explosion: Multiple Internet Access Devices per User Each device will have a unique IP address Employee-owned smart devices to reach 350mn by 2014, up from 150mn this yr 1 Billion Smart Devices Shipped in 2011, Expected to Double by 2016
5
Cloud: Web Applications Critical business applications and Services moving to the Web Cloud Computing will generate more than $45.4 billion in revenue by 2015! Critical business applications CRM ERP Intranet HR Mobile Apps Email Server
6
Cloud: Explosion of Internet Applications Infinite applications on the Internet Internet
7
How will Organizations Gain? With Network Connectivity & Productivity taking a leap, what about Security? SECURITY CONNECTIVITY PRODUCTIVITY
8
Can your Security keep pace? The New Network Infrastructure - SOHO /SMB network infrastructure is moving to Gigabit! - Anything less than Gigabit is nearly obsolete! - Does your security appliance have Gigabit ports? - Does any security vendor offer network security appliances with Gigabit ports to these segments? Superfast Internet Speeds - Gigabit Internet speeds to be soon available from ISPs /Telcos - Can your security appliance match high Internet speeds? - Does it offer Gigabit throughputs? Device Explosion - More devices per employee connecting to the IT network - Changing approach from ‘Users’ to ‘Devices’ - Can your security appliance support more number of Devices?
9
Can your Security keep pace? Explosion of Internet applications - Leading to ‘Application Chaos’! - What level of application control granularity does your Security offer? Critical business applications moving to Cloud - Internet-facing applications face risk of getting hacked - Does your security offer web application protection?
10
No one wants SECURITY to become a bottleneck in their network!
11
What can SOHO/SMBs do to prevent Security from becoming a bottleneck in progress? Expand Security budgets to buy Enterprise security solutions Or IT Manager Move to Future-Ready security appliances
12
Presenting The Cyberoam NG series The ‘Next-Generation’ appliances built for Future-ready Security in networks!
13
Cyberoam NG series offers ‘Future-Ready’ Security The ‘Fastest UTM appliances’ for SOHO and SMB segments Next-Generation Firewall protection for Large Enterprises! Offers Future-Ready security to: SOHO, ROBO CR15iNG, CR25iNG, CR35iNG Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG SMB CR50iNG, CR100iNG Enterprise CR2500iNG
14
How Cyberoam NG series offers Future-Ready Security?
15
Appliances starting with Gigabit Firewall Throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
16
Best in class UTM throughputs * CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
17
Powerful Hardware for Future-Ready Security Superfast processing speed A must for Gigabit Internet speeds! Nano second security processing with Giga Hertz processors Parallel security processing with Dual core Gigabit Ports to enable Gigabit Speeds Gigabit Ethernet for future SOHO & SMB networks Higher port density
18
Complete overhaul of appliance design to provide Future-Ready Security Next-Gen Fast Memory Larger memory size for Enterprise-grade security DDR3 RAM for more number of data transfers per clock cycle Faster, Next-Gen memory for higher I/O throughput High Capacity Storage Today, higher throughput leads to more activities, generating more data. – More storage for more reports – Reports stored for longer duration Superior Quality for High Performance and Robustness Design & components supporting high speed I/O throughput Designed to protect against power surge & fluctuations Industrial grade components to withstand extreme environments
19
Wi-Fi Security appliances for SOHO/ROBO networks Faster performance, broader coverage with 3x3 MIMO Technology Dual band support: 2.4 GHz or 5 GHz Higher performance by aggressively transmitting and receiving data over Wi-Fi channels Faster handling of video streaming and high bandwidth downloads High performance integrated security over WLAN Secures wireless networks to the extent of wired networks
20
The NG Series- Loaded with All-New Firmware
21
The most Intelligent and Powerful Cyberoam firmware Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance Better use of Multicore architecture for Parallel processing Optimize workload distribution across cores Lockless path for packet forwarding – A single core handles packets for each connection at any given time to avoid inter-locks Optimize Interrupt rates for minimum CPU overhead and latency High rate of interrupts - A bottleneck in high-speed data transfers FastPath packets to improve processing speed and reduce CPU overhead
22
The NG Series- Interactive, Easy to use, All-new GUI
27
Confidential. For internal use only Cyberoam Technologies Pvt. Ltd.
28
The need for Next Generation Security features…
29
The need to be more application-layer aware than ever before Explosion of Internet Applications Need to control which applications are important to business and run on network Internet
30
NG series offers Advanced Application Controls
31
Take complete control over applications running on your network
32
Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls VoIP Bit Torrent CRM ERP IM Application Web mail Internet Medium Quality High Quality Low Quality Control over
33
Granular classification of applications
34
Proactive Protection Model Easy selection of filtering criteria by administrator Technology, Risk Level, Characteristics Set action – regardless of application name Allow or Deny Allow/Block all future applications included for respective criteria No administrator intervention needed to add new applications to policy
35
The increasing need to protect Web Applications from hackers Legacy business applications moving to the Web Firewalls/IPS cannot protect Web application from unknown threats Critical business applications CRM ERP Intranet HR Mobile Apps Email Server
36
NG series offers On-Appliance Web Application Firewall
37
On-Appliance Web Application Firewall No need to buy dedicated WAF appliance Protect Web Servers and Web Applications from hackers Prevents hackers from exploiting Web-Application Vulnerabilities Positive protection model and No Signature Tables Intuitive website flow detector automatically adapts to website changes Protects against OWASP top 10 vulnerabilities
38
The ever increasing need for identity awareness and granular controls Increasing instances of insider threats Increasing need to implement acceptable use policies to greater granularity at user and group level Binding service access and network usage to user Identity to enhance user productivity Tracking end user activities with logs, reports and forensic ability to comply to regulatory needs
39
NG series offers Layer 8 granular Identity-based Security
40
Cyberoam’s Layer 8 (Identity-based) security User Login Cyberoam Authenticates User Name IP Address MAC Id Session Id Cyberoam Authorizes Internet surfing quota Schedule control Security Policies Web Filtering Application Visibility & Control QoS / Bandwidth Management IM Controls Cyberoam Audits Identity - based Logs + Reports Compliance Reports Control over staff network activities Who can connect to the network Who can access what What have they accessed Control over staff network activities Who can connect to the network Who can access what What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions
41
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You NG series offers First-of-its-kind On-Appliance Reporting
42
First-of-its-kind On-appliance reporting Eliminates the need to purchase a dedicated reporting solution 1000+ indepth reports Real time visibility into user and network activities Logs and Reports help organizations with Security management Compliance Management Forensic Analysis Reports include dynamic and animated reports, in-line graphs, country maps
43
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Graphical overview of Data transfer and Risk level Country Maps for Source/Destination Traffic
44
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard
45
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Dual Dashboard – Traffic and Security Dashboard Security Dashboard
46
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Dual Dashboard – Traffic and Security Dashboard Security Dashboard Others: Rest of recordsN/A: Private IP
47
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Application Reports
48
Support for new Connectivity Technologies – 4G/ LTE
49
Makes organizations ready for high speed future Easy deployment for high speed Internet connection Simple USB modem plug-in into Cyberoam appliance Ensures business connectivity Automatic fail-over to 4G/LTE WWAN connection Gateway failover over VPN VPN over 4G/LTE 4G3G
50
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security Features Fusion Technology-driven SI Firewall -Interface for achieving Unified Security Virtual Private Network (VPN) -Threat-free remote access -Threat Free Tunneling (TFT) Technology -IPSec, L2TP, PPTP and SSL-VPN
51
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Threat Protection Features Intrusion Prevention System -Maximum security against emerging threats -Identity-based IPS policies per user or group -3500+ signatures – broadest security cover Gateway Anti-Virus, Anti-spyware -Prevents blended threats -4 million+ signatures -Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic Gateway Anti-Spam -Real-time, most accurate spam protection -Recurrent Pattern Detection (RPD) technology -Scans SMTP, POP3, IMAP traffic Outbound Spam Protection -Protecting service providers against Outbound Spam
52
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security Features Web & Content Filtering -Complete Visibility & Control over HTTP & HTTPS -82+ categories and 44 million+ URLs Bandwidth Management -Enhanced network performance and productivity -Bandwidth policy on a combination of User, Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control Multi-Link Management -For an ‘always-on’ network -Support for more than 2 ISP links -Supports Wireless WAN -Gateway failover over VPN
53
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security Features Instant Messaging & Control -Identity-based controls for Yahoo messenger and Windows Live Messenger -Controls who can chat with whom, file transfer, webcam ‘IPv6 Ready’ Gold Logo
54
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam features assure Security, Connectivity, Productivity Organizations cannot afford to compromise on any of these. The right SCP balance is essential!
55
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Product Range Securing the IT network Centralized security management for remote /branch offices & clients Network Monitoring & Analysis Secure Internet surfing for home users Unified Threat Management & Open Source
56
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Recognized as ‘Visionary’ in the Gartner UTM MQ 2012 Magic Quadrant for Unified Threat Management
57
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Proven track record of Innovation “One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model – that allows connection of names. This could be users, domains and more. This allows greatly improved granularity of system administration.” NASSCOM INNOVATION AWARD 2011
58
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Introduction Sales, Distribution Channel and Customers across 125+ Countries Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group Technology Powerhouse 450+ Employees Patent-pending Identity-based Management Amongst the top 3 global players for UTM features
59
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.