Download presentation
Presentation is loading. Please wait.
Published byBruce Porter Modified over 9 years ago
1
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN - Secure Remote Access
2
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Established in 1999. 500+ Employee Company. ISO 9001-2000 Certified. 55 Distributors covering 75+ countries. 30000+ combined installation of Central Console (CCC) Unified Threat Management
3
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Agenda of Presentation The Business Need of SSL VPN About Cyberoam SSL VPN Product Walkthrough
4
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy The Business Need for SSL VPN Also, An Introduction to Virtual SSL VPN Appliances
5
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Secure, Remote Access is indispensable in today’s work environment Scenario 1: Employees and Mobile Workers
6
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Secure, Remote Access is indispensable in today’s work environment Scenario 2: Partners, Suppliers and Customers get Extranet access
7
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy IPSec PPTP L2TP SSL VPN Solutions Comparison: When to use What? Ideal for a limited number of employees accessing corporate resources through clients on trusted devices Use SSL VPN in Different Locations: Home, Airport, Hotels, cyber cafe Various Devices laptops, home PC, PDA, mobile phone Extranet access to customers, partners, suppliers Web-enabled access – no need to install client on device
8
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy The Onset of Virtualization in SSL VPN… How is it done? Utilizing virtualization environments like VMware Building Virtual appliances within existing hardware Running a large number of independent, virtual SSL VPN gateways Implementing complex virtual datacenters so servers are consolidated across multiple physical servers
9
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy The Onset of Virtualization in SSL VPN… Benefits Multiple SSL VPN instances can run on one single appliance Appliance-wide or individual instances upgrades Optimum hardware resource allocation Resilience to hardware failure Increases deployment scalability Minimizes operating and maintenance costs Eco-friendly
10
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Higher security due to 128-K Encryption and Authenticated Access Granularly restrict users to specific applications and resources Security checks on endpoint devices even before giving access Ease of Use Lower costs, Less Maintenance Least Admin intervention Access from any web-enabled device Minimum downtime Business Advantages of SSL VPN
11
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy About Cyberoam SSL VPN
12
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN – Secure Remote Access Employees, Customers, Partners and guest users Cyberoam SSL VPN Internal Resources Different Devices
13
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Roaming UserCyberoam SSL VPNServers (App./Web/FTP/File Share/WTS etc) Client Certificate Username/Password Server Certificate User gets a list of applications based on policies All Published Applications/Resources Cyberoam SSL VPN – How does it work?
14
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Why choose Cyberoam SSL VPN? Scalability and Performance Unlimited user license N+1 clustering with application load balancing Available as Virtualized Solution Available as virtual appliances Run a large number of independent virtual gateways from existing infrastructure Identity-based Security Monitor user log-on activity including username, MAC address, IP address of endpoint Know “who is doing what” in the network
15
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Key Features Multiple Applications Support Microsoft Outlook, TCP, 802.11X and UDP, FTP, Citrix and Microsoft Terminal Servers and more Secure Firewall Traversal Works alongside existing firewalls Prevents exposure of UDP port ranges to hackers Does not publish internal IP address to outside network
16
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Access Mode Clientless VPN with a browser agent for seamless access to applications Linux, Windows, MAC support Authentication and Authorization Supports LDAP, AD, RADIUS etc. E-mail based user-provisioning Support for external two-factor& biometric authentication Key Features
17
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Device Profiling (Endpoint Security) Product checks – Anti-virus, Firewall & Anti-spyware Up to 1100+ products supported MAC address and IP address checks Quarantine policy for devices that fail profiling test Remediation information sent to user for any failed access e.g. updating anti-virus software, configuring firewall etc. Key Features
18
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Auditing & Logging Users logon activity including time of access, username, MAC address and IP address of endpoint Management Web-based and Command Line Insole Wizard-driven installation Role-based administration Monitor and disconnect live users Real-time status and monitoring Key Features
19
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Product Walkthrough
20
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Dedicated SSL VPN appliance Deployment
21
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN Virtual Appliance No need to buy separate hardware!! Based on VMWare virtualization platform Install multiple virtual SSL VPN machines Cyberoam’s Virtualization platform, VMware allows virtual datacenters where servers are consolidated across multiple physical servers, for guaranteed efficiency and performance
22
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Virtual Appliance Deployment Diagram
23
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Bootstrap State ◦ Initial Installation Configuration state ◦ State where firmware upgrades, license upgrades, backup-restore can be performed (Involves downtime) Run State ◦ Resource configuration on-the-fly possible ◦ State in when users connect and access their resources Note: Appliance can be changed from Configuration state to Run State as and when needed or vice versa
24
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
25
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Create UsersCreate GroupsOrganize Users in GroupsRegister ApplicationsCreate Application GroupsOrganize applications into application groupsAccess FiltersAccess Control AD/LDAP GroupsEndpoint Security PoliciesDevice Profiling
26
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
27
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Create PolicyCreate ProfileSelect the Policies that apply for the Profile Mandatory ProfileQuarantine ProfileGeneral Profile
28
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
29
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
30
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
31
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
32
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
33
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Pricing and Support Virtual Appliance Mode Base License – Default 5 user license available for 30 days FREE TRIAL No Endpoint Security in Trial version Dedicated Appliance Mode Concurrent user license (upgrade option available e.g.50 to 100 user license upgrade) Support Plans: 8X5 and 24X7 plans based on appliance + per user license Free Trial Download online with support + full access to all features
34
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy CR-SSL-800 Supports 1-50 concurrent users Secure, remote Intranet & Extranet access Designed For SMEs, MSSPs and more Comparison of Cyberoam Dedicated Appliance Offerings CR-SSL-1200 Supports 51-250 concurrent users Secure, remote Intranet & Extranet access Designed For SMEs, large enterprises, MSSPs and more CR-SSL-2400 Supports 251-1000 concurrent users Secure, remote Intranet & Extranet access Designed For large global enterprises, MSSPs
35
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy New Revenue Opportunities: Global SSL VPN market at $500 million in 2008 (Source: Gartner) Support: 24X7 Support and monitoring Centralized Policy Management Continuous access Familiar, easy-to-use interface Cyberoam Virtual Appliances allow MSSPs to service multiple clients through shared allocation of hardware resources Summary Benefits for MSSPs
36
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Reduced costs: Centralized management, minimum admin intervention, timely support Protect your Investments: Use existing networks, firewalls, servers Trusted Remote Access: Extend access to regional offices, partners, customers, telecommuters, wireless users Continuous access: Provide reliable access 24X7 Increase employee productivity (Intranet portals, ERP) Partner access to internal applications (Partner Extranet) Eliminate risks of organizational resource access from cyber cafes, customer site etc. Apply Uniform security policy Summary Benefits for Organizations– Cyberoam SSL VPN
37
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN Virtual Appliance Free Trial… Register for a free online trial A fully functional Cyberoam product Free technical support No financial obligations
38
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Question/Answer Session
39
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Please visit us at www.secureone.com.my Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.