cyberoam next-generation security for enterprises : brochure · 2019-11-23 · leakage over...

8
Cyberoam Next-Generation Security for Enterprises With organizations experiencing newer trends like high Internet speeds, virtualization, application explosion, increasing use of Web applications and BYOD, they ought to prepare for emerging security risks in their networks along with increasing concerns on insider threats, vanishing ‘trust boundaries’, compliance management and more. Growing businesses and rapidly expanding network horizons have lead to an increased demand for next-generation security, higher performance, easy security management and quick compliance, in enterprises. Cyberoam’s next-generation security caters to the security anxiety and demand for advanced network security in organizations today. www.cyberoam.com Securing You

Upload: others

Post on 27-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

CyberoamNext-Generation Security for Enterprises

With organizations experiencing newer trends like high

Internet speeds, virtualization, application explosion,

increasing use of Web applications and BYOD, they

ought to prepare for emerging security risks in their

networks along with increasing concerns on insider

threats, vanishing ‘trust boundaries’, compliance

management and more. Growing businesses and rapidly

expanding network horizons have lead to an increased

demand for next-generation security, higher

performance, easy security management and quick

compliance, in enterprises. Cyberoam’s next-generation

security caters to the security anxiety and demand for

advanced network security in organizations today.

www.cyberoam.com S e c u r i n g Y o u

Page 2: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

The Cyberoam Solution for Network Security

Cyberoam is an award-winning global IT security

company with a presence in 125+ countries. With an

array of globally acclaimed and certified products,

Cyberoam offers reliable solutions for varied needs of

SOHO/ROBO, SMBs and Enterprises, including

network security, centralized security management and

centralized visibility. Trusted by thousands of customers

across the globe for its innovative products and

technology, Cyberoam enjoys a proven track record of

serving many well-known customers across various

industries.

Cyberoam’s Security Product Portfolio:

L7

L8

L6

L5

L4

L3

L2

L1

Application

Presentation

Session

Transport

Network

Data Link

Physical

USER

00-17-BB-8C-E3-E7

192.168.1.1

TCP, UDP

L2TP, PPTP

ASCII, EBCDIC, ICA

Cyberoam's treats “User Identity” as the 8th Layer in the protocol stack

Layer 8 Technology

Cyberoam Next Generation Firewall (NGFW) offers security across Layer 2-Layer 8 using Identity-based policies

Network SecurityOffers flexibility of hardware and virtual

network security appliances for security in

physical as well as virtual networks

Centralized Security ManagementAllows enterprises/MSSPs to manage multiple,

dispersed Cyberoam security installations across

remote or branch offices

Cyberoam’s Layer 8 Technology treats User Identity as the 8th

layer or the “human layer” in the network protocol stack. This

allows organizations to uniquely identify users, control user

activities in the network, and enable policy-setting and

reporting by username, even in dynamic IP environments like

DHCP and Wi-Fi. Cyberoam’s Layer 8 Technology adds speed

to security in a network by offering instant visibility into the

source of attacks by identifying victims/attackers by

username, which allows proactive remediation of security

incidents. With Layer 8 identification and controls, Cyberoam

enables security management, data protection, forensic

analysis and compliance management in organizations.

CYBEROAM’S LAYER 8 IDENTITY-BASED SECURITY

Centralized VisibilityOffers real-time visibility into user and network

activities across the enterprise network

Training & SupportEnables faster resolution of issues with customer

support and efficient deployment and

management of Cyberoam solutions with

trainings

Page 3: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

Cyberoam integrates multiple security features on a single

appliance to offer comprehensive network security.

Cyberoam security appliances work at the network gateway

and protect networks against application threats,

vulnerabilities in web applications, BYOD challenges, data

leakage over websites and applications, sophisticated &

blended attacks, malware, spam, spyware and other

evolving external threats. With the flexibility of hardware as

well as virtual security appliances, Cyberoam protects both

the physical and virtual organizational networks.

NETWORK SECURITY

Next-Generation security features on Cyberoam network security appliances:

ŸStateful Inspection Firewall

ŸApplication Visibility & Control

ŸWeb Application Firewall

ŸVPN (SSL VPN & IPSec)

Ÿ Intrusion Prevention System

Ÿ Anti-Virus & Anti-Spyware

ŸAnti-Spam

ŸOutbound Spam Protection

ŸWeb Filtering

ŸBandwidth Management

Ÿ3G / 4G / WiMAX Connectivity *

ŸIM Archiving & Controls

ŸMultiple Link Management

ŸOn-Appliance Reporting

ŸIPv6 Ready

ŸWi-Fi Appliances *

ŸFleXi Ports *

* Features not available on virtual network security appliances

S e c u r i n g Y o u

Security Connectivity Productivity

Cyberoam network security appliances ensure Security, without compromising on the equally

essential, Connectivity and Productivity. Organizations can achieve a balanced growth with a network

security appliance that offers policy controls over its features to help achieve security, connectivity and

productivity, without compromising any one of them. With such an ideal combination of best-of-breed

assembly of features over a single interface, organisations get a complete networking solution in

Cyberoam.

CYBEROAM SECURITY APPLIANCES ASSURE

KEY HIGHLIGHTS:

! Sales, channel and customer presence across 125+ countries! Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group! 450+ employees globally; Industry leading R&D ! Patent-pending Identity-based Layer 8 Technology ! Common Criteria EAL4+ certified security! Recognized as a ‘Network Security Innovator’ by SC Magazine! Recognized as ‘Visionary’ in Gartner’s UTM Magic Quadrant

st! World’s 1 network security and UTM vendor with ISO 20000:2011 certified Customer Support

Services

Page 4: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

Cyberoam NG series – Future-ready Security

Ÿ Offers protection against newly evolving threats with

Intrusion Prevention System, Gateway Anti-Virus/Anti-

Spyware, Gateway Anti-Spam, offering security at par

with best-of-breed solutions

Advanced Threat Protection [IPS, AV, AS]

Ÿ Patent-pending Layer 8 technology penetrates through all

security modules of Cyberoam network security

appliances, offering Identity-based controls over user

authentication, service authorization and reporting (AAA)

Layer 8 Technology for Identity-based Security

The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with

increasing number of users like customers and partners connecting to an office network from outside is leading to de-

perimeterization of networks. Besides, trends like rise in number of network users and devices, application explosion,

virtualization, increasing use of web applications and more are leading to loss of security controls for organizations

over their networks.

Cyberoam offers future-ready security to SOHO/ROBO, SMEs and Enterprises with its NG Series network security

appliances, available as Next-Generation Firewalls and UTMs. Cyberoam’s security appliances offer next-generation

security features to help organizations secure their networks against risk emerging from adoption of IT trends.

Cyberoam NGFW Hardware Appliance Range:

CR NG Series

CR ia Series

500iNG-XP, 750iNG-XP, 2500iNG

500ia, 500ia-1F/10F/RP, 750ia, 750ia-1F/10F, 1000ia,

1000ia-10F, 1500ia, 1500ia-10F

Ÿ Industry-leading coverage for 2000+ key applications

Ÿ Prioritizes applications based on combination of User,

Time, Applications and Bandwidth

Ÿ Granular application controls with classification based on

risk level, characteristics, technology

Ÿ Pro-active protection model eliminates the need for

manual intervention by administrator to update policy for

new applications

Application Visibility & Control

Ÿ On-appliance reporting with real-time logs and reports,

saving the cost of a dedicated reporting solution

Ÿ Offers 1200+ reports offer real-time visibility into user and

network activities

Ÿ Helps organizations with security management,

compliance management and forensic analysis

Ÿ One-click compliance reports on PCI DSS, HIPAA, SOX and

more

On-appliance reporting

Cyberoam NGFWs with Layer 8 Identity-based technology

offer actionable intelligence and controls to enterprises

that allow complete security control, over L2-L8 for their

future-ready security. Cyberoam NGFW protection offers

Layer 8 Identity-based security, Application visibility &

control, IPS, VPN (IPSec and SSL), website filtering, and

QoS. Based on the security needs, enterprise customers

can avail additional security features like Web Application

Firewall, Gateway Anti-Virus, Anti-Spam, and more.

Cyberoam offers the fastest UTM appliances for

SOHO/SMB and Branch offices with comprehensive

network security. Cyberoam NG series offers future-ready

security through its enterprise-grade security features,

gigabit ports and best-in-class hardware & software.

Multiple security features integrated over a single, Layer 8

Identity-based platform making security simple, yet

highly effective.

Next-Generation Firewalls (NGFW) Unified Threat Management Appliances

Key Features

Cyberoam UTM Hardware Appliance Range:

CR NG Series

CR ia Series

15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG,

100iNG, 200iNG, 200iNG-XP, 300iNG, 300iNG-XP

15i, 25ia, 35ia, 15wi, 25wi, 35wi, 50ia, 100ia, 200i, 300i

Page 5: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

Future-Ready Security.

Ÿ QoS/Bandwidth allocation to users, user groups, Applications,

Website Categories and Firewall rules

Ÿ Prioritize business critical applications and users, ensuring

assured QoS for business-critical applications like VoIP and CRM

Ÿ Option to commit bandwidth at all times or assign idle bandwidth

automatically to other applications /users /website categories

QoS or Bandwidth management

Ÿ Ensures secure remote access with IPSec VPN, LT2P,

PPTP and SSL VPN over its network security appliances

Ÿ Threat-free Tunneling technology scans traffic for

malware, intrusion attempts

Ÿ Offers Mobile VPN clients for Android and iOS devices,

simplifying communications

Ÿ Comprehensive URL database with 100 million URLs in

89+ categories

ŸCreate policy on a combination of user, website

category, time and bandwidth

ŸBlocks harmful websites, preventing malware, phishing,

pharming attacks and enhances productivity by limiting

access to unproductive content

VPN

Web filtering

Ÿ Available as an on-appliance subscription module

Ÿ Protects websites and web-based applications against OWASP

Top 10 web application attacks like SQL injection, cross-site

scripting (XSS), URL parameter tampering, and more

Ÿ Follows a positive security model through Intuitive Website Flow

Detector - automatically identifies and blocks all application layer

attacks without relying on signature tables or pattern-matching

techniques

Web Application Firewall (WAF)

Extensible Security Architecture (ESA)

Cyberoam’s Extensible Security Architecture helps

organizations tackle unknown threats of the future by

offering the agility to prolong the life and performance of

its security appliances to support newer security features

and enhancements.

Scalability

Besides the Extensible Security Architecture that

supports future security needs without the need to

change the appliance, organizations can add another

appliance in cluster/HA to support more number of users.

Flexibility

The FleXi Ports available in the FleXi Port (XP) security

appliances, offer flexible network connectivity with I/O

slots that allow additional Copper/Fiber 1G/10G ports on

the same security appliance, allowing organizations to

upgrade to new technologies easily and cost-effectively,

making them future-ready.

High Performance Security Appliances

Cyberoam offers high performance for enterprises with its

powerful hardware appliances and CybeoamOS that has

the ability to extract highest level of performance from a

multi-core platform and tightly integrates with the

hardware for network and crypto acceleration.

Cyberoam offers the “fastest UTM appliances” for SOHO/

SMB segments.With the entry-level NG series appliance

starting with gigabit firewall throughputs, organizations

get assured high performance security, even for small and

branch offices.

Actionable Intelligence & Controls

Cyberoam’s Human Layer 8 acts like a standard abstract

layer, which binds with the existing Layers 2-7, enabling

enterprises to regain lost security controls and put

security checks where they want to from L2-L8, along

with complete visibility into user and network activities.

OSIntelligent Firmware - CyberoamOS

Integrated seamlessly with the hardware, for network and

crypto acceleration, CyberoamOS extracts the highest

level of performance from a multi-core platform and offers

minimum latency. It comes with Next-Generation security

features to protect against newly evolving threats.

Page 6: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

Cyberoam virtual network security appliance range:

CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C

Cyberoam virtual security appliances offer:

1. Security for virtualized networks by scanning traffic within virtual

networks; protecting hypervisor management console, hypervisor

and Guest OS; and securing zero trust networks.

2. Comprehensive network security with multiple security features, in a

single virtual appliance that makes virtual environments as secure as

the physical infrastructure.

3. Ease of deployment and upgrade.

4. One-click compliance reports and logging/reporting that helps in

compliance management.

5. Centralized Security Management of branch offices using

physical/virtual network security appliances over a single interface

of Cyberoam Central Console (CCC), available in both virtual and

hardware forms.

6. Centralized Visibility into network and user activities with logging and

reporting offered by Cyberoam iView software.

7. Complete virtual security solution with Cyberoam’s virtual network

security appliances, virtual CCC, and Cyberoam iView software for

centralized logging and reporting.

Cyberoam virtual security appliances support multiple virtualization

platforms like VMware and Hyper-V.

Virtual Security

Cyberoam virtual network security appliances are designed to address the security needs for virtualised environments

like virtual data-centers, ‘Security-in-a-Box’ set-up for MSSPs/Enterprises, and ‘Office-in-a-Box’. Cyberoam virtual

network security appliance can be deployed as Next Generation Firewalls or UTMs.

Page 7: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

Centralized Security Management across Branch Offices Centralized Visibility across Networks

Enterprises can centrally manage security across

dispersed branch offices using Cyberoam security

appliances with Cyberoam Central Console (CCC),

available as hardware and virtual appliances.

Enterprises can get complete centralized real-time

visibility into network and user activities with logs and

reports offered by Cyberoam iView.

Cyberoam iView Appliance Range:

Hardware appliances

- CR-iVU25, CR-iVU100, CR-iVU200

Software

Centrally push policies, security subscriptions and

firmware/signature upgrades with change management for

uniform policies and protection against zero hour threats.

Enables quick management with the flexibility to group

Cyberoam security appliances deployed across offices

based on geography, appliance models, firmware versions,

and security subscriptions

Role-based administrative controls with logs /views of

administrator actions

Pro-active alerts on subscription expiry, excess disk usage,

IPS and virus threat counts, unhealthy surfing hits, and

more

Enables pre-provisioning (auto-appliance discovery) of

Cyberoam devices with configuration templates to create

policies in minimum time

1200+ reports help with log and security management,

compliance management, and forensic analysis Logs, reports and alerts across multiple devices,

protocols and locations provide user and network activity

information to identify security breaches, enabling quick

action and minimizing network downtime One-click compliance reports on HIPAA, PCI DSS, GLBA,

SOX and drill-down reports /alerts for security breach,

data leakage helps to meet compliance needs Helps with forensic analysis by reconstructing the

sequence of events of security breach with logs and

reports, reducing cost of investigation and minimizing

network downtime Compatibility with a wide range of devices including

Proxy Firewalls, Custom Applications and any Syslog-

compatible devices enables organizations to store logs

and reports of multiple devices

CCC Appliance Range:

Hardware CCC Appliances

- CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000

Virtual CCC Appliances

- CCCV15, CCCV50, CCCV100, CCCV200, CCCV500

Page 8: Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and

Awards and Certifications

Registered Trademark of Cyberoam Technologies Pvt. Ltd.

[email protected] | www.cyberoam.com

S e c u r i n g Y o u

Cyberoam Technologies

505 Thornall Street, Suite # 304 Edison,

NJ - 08837, USA, Tel: +1-847-235-4684

Toll Free Number: +1-800-686-2360

Cyberoam Threat Research Labs consists of a dedicated team of

researchers that ensure detection and identification of security

threats at early stages of propagation and protect Cyberoam

customers against numerous zero day vulnerabilities and

malware attacks. CTRL ensures appropriate security protection

by continuously releasing suitable signatures, timely security

upgrade and research reports.

Cyberoam Threat Research LabTraining and Support

Cyberoam offers trainings and product updates to its

customers for efficient deployment, configuration and

management of Cyberoam solutions.

Training

Cyberoam’s dedicated global pre-sales team offers

security planning and migration assistance for Cyberoam

deployment and implementation to enterprises

Pre-sales Support

Cyberoam’s ISO 20000:2011 certified Global Support

Team offers 24x7 or 8x5 support – as subscribed by the

customers, over phone, email and chat.

Post-Sales Support

www.check-mark.com

CERTIFIED

VPNC

InteropBasic

AES

Interop

CERTIFIED

VPNC

SSL Advanced Network Extension

SSL Basic Network Extension

SSL JavaScript

SSLFirefox

SSLExchange

SSLPortal

RECOMMENDS

BEST BUY

EDITOR’S C H O I C E

www.itpro.co.ukPROPCRECOMMENDED