cyberoam ng series: future-ready security

30
Cyberoam NG series: Future-Ready Security

Upload: nathaniel-cervantes

Post on 30-Dec-2015

53 views

Category:

Documents


11 download

DESCRIPTION

Cyberoam NG series: Future-Ready Security. A glimpse into the future of networks…. Superfast Internet Data moving at 10 times current Internet speeds Google launched a 1000 Mbps ‘Google Fiber’ Internet service - PowerPoint PPT Presentation

TRANSCRIPT

Cyberoam NG series: Future-Ready Security

A glimpse into the future of networks…

Superfast Internet

• Data moving at 10 times current Internet speeds• Google launched a 1000 Mbps ‘Google Fiber’ Internet service• IDNet launched UK 1000 Mbps Leased Line Business Ethernet Service

Device Explosion: Multiple Internet devices per user

• Each device with a unique IP address• Employee-owned smart devices to reach 350mn by 2014, up from 150mn

Cloud: Web Applications

• Critical business applications and Services moving to the Web• Cloud Computing will generate more than $45.4 billion in revenue by 2015!

Cloud: Explosion of Internet Applications

• Infinite applications moving to the cloud

How will Organizations Gain?

With Network Connectivity & Productivity taking a leap, what about Security?

SECURITYCONNECTIVITY PRODUCTIVITY

Can your Security keep pace?

• The New Network Infrastructure- SOHO /SMB Network Infrastructure is moving to Gigabit! - Anything less than Gigabit is nearly obsolete!- Does your security appliance have Gigabit ports?- Does any security vendor offer network security appliances with

Gigabit ports to these segments?

• Superfast Internet Speeds- Gigabit Internet speeds to be soon available from ISPs /Telco’s- Can your security appliance match high Internet speeds?

- Does it offer Gigabit throughputs?

• Device Explosion- More devices per employee connecting to the IT network- Changing approach from ‘Users’ to ‘Devices’- Can your security appliance support more number of Devices?

Can your Security keep pace?

• Explosion of Internet applications- Leading to ‘Application Chaos’!- What level of application control granularity does your Security offer?

• Critical business applications moving to Cloud- Internet-facing applications face risk of getting hacked- Does your security offer a web application protection?

No one wants SECURITY to become a bottleneck in their network!

What can SOHO/SMB do to prevent Security from becoming a bottleneck in progress?

Expand Security budgets to buy Enterprise security solutions

Or

IT Manager

Move to Future-Ready security appliances

Presenting The Cyberoam NG series

The ‘Next-Generation’ appliances built for Future-ready Security in networks!

Cyberoam NG series offers ‘Future-Ready’ Security

• The Fastest ‘UTM’ appliances for SOHO and SMB segments• Offering Next-Generation Firewall protection for Large Enterprises!

• Offering Future-Ready security to• SOHO, ROBO

• CR15iNG, CR25iNG, CR35iNG• Wi-Fi appliances

• CR15wiNG, CR25wiNG, CR35wiNG• Faster performance, broader coverage

with 3 x 3 MIMO• Dual band support

• SMB• CR50iNG, CR100iNG

• Enterprise• CR2500iNG

How Cyberoam NG series offers Future-Ready Security?

Offering upto 5 times industry average throughput for SOHO /SMB

* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above

Appliances starting with Gigabit Firewall Throughputs

Best in class UTM throughputs

Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.

Firewall throughputs UTM throughputs

CyberoamCR15iNG vs. CR15i

ONE CR15iNG vsDell Sonicwall TZ series

Cyberoam CR15iNG vsFortinet FG20C, FG40C

Cyberoam CR15iNG vsWatchguard WG XTM25, WG XTM26

Cyberoam CR15iNG

Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above

Firewall throughputs UTM throughputs

CyberoamCR25iNG vs. CR25ia

CR25iNG vsDell Sonicwall NSA220, NSA 250M

Cyberoam CR25iNG vsFortinet FG60C

Cyberoam CR25iNG vsWatchguard WG XTM33

Cyberoam CR25iNG

Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above

Firewall throughputs UTM throughputs

CyberoamCR35iNG vs. CR35ia

Power to secure SMB with SOHO appliance!

CR35iNG vsDell Sonicwall NSA2400,

Power to secure SMB with SOHO appliance!

Cyberoam CR35iNG vsFortinet FG80C

Cyberoam CR35iNG vsWatchguard WG XTM330, XTM 505

Cyberoam CR35iNG

Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above

Firewall throughputs UTM throughputs

CyberoamCR50iNG vs. CR50ia

Size doesn’t matter!

CR50iNG vsDell Sonicwall NSA2400, NSA 3500

Size doesn’t matter!

Cyberoam CR50iNG vs Fortinet FG100D

Size doesn’t matter!

Cyberoam CR50iNG vsWatchguard XTM505, XTM 515

Cyberoam CR50iNG

Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above

Firewall throughputs UTM throughputs

CyberoamCR100iNG vs. CR100ia

Size doesn’t matter!

CR100iNG vsDell Sonicwall NSA3500, NSA 4500

Size doesn’t matter!

Cyberoam CR100iNG vsFortinet FG200B, FG300C

Size doesn’t matter!

Cyberoam CR100iNG vsWatchguard XTM515, XTM 525

Cyberoam CR100iNG

Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above

NG series offers Future-Ready Security

• Powerful Hardware• Superfast processing speed : A must for Gigabit Internet

speeds!– Nano second security processing with multicore Gigahertz

processors• Gigabit Ports to enable Gigabit Speeds for SOHO /SMB

networks• A complete overhaul of appliance design

• Faster, Next-Gen Memory and High Capacity Storage• Superior Quality for High Performance and Robustness

– Design & components supporting high speed I/O throughput and withstanding extreme environments

NG series offers Future-Ready Security

• Increased port density

Cyberoam NG series Cyberoam ia seriesCR15iNG 3 GbE ports CR15i 3 10/100 Ethernet portsCR15wiNG 3 GbE ports CR15wi 3 10/100 Ethernet portsCR25iNG-6P 6 GbE ports CR25ia 4 GbE portsCR25wiNG-6P 6 GbE ports CR25wi 4 GbE portsCR35iNG 6 GbE ports CR35ia 4 GbE portsCR35wiNG 6 GbE ports CR35wi 4 GbE ports

CR50iNG 8 GbE ports2 hardware bypass segment CR50ia 6 GbE ports

1 hardware bypass segment

CR100iNG 8 GbE ports2 hardware bypass segment CR100ia 6 GbE ports

1 hardware bypass segment

Intelligent, Powerful firmware

• Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance

• Better use of Multicore architecture for Parallel processing • Optimized workload distribution across cores• Lockless path for packet forwarding

– A single core handles packets for each connection at any given time to avoid inter-locks

• Optimized Interrupt rates for minimum CPU overhead and latency

• High rate of interrupts - A bottleneck in high-speed data transfers

• Fastpath packets to improve processing speed and reduce CPU overhead

• CyberoamOS offers advance features with entry-level appliances

• CyberoamOS installed on flash and reports are stored in HDD*

• Auto flash recovery**

• Auto OS failover from flash to HDD in case of flash failure**

*available in models above CR15iNG/wiNG**Future implementation

Feature availabilityCyberoam appliance SSL-VPN WAF HA

CR15i/wi X X XCRR15iNG/wiNG √ X XCR25ia X X XCR25iNG/iNG-6P √ √ √

Intelligent, Powerful firmware

Take complete control over applications running on your network

Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls

VoIPBitTorrentCRM ERP

IM ApplicationWebmail

Internet

Medium Quality

High Quality

Low Quality Control over

Granular classification of applications

Risk Level

Very Low (1)

Low (2)

Medium (3)

High (4)

Very High (5)

Application Characteristics

Excessive Bandwidth

Prone to misuse

Transfer files

Tunnel other apps

Vulnerabilities

Widely used

Loss of Productivity

Can bypass firewall policy

Application Technology

Browser Based

Client Server

Network Protocol

P2P

Proactive Protection model:Eliminates the need for manual intervention by administrators to update policies for new applications added to the list

On-Appliance Web Application Firewall

• No need to buy dedicated WAF appliance• Protect Web Servers and Web Applications from hackers

• Prevents hackers from exploiting Web-Application Vulnerabilities• Positive protection model and No Signature Tables• Intuitive website flow detector automatically adapts to website changes• Protects against OWASP top 10 vulnerabilities

Cyberoam’s Layer 8 (Identity-based) security

User Login

Cyberoam Authenticates

• User Name• IP Address• MAC Id• Session Id

Cyberoam Authorizes

• Internet surfing quota• Schedule control• Security Policies• Web Filtering• Application Visibility & Control• QoS / Bandwidth Management• IM Controls

Cyberoam Audits

• Identity - based Logs + Reports • Compliance Reports

Control over staff network activities• Who can connect to the network• Who can access what• What have they accessed

Ability to track the user activities; identify attackers /victims

Take quick network security decisions

Best-in-class ReportingBest-in-class Reporting- 1000+ in-depth reports

- Real time visibility into user and network activities

- Helps with Security & Compliance management, Forensic Analysis

- Reports include dynamic and animated reports, in-line graphs, country maps

Country maps for Source/ Destination traffic

Dual Dashboard - Traffic & Security Dashboard Application Reports

Support for new Connectivity Technologies – 4G /LTE

• Makes organizations ready for high speed future• Easy deployment for high speed Internet connection

• Simple USB modem plug-in into Cyberoam appliance• Ensures business connectivity

• Automatic fail-over to 4G/LTE WWAN connection• Gateway failover over VPN

• VPN over 4G/LTE

4G3G

Threat Protection FeaturesThreat Protection Features Intrusion Prevention System

- Maximum security against emerging threats- Identity-based IPS policies per user or group- 4500+ signatures – broadest security cover

Gateway Anti-Virus, Anti-spyware- Prevents blended threats- 4 million+ signatures- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic

Gateway Anti-Spam- Real-time, most accurate spam protection- Recurrent Pattern Detection (RPD) technology- Scans SMTP, POP3, IMAP traffic

Outbound Spam Protection- Protects service providers against Outbound Spam

Other Security FeaturesOther Security Features

Fusion Technology driven SI Firewall- Interface for achieving Unified Security

Virtual Private Network (VPN) - Threat-free remote access- Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN

Web & Content Filtering- Complete Visibility & Control over HTTP & HTTPS- 82+ categories and 44 million+ URLs

Bandwidth Management- Helps enhance network performance and productivity- Create a bandwidth policy on a combination of User,

Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control

www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Live NG Series Demo

View Demo