cyberoam - unified threat management unified threat management cyberoam copyright 2010 elitecore...

53
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy C VERSION X GETTING READY FOR 200X

Upload: gervais-henderson

Post on 31-Dec-2015

228 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

VERSION XGETTING READY FOR 200X

Page 2: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

AGENDA

New Architecture & Firmware

The Next Generation GUI

Integrated iView Reporting

Features

Page 3: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

New Architecture &

Firmware

Page 4: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Version X – Firmware Architecture

• Introducing Light Weight CyberoamOS.

• Firmware based – No more bulky Upgrades.

• Multiple Firmware: Factory Default + Firmware of your choice.

• No more RMAs due to OS Corruption and Upgrade Corruption.

• Negligible chances of Database Corruption/inconsistencies.

• Extensible Architecture

Page 5: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Salient Features of the

NG GUI

Page 6: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Accordion Menu & TABs for easy navigation of menu items

Page 7: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Easy Access Top Panel

Page 8: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Appliance Actions available on Dashboard – Reboot, Shutdown

Page 9: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Static Status bar at bottom – Visible all the time

Page 10: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Unsubscribed modules visibility on the menu itself

Page 11: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Select Column Control, Direct Access from the Button

Page 12: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Move column positions directly from select column control

Page 13: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Filters on Manage Pages

Page 14: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Filters on Manage Pages

Page 15: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Pagination where ever required

Page 16: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

No Java Script Pop Ups - Web 2.0 Pop UP

Page 17: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Grouping control with search facility – easy to search objects and add it to a group

Page 18: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Tabbed Data Entry control for Bulk Addition

Page 19: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Informative Tooltip giving detail information on the policy attached – including Edit Option

Page 20: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Informative Tooltip giving detailed information on the policy attached – including Edit Option

Page 21: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

CR Custom Control – control with search functionality, and Add facility to add object from the control itself

Page 22: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

CR Custom Control – control with search functionality, and Add facility to add object from the control itself

Page 23: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Integrated iView

Reporting

Page 24: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Subscription free On-Appliance Reporting

Real-time Monitoring and Alerting

Over 1100+ Drilldown Reports

Reports in HTML, MHTML, PDF, & CSV formats & Email Alerts

Web 2.0 GUI and Reporting interface.

iView(Cyberoam Aggregated Reporting & Logging Software)

Page 25: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Page 26: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Page 27: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Page 28: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Page 29: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

IPv6 Ready

Page 30: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

IPV4

Cyberoam – With IPv6 Ready Logo – Only 2

Page 31: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

IPv6 Ready

• Only the 2nd UTM

• IPv4IPv6 tunneling

• IPv6IPv4 tunneling

Page 32: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

3G & Wimax

USB Modem Support

Page 33: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

3G & Wimax USB Card Connectivity

Page 34: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Instant Messaging

Logging & Control

Page 35: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Instant Messaging Logging & Control

• Yahoo & Windows Live Messaging

• Control Who Communicates with Whom

• Control Webcam usage

• Control Voice Usage

• Individual as well as Group Control

Page 36: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Control who can chat with whom

Archive Communication

Control communication medium(chat, video, voice)

Data Protection

Productivity

Instant Messaging & Control

Page 37: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Next Generation

Layer 7 Firewall

Page 38: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Port 443

Port 80

443

80

443

80

21

1st Generation Firewalls

Page 39: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

MailSkype WebBit

Torrent

Application Firewalls – CR Version 9

Page 40: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

CRM ERPSalesforce

YouTubeIM

ApplicationWebmail

CasualTraffic

Application Firewall Crowd of Applications Bandwidth Management

Next Generation Firewalls – Version X

Page 41: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

CRM

ERP

Salesforce

YouTube

IM Application

Webmail

CasualTraffic

Application Firewall Crowd of Applications Bandwidth Management

Next Generation Firewalls

Page 42: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Identity without IP

Page 43: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Thin Client Support

• Windows Thin Client Support

• Windows Terminal Services

• Citrix Presentation Server

• Apply User Based Policies and Controls

Page 44: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

SSL VPN Enhancements

Page 45: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

SSL VPN Enhancements

• Application Access Mode within Web Browzer• HTTP, HTTPS

• RDP

• Telnet , SSH

• FTP

• SSL VPN Client

• Save Password

• Auto Start VPN Connection

Page 46: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Stability

& Performance

Page 47: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Stability & Performance

• Firmware based approach

• ~10 second Soft Reboot Time

• Fast GUI Access

• Extensible Architecture vs ASIC

• Preparing for upcoming threats

• HTTP Proxy Enhancements for HTTP 1.1 protocol

• Extensive Logging and Log Viewer for Instant Troubleshooting

• Getting ready for the Enterprise.

Page 48: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

… And Much More

Page 49: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

…And Much More

• Role Based Access Control

• Multiple Authentication Support for User

• External Authentication for Administrator

• Customer My Account Revamp

• HTTP DDoS attack protection

• Naming Firewall Rules for easy troubleshooting

• HTTP & FTP scanning over custom ports

Page 50: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

…And Much More

• Inline Captive Portal

• HTTPS

• Super Enhanced Packet Capture Log & Log Viewer

• VLAN over WAN

• Support for MD5 Authentication for RIP & OSPF

• Enhanced IPS Actions

• Drop Connection

• Drop Attack Source

Page 51: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Version X

Summary

Page 52: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Security

Productivity

Connectivity

•Application Control

•SSL (HTTPS) Scanning

•Instant Messaging Control

•Firmware based Approach

•Usable GUI

•Performance

•3G Support

•IPv6 Ready

•SSL VPN Application Access Mode

Page 53: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam  Copyright 2010 Elitecore Technologies Ltd. All rights reserved

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

www.cyberoam.com Copyright 2010 Elitecore Technologies Ltd. All rights reserved. Privacy PolicyC

Thank You