cyberoam ssl vpn - secure remote access

38
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam SSL VPN - Secure Remote Access

Upload: mari-solis

Post on 03-Jan-2016

49 views

Category:

Documents


1 download

DESCRIPTION

Cyberoam SSL VPN - Secure Remote Access. Established in 1999. 500+ Employee Company. ISO 9001-2000 Certified. 55 Distributors covering 75+ countries. 30000+ combined installation of. Central Console (CCC). Unified Threat Management. Agenda of Presentation The Business Need of SSL VPN - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Cyberoam SSL VPN - Secure Remote Access

Page 2: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Established in 1999. 500+ Employee Company. ISO 9001-2000 Certified. 55 Distributors covering 75+ countries. 30000+ combined installation of

Central Console (CCC)Unified Threat Management

Page 3: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Agenda of Presentation

• The Business Need of SSL VPN• About Cyberoam SSL VPN• Product Walkthrough

Page 4: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

The Business Need for SSL VPN

Also, An Introduction to Virtual SSL VPN Appliances

Page 5: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Secure, Remote Access is indispensable in today’s work environment

Scenario 1: Employees and Mobile Workers

Page 6: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Secure, Remote Access is indispensable in today’s work environment

Scenario 2: Partners, Suppliers and Customers get Extranet access

Page 7: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

IPSec

PPTP

L2TP

SSL VPN

Solutions Comparison: When to use What?

Ideal for a limited number of employees accessing corporate resources through clients on trusted devices

Use SSL VPN in

Different Locations: Home, Airport, Hotels, cyber cafe

Various Devices

laptops, home PC, PDA, mobile phone

Extranet access to customers, partners, suppliers

Web-enabled access – no need to install client on device

Page 8: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

The Onset of Virtualization in SSL VPN…

How is it done?

Utilizing virtualization environments like VMware

Building Virtual appliances within existing hardware

Running a large number of independent, virtual SSL VPN gateways

Implementing complex virtual datacenters so servers are consolidated across multiple physical servers

Page 9: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

The Onset of Virtualization in SSL VPN…

Benefits

Multiple SSL VPN instances can run on one single appliance

Appliance-wide or individual instances upgrades

Optimum hardware resource allocation

Resilience to hardware failure

Increases deployment scalability

Minimizes operating and maintenance costs

Eco-friendly

Page 10: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Higher security due to 128-K Encryption and Authenticated Access Granularly restrict users to specific applications and resources Security checks on endpoint devices even before giving access Ease of Use Lower costs, Less Maintenance Least Admin intervention Access from any web-enabled device Minimum downtime

Business Advantages of SSL VPN

Page 11: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

About Cyberoam SSL VPN

Page 12: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Cyberoam SSL VPN – Secure Remote Access

Employees, Customers,

Partners and guest users

Cyberoam SSL VPN

Internal Resources

Different Devices

Page 13: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Roaming User Cyberoam SSL VPN Servers (App./Web/FTP/File

Share/WTS etc)

Client Certificate

Username/Password

Server Certificate

User gets a list of applications based

on policies

All Published Applications/Resources

Cyberoam SSL VPN – How does it work?

Page 14: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Why choose Cyberoam SSL VPN?

Scalability and Performance

Unlimited user license

N+1 clustering with application load balancing

Available as Virtualized Solution

Available as virtual appliances

Run a large number of independent virtual gateways from existing infrastructure

Identity-based Security

Monitor user log-on activity including username, MAC address, IP address of endpoint

Know “who is doing what” in the network

Page 15: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Key Features

Multiple Applications Support

Microsoft Outlook, TCP, 802.11X and UDP, FTP, Citrix and Microsoft Terminal Servers and more

Secure Firewall Traversal

Works alongside existing firewalls

Prevents exposure of UDP port ranges to hackers

Does not publish internal IP address

to outside network

Page 16: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Access Mode

Clientless VPN with a browser agent for seamless access to applications

Linux, Windows, MAC support

Authentication and Authorization

Supports LDAP, AD, RADIUS etc.

E-mail based user-provisioning

Support for external two-factor& biometric authentication

Key Features

Page 17: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Device Profiling (Endpoint Security)

Product checks – Anti-virus, Firewall & Anti-spyware

Up to 1100+ products supported

MAC address and IP address checks

Quarantine policy for devices that fail profiling test

Remediation information sent to user for any failed access e.g. updating anti-virus software, configuring firewall etc.

Key Features

Page 18: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Auditing & Logging

Users logon activity including time of access, username, MAC address and IP address of endpoint

Management

Web-based and Command Line Insole

Wizard-driven installation

Role-based administration

Monitor and disconnect live users

Real-time status and monitoring

Key Features

Page 19: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Product Walkthrough

Page 20: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Dedicated SSL VPN appliance Deployment

Page 21: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Cyberoam SSL VPN Virtual Appliance

No need to buy separate hardware!!

Based on VMWare virtualization platform

Install multiple virtual SSL VPN machines

Cyberoam’s Virtualization platform, VMware allows virtual datacenters where servers are consolidated across multiple physical servers, for guaranteed efficiency and performance

Page 22: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Virtual Appliance Deployment Diagram

Page 23: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Bootstrap State◦ Initial Installation

Configuration state◦ State where firmware upgrades, license upgrades,

backup-restore can be performed (Involves downtime) Run State

◦ Resource configuration on-the-fly possible◦ State in when users connect and access their

resources

Note: Appliance can be changed from Configuration state to Run State as and when needed or vice versa

Page 24: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 25: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

AD/LDAP Groups

Endpoint Security Policies

Device Profiling

Page 26: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 27: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Mandatory Profile

Quarantine Profile

General Profile

Page 28: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 29: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 30: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 31: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 32: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Page 33: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Pricing and Support

Virtual Appliance Mode

Base License – Default 5 user license available for 30 days FREE TRIAL

No Endpoint Security in Trial version

Dedicated Appliance Mode Concurrent user license (upgrade option available e.g.50 to 100 user license upgrade)

Support Plans: 8X5 and 24X7 plans based on appliance + per user license

Free Trial Download online with support + full access to all features

Page 34: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

CR-SSL-800

Supports 1-50 concurrent users

Secure, remote Intranet & Extranet access

Designed For SMEs, MSSPs and more

Comparison of Cyberoam Dedicated Appliance Offerings

CR-SSL-1200

Supports 51-250 concurrent users

Secure, remote Intranet & Extranet access

Designed For SMEs, large enterprises, MSSPs and more

CR-SSL-2400

Supports 251-1000 concurrent users

Secure, remote Intranet & Extranet access

Designed For large global enterprises, MSSPs

Page 35: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

New Revenue Opportunities: Global SSL VPN market at $500 million in 2008 (Source: Gartner)

Support: 24X7 Support and monitoring Centralized Policy Management Continuous access Familiar, easy-to-use interface Cyberoam Virtual Appliances allow MSSPs to service multiple clients

through shared allocation of hardware resources

Summary Benefits for MSSPs

Page 36: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Reduced costs: Centralized management, minimum admin intervention, timely support

Protect your Investments: Use existing networks, firewalls, servers Trusted Remote Access: Extend access to regional offices, partners,

customers, telecommuters, wireless users Continuous access: Provide reliable access 24X7 Increase employee productivity (Intranet portals, ERP) Partner access to internal applications (Partner Extranet) Eliminate risks of organizational resource access from cyber cafes,

customer site etc. Apply Uniform security policy

Summary Benefits for Organizations– Cyberoam SSL VPN

Page 37: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Cyberoam SSL VPN Virtual Appliance Free Trial…

Register for a free online trial

A fully functional Cyberoam product

Free technical support

No financial obligations

Page 38: Cyberoam SSL VPN - Secure Remote Access

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy

Thank You! [email protected]