our products
DESCRIPTION
CYBEROAM. Comprehensive Network Security. Our Products. Cyberoam – Endpoint Data Protection. Data Protection & Encryption Device Management. Application Control Asset Management. Unified Threat Management. Cyberoam Central Console (CCC). SSL VPN. Cyberoam Unified Threat Management. - PowerPoint PPT PresentationTRANSCRIPT
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Our Products
Unified Threat Management Cyberoam Central Console (CCC) SSL VPN
Data Protection & Encryption
Device Management
Application Control
Asset Management
Cyberoam – Endpoint Data Protection
Comprehensive Network Security
CYBEROAM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam Unified Threat Management
Gateway Integrated security over single platform
Unique Identity-based Layer 8 approach penetrates through each security module
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
How do you Identify users and grant access?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
How do you Identify users and grant access?How do you Identify users and grant access?
“Certain employees are using their hand-held devices like Iphones & Blackberrys to access internal resources in my company. Some are working from home.”
“Our Network works on Citrix, and we would like to block certain users from accessing particular applications and apply unique policy for each user across the network.”
“How can I create special privilege for the technical team to access only specific servers / applications in my DMZ zone?”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“How can I know have information of which users logging when and what he is accessing from network or even from HOME. (Work from HOME)”
“How can I have AAA (Authenticate, Authorize and Audit) in my single security device.”
How do you Identify users and grant access?How do you Identify users and grant access?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION – Unique Identity Based Cyberoam FirewallSOLUTION – Unique Identity Based Cyberoam Firewall
Cyberoam features:
Stateful Inspection Firewall
Application based Firewall
Identity based Firewall
Admin can define the policies based on Username or IP Addresses and follows wherever he goes
Admin can bind the policies with user-name, IP address, MAC and session id (For Windows Terminal Sever and Citrix) as well
Terminal Server
XenServer
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
HOW DO YOU PROVIDE ACCESS PRIVILEDGES TO USERS?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
How do you enable access policies for your users?How do you enable access policies for your users?
“Blanket policies for all departments do not work for us anymore.”
“I want my HR department to have access to Job & Recruitment websites.”
“I want to apply a daily download quota to certain users in my network”
“I want to block certain websites for a specific group of users. Although, these websites are hosted on HTTPS”
“I want to allow IM access to our Senior Management & Sales Team”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
How do you enable access policies for your users?How do you enable access policies for your users?
“How can I give access to FACEBOOK to specific users only one hr a day that too after office hrs?”
“How can I manage B/W to social networking websites to (for eg: Facebook) 2kbps so that business application gets right b/w?”
“How to block P2P applications, Proxy applications or Secured application like Ultrasurf acoross my organization?”
“How can I monitor/log DATA Transfer over HTTPS?”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: WEB CONTENT & APPLICATION FILTERSOLUTION: WEB CONTENT & APPLICATION FILTER
Block, Control & Monitor internet access & application access of Users.
Over 44 million+ websites in 82+ categories
Blocks and inspect
HTTPS websites
Google Cached pages
All known proxies such as Ultrasurf etc.
Educate healthy-usage policy by providing customized messages on blocked websites.
Premium
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
COMPLETE CONTROL WITHUSER IDENTITY
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Blocks over 5000+ Applications
SOLUTION: APPLICATION CONTROLSOLUTION: APPLICATION CONTROL
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: IM MANAGEMENT & CONTROLSOLUTION: IM MANAGEMENT & CONTROL
Log & Monitor leading Instant Messengers
Yahoo,
Windows Live
Filter content over IM: Blacklist certain keywords or regular expressions
Block File transfer over messengers
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IM Controls for Yahoo MSG:
Data Leak Protection (File Transfer Control)Who can chat with whom!Logging of Chat Conversations
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
HOW DO YOU OPTIMIZE NETWORK & RESOURCE AVAILABILITY?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“We want to allot dedicated bandwidth to our VOIP/CRM/ERP”
“My CEO – wherever he logs in – Wifi/Lan/Handheld – should receive committed bandwidth at all times and hours.”
“I want to assign burstable (128kbps – 1 Mbps) to users/group and burst it when the B/W is free from other users”
How do you optimize Network & Resource Availability?How do you optimize Network & Resource Availability?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“How can I provide Dedicated B/W to Video Conferencing/ Backup device for only 2 hrs on specific date?”
“We would like to prioritize applications that utilize applications. CRM should have highest priority.”
“How can I analyze that which application / User is using how much B/W in real time?”
How do you optimize Network & Resource Availability?How do you optimize Network & Resource Availability?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: BANDWIDTH MANAGEMENTSOLUTION: BANDWIDTH MANAGEMENT
Allocate/Restrict bandwidth to specific application or users/groups
Allocate/Restrict bandwidth to specific categories Schedule bandwidth allocation/restriction Allocate dedicated bandwidth or as per availability
(burstable)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
CRM
ERP
Salesforce
YouTube
IM Application
Webmail
CasualTraffic
Application Firewall Crowd of Applications Bandwidth Management
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: TRAFFIC DISCOVERY SOLUTION: TRAFFIC DISCOVERY
Real-time visibility into bandwidth utilization by User Protocol Application
Provides visibility of unproductive usage of resources and threat incidence
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Traffic Discovery:
Live Traffic Analysis including Bandwidth, Data Transfer Connection InformationLive traffic filtering by Application, User, IP AddressFilter traffic for specific applicationTraffic Filtering by Firewall Rule-ID, IP Address, Port etc.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
HOW DO YOU ENSURE BUSINESS CONTINUITY?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
How do you ensure Business Continuity?How do you ensure Business Continuity?
“Internet access should not be interrupted even though one of our link fails”
“We want the traffic of our finance department to route via a separate gateway”
“How can I ensure my VPN connectivity is having 100% uptime?”
“How can I use my 3G modem as back-up link when ADSL goes down?”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: MULTIPLE LINK MANAGERSOLUTION: MULTIPLE LINK MANAGER
Automated Link Load balancing assures ROI/investment Support for more than 2 ISP links Supports Wireless WAN (3G USB modems, Wimax)
Link Failover
Policy-based routing: Source ID/Users/Protocols
VPN Failover
High Availability Active Active Active Passive
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Active-Active gateway load balancing
Sales Dept. Finance Dept.Dev. Dept.
Failover Link
ISP1 (MPLS)(10 mbps)
ISP2 (ADSL)(5 mbps)
ISP3 (3G)(1 mbps)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
HOW DO REMOTE WORKERSACCESS YOUR NETWORK?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
How do remote workers access your network?How do remote workers access your network?
“I want a connect all branches to my HO using secure and stable connection with zero downtime”
“I would like to grant our employees secured access to internal resources from hand-held devices like iPhone”
“I want my work-from-home employees/Roaming users to have limited access to only specific application ”
I want to SCAN my Remote/Roaming users traffic before they connect to my NETWORK?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: VIRTUAL PRIVATE NETWORK (VPN)SOLUTION: VIRTUAL PRIVATE NETWORK (VPN)
Secure & Seamless connectivity between branch offices
Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for:
Malware Spam Inappropriate content Intrusion attempts
Supports IPSec, L2TP, PPTP technologies (client-based) SSL-VPN enables access to internal resources from any
device (Does not require a client)
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SSL VPN User Portal
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
ARE DESKTOP ANTI-VIRUS & ANTI-SPAM SUFFICIENT?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“I want to optimize my bandwidth by blocking spam at the source/gateway itself”
“I want to provide users the ability to release/tag their messages from/to the quarantine area”
“Even HTTPS websites/applications need to be scanned for viruses”
“I want my F/W/UTM to use trusted AV and use all the signatures of Virus and give 100% protection”
“How can I create User based Anit-SPAM rules? “
“How can I comply SOX?”
Are Desktop Anti-virus & Anti-spam sufficient?Are Desktop Anti-virus & Anti-spam sufficient?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SECURITY » Content Security » Anti-Malware
Gateway Anti-Malware
- 4 million+ signatures
- Bi-directional scanning of web & email
- Self-service Virus Quarantine
- Reduced window of vulnerability Broadest security cover against all malware
- Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic
- Layer 8 Impact Identity-based virus reports
- Instant visibility into attacker/victim
Identity-based Quarantine policies
indicates feature offered only by top-rated UTMs
Anti-Virus
Anti-Spyware
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION : GATEWAY ANTI-SPAMSOLUTION : GATEWAY ANTI-SPAM
Premium
Detects & blocks 98% of all spam False positive rate of 1 in a million. Unique Recurrent Pattern Detection (RPD)
technology blocks all types of spam including excel,pdf, multi-lingual spam etc.
Self-Service Quarantine Area for users, allowing them to check quarantined emails and reduce administrator overhead
Users Receive daily/weekly/monthly spam digest IP Reputation filtering:
Stops 85% of spam at Gateway Does not let it enter the network Saves bandwidth & resources
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“How can I protect my network from DDOS & SQL Injection attacks?”
“I wan to block a specific (custom) application for Specific users by creating signature in my firewall?”
“How do I get immediate intimation on a hacking attempt on my network?”
How do you safe-guard your network from Hacking attempts?How do you safe-guard your network from Hacking attempts?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: INTRUSION PREVENTION SYSTEM (IPS)SOLUTION: INTRUSION PREVENTION SYSTEM (IPS)
More than 3500+ signatures to block a plethora of intrusion attempts.
Complete protection against DOS, DDOS, Syn Flood attacks and more.
Identity-based IPS policies per user or group Overview of threat status:
Top alerts, top attackers, top victims
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
KEY QUESTION TO ASK:
DO YOU HAVE COMPLETE VISIBILITYOF YOUR NETWORK?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Do you have complete visibility of your network?Do you have complete visibility of your network?
“I want to identify the most dangerous users in my network”
“I would like to discover which users receive the most spam”
“Can I find out what people are surfing on the net in my company?”
“I want to monitor IM conversations of employees in my company”
“I want to monitor what files are being uploaded on the net”
“I want know know what google searches are being made”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SOLUTION: ON-APPLIANCE REPORTINGSOLUTION: ON-APPLIANCE REPORTING
More than 1000+ on appliance reports.
No Additional Purchase needed of hardware/service to access reports.
Collects logs and assists in Network Forensics
Reports in compliance with CIPA – Children’s Internet Protection Act
HIPAA – Health Insurance Portability & Accountability Act
GLBA – Gramm-Leach-Bliley Act
SOX – Sarbanex-Oxley
FISMA – Federal Information Security Management Act
PCI – Payment Card Industry Data Security Standards
Powered By:
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
User Dashboard
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Combined Report
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Categories
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Web Users
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Search Engine – Google Search Results
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Top Spam Recipients
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Other UTMs
User Login
Cyberoam Authenticates
• User• IP Address• MAC Id• Session Id
Cyberoam Authorizes
• Access Time • Internet Quota• Security Policies• Web Filtering• Layer 7 Controls• QoS• IM Controls
Cyberoam Audits
• Identity - based Logs + Reports
• MAC Id• Session Id
Cyberoam Layer 8 Advantage
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam UTM solves Organizational Concerns
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
DEPLOYMENT MODES CYBEROAM
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Default Gateway: 192.168.0.1 Users
Router
Network:192.168.0.x/24
FirewallINT IP: 192.168.0.1/24
BRIDGE MODEBRIDGE MODE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Default Gateway: 192.168.0.1
Network:192.168.0.x/24
RouterIP:61.0.5.1/29
Users
Mail ServerIP:172.16.1.3
Gateway: 172.16.1.1
Database ServerIP:172.16.1.4
Gateway: 172.16.1.1
Switch
Web ServerIP:172.16.1.2
Gateway: 172.16.1.1
SwitchConsole
INT IP:192.168.0.1/24
DMZ IP: 172.16.1.1/24
EXT IP: 61.0.5.2/29Gateway IP: 61.0.5.1
DMZ Zone
GATEWAY MODEGATEWAY MODE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
OVERVIEW:
CYBEROAM APPLIANCE RANGE
& SUBSCRIPTION SERVICES
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Large Enterprises- CR 1500ia- CR 1000ia- CR 750ia- - CR 500ia
Small to Medium Enterprises- CR 300i- CR 200i- CR 100ia- CR 50ia
Remote Offices- CR 35ia - CR 35wi- CR 25ia - CR25wi- CR 15i- CR 15wi
CYBEROAM UTM APPLIANCE RANGECYBEROAM UTM APPLIANCE RANGE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam
(RBL Service)
Basic ApplianceBasic Appliance SubscriptionsSubscriptions
Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)
Gateway Anti-spam Subscription
Web & Application Filtering Subscription
Intrusion Prevention System (IPS)
8x5 Tech support & Warranty
24 x 7 Tech Support & Warranty
Subscription ModelSubscription Model
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Bundled SubscriptionsBundled Subscriptions
TVS (Total Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)
- Gateway Anti-spam
- Web & Application Filtering
- Intrusion Prevention System (IPS)
- 8 x 5 Email, phone and chat Tech Support
SVS (Security Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)
- Web & Application Filtering
- Intrusion Prevention System (IPS)
- 8 x 5 Email, phone and chat Tech Support
Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Bundled SubscriptionsBundled Subscriptions
TVSP (Total Value Subscription Plus)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)
- Gateway Anti-spam
- Web & Application Filtering
- Intrusion Prevention System (IPS)
- 24 x 7 Email, phone and chat Tech Support
SVSP (Security Value Subscription Plus)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)
- Web & Application Filtering
- Intrusion Prevention System (IPS)
- 24 x 7 Email, phone and chat Tech Support
Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Product Line
Unified Threat Management Cyberoam Central Console (CCC)
SSL VPN
CyberoamEnd Point Data Protection
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
PRICINGPRICING
HARDWARE
One Time Payment
SOFTWARE
Yearly Renewal Required
AV/AS/CF/IPS Database needs to update regularly to provide up-to-date protection
Need to renew 8x5 to get updates and keep the appliance under warranty
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
HOW TO CHOOSE A CYBEROAM MODEL?HOW TO CHOOSE A CYBEROAM MODEL?
USER MODEL MATRIXNote: Denotes Number of Firewall Users SupportedActivation of other modules will lower performance
USER MODEL MATRIXNote: Denotes Number of Firewall Users SupportedActivation of other modules will lower performance
2250
1500
1100
750450
3001507550402525
0
500
1000
1500
2000
2500
CR15i
CR15wi
CR25ia
CR35ia
CR50ia
CR100ia
CR200i
CR300i
CR500ia
CR750ia
CR1000
i
CR1500
i
Appliance Name
Nu
mb
er
of
Us
ers
Su
pp
ort
ed
Please Note: Chart is an approximation Only. Number of users may vary on the network load & configuration.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Product Description List Price (US$)
Qty Final Price (US$)
Cyberoam 300i Appliance - Firewall, Bandwidth Management , Multiple Gateway & Load Balancing
SKU : 01-CRI-300-01
100
1Year Antivirus-Antispam for CR 300i 60
1 Year Web & Application Filtering for CR300i 31
1 Year IPS for CR300i 18
1 year TVS ( AV+AS+IPS+WAF with 8*5 support) 60
1 year SVS (AV+IPS+WAF with 8*5 support) 54
1 yrs 8*5 Support 11
Total
SAMPLE QUOTESAMPLE QUOTE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IMPORTANT RESOURCES FOR CYBEROAM PARTNERSIMPORTANT RESOURCES FOR CYBEROAM PARTNERS
http://partner.cyberoam.com Partner Portal >> Knowledge-base
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Stay updated with Cyberoam Newslettershttp://www.cyberoam.com/newsletters.html
IMPORTANT RESOURCES FOR CYBEROAM PARTNERSIMPORTANT RESOURCES FOR CYBEROAM PARTNERS
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
IMPORTANT RESOURCES FOR CYBEROAM PARTNERSIMPORTANT RESOURCES FOR CYBEROAM PARTNERS
Register for Cyberoam WebinarsRegister for Cyberoam Cerficationhttp://training.cyberoam.com
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
DEDICATED CONSULTANTS FOR PARTNERSDEDICATED CONSULTANTS FOR PARTNERS
www.cyberoam.com/presalessupport/ Cyberoam Presales Consultants are available 24x7 for
Channel Partners
Dedicated Support
Chat: Yahoo/MSN/Skype
Telephone: Toll Free for some regions
Presales Consultants help you with
Installation Support,
Network Consultation
Documentation Support for Tenders/RFPs
Feature Requests
Training/Certification requests
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Credentials
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Industry RecognitionIndustry Recognition
Recognized as ‘Visionary’ in the Gartner UTM MQRecognized as ‘Visionary’ in the Gartner UTM MQ
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam is the only Network UTM vendor to receive this recognition in 2010 from SC Magazine
SC Magazine
Recognized as ‘Network UTM Innovator – Security Innovator’Recognized as ‘Network UTM Innovator – Security Innovator’
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”
Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight
IDC ReviewIDC Review
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
2008 - Emerging Vendor of the Year2008 - Emerging Vendor of the Year
Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year
Award in the Network Security Market
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam CertificationsCyberoam Certifications
Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP
UTM Level 5: Cyberoam holds a unique & complete UTM certification
ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability
ICSA Certified High-Availability
PremiumPremium
IPv6Ready
Member of Internet Watch
Foundation
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
SC Magazine Five Star Rating – Seven Times in a Row!SC Magazine Five Star Rating – Seven Times in a Row!
April 2009 – Product Review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“
July 2010 – Product Review Cyberoam CR50ia “A lot of features at a low cost.” “A solid product and the price is right. We give CR50ia our Best Buy this month.”
October 2010 – Product Review Cyberoam CR15wi “Remarkably good value, identity-based security, simple deployment,
extensive security measures, top quality reporting software.”
April 2011 – Product Review Cyberoam CR100ia
“Easy to deploy with a lot of granular controls.”
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Reviews and AwardsReviews and Awards
Cyberoam CR35ia outshines competitors in SOHO UTM Group Test
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Partial ClientelePartial Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Partial ClientelePartial Clientele
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Cyberoam maximizes Return Over Investment. We are fully satisfied with Cyberoam Unified Threat Management solution.” Mr. Avnesh JainSr. Manager, Information SystemsHero Honda Motors Limited
TestimonialsTestimonials
“Since its deployment, unlike FortiGate, Cyberoam has been able to give wire speed performance. We soon plan to invest more in Cyberoam appliances to protect our other operations. The most important quality of Cyberoam is its unobtrusive businessfriendly wire-speed security. Cyberoam All-in-One solution is running very well and can change people’s mind about the performance of UTM solutions” Mr. Vo Remy Manager, IT Department, Societe Generale Viet Finance, Vietnam
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“We purchased few appliances to start with and monitored them. We soon came to a conclusion that Cyberoam UTM was a robust appliance and that the post-sales support is prompt. VisionTech Systems, Cyberoam’s channel partners ensures that we have continuous support. Today, after purchasing twenty appliances from them, our opinion about them still remains unchanged. We intend to continue deploying Cyberoam UTM appliances on our other constructions sites in future.”
TestimonialsTestimonials
“Through Cyberoam we have gained in efficiency, quality control and now we focus on users rather than IP addresses, which is more logical when addressing security concerns. We actually got what we were promised on paper. The security policies have been easy to configure” Mr.Thierry ManginDirectro of Information Systems, Baccarat Crystal, France
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
“We find Cyberoam UTM a dependable solution. It amply takes care of our primary productivity need. En route, it also bridges security our to productivity requirements. Cyberoam is productivity promoting, business friendly security” Mr.Leonides Tolentino, Sr. Manager, MISCDO-Foodsphere, Philippines
TestimonialsTestimonials
“The Cyberoam team has set an extremely high bar for vendors that I deal with on all levels of business. The responsiveness, impeccable follow-up and willingness to adjust as dynamically as our requests was uncanny. Cyberoam’s customer service should be a model. From sales to support, I could not ask for a more desirable experience. The product’s power matches the providers experience and support. Stellar! Five Star! Speechless! ” Mr. Courtney SwanagainIBusiness Strategist,Swanagain Elite Enterprises, USA
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
ABOUT ELITECORE
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Established in 1999
500+ Employees
ISO 9001:2000 certified company
Backed by World’s Largest Private Equity Group ($90bn)
Sales, Distribution Channel & Customers across 75+ countries
Communication - Networks – Security
- Cyberoam - Network to Endpoint Security
- CRESTEL - Telecommunication OSS BSS
- EliteAAA - Telecommunication
- 24online - Bandwidth Management Solution
About Elitecore TechnologiesAbout Elitecore Technologies
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
LET’S RECAP THROUGH SOME SCENARIOS
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 1Scenario 1
A Finance Company has offices at different cities Head Office: 150 Employees
Branch Offices: 15 Employees each
IT Managers’ Challenge: Wants to deploy security solution for their network
Wants to store all reports at central location
What solution will you recommend to the IT Manager?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 1: The SolutionScenario 1: The Solution
At Head Quarters
CR200i AV & AS
IPS for Mail Server
Web & App Filter
iView & CCC
At Branch Offices CR15wi
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 2Scenario 2
A Retail Marketing Company Head Office: 50 Employees
IT Managers’ Challenge: Wants marketing executives to have secured access to
their CRM
What will you recommend to the IT Manager?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 2: The SolutionScenario 2: The Solution
At Head Quarters
CR50ia SSL VPN
CRM Access to Marketing Executives
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 3Scenario 3
An Educational Institution 1500 Students accessing Internet
2 ISP Links with 50 Mbps bandwidth on each links
IT Managers’ Challenge:
Wants to grant user access based on profile.
Control access of unwanted & bandwidth guzzling websites
Games
Music
Youtube, Facebook
P2P
Load Balancing on both Links. No Auto Failover Available
Staff is getting lot of spam & virus infected emails.
Mail server gets listed in spam database due to student infected laptops sending 1000s of emails
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Solution: Scenario 3Solution: Scenario 3
At Head Quarters
2 x CR1500i for
redundancy One link for
Hosted Servers
Second for Internet Browsing
AV & AS for: Outgoing &
Incoming Mail traffic
CF For: Blocking Im’s,
P2P, Music etc.
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Scenario 4Scenario 4
A Small Company Head Office: 50 Employees
3 Remote Offices: 15 Employees
DSL Line Connectivity at all 4 Places
IT Managers’ Challenge: All remote offices need to be connected to main office securely
Every office has wifi connection
What will you recommend to the IT Manager?
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Solution: Scenario 4Solution: Scenario 4
Head office:
CR 50ia
All remote offices:
CR 15i
Dynamic DNS
Support
Site-to-Site VPN
Tunnel is established
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Comprehensive Network Security
Question/Answer Session