future is ready. are you?
DESCRIPTION
Future is Ready. Are You?. A Glimpse into the Future of networks…. Super Fast Internet. Data to move at 10 times current Internet speeds Google launched ‘Google Fiber’ service that offers a 1000 Mbps Internet service UK ISP, IDNet , launched 1000 Mbps Leased Line Business Ethernet Service. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/1.jpg)
Future is Ready. Are You?
![Page 2: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/2.jpg)
A Glimpse into the Future of networks…
![Page 3: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/3.jpg)
Super Fast Internet
• Data to move at 10 times current Internet speeds• Google launched ‘Google Fiber’ service that offers a
1000 Mbps Internet service• UK ISP, IDNet, launched 1000 Mbps Leased Line
Business Ethernet Service
1000 Mbps
1000 Mbps
![Page 4: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/4.jpg)
Device Explosion: Multiple Internet Access Devices per User
• Each device will have a unique IP address• Employee-owned smart devices to reach 350mn
by 2014, up from 150mn this yr• 1 Billion Smart Devices Shipped in 2011,
Expected to Double by 2016
![Page 5: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/5.jpg)
Cloud: Web Applications
• Critical business applications and Services moving to the Web
• Cloud Computing will generate more than $45.4 billion in revenue by 2015!
Critical business applications
CRM
ERP
Intranet
HR
Mobile Apps
Email Server
![Page 6: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/6.jpg)
Cloud: Explosion of Internet Applications
• Infinite applications on the Internet
Internet
![Page 7: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/7.jpg)
How will Organizations Gain?
With Network Connectivity & Productivity taking a leap, what about Security?
SECURITYCONNECTIVITY PRODUCTIVITY
![Page 8: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/8.jpg)
Can your Security keep pace?
• The New Network Infrastructure- SOHO /SMB network infrastructure is moving to Gigabit! - Anything less than Gigabit is nearly obsolete!- Does your security appliance have Gigabit ports?- Does any security vendor offer network security appliances with Gigabit
ports to these segments?
• Superfast Internet Speeds- Gigabit Internet speeds to be soon available from ISPs /Telcos- Can your security appliance match high Internet speeds?
- Does it offer Gigabit throughputs?
• Device Explosion- More devices per employee connecting to the IT network- Changing approach from ‘Users’ to ‘Devices’- Can your security appliance support more number of Devices?
![Page 9: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/9.jpg)
Can your Security keep pace?
• Explosion of Internet applications- Leading to ‘Application Chaos’!- What level of application control granularity does your Security offer?
• Critical business applications moving to Cloud- Internet-facing applications face risk of getting hacked- Does your security offer web application protection?
![Page 10: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/10.jpg)
No one wants SECURITY to become a bottleneck in their network!
![Page 11: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/11.jpg)
What can SOHO/SMBs do to prevent Security from becoming a bottleneck in progress?
Expand Security budgets to buy Enterprise security solutions
Or
IT Manager
Move to Future-Ready security appliances
![Page 12: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/12.jpg)
Presenting The Cyberoam NG series
The ‘Next-Generation’ appliances built for Future-ready Security in networks!
![Page 13: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/13.jpg)
Cyberoam NG series offers ‘Future-Ready’ Security
• The ‘Fastest UTM appliances’ for SOHO and SMB segments• Next-Generation Firewall protection for Large Enterprises!
• Offers Future-Ready security to:• SOHO, ROBO
• CR15iNG, CR25iNG, CR35iNG• Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG
• SMB• CR50iNG, CR100iNG
• Enterprise• CR2500iNG
![Page 14: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/14.jpg)
How Cyberoam NG series offers Future-Ready Security?
![Page 15: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/15.jpg)
Appliances starting with Gigabit Firewall Throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
![Page 16: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/16.jpg)
Best in class UTM throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
![Page 17: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/17.jpg)
Powerful Hardware for Future-Ready Security
• Superfast processing speed• A must for Gigabit Internet speeds!• Nano second security processing with Giga Hertz processors• Parallel security processing with Dual core
• Gigabit Ports to enable Gigabit Speeds• Gigabit Ethernet for future SOHO & SMB networks• Higher port density
![Page 18: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/18.jpg)
Complete overhaul of appliance design to provide Future-Ready Security
• Next-Gen Fast Memory• Larger memory size for Enterprise-grade security • DDR3 RAM for more number of data transfers per clock cycle• Faster, Next-Gen memory for higher I/O throughput
• High Capacity Storage• Today, higher throughput leads to more activities, generating more data.
– More storage for more reports– Reports stored for longer duration
• Superior Quality for High Performance and Robustness• Design & components supporting high speed I/O throughput• Designed to protect against power surge & fluctuations• Industrial grade components to withstand extreme environments
![Page 19: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/19.jpg)
Wi-Fi Security appliances for SOHO/ROBO networks
• Faster performance, broader coverage with 3x3 MIMO Technology• Dual band support: 2.4 GHz or 5 GHz• Higher performance by aggressively transmitting and
receiving data over Wi-Fi channels• Faster handling of video streaming and high bandwidth
downloads• High performance integrated security over WLAN
• Secures wireless networks to the extent of wired networks
![Page 20: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/20.jpg)
The NG Series-Loaded with All-New Firmware
![Page 21: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/21.jpg)
The most Intelligent and Powerful Cyberoam firmware
• Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance
• Better use of Multicore architecture for Parallel processing • Optimize workload distribution across cores• Lockless path for packet forwarding
– A single core handles packets for each connection at any given time to avoid inter-locks
• Optimize Interrupt rates for minimum CPU overhead and latency• High rate of interrupts - A bottleneck in high-speed data
transfers• FastPath packets to improve processing speed and reduce CPU
overhead
![Page 22: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/22.jpg)
The NG Series-Interactive, Easy to use, All-new GUI
![Page 23: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/23.jpg)
![Page 24: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/24.jpg)
![Page 25: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/25.jpg)
![Page 26: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/26.jpg)
![Page 27: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/27.jpg)
Confidential. For internal use onlyCyberoam Technologies Pvt. Ltd.
![Page 28: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/28.jpg)
The need for Next Generation Security features…
![Page 29: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/29.jpg)
The need to be more application-layer aware than ever before
• Explosion of Internet Applications• Need to control which applications are important to
business and run on network
Internet
![Page 30: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/30.jpg)
NG series offers Advanced Application Controls
![Page 31: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/31.jpg)
Take complete control over applications running on your network
![Page 32: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/32.jpg)
Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls
VoIPBitTorrentCRM ERP
IM ApplicationWebmail
Internet
Medium Quality
High Quality
Low Quality Control over
![Page 33: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/33.jpg)
Granular classification of applications
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Application Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Application Technology
Browser Based
Client Server
Network Protocol
P2P
![Page 34: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/34.jpg)
Proactive Protection Model
• Easy selection of filtering criteria by administrator• Technology, Risk Level, Characteristics
• Set action – regardless of application name• Allow or Deny
• Allow/Block all future applications included for respective criteria
• No administrator intervention needed to add new applications to policy
![Page 35: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/35.jpg)
The increasing need to protect Web Applications from hackers
• Legacy business applications moving to the Web • Firewalls/IPS cannot protect Web application from
unknown threats
Critical business applications
CRM
ERP
Intranet
HR
Mobile Apps
Email Server
![Page 36: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/36.jpg)
NG series offers On-Appliance Web Application Firewall
![Page 37: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/37.jpg)
On-Appliance Web Application Firewall
• No need to buy dedicated WAF appliance• Protect Web Servers and Web Applications from hackers
• Prevents hackers from exploiting Web-Application Vulnerabilities• Positive protection model and No Signature Tables• Intuitive website flow detector automatically adapts to website changes• Protects against OWASP top 10 vulnerabilities
![Page 38: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/38.jpg)
The ever increasing need for identity awareness and granular controls
• Increasing instances of insider threats• Increasing need to implement acceptable use
policies to greater granularity at user and group level• Binding service access and network usage to user
Identity to enhance user productivity• Tracking end user activities with logs, reports and
forensic ability to comply to regulatory needs
![Page 39: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/39.jpg)
NG series offers Layer 8 granular Identity-based Security
![Page 40: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/40.jpg)
Cyberoam’s Layer 8 (Identity-based) security
User Login
Cyberoam Authenticates
• User Name• IP Address• MAC Id• Session Id
Cyberoam Authorizes
• Internet surfing quota• Schedule control• Security Policies• Web Filtering• Application Visibility & Control• QoS / Bandwidth Management• IM Controls
Cyberoam Audits
• Identity - based Logs + Reports • Compliance Reports
Control over staff network activities• Who can connect to the network• Who can access what• What have they accessed
Ability to track the user activities; identify attackers /victims
Take quick network security decisions
![Page 41: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/41.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
NG series offers First-of-its-kind
On-Appliance Reporting
![Page 42: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/42.jpg)
First-of-its-kind On-appliance reporting
• Eliminates the need to purchase a dedicated reporting solution• 1000+ indepth reports
• Real time visibility into user and network activities• Logs and Reports help organizations with
• Security management• Compliance Management• Forensic Analysis
• Reports include dynamic and animated reports, in-line graphs, country maps
![Page 43: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/43.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
• Graphical overview of Data transfer and Risk level
Country Maps for Source/Destination TrafficCountry Maps for Source/Destination Traffic
![Page 44: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/44.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
![Page 45: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/45.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Security Dashboard
![Page 46: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/46.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Security Dashboard
Others: Rest of recordsN/A: Private IP
![Page 47: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/47.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Application ReportsApplication Reports
![Page 48: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/48.jpg)
Support for new Connectivity Technologies – 4G/ LTE
![Page 49: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/49.jpg)
Support for new Connectivity Technologies – 4G /LTE
• Makes organizations ready for high speed future• Easy deployment for high speed Internet connection
• Simple USB modem plug-in into Cyberoam appliance• Ensures business connectivity
• Automatic fail-over to 4G/LTE WWAN connection• Gateway failover over VPN
• VPN over 4G/LTE
4G3G
![Page 50: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/50.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security FeaturesSecurity Features
Fusion Technology-driven SI Firewall- Interface for achieving Unified Security
Virtual Private Network (VPN) - Threat-free remote access- Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN
![Page 51: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/51.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Threat Protection FeaturesThreat Protection Features Intrusion Prevention System
- Maximum security against emerging threats- Identity-based IPS policies per user or group- 3500+ signatures – broadest security cover
Gateway Anti-Virus, Anti-spyware- Prevents blended threats- 4 million+ signatures- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
Gateway Anti-Spam- Real-time, most accurate spam protection- Recurrent Pattern Detection (RPD) technology- Scans SMTP, POP3, IMAP traffic
Outbound Spam Protection- Protecting service providers against Outbound Spam
![Page 52: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/52.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security FeaturesSecurity Features
Web & Content Filtering- Complete Visibility & Control over HTTP & HTTPS- 82+ categories and 44 million+ URLs
Bandwidth Management- Enhanced network performance and productivity- Bandwidth policy on a combination of User, Application,
Category (application & web), allowing great flexibility and real L2-L8 visibility and control
Multi-Link Management- For an ‘always-on’ network- Support for more than 2 ISP links- Supports Wireless WAN- Gateway failover over VPN
![Page 53: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/53.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security FeaturesSecurity Features
Instant Messaging & Control- Identity-based controls for Yahoo messenger and
Windows Live Messenger- Controls who can chat with whom, file transfer, webcam
‘IPv6 Ready’ Gold Logo
![Page 54: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/54.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam features assure Security, Connectivity, ProductivityCyberoam features assure Security, Connectivity, Productivity
Organizations cannot afford to compromise on any of these.The right SCP balance is essential!
![Page 55: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/55.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Product RangeCyberoam Product Range
Securing the IT network
Centralized security management for remote /branch offices & clients
Network Monitoring & Analysis
Secure Internet surfing for home users
Unified Threat Management
& Open Source
![Page 56: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/56.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Recognized as ‘Visionary’ in the Gartner UTM MQRecognized as ‘Visionary’ in the Gartner UTM MQ
2012Magic Quadrant for Unified
Threat Management
![Page 57: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/57.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Proven track record of InnovationProven track record of Innovation
“One innovative solution to growth and extensibility requirements has been adding an abstraction layer – a sort of Layer 8 on the open systems interconnection (OSI) model – that allows connection of names. This could be users, domains and more. This allows greatly improved granularity of system administration.”
NASSCOM INNOVATION AWARD
2011
![Page 58: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/58.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam IntroductionCyberoam Introduction
Sales, Distribution Channel and Customers across 125+ Countries
Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group
Technology Powerhouse
450+ Employees
Patent-pending Identity-based Management
Amongst the top 3 global players for UTM features
![Page 59: Future is Ready. Are You?](https://reader038.vdocuments.site/reader038/viewer/2022102809/56813144550346895d97c0aa/html5/thumbnails/59.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank You!