View
6
Download
0
Category
Preview:
Citation preview
In to d a y ’s In fo rm a tio n age, n eed fo r c o n tin u o u s in tern et
c o n n ec tiv ity c a n n o t b e d en ied . A s a n in d iv id u a l u s er o r a s
a n em p lo y ee in y o u r o rga n iz a tio n , b len d ed th rea ts a re
w a itin g to a tta c k YOU b y id en tify in g o n e v u ln era b le
m o m en t w h en y o u r d efen s es a re lo w . T h es e c a n b e
v iru s es , m a lw a re, s p a m , T ro ja n s a n d in s id er a tta c k s lik e
d a ta th eft a n d lea k age. S ec u rin g YOU – th e U s er, th u s
b ec o m es c ritic a l! H o w d o y o u en s u re c o n tin u o u s s ec u rity
aga in s t s o p h is tic a ted IT s ec u rity th rea ts ?
Cy b ero a m ’s id en tity -b a s ed s ec u rity s o lu tio n s c a n s ec u re
y o u r ev ery m o v e a t w o rk , a t h o m e a n d w h ile y o u tra v el –
fro m th e n etw o rk ga tew a y to th e en d p o in ts . It b in d s
s ec u rity w ith y o u r id en tity a n d w o rk s a s y o u r p riv a te
s ec u rity gu a rd , ev en w h en y o u a re a w a y fro m w o rk o r a t
h o m e. Its en d p o in t s ec u rity p ro tec ts y o u r s en s itiv e d a ta
b y s ec u rin g y o u r en d p o in ts , s to rage d ev ic es a n d
c o n tro llin ga p p lic a tio n s .Elitecore Product
Se c u rin g Y o u
w w w .c y b ero a m .c o m
S e c u r i n g Y o u
www.ostindia.com
C y b e r o a m 's Id e n t it y -B a s e d S e c u r it y A d v a n t a g e s
Id en tifies a n d c o n tro ls u s ers th ro u gh id en tific a tio n ,
p o lic y -s ettin ga n d rep o rtin gb y u s ern a m e.
Offers s ec u rity ev en in d y n a m ic IP en v iro n m en ts lik e
D H CP a n d W i-F i.
A llo w s b in d in g o f u s er id en tity w ith IP a d d res s , M A C Id ,
S es s io n Id to p rev en t u n a u th o riz ed n etw o rk a c c es s .
A llo w s rea l-tim e th rea t c o n tro l th ro u gh id en tity -b a s ed
rep o rtin g o n u s age a n d th rea t p a ttern s o f in d iv id u a l
u s ers .
F a c ilita tes regu la to ry c o m p lia n c e fo r H IP A A , P CI-D S S ,
GL BA , CIP A , etc . w ith o n -a p p lia n c e rep o rtin g o f w h o is
a c c es s in g w h a t ,s h o rten in ga u d it a n d rep o rtin gc y c les .
C y b e r o a m 's F u t u r e -r e a d y A r c h it e c t u r e
Cy b ero a m 's M u lti-c o re tec h n o lo gy o ffers h igh s ec u rity
w ith o u t c o m p ro m is in g o n p erfo rm a n c e b y a llo w in g
p a ra llel p ro c es s in g o f m u ltip le s ec u rity fea tu res ,
th erefo re a llo w in g effec tiv e m a n agem en t o f d y n a m ic ,
c o n ten t-b a s ed th rea ts s u c h a s W eb 2.0 a p p lic a tio n s ,
Vo ic e o v er IP,s trea m in gm ed ia ,IM a n d P 2P.
Cy b ero a m U T M 's Ex ten s ib le S ec u rity A rc h itec tu re (ES A )
is b u ilt o n a n ex ten s ib le p la tfo rm th a t c a n o rga n ic a lly
gro w w ith fu tu re s ec u rity n eed s o f th e o rga n iz a tio n .
S u c h a n a p p ro a c h h a s th e agility to p ro lo n g th e life a n d
p erfo rm a n c e o f th e lega c y U T M a p p lia n c e b y s u p p o rtin g
f u t u re fe a t u re e n h a n c e m e n t s , f o r w h ic h t h e
d ev elo p m en t c a n b e d o n e v ery ra p id ly a n d w ith
m in im u m d ep lo y m en t effo rt.User Identity-based Security Policy Controls
Cyberoam UTM offers security acrossLayer 2-Layer 8 using Identity-based policies
Cyberoam's Layer 8 Technologytreats “User Identity” as the 8thLayer in the protocol stack
ApplicationPresentationSessionTransport
NetworkData LinkPhysical
USERL7L8
L6L5L4
L3L2L1
00-17-BB-8C-E3-E7
192.168.1.1
TCP, UDP
L2TP, PPTP
ASCII, EBCDIC, ICA
Cy b ero a m U n ified T h rea t M a n agem en t a p p lia n c es o ffer
c o m p reh en s iv e s ec u rity to s m a ll, m ed iu m a n d la rge
en terp ris es th ro u gh m u ltip le s ec u rity fea tu res in tegra ted
o v er a s in gle p la tfo rm . It is th e firs t U T M th a t em b ed s u s er
id en tity in th e firew a ll ru le m a tc h in g c riteria , o fferin g in s ta n t
v is ib ility a n d p ro a c tiv e c o n tro ls o v er s ec u rity b rea c h es a n d
elim in a tin gd ep en d en c e o n IP A d d res s es .
Cy b ero a m 's u n iq u e L a y er 8 tec h n o lo gy trea ts U S ER a s th e
8th la y er in th e n etw o rk s ta c k . A ls o k n o w n a s th e H u m a n
la y er, it p en etra tes th ro u gh ea c h o f Cy b ero a m 's s ec u rity
m o d u les , a llo w in g o rga n iz a tio n s to c rea te u s er id en tity -
b a s ed s ec u rity p o lic ies . T h is o ffers th em c o m p lete v is ib ility
a n d c o n tro l o v er u s er a c tiv ities , s h o w in g w h o is d o in g w h a t
a n y w h ere in th e n etw o rk a n d en a b les th em to ta k e n etw o rk
s ec u rity d ec is io n s b a s ed o n u s ern a m es a n d n o t ju s t IP
a d d res s es .
Cy b ero a m 's id en tity -b a s ed s ec u rity o ffers a h igh d egree o f
gra n u la rity , m a k in g p o lic y -s ettin g a n effic ien t p ro c es s
d o w n to th e u s er lev el th a t c a n b e ex ten d ed to a n y
c o m b in a tio n o f gro u p , jo b fu n c tio n o r a p p lic a tio n . T h e IP -
in d ep en d en t n a tu re o f Cy b ero a m a llo w s u s ers to c a rry th eir
o w n a c c es s righ ts a n d p o lic ies a n y w h ere in th e n etw o rk ,
ev en in d y n a m ic IP en v iro n m en ts lik e D H CP a n d W i-F i.
Cy b ero a m 's L a y er 8 tec h n o lo gy a d d s s p eed to th e w h o le
s ec u rity s et-u p b y o fferin g a d m in is tra to rs in s ta n t
v is ib ility in to s o u rc e o f a tta c k s , en a b lin g th em to id en tify
a tta c k er/v ic tim s b y u s ern a m e a n d a c h iev e im m ed ia te
rem ed ia tio n to a n y s ec u rity b rea c h c o n d itio n .
Cyberoam Identity-based Unified Threat Management
SME50ia , 100ia , 200i, 300i 500ia , 750ia , 1000ia , 1500ia
500ia -1F / 10F / R P, 750ia -1F / 10F ,1000ia -10F , 1500ia -10F
Enterprises15w i,15i, 25w i, 25ia , 35w i, 35ia
Small Offices
Identity-based Security PoliciesLayer 8 Technology
INTRUSION PREVENTION SYSTEM
MULTIPLE LINK MANAGEMENT
WEB & APPLICATION FILTERING
WEB APPLICATION FIREWALL
BANDWIDTH MANAGEMENT
GATEWAY ANTI-MALWARE
GATEWAY ANTI-SPAM
STATEFUL INSPECTION FIREWALL
VIRTUAL PRIVATE NETWORK-VPN
ON-APPLIANCE REPORTING
www.ostindia.com
Cy b ero a m U T M o ffers s ec u rity w ith o u t c o m p ro m is in g o n c o n n ec tiv ity a n d p ro d u c tiv ity . It o ffers a c o m b in a tio n o f b es t-o f-b reed
a s s em b ly o f s o lu tio n s o v er a s in gle in terfa c e, res u ltin g in a c o m p lete, d ep en d a b le s h ield th a t n etw o rk th rea ts fin d ex trem ely
d iffic u lt to p en etra te.
Cyberoam UTM Features Assure Security, Connectivity and Productivity
T e c h n ic a l B e n e fit s F in a n c ia l B e n e fit s B u s in e s s B e n e fit s
R e a l tim e p ro te c tio n a g a in s t a ll
In te rn e t-b a s e d Th re a ts , in c lu d in g
b le n d e d a n d in te r n a l th re a ts
R a p id d e p lo y m e n t
M in im a l c o n fig u ra tio n
N e x t-g e n e ra tio n GU I e n h a n c e s
s e c u rity w ith its e a s y n a v ig a tio n a n d
c u s to m c o n tr o ls
Lo w c a p ita l e x p e n s e
Lo w o p e ra tio n a l e x p e n s e
H ig h e r R O I
Sa fe b u s in e s s e n v ir o n m e n t
Co n tr o l o v e r le g a l lia b ility
En h a n c e d p ro d u c tiv ity
M e e ts re g u la to ry c o m p lia n c e re q u ir e m e n ts
Cy b ero a m Cen tra l Co n s o le (CCC) is a c en tra liz ed s ec u rity
m a n agem en t a p p lia n c e th a t a llo w s en terp ris es a n d
M S S P s to m a n age m u ltip le, d is p ers ed Cy b ero a m U T M
in s ta lla tio n s a c ro s s rem o te o r b ra n c h o ffic es a n d c lien ts
res p ec tiv ely , o fferin g th e flex ib ility o f h a rd w a re CCC
a p p lia n c es a n d v irtu a lCCC a p p lia n c es .
CCC s im p lifies s ec u rity m a n agem en t b y en a b lin g
c en tra liz ed p o lic y c rea tio n a n d im p lem en ta tio n ,
s u b s c rip tio n a n d s ign a tu re u p d a tes fo r Cy b ero a m U T M
a p p lia n c es d ep lo y ed a t b ra n c h o ffic es a n d c lien t o ffic es
fo r a ll U T M fea tu res lik e F irew a ll, In tru s io n P rev en tio n
S y s tem , A n ti-Viru s s c a n n in g, a n d m o re, a llo w in g rea l-
tim e p ro tec tio n aga in s t z ero -h o u r th rea ts a n d red u c in g
res p o n s e tim e aga in s t n ew ly id en tified th rea ts .
CCC p ro v id es M S S P s a n d En terp ris es th e flex ib ility to
gro u p Cy b ero a m U T M a p p lia n c es d ep lo y ed a c ro s s
v a rio u s o ffic es b a s ed o n geo gra p h y, Cy b ero a m U T M
m o d els , firm w a re v ers io n , o rga n iz a tio n (fo r M S S P ) a n d
s erv ic e s u b s c rip tio n fo r th eir q u ic k m a n agem en t. W eb
2.0-b a s ed GUI o ffers d y n a m ic v iew s o n th e d a s h b o a rd
fo r ea s y m a n agem en t,s ea rc h a n d s o rtin go f a p p lia n c es
Security Management - Instant Enforcement ofSecurity Policies
Flexibility of Management
b y firm w a re v ers io n s , a p p lia n c e m o d els a n d a ll a p p lia n c es .
Orga n iz a tio n s c a n a ls o s o rt a p p lia n c e v iew s o n th e d a s h b o a rd
w ith c u s to m iz a b le s elec tio n c riteria o f s o rtin g.
CCC en a b les en terp ris es a n d M S S P s to s et ro le-b a s ed
a d m in is tra tio n fo r CCC h a rd w a re a n d v irtu a l a p p lia n c es a s w ell
a s in d iv id u a l Cy b ero a m U T M a p p lia n c e a n d fo r gro u p s o f
Cy b ero a m U T M a p p lia n c es .
T h e CCC L o g View er o ffers lo gs a n d v iew s o f a d m in is tra to r
a c tio n s o n CCC a s w ell a s d is p ers ed U T M a p p lia n c es . Em a il
a lerts c a n b e s et b a s ed o n ex p iry o f s u b s c rip tio n m o d u les ,
ex c es s d is k u s age, IP S a n d v iru s th rea t c o u n ts , u n h ea lth y
s u rfin gh its a n d o th er p a ra m eters .
Security against Misuse ofAdministrator Privileges
Audit Logs &Alerts
CCC Hardware Appliance Range
CCC Virtual Appliance Range :
:
CCC for VM w a re Server-based Virtual Environment
CCC for VM w a re Workstation-based Virtual Environment
CCC1 5, CCC50, CCC1 00, CCC200, CCC500, CCC1 000
CCC VM S 1 5, CCC VM S 50, CCC VM S 1 00, CCC VM S 200
CCC VM W 1 5, CCC VM W 50, CCC VM W 1 00,CCC VM W 200
Cyberoam Central Console (CCC) - Centralized Management
Security Connectivity Productivity
Employee Productivity
IT Resource Optimization
Administrator Productivity
- Content Filtering- Instant Messaging Archiving & Controls
- Bandwidth Management- Traffic Discovery- Application Layer 7 Management
- Next-Gen UI
Network Security
Content Security
Administrative Security
- Firewall- Intrusion Prevention System- Wireless security
- Anti-Virus/Anti-Spyware- Anti-Spam- HTTPS/SSL Content Security
- Web Application Firewall
- Next-Gen UI- iView- Logging & Reporting
Business Continuity
Network Availability
Future-ready Connectivity
- Multiple Link Management- High Availability
- VPN- 3G/WiMAX Connectivity
- “IPv6 Ready” Gold Logo
Awards & Certifications
S e c u r i n g Y o u
www.check-mark.com 2008 - Emerging Vendor of the Year
CERTIFIEDVPNC
InteropBasic
AESInterop
CERTIFIEDVPNC
SSL AdvancedNetwork Extension
SSL BasicNetwork Extension
SSLJavaScript
SSLFirefox
SSLExchange
SSLPortal
PROP C
R E C O M M E N D E D
RECOMMENDS
BEST BUY
E D IT O R ’SC H O I C E
w w w .itp r o .c o .u k
T h e Cy b ero a m iView a p p lia n c e s eries o ffers v is ib ility in to
a c tiv ity w ith in th e o rga n iz a tio n fo r h igh lev els o f s ec u rity , d a ta
c o n fid en tia lity a n d regu la to ry c o m p lia n c e. It p ro v id es a n
o rga n iz a tio n -w id e s ec u rity p ic tu re o n a s in gle d a s h b o a rd
th ro u gh c en tra liz ed rep o rtin g o f m u ltip le d ev ic es a c ro s s
geo gra p h ic a l lo c a tio n s . T h is en a b les o rga n iz a tio n s to a p p ly
o r c o rrec t s ec u rity p o lic ies fro m a c en tra l lo c a tio n , en h a n c in g
s ec u rity .
It a llo w s effo rtles s , id en tity -b a s ed lo g m a n agem en t in n ea r
rea l-tim e. Orga n iz a tio n s c a n m a tc h u s er id en tity -b a s ed
in fo rm a tio n c o n ta in ed in lo gs w ith th eir righ ts a n d p riv ileges
to rev ea l d is c rep a n c ies in u s er a c tiv ities .
A q u ic k gla n c e a t th e iView d a s h b o a rd , its d rill-d o w n rep o rts
a n d id en t it y -b a s ed lo ggin g a n d re p o r t in g en a b le s
o rga n iz a tio n s to in s ta n tly lo c a te n etw o rk a tta c k s , th eir
s o u rc e a n d d es tin a tio n ,a llo w in gra p id a c tio n .
iView elim in a tes c o m p lia n c e c o m p lex ities w ith a o n e-s tep
a c c es s to c ritic a l in fo rm a tio n w ith m u ltip le rep o rts o n a s in gle
d a s h b o a rd th a t c a n b e d rilled d o w n to get th e th ird -lev el o f
in fo rm a tio n . Orga n iz a tio n s c a n ea s ily m o n ito r a c c es s a n d
s ec u rity v io la tio n s in th e n etw o rk , a c c elera tin g in c id en t
res p o n s e a n d fa c ilita tin gc o m p lia n c e.
iView h elp s o rga n iz a tio n s rec o n s tru c t th e s eq u en c e o f
ev en ts th a t o c c u rred a t th e tim e o f s ec u rity b rea c h th ro u gh
iView lo gs a n d rep o rts . T h ey c a n red u c e th e c o s t o f
in v es tiga tio n a n d a n a ly s is a n d m in im iz e n etw o rk d o w n tim e
w h ile ga th erin gh is to ric a l in fo rm a tio n .
Log Management
Security Management
Compliance Management
ForensicAnalysis
V IE W
Cyberoam T M
Cyberoam iViewIntelligent Logging andReporting Solution Cyberoam NetGenie
Cy b ero a m NetGen ie p ro v id es a s a fe In tern et ex p erien c e a n d
a d d res s es u n m et In tern et n eed s o f H o m e a n d S m a ll Offic e
s egm en ts . It p ro v id es m u ltip le fea tu res o n a s in gle a p p lia n c e
lik e p re-s et W i-F i s ec u rity , a d v a n c ed In tern et c o n tro ls , In -b u ilt
A n ti-Viru s , In tru s io n P rev en tio n S y s tem , In tern et s h a rin g o v er
3G m o d em d ev ic e,a n d W i-F i s ec u rity o v er m u ltip le d ev ic es .
Cy b ero a m NetGen ie in h o m es en a b les
p a ren ts to p ro v id e age-w is e In tern et
a c c e s s t o c h ild r e n a n d b lo c k
u n s a fe/a d u lt In tern et c o n ten t a lo n g
w ith m o n ito rin g th eir In tern et a c tiv ities
in rea l tim e. NetGen ie's s c h ed u le-
b a s ed In tern et c o n tro ls a llo w p a ren ts to c o n tro l w h en th eir
c h ild ren c a n v is it s p ec ific w eb s ite c a tego ries lik e s o c ia l
n etw o rk in g, w eb m a il a n d a p p lic a tio n s lik e S k y p e, Ga m es .
NetGen ie p ro tec ts h o m e w ireles s n etw o rk s aga in s t v iru s es
a n d h a c k ers o v er a ll In tern et-a c c es s d ev ic es lik e d es k to p s ,
la p to p s ,a n d s m a rtp h o n es u s ed to s u rf th e In tern et a t h o m e.
Cy b ero a m NetGen ie in s m a ll o ffic es
o ffers c o n tro ls o v er w h a t em p lo y ees
c a n a c c es s o v er th e In tern et to en s u re
h igh p ro d u c tiv ity in o ffic es . NetGen ie
o ffers a s ec u re W i-F i o ffic e n etw o rk
a n d p ro te c ts th e In tern et-a c c es s
d ev ic es lik e c o m p u te r s , ta b le t s ,
s m a rtp h o n es fro m v iru s es a n d h a c k ers w h en o n lin e. It
p ro v id es s ec u re a c c es s to rem o te res o u rc es lo c a ted a t
b ra n c h o r c en tra l o ffic es w ith Virtu a l P riv a te Netw o rk fea tu re.
Cyberoam NetGenie HOMESmart Wireless Router withFamily Protection
Cyberoam NetGenie SOHOUnified Threat Management
www.ostindia.com
Recommended