Cyberoam USP (PT-BR)
-
Upload
vitor-nakano -
Category
Technology
-
view
242 -
download
1
Transcript of Cyberoam USP (PT-BR)
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam
Next Generation Security
Our Products
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Next Generation Security Appliance
(Hardware & Virtual)
Vitor Nakano
PreSales Manager
Cel: 011 98509-3505
Skype: vinakano
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Tecnologia Powerhouse
550+ Funcionários
Vendas, canal de distribuição e clientes em todo +125 Países
Entre os 3 melhores UTM do mundo em recursos de
segurança de rede
Gestão de usuários baseada em identidade com patente pendente
Introdução Cyberoam
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Segurança de rede
Gerenciamento de
segurança
centralizada
Relatórios de redes e
ameaças
Soluções Cyberoam
Segurança para home
users Modem Router
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Appliances para Segurança de Rede – UTM, NGFW
(Hardware & Virtual)
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam Next-Generation Security
Core NGFW
Segurançaem
Camada 8Firewall
Filtro de Aplicação
Filtro web e de conteúdo
IPS VPN
Gerenciamento de Banda/QoS
Relatórios
Gateway Anti-Virus
Gateway Anti-Spam (Inbound/outbound)
Wireless Security
Web Application Firewall
Gerenciamentode multiplos
linksSuporte a 3G/4G
Características do UTM
Suporte IPv6
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam Next Generation security appliances offer…
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Poderoso Hardware
Multicore Gigahertz processors for
Nano second security processing
Gigabit Ports to integrate with
Gigabit network
Cyberoam Architecture
Intelligent Firmware
Tight integration with
Hardware
Network & Crypto
Acceleration
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Appliances de segurança de alto desempenho
Modelo de entrada oferece
throughput Gigabit firewall para
pequenos escritórios e filiais
Top CR2500iNG-XP Oferece
Firewall Throughput: 60 Gbps
NGFW Throughput: 8 Gbps
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Inovação Cyberoam : Segurança em Camada 8
Cyberoam trata a Identidade do
usuário como camada 8
Cyberoam UTM oferece segurança
da camada 2 até a camada 8
usando politicas baseadas em
identidade
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Appliance UTM
Cyberoam
Auditoria
• Identity–based
Logs + Reports
• Compliance
Reports
Cyberoam
Autoriza
• Internet surfing quota
• Schedule control
• Security Policies
• Web Filtering
• Application Visibility
& Control
• QoS / Bandwidth
Management
• IM Controls
Cyberoam
Autentica
• Nome
• IP Address
• MAC Id
• Session Id
Users
Clientes
Funcionários
Gerentes
Parceiros
Identidade Baseada em AAA
Controle das atividades dos
usuário Quem pode conectar à rede
• Quem pode acessar o que
• O que eles têm acessado
Capacidade de rastrear as
atividades dos usuários;
identificar ataques / vítimas
Tomar decisões rápidas
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
192.168.3.110
Ancy
192.168.3.105
RichardInternet
Corporate LAN
DHCP
Administrator
Aplica políticas de segurança baseadas
em identidade real de usuários.
Regras específicas para vários usuários
compartilhar um endereço IP comum
192.168.3.110
Steve
Segurança baseada em identidade
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Priorize o controle das aplicações
Aplicações infectadas e Bloqueados
Internet
Tráfego aplicação
Appliance Cyberoam
Visibilidade Controle
worms Spyware
Gerenciamento banda
indesejável
Crítico para o negócio
Redes Sociais
Não Crítico
Logs & Reports
Controles com base na identidade do usuário, Tempo, Aplicação e largura de banda
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Technology
Browser Based
Client Server
Network Protocol
P2P
Category
File Transfer
Gaming
General Internet
Instant Messenger
Infrastructure
Network Services
P2P
Proxy and Tunnel
Remote Access
Streaming Media
VoIP
Mobile Applications
Social Networking
Web Mail
And more…
Classificação de aplicações
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
proteção pró-ativa:Elimina a necessidade de intervenção manual dos administradores para atualizar políticas e
para novas aplicações
Classificação de aplicações
Selecione
aplicações P2P
Bloquea todas as futuras aplicações P2P
sem a necessidade adicionar de
aplicativos manualmente
Definir as ações
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Visibilidade em tempo real das atividades dos usuário e da rede
Descoberta de tráfego
Visibilidade em tempo real da utilização de banda por usuário, protocolos das
aplicações
Log e Reporte
Gerenciamentode
Segurança
AnáliseForense
ProteçãoDe
Dados
Gerenciamentode
Conformidade
1200+
Reportes
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Layer-8 User-based Reports
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Layer-8 User-based Reports
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Traffic Dashboard
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Dual Dashboard – Traffic & Security Dashboard
Security Dashboard
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Application Reports
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Compliance Reports
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Interactive World Traffic Map
Interactive World Traffic Map for Source and Destination traffic
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Traffic Discovery
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Traffic Discovery
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Firewall Stateful Inspection
Segurança Unificada
Firewall de Aplicação
Identidade baseada em Firewall
Controle de entrada/saída de
tráfego para um país específico
Tecnologia FastPath
- Melhor velocidade de processamento e
reduz a sobrecarga da CPU
Politicas de
segurança
Políticas de
conectividade
Políticas de
produtividad
e
Regrasde
Firewall
Segurança Unificada
• Regras para todos os recursos de
firewall em uma página
• Navegação fácil
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Regras para todos os recursos a partir da página de
Firewall
Identificação
Segurança
Produtividade
Conectividade
+
+
+
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Intrusion Prevention System
- Camada 8
- Identidade baseados em políticas IPS por grupo, usuários e endereço IP
- Permite diversas políticas IPS
- alerts & reports
- 4500+ assinaturas - cobertura ampla em segurança
Anti-Spam (Inbound/Outbound)
- Três niveis de scan:
IP Reputation filtering
Real-time Blackhole List (RBL)
Tecnologia Recurrent Pattern Detection (RPDTM)
- 98% de datecção de spam
- Self-service Sumário quarentena e Spam
- Scans SMTP, POP3, IMAP traffic
- Virus outbreak detection para proteção zero-hora
DoS & DDoS Protection
- Proteção contra ataques flood
- SYN Flood
- TCP Flood
- UDP Flood
- ICMP Flood
- Assinatura IPS para evitar ataques
- Anomalia de protocolo
Gateway Anti-Virus, Anti- spyware
- +4 milhões de assinaturas
- Scan Bi-directional: Web & Email
- Self-service para quarentenas de Virus
- Scan HTTP, FTP, SMTP, POP3, HTTPS, IMAP e tráfego IM
- Visibilidade instantânea para Ataque/Vítima
Recursos de Proteção para Amaças
Atualização constante via
Cyberoam Security Center
Central de
Segurança
Cyberoam
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Firewalls/IPS não podem proteger uma aplicação web de ameaças desconhecidas
Web Application Firewall (WAF)
Traditional
Firewall
Web &
Application
ServerDatabase
Server
Organization's IT networkUnauthorized
access blocked
Custo EficazNão há necessidade de comprar
hardware dedicado WAF
Fácil de implantarNão necessita de nenhuma
alteração na configuração
Cyberoam UTM oferta
proteção WAF
WAF protecção no Cyberoam UTM
Protege web-apps e servidores web
de hackers
Modelo de proteção Positiva e não
base de assinaturas
Intuitivo detector de sites, se adapta
automaticamente às mudanças do
site
Protege contra aplicativos da Web
e Vulnerabilidades(www.owasp.org)
Monitora & Reporta
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Suporte para IPSec, L2TP,
PPTP, SSL VPN
Tecnologia Threat Free
Tunneling (TFT)
Clientes VPN suportados
MacOS
iOS
Dispositivos Android
IPSec VPN
L2TP VPN
PPTP VPN
iOS
L2TP VPN
Android
Virtual Private Network (VPN)
SSL VPN
-Licença gratuita
- Verifica na VPN tráfego de Malware, Spam,
Conteúdo impróprio, Tentativas de invasão
Recursos avançados para continuidade
dos negócios
MPLS failover para VPN
- VPN failover
Clientes móveis VPN
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Blocked
Websites
HTTP
/HTTPS
Website
HTTP /
HTTPS
Web & Content Filtering
Allowed
Websites
HTTP/
HTTPS
Web
2.0
Web
2.0
cache
pages
cache
pages
Embedded
URLs
Embedded
URLs
Malware
hosting
sites
Malware
hosting
sites
Banco de dados de URL mais abrangente
+ 100 milhões URLs em + 89 categorias
Controla o acesso a HTTP/HTTPS
Bloqueia o cache do Google
Bloqueia URLs
Detecta e Bloqueia sites de tunelamento
Filtros de Web 2.0
Web
2.0
Bloqueia Sites de hospedagem de malware
Proxy
&
Tunneling
sites
Proxy&
Tunneling
sites
Internet
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Gerenciar a produtividade, controlar o acesso a sites indesejados
Banco de dados web On-appliance
Acesso mais rapido
Controle de vazamento de dados
Bloqueia upload de arquivos em páginas da web
Ajuda a atender às exigências de conformidade
Evita a perda de produtividade com abordagem
Personalize as mensagens bloqueadas para educar os usuários
sobre as políticas corporativas
“YouTube para escolas”for Educational Institutes Permite o acesso a conteúdo
educacional
Bloqueia todo o conteúdo
impróprio, periféricos, tais como
anúncios, comentários e links
Web & Content Filtering
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Políticas de banda baseados UserUserUser/Users
groupUser/Users
groupFirewall RuleFirewall Rule
Web Category
Web Category
ApplicationApplication
O Melhor para Gerenciamento de Banda/ QoS
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Crie política de largura de banda para:
Usuário, Grupos de usuários/Departamento
Aplicações ou Categoria de aplicações
Categoraias Web
Permite grande flexibilidade e real visibilidade em L2 – L8
Compartilha largura de banda
Schedule largura de banda
O Melhor para Gerenciamento de Banda/ QoS
• Compartilhar a largura de banda não
utilizadaComprometimento de Banda• Aloca banda dedicada
CEO Manager ERP System
5 mbps 2 mbps 8 mbps
Manager
2mbps
Employee 2
2mbps
Employee 1
2mbps
Employee 2
3mbps
Employee 1
3mbps
Marketing
Group
6mbpsQuando o
usuário
não está
conectado
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
High Availability
- Active-Active & Active-Passive
- Reduces single-point-of-failure
- Maximizes network uptime
- Ensures continuous network security
Multiple Link Management with Automated Load Balancing
- Multiple WAN and WWAN (3G/4G, WiMax) link management with multiple failover
conditions
- Active-Active and Active-Passive Auto Link Failover
- Gateway failover over VPN
Business Continuity Features
ISP2(5 mbps)
Sales Dept.
Dev. Dept.
Finance Dept.
ISP1(10 mbps)
MPLS
ISP3 (3G)(3 mbps)
Failover LinkOrganization's IT network
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Layer 8 Policy-based Routing
- Routes traffic based on Source IP addresses, Protocols & Users
- Assures QoS for key users and applications
Business Continuity Features
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
High performance, integrated security over WLAN
- Secures wireless networks to the extent of wired networks
Faster performance, broader coverage with 3x3 MIMO Technology
- Dual band support: 2.4 GHz or 5 GHz
Multiple Virtual Access Points
Layer 8 over WLAN
- Identity-based policies in dynamic IP environment
- MAC-based filtering
- Supports IP-address pool
Enhances security
Wireless (WLAN) Security
Internet
Marketing
Engineering
Sales
File server
ADS
ERP
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Prevent the risk of IT administrator from misusing privilege of
tracking user activities
2 people: Authorizer and Administrator
- Authorizer consent required for the Administrator to view user-specific activities
Safeguard user privacy – 4-Eye Authentication
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Needed for hotspots, airports, hotels, corporate offices
Default group can be created for guest users
Sending Internet access credentials using SMS for guest users
SMS (Text-based) Authentication
Airports
Hotels
SMS for Guest users
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
FleXi Ports for flexible network connectivity
Combination of Fixed Ports and Flexible Ports
Flexibility to choose Copper, Fiber 1GbE / 10GbE modules
Modules can be purchased individually as per need
Fixed Copper GbE Ports
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Organizations cannot afford to compromise on any of these.The right SCP balance is essential!
Cyberoam features assure Security, Connectivity, Productivity
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Web
Support
Chat
Support
Support
Phone
Support
Customer Support System
• Appliance Registration and Upgrade• Subscribe security features• Create support tickets• Request RMA
• Support available across all time zones
• Global Support Excellence - ITIL compliance (ISO 20000)
Knowledge
base
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Web
Support
Chat
Support
Support
Partner Support System
• Ordering & Inventory management• Sales & Marketing tools &
resources• Presales Support• Track Appliance/Subscription
Knowledge
base
Region specific dedicated Technical Account Managers (TAM)
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam Network Security Appliance Product Range
Hardware appliances
UTM, Next Generation FirewallVirtual security appliances
CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C
NGFW for Large EnterprisesCR2500iNG, CR2500iNG-XP
CR1500iNG-XP, CR1000iNG-XP
CR750iNG-XP, CR500iNG-XP
UTM for Small and Medium EnterprisesCR300iNG-XP, CR200iNG-XP
CR300iNG, CR200iNG,
CR100iNG, CR50iNG
UTM for Small and Remote OfficesCR35wiNG, CR35iNG,
CR25wiNG, CR25iNG,
CR15wiNG, CR15iNG
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Dubai
Head Office
New York
Branch Office
Mumbai
Branch Office
Boston
Branch Office
Cyberoam
Cyberoam
Cyberoam
Cyberoam
Cyberoam Central Console (CCC)
CCC is for centralized, integrated management and
monitoring of Cyberoam network security devices
- Offers complete control over distributed networks from
head office (H.O.) or Security Operations Center (S.O.C.)
of MSSPs
Available as
- Hardware CCC Appliances, Virtual CCC Appliances
Cyberoam Central Console (CCC)
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Servers
Firewalls
IDP / IPS
SwitchesRouters
UTM / NGFW
Applications
Desktop systems
Logs & Events
Identity
Logging Reporting
Compliance
Management
Forensic
Analysis
Log
Management
Security
Management
Cyberoam iView – Logging and Reporting
Ability to log and report
activities from various
devices/vendors Available as Open Source software
Appliance
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
CCC & iView
CCC appliances iView – Logging & Reporting
CR-iVU200
CR-iVU100
CR-iVU25
Hardware CCC appliances
CCC15, CCC50, CCC100,
CCC200, CCC500, CCC1000
Virtual CCC appliances
CCCV15, CCCV50, CCCV100,
CCCV200, CCCV500
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Desenvolvendo competências com Dispositivos de segurança Cyberoam Next Generation
CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)
CYBEROAM CERTIFIED TRAINER (CCT)
CYBEROAM CERTIFIED NETWORK & SECURITY PROFESSIONAL (CCNSP)
Treinamento & Certificação
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Cyberoam Threat Research Labs (CTRL)
Identify emerging
threats and zero-day
vulnerabilities
Post vulnerabilities
to global bodies
Release
signatures
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Certificações
UTM Level 5:
Cyberoam holds a unique &
complete UTM certification
Anti-SpywareAnti-VirusFirewall VPN
IPS/IDPAnti-Spam URL Filtering
PremiumPremium Premium
ICSA Certified
High-Availability
ICSA Certified Firewall
VPNC Certified for Basic
VPN & AES Interoperability
Cyberoam achieves
Common Criteria
EAL4+ Certification
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Reconhecido como "visionário" no Gartner UTM MQ
2009
2010
2012
2009Magic Quadrant for SMB
Multifunction Firewalls
2010Magic Quadrant for Unified
Threat Management
2012Magic Quadrant for Unified
Threat Management
2013Magic Quadrant for Unified Threat Management
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Educação Saúde Telecom
GovernoFinanceiro Industria
Clientes pelo Mundo
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Hoteis
Clientes pelo Mundo
Serviços
Outros
IT/BPO & Media
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
Cyberoam Demo on-line
Get a 30 day FREE Evaluation of
Cyberoam Virtual appliance
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Thank youContact: [email protected]