Cyberoam Virtual UTM

62
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserv Securing You Cyberoam Virtual UTM Our Products Unified Threat Management

description

Cyberoam Virtual UTM. Our Products. Unified Threat Management. Different Stages Virtualization Implementation. Already Implemented In Process In Planning. Benefits. Virtualization Strategy: Data Center. Simplify server management Reduce infrastructure costs - PowerPoint PPT Presentation

Transcript of Cyberoam Virtual UTM

Page 1: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM

Our Products

Unified Threat Management

Page 2: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Different Stages Virtualization ImplementationDifferent Stages Virtualization Implementation

Already Implemented In Process In Planning

Page 3: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Virtualization Strategy: Data CenterVirtualization Strategy: Data Center

Simplify server management

Reduce infrastructure costs

Reduce physical server sprawl

Reduce power consumption

Implement scalable system to cater for future growth

Benefits

Page 4: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Workstation virtualization- Transform single host server into workgroup of multiple users

Reduce infrastructure costs

Centralized control

Works in a BYOD scenario

Benefits

Virtualization Strategy: Office in a BoxVirtualization Strategy: Office in a Box

Page 5: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Getting office into a box : Enterprise scenarioGetting office into a box : Enterprise scenario

Corporate office

Branch office 1

Branch office 2

Page 6: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Virtualization – You Gain Some, You Lose SomeVirtualization – You Gain Some, You Lose Some

Page 7: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Scanning InterVM traffic- Cannot scan Inter-VM traffic with externally based security hardware- A single compromised virtual machine can infect the entire data center

Risk of attacks on Hypervisor management console Hypervisor & GuestOS

Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control

- Tying service access and network usage to user Identity

Security hardware cannot offer inline protection- Traffic flows are invisible; creating blindspots in network- Cannot conduct forensic analysis and display compliance

Security challenges in VirtualizationSecurity challenges in Virtualization

Need of virtual security solution for virtual environmentNeed of virtual security solution for virtual environment

Page 8: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – Solving Virtual ProblemsCyberoam Virtual UTM – Solving Virtual Problems

Page 9: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Resides on the Virtual layer Scans all traffic inside virtual environment

Cyberoam Virtual applianceCyberoam Virtual appliance

VM2

AppsApps

Linux OSLinux OS

VM1

Windows OS

Windows OS

AppsApps

VM3

Other OSOther OS

AppsApps

Cyberoam Virtual UTM appliance

Hardware

Hypervisor

Best-of-breed security• Stateful inspection firewall• Intrusion Prevention System• Gateway Antivirus• Anti-spyware and Anti-spam• Web filtering• Application Visibility & Control• Web Application Firewall (WAF)• Virtual Private Network• Logging & Reporting• Layer 8 Identity-based security

Best-of-breed security• Stateful inspection firewall• Intrusion Prevention System• Gateway Antivirus• Anti-spyware and Anti-spam• Web filtering• Application Visibility & Control• Web Application Firewall (WAF)• Virtual Private Network• Logging & Reporting• Layer 8 Identity-based security

Page 10: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management

console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports

Security in a Virtual Data CenterSecurity in a Virtual Data Center

Page 11: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Scenario: Security in a Virtual Data CenterScenario: Security in a Virtual Data Center

Internet

administrator

Cyberoam vUTMvSwitch

vSwitch

vSwitch

Page 12: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Scenario: Enterprise/ MSSP Security in a BoxScenario: Enterprise/ MSSP Security in a Box

BO/Customer 1

BO/Customer 3

BO/Customer 2

BO/Customer n

Complete Virtual Security solution

Page 13: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

MSSP Scenario1: MSSP + Hosting Services ProviderMSSP Scenario1: MSSP + Hosting Services Provider

administrator

Cyberoam vUTM

vSwitch

Customer 2

InternetCyberoam vUTM

vSwitch

Customer 1

Cyberoam vUTM

vSwitch

Customer 3

vSwitch

vSwitch

vSwitch

Cyberoam vUTM

vSwitch

vSwitch

Central Console & Logging /Reporting

Page 14: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

MSSP Scenario2: On-premise deploymentMSSP Scenario2: On-premise deployment

On-premise deployment

Internet

administrator

Cyberoam vUTM

vSwitch

vSwitch

MSSP

At Customer premise

Page 15: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

MSSP Scenario3: ISP as an MSSPMSSP Scenario3: ISP as an MSSP

vUTM - Customer 1

vUTM – Customer 2

vUTM – Customer 3

Customer 1

ISP

Customer 2

SwitchR3

R1

R2

R4

Internet

Page 16: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more

Access control for users- Tying service access and network

usage to user Identity

Provides multiple security features on single appliance

Cyberoam protects Virtual Office or ‘Office in a box’Cyberoam protects Virtual Office or ‘Office in a box’

Page 17: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Scenario: Office-in-a-box setupScenario: Office-in-a-box setup

administrator

Cyberoam vUTM

vSwitch

vSwitch

LAN

LaptopRepurposed PC

Thin Client

Switch

Internet

Switch

Page 18: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam offersCyberoam offers

Protection for virtualized networks - Protects hypervisor management console, hypervisor & Guest OS- Scan Inter-VM traffic- Secure zero trust networks

Comprehensive Security- Consolidate multiple security features on single virtual appliance- Secures virtual networks to the extent of physical networks

Ease to deployment- Offers flexibility to allot number of vCPUs- Easy to upgrade with simple activation key

Page 19: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam offersCyberoam offers

Compliance Management- Segregates and secures traffic and data between and around virtual entities to

help stay regulatory compliant- Display compliance with indepth on-appliance reports

Centralized Management for Virtual & Physical appliances- Centrally manage physical and virtual infrastructure using single interface with

CCC (Cyberoam Central Console) Available as Virtual CCC and Hardware CCC

- Ensure centralized, consistent and quick security actions across your network

Page 20: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Virtualization platforms SupportedVirtualization platforms Supported

VMware ESX/ESXi 3.5/4.0/4.1/5.0 VMware Workstation 7.0 or 8.0 VMware Player 3.0 or 4.0

Page 21: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM appliance modelsCyberoam Virtual UTM appliance models

Offering Licensing

CRiV-1C Supports upto 1vCPU

CRiV-2C Supports upto 2vCPU

CRiV-4C Supports upto 4vCPU

CRiV-8C Supports upto 8vCPU

CRiV-12C Supports upto 12vCPU

Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.

Page 22: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam’s Security PortfolioCyberoam’s Security Portfolio

Software

Page 23: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Take Control of Your Security Infrastructure with CyberoamTake Control of Your Security Infrastructure with Cyberoam

Take Control of - WHAT you want?- HOW MUCH you want?- HOW you want?

Page 24: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Virtual UTM - WorkflowVirtual UTM - Workflow

Page 25: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

ContentContent

Introduction – Cyberoam Virtual UTM Cyberoam Virtual UTM – Trial

- Order- Registration

Cyberoam Virtual UTM – Upgrade- Order- Apply Upgrade

Resources

Page 26: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

IntroductionCyberoam Virtual UTM

Page 27: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – CRiV SeriesCyberoam Virtual UTM – CRiV Series

Platform support:

- VMware ESX/ESXi 4.0/4.1/5.0

- VMware Workstation 8.0/9.0

Base Configuration Required:

- One vCPU

- 1GB vRAM

- 3 vNIC

- Primary Disk with 4GB size

- Report Disk with 80GB size

- 1 Serial Port

- 1 USB Port

Page 28: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Subscriptions

Cyberoam Virtual UTM appliance range

CRiV-TR(30days Trial)

CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12CCRiV-UNL

Supported vCPU 32 1 2 4 8 12 32

IPS ● ○ ○ ○ ○ ○ ○

Gateway Anti-Spam ● ○ ○ ○ ○ ○ ○

Gateway Anti Virus ● ○ ○ ○ ○ ○ ○

Outbound Spam Protection ● ○ ○ ○ ○ ○ ○

Web and Application Filter ● ○ ○ ○ ○ ○ ○

Web Application Firewall ● ○ ○ ○ ○ ○ ○

Support ●(8x5)

○(8x5/24x7)

○(8x5/24x7)

○(8x5/24x7)

○(8x5/24x7)

○(8x5/24x7)

○(8x5/24x7)

● Available ○ Optional

Cyberoam Virtual UTM SubscriptionCyberoam Virtual UTM Subscription

Page 29: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – TrialCyberoam Virtual UTM – Trial

Page 30: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – Trial Order

Page 31: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Steps For Customer

Page 32: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Visit www.cyberoam.com & Click on “Try & Buy”

STEP01

Customer

Page 33: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam sales team forwards customer lead to respective partner

STEP02

Customer

Page 34: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial

Steps For Partner

Page 35: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Visit https://partner.cyberoam.com

STEP01

Partner

Page 36: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You STEP02

Partner

Page 37: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You STEP03

Partner

Page 38: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer

Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner

Page 39: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – Trial Registration

Page 40: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Steps For Customer

Continued

Page 41: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Visit https://customer.cyberoam.com

Existing Customers Login to Customer Portal

Existing Customers Login to Customer Portal

New Customers create account and Login with credentials

New Customers create account and Login with credentials

STEP03

Customer

Page 42: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You STEP04

Customer

Page 43: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Enter Trial Appliance Key and other details

Enter Trial Appliance Key and other details

STEP05

Customer

Page 44: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Email to customer confirming registration of virtual appliance

STEP06

Customer

Page 45: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Email to customer with steps to download Virtual UTM appliance

STEP07

Customer

Page 46: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Download Virtual UTM OVF Download Virtual UTM OVF

Install Cyberoam Virtual UTM(Refer Installation Guide for reference)

Install Cyberoam Virtual UTM(Refer Installation Guide for reference)

STEP08

Customer

Page 47: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Click on Registered appliance key to see appliance information

Click on Registered appliance key to see appliance information

STEP09

Customer

Page 48: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You STEP10

Customer

Page 49: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – UpgradeCyberoam Virtual UTM – Upgrade

Upgrade from Trial to Full Version

Upgrade to Higher model

Upgrade from Trial to Full Version

Upgrade to Higher model

Page 50: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – Upgrade Order

Page 51: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Customer places an order with partner to Buy Full Version or

Upgrade Model

Customer provides Previous Appliance Key to Partner (Trial

appliance key or old appliance key) along with the order

Page 52: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Steps For Partner

Page 53: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

STEP01

STEP02

STEP03

Visit https://partner.cyberoam.com

Page 54: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Partner shares Cyberoam Virtual UTM Upgrade Key with the customer

Cyberoam Team sends Virtual UTM Upgrade Key to Partner

Page 55: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Cyberoam Virtual UTM – Apply Upgrade

Page 56: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Steps For Customer

Page 57: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

From the Menu select “License upgrade” From the Menu select “License upgrade”

Login to Virtual UTM’s CLI Console Login to Virtual UTM’s CLI Console

STEP01

Customer

Page 58: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

From the Menu select Purchased Model No. From the Menu select Purchased Model No.

STEP02

Customer

Page 59: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

On successful activation previous appliance expires and new registered appliance is shown in customer portal

On successful activation previous appliance expires and new registered appliance is shown in customer portal

Enter Upgrade Key to activate the purchased appliance Enter Upgrade Key to activate the purchased appliance

STEP03

Customer

Page 60: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

ResourcesResources

Page 61: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

ResourcesResources

Cyberoam Virtual UTM – CRiV Series Installation Guide

Cyberoam Virtual UTM – CRiV Series Upgrade Guide

Page 62: Cyberoam Virtual UTM

www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Securing You

Thank you