MSSP - Cyberoam

advertisement
To offer Telecom Customers :
CONNECTIVITY
PRODUCTIVITY
SECURITY
Network Connectivity, Productivity & Security with Cyberoam
Offer
Cyberoam Introduction
Technology Powerhouse – Founded in 1999
800+ Employees
Backed by World’s Largest PE Investor ($90bn); The Carlyle Group
Sales, Distribution Channel and Customers across 110+ Countries
Amongst the top 3 global UTM players in terms of features
Patent Pending Identity-based Management
MNC Clientele
FEW CUSTOMER ACQUISITIONS (2011-12)
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC)
Carlson Suites, USA (150 x CR15i )
Indian Army, India (50 x CR500ia, CR200i with CCC)
National Stock Exchange. India (240 x CR50ia with CCC)
LYDEC, Morocco ( Multiple CR’s)
Ministry of Justice, Morocco, (84x CR1000ia)
Casablanca Stock Exchange, Morocco (4 x 500ia)
Iran Postal Services, GCC, (44 x CR200i)
Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC)
BTT Bank, GCC, (30 X CR300i)
Abu Dhabi Government, Abu Dhabi (4 x CR1500ia)
Giordano, UAE/Saudi, (50 x CR25ia)
Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC)
Ministry of Interior, Italy, (8 x CR1500ia, CCC)
Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC)
Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia)
British Aid, Kenya (6 x CR1500ia)
And Many More….
Imperial Logistics, South Africa (20 x CR15i)
Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO
2.5 Years in North Africa!
 Revenue grew 60% YOY
 500+ success deployments
 Conducted 30 CCNSP & 7 CCNSE trainings
 14+ CCSC Trainings
 200+ CCNSPs on ground
 Number of end client focused events & seminars
 Successful Penetration in all the verticals.
North African Clientele
And Many More….
Typical Requirements of MSSP
 Providing best quality of services to clients with
least effort and cost
- Provide higher coverage of managed security services
- Centralized control of client network’s security without
allocating dedicated resources for each client
 Rapid deployment at client site without
interrupting client operations
 Easy Policy setting, Modification, Monitoring
Performance, Reacting to situations in time
 Pro-active security management
Typical Requirements of MSSP
 Have a system that
Is simple to configure and manage
Helps meet the SLA’s
Help customers to display compliance
 Ability to offer flexible security plans to clients
 Ability to offer easy system upgrade alternative
for growing businesses
Be an MSSP in 3 Simple Steps
1
2
3
Use Cyberoam UTM (Internal
Network)
Sell Cyberoam UTM
Manage Cyberoam with CCC/ VCC/ CCMS
Cyberoam Solution for MSSP
Network Security
Centralized security
Management
Network Monitoring &
Analysis
Securing Home users
Cyberoam UTM – Layer 8 Technology
Layer 8 security in DHCP environment
Corporate LAN
DHCP
192.168.3.105
192.168.3.110
Richard
Steve
Ancy
Administrator
Internet

Applies security policies based on actual
identity of users.

User-specific rules for multiple users to
share a common IP address
Cyberoam’s Layer 8 (Identity-based) security
Identity-based AAA
Users
Employees
Management
Cyberoam
Authenticates
Cyberoam
Authorizes
Cyberoam
Audits
• User Name
• IP Address
• MAC Id
• Session Id
• Internet surfing quota
• Schedule control
• Security Policies
• Web Filtering
• Application Visibility &
Control
• QoS / Bandwidth
Management
• IM Controls
• Identity–based
Logs + Reports
• Compliance
Reports
Customers
Partners
Control user network activities
• Who can connect to the network
• Who can access what
• What have they accessed
Ability to track the user activities;
identify attackers /victims
Take quick network security
decisions
Cyberoam UTM Features are :
 Fusion Technology driven SI Firewall
- Interface for achieving Unified Security
 Intrusion Prevention System
- Maximum security against emerging threats
- Identity-based IPS policies per user or group
- 3500+ signatures – broadest security cover
 Gateway Anti-Virus, Anti-spyware
- Prevent blended threats
- 4 million+ signatures
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
Other Cyberoam UTM Features are :
 Virtual Private Network (VPN)
- Threat-free remote access
- Threat Free Tunneling (TFT) Technology
- IPSec, L2TP, PPTP and SSL-VPN
 Multi-Link Management
- For an ‘always-on’ network
- Support for more than 2 ISP links
- Supports Wireless WAN (3G USB modems, WiMax)
- Gateway failover over VPN
Other Cyberoam UTM Features are :
 Gateway Anti-Spam
- Real-time, most accurate spam protection
- Recurrent Pattern Detection (RPD) technology
- Scans SMTP, POP3, IMAP traffic
 Outbound Spam Protection
- Protecting service providers against
- Outbound Spam
 iView: Intelligent logging & reporting
- Real-time visibility into network activities
- On-appliance reporting. LAYER 8 - Identity-based
reporting
- 1200+ reports
Other Cyberoam UTM Features are :
 Instant Messaging & Control
- Identity-based controls for Yahoo messenger and
Windows Live Messenger
- Control who can chat with whom, file transfer, webcam
 Bandwidth Management
- Enhance network performance and productivity
- Application and Identity-based bandwidth allocation
Other Cyberoam UTM Features are :
 3G/WiMAX Connectivity
- Secure, Uninterruped WAN Connectivity
- Configure Wireless WAN as primary or back-up link
 ‘IPv6 Ready’ Gold
 Web & Content Filtering
- Complete Visibility & Control over HTTP & HTTPS
- 82+ categories and 44 million+ URLs
Cyberoam UTM – One Stop Solution !!!
Multiple security features over single appliance
UTM appliance range Segment wise & Network size
Large
Enterprises
CR 2500iNG, CR1500ia,
CR1500ia-10F
CR1000ia, CR1000ia-10F
CR750ia, CR750ia-1F/10F
CR500ia, CR500ia –
RP/1F/10F
Small to Medium
Enterprises
Small and
Remote Offices
CR200i, CR300i,
CR100iNG, CR50iNG
CR35wiNG, CR35iNG,
CR 25wiNG – 6P, CR 25iNG –
6P, CR25wiNG, CR25iNG,
CR15wiNG, CR15iNG
Subscriptions Bifurcations
Basic Appliance
Subscriptions







 Gateway Anti-Virus
Identity-based Firewall
VPN
Free SSL-VPN
Bandwidth Management
Multiple Link Management
On Appliance Reporting
Basic Anti-Spam
(RBL Service)
 Gateway Anti-spam
 Web & Application Filtering
 Intrusion Prevention System (IPS)
 Web application firewall
 8x5 Tech support & Warranty
 24 x 7 Tech Support & Warranty
Cyberoam UTM – Subscriptions
Enables MSSP to offer flexible service packages to their customers
Customers with individual security needs:
-
Gateway Anti-Virus Subscription
(Anti-malware, phishing, spyware protection included)
Anti-Spam
Web & Application Filtering Subscription
Intrusion Prevention System Subscription
Advanced Subscriptions include:
-
Web Application Firewall (WAF) Subscription
Outbound Spam Protection Subscription
Support Subscriptions
-
8x5 support
24x7 support
Cyberoam UTM – Bundled Subscriptions
For customers not having mail server in their network
Security Value Subscription (SVS) / SVS Plus*
 Gateway Anti-Virus Subscription
(Anti-malware, phishing, spyware protection included)
 Web & Application Filtering Subscription
 Intrusion Prevention System (IPS)
 8x5 Tech Support & Warranty
For customer having mail server in their network
Total Value Subscription (TVS) / TVS Plus*
 Gateway Anti-Virus Subscription
(Anti-malware, phishing, spyware protection included)
 Gateway Anti-Spam Subscription
 Web & Application Filtering Subscription
 Intrusion Prevention System (IPS)
* SVS Plus and TVS Plus offers additional 24x7
 8x5 Tech Support & Warranty
support service to SVS and TVS services
Cyberoam UTM – Advance Subscriptions
For customers having web server in their network
Web Application Firewall (WAF) Subscription
 Protection to corporate websites and web-based applications such as
CRM, ERP, MIS, Payment Gateway and others
 Website Flow Detector technology
 OWASP Top 10 web application vulnerabilities
For Service Providers to protect them from Outbound spam
Outbound Spam Protection Subscription
 Unique feature with Cyberoam UTM
 Scanning with Recurrent Pattern Detection (RPD) Technology
 Detection of Outbound Spam which is a part of global outbreak
 Near 98% spam detection
 False Positive rate of 1 in a million
CCC – Cyberoam Central Console
 Centralized integrated management and monitoring appliance
 Helps Managed Security Service Providers (MSSP) to manage and
monitor their multiple Cyberoam installations centrally
Ease and flexibility of management
 Easy grouping of Cyberoam UTM appliances
- Based on geography, Cyberoam UTM models, firmware, organizations
(for MSSPs) and service subscriptions
- Dynamic views in CCC help in managing, searching and sorting
appliances
- Customizable and multiple dashboards
Ease and flexibility of management
Group of UTM Appliances
Based on Geography
Based on Appliance Models
Based on Client
Appliance Discovery
Automatically discover new unmanaged Cyberoam UTM appliances and add just
with one click
Easy, instant security policy enforcement
 Simplified security management
- Centralized policy creation and
implementation for all Cyberoam UTM
features
 Leads to uniform adoption of security
practices across offices
 Establish policies based on workprofiles across offices
- Subscription and signature updates for
Cyberoam UTM features like Gateway
Anti-Virus, Anti-Spam, etc.
- Protection against zero-hour threats
Easy, instant security policy enforcement
Add UTM appliances
Client based grouping of UTM
appliances
Easy, instant security policy enforcement
Configure UTM appliance from CCC
Easy, instant security policy enforcement
Update configuration of UTM appliances
Easy Signature Distribution
Security against misuse of administrator privileges
 Role-based administration privileges
- For CCC appliance
- Individual Cyberoam appliances
- Groups of Cyberoam UTM appliances
Role based administration privileges
CCC Access profiles
Profiles considered: VPN Administrator, Security Administrator, Global
Administrator
Role based administration privileges
CCC rights per access profile (example of VPN administrator rights)
Role based administration privileges
CCC admin users
Role based administration privileges
Access to each UTM appliance
Audit logs & alerts for organization-wide security visibility
 Logs and views of administrator actions as well as dispersed UTM
appliances
- Instant security visibility
- Supports regulatory compliance
- Investigative analysis
- Keeping track of historical activity
 Email alerts
- Based on expiry of subscription modules, excess disk usage, IPS and
virus threat counts, unhealthy surfing hits, etc.
- Alert configuration on various parameters like excessive CPU usage,
spam mail count, virus count, etc.
Audit logs and alerts for greater security visibility
CCC Logs
Audit logs and alerts for greater security visibility
Cyberoam UTM appliance logs
Audit logs and alerts for greater security visibility
Alert configuration
Audit logs and alerts for greater security visibility
Email Alert
Cyberoam’s Centralized Management Solution available as:
Hardware Appliance
Virtual CCC (VMWare
Supported)
Cloud Computing Managed
Services
Hardware CCC Appliance

Dedicated appliance for centralized management

Manage from 15 to 1000 Cyberoam UTM appliances
Virtual CCC Appliance

VMware based CCC Virtual appliances

Server-based Virtual environment and Workstationbased Virtual environment

Eliminate need for dedicated hardware, reduce cost
of ownership, simplify future upgrades for users
Cyberoam’s On-Cloud Management Service (CCMS)
Group: Customer1

Managed security services hosted on
Cyberoam’s Cloud - MSSPs don’t need to

Abu Dhabi
Dubai
Sharjah
invest in core SoC
Customer
Customer account management,
Appliances
customer appliance monitoring and
management from the web portal

MSSP engineer can offer services to
clients from anywhere without being
present at the SoC

MSSP can maximize their revenue with
recurring business
MSSP Network
Group: Customer2
Abu Dhabi
Dubai
Sharjah
CCC Benefits

Real-time protection against newly identified threats

Complete control over distributed networks from central location

Quick policy setting and security management

Lower operational cost, complexity and time to maintain dispersed client
networks

Enables MSSPs to have different personnel for managing distributed
Cyberoam UTM appliances for quick, error-free security management
Cyberoam offers
First-of-its-kind
On-Appliance Reporting
First-of-its-kind On-appliance reporting
 Eliminates the need to purchase a dedicated reporting
solution
- 1200+ indepth reports
 Real time visibility into user and network activities
 Logs and Reports help organizations with
- Security management
- Compliance Management
- Forensic Analysis
 Reports include dynamic and animated reports, in-line
graphs, country maps
Interactive World Traffic Map
Interactive World Traffic Map for Source and Destination traffic
Dual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
Dual Dashboard – Traffic and Security Dashboard
Security Dashboard
Application Reports
Compliance Reports
Cyberoam Deployment for MSSP
Group: Customer1
Abu Dhabi
Dubai
Sharjah
Group: Customer2
Abu Dhabi
Dubai
Sharjah
FTTx Network
(GPON Technology)
Group: Customer3
Abu Dhabi
Dubai
Sharjah
MPLS
Network
Customer
Appliances
DSL or Wi-Max
Cyberoam Central Management
Hardware/Virtual/Cloud
MSSP Network
Taking a look at each steps in MSSP operations
 Client Requirement Identification
 Deployment & Testing
 Remotely managing Security of client setup
 Reporting & Compliance Management
Cyberoam can help MSSP at each step
Client Requirement Identification
 Based on number of users
 Cyberoam UTMs available for various size of organizations
 Security requirement of client
 Individual or bundled subscriptions
Deployment & Testing
 Rapid client site deployment through pre-configured Deployment Kit
 Cyberoam’s industry standard design easily fits in to client’s existing
infrastructure
Cyberoam Deployment Kit
Remote Security Management
 Real-time visibility of client’s network with alerts
 Multiple ways of remotely monitoring and managing client networks
 Hardware appliance
 VMware based virtual appliance
 Cloud based centralized management
Reporting and Compliance Management
 Centrally manage logging and reporting of multiple client sites
 Generate reports for each client
 Comply to industry standard compliances as per client needs
Update
 Protect client’s network against latest threats
 Automatic subscription and signature updates
Cyberoam After Sales Services
Before Purchase
After Sales:
• 24x7 to
Resellers
• 8x5 to
Enduser
While Installation
After Sales:
• On Chat
• On Email
• On Phone
Presales Team Structure
Cyberoam Global Presales Team
Rest of World (ROW)
(ANZ, APAC, ME, EU,
LATAM, AFRICA)
North America &
Canada
SAARC
Dedicated Technical Account Manager (TAM) for every region
Customer Engineer Team (CE)
Presales Support for Partner
24x7 AVAILABILITY
EMAIL: AFRICAPARTNERS@CYBEROAM.COM
CHAT: HTTP://WWW.CYBEROAM.COM/PRESALESSUPPORT
PHONE: +1-877-777-0368 (TOLL FREE)
KNOWLEDGE Base for Partners :
For How To’s, FAQ’s, Release Notes
http://kb.cyberoam.com
Post-sales Support for Customer’s
 Post-sales Support
- Email
- Chat
- Telephone: Toll Free
Post-sales
Support
Training & Certification Programs for Partner
Developing competencies with Cyberoam UTM appliances
CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP)
CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)
CYBEROAM CERTIFIED TRAINER (CCT)
West Africa Telecom, Liberia (MSSP)
GLO – Nigeria’s Largest Telco
Cobranet – Nigeria (MSSP)
Busy Internet – Ghana (MSSP)
Netcom – Nigeria (MSSP)
Vodacom – Tanzania Biggest Telco
SimbaNet – Tanzania
SimbaNet – Kenya (MSSP)
Access Kenya – Kenya (MSSP)
CS Lox Info – Thailand (MSSP)
TRUE – Thailand ISP (MSSP)
CAT – Thailand (MSSP)
Baltnetos – Lithuania (MSSP)
DootAll – Netherlands (MSSP)
Mobile 8 – Indonesia (MSSP)
MTDS – Morocco
AIRLINK – Morocco
& many more..
NOT TO FORGET
2012
Magic Quadrant for Unified
Threat Management
“Cyberoam maintains a high level of loyalty from its channel partners.”
Source: Gartner MQ 2011
2012: Rated #3 in UTM market in terms of Competeness of Vision
Host of Awards / Certifications
Premium
Anti-Virus
Anti-Spyware
Anti-Spam
Premium
URL Filtering
Firewall
VPN
IPS/IDP
UTM Level 5: Cyberoam holds a unique & complete UTM certification
ICSA Certified Firewall
IPv6
Ready
Member of
Internet Watch
Foundation
ICSA Certified
High-Availability
VPNC Certified for Basic VPN
& AES Interoperability
Authorised Distributor in North Africa
Config Tunisia
Cyberoam National Distributor
Morocco | Tunisia | France
Switzerland | Algeria
Tel : +216 71 792 802
Fax : +216 71 792 611
Email: config.tunisie@config.tn
Next Step IT
Cyberoam Preferred Reseller
Tel: + 216 71 90 60 41
Fax: + 216 71 90 60 43
Email: h.maalaoui@it-nextstep.com
Questions?
Yashesh Vaishnav
Regional Manager
Cyberoam
www.cyberoam.com
Email: yashesh.vaishnav@cyberoam.com
Download