Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Cyberoam SSL VPN - Secure Remote Access Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Established in 1999. 500+ Employee Company. ISO 9001-2000 Certified. 55 Distributors covering 75+ countries. 30000+ combined installation of Unified Threat Management Central Console (CCC) Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Agenda of Presentation • The Business Need of SSL VPN • About Cyberoam SSL VPN • Product Walkthrough Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management The Business Need for SSL VPN Also, An Introduction to Virtual SSL VPN Appliances Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Secure, Remote Access is indispensable in today’s work environment Scenario 1: Employees and Mobile Workers Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Secure, Remote Access is indispensable in today’s work environment Scenario 2: Partners, Suppliers and Customers get Extranet access Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Solutions Comparison: When to use What? IPSec SSL VPN PPTP Use SSL VPN in Different Locations: Home, Airport, Hotels, cyber cafe L2TP Various Devices Ideal for a limited number of employees accessing corporate resources through clients on trusted devices laptops, home PC, PDA, mobile phone Extranet access to customers, partners, suppliers Web-enabled access – no need to install client on device Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management The Onset of Virtualization in SSL VPN… How is it done? Utilizing virtualization environments like VMware Building Virtual appliances within existing hardware Running a large number of independent, virtual SSL VPN gateways Implementing complex virtual datacenters so servers are consolidated across multiple physical servers Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management The Onset of Virtualization in SSL VPN… Benefits Multiple SSL VPN instances can run on one single appliance Appliance-wide or individual instances upgrades Optimum hardware resource allocation Resilience to hardware failure Increases deployment scalability Minimizes operating and maintenance costs Eco-friendly Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Business Advantages of SSL VPN Higher security due to 128-K Encryption and Authenticated Access Granularly restrict users to specific applications and resources Security checks on endpoint devices even before giving access Ease of Use Lower costs, Less Maintenance Least Admin intervention Access from any web-enabled device Minimum downtime Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management About Cyberoam SSL VPN Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Cyberoam SSL VPN – Secure Remote Access Cyberoam SSL VPN Different Devices Employees, Customers, Partners and guest users Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Internal Resources Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Cyberoam SSL VPN – How does it work? Client Certificate Server Certificate Username/Password Roaming User User gets a list of applications based on policies Cyberoam SSL VPN Servers (App./Web/FTP/File Share/WTS etc) All Published Applications/Resources Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Why choose Cyberoam SSL VPN? Identity-based Security Monitor user log-on activity including username, MAC address, IP address of endpoint Know “who is doing what” in the network Available as Virtualized Solution Available as virtual appliances Run a large number of independent virtual gateways from existing infrastructure Scalability and Performance Unlimited user license N+1 clustering with application load balancing Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Key Features Multiple Applications Support Microsoft Outlook, TCP, 802.11X and UDP, FTP, Citrix and Microsoft Terminal Servers and more Secure Firewall Traversal Works alongside existing firewalls Prevents exposure of UDP port ranges to hackers Does not publish internal IP address to outside network Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Key Features Authentication and Authorization Supports LDAP, AD, RADIUS etc. E-mail based user-provisioning Support for external two-factor& biometric authentication Access Mode Clientless VPN with a browser agent for seamless access to applications Linux, Windows, MAC support Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Key Features Device Profiling (Endpoint Security) Product checks – Anti-virus, Firewall & Anti-spyware Up to 1100+ products supported MAC address and IP address checks Quarantine policy for devices that fail profiling test Remediation information sent to user for any failed access e.g. updating anti-virus software, configuring firewall etc. Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Key Features Management Web-based and Command Line Insole Wizard-driven installation Role-based administration Monitor and disconnect live users Real-time status and monitoring Auditing & Logging Users logon activity including time of access, username, MAC address and IP address of endpoint Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Product Walkthrough Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Dedicated SSL VPN appliance Deployment Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Cyberoam SSL VPN Virtual Appliance No need to buy separate hardware!! Based on VMWare virtualization platform Install multiple virtual SSL VPN machines Cyberoam’s Virtualization platform, VMware allows virtual datacenters where servers are consolidated across multiple physical servers, for guaranteed efficiency and performance Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Virtual Appliance Deployment Diagram Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Bootstrap State ◦ Initial Installation Configuration state ◦ State where firmware upgrades, license upgrades, backup-restore can be performed (Involves downtime) Run State ◦ Resource configuration on-the-fly possible ◦ State in when users connect and access their resources Note: Appliance can be changed from Configuration state to Run State as and when needed or vice versa Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Create Users Create Groups Organize Users in Groups Register Applications Create Application Groups AD/LDAP Groups Endpoint Security Policies Organize applications into application groups Device Profiling Access Filters Access Control Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Create Policy Mandatory Profile Create Profile Quarantine Profile General Profile Select the Policies that apply for the Profile Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Pricing and Support Virtual Appliance Mode Dedicated Appliance Mode Concurrent user license (upgrade option Base License – Default 5 user license available e.g.50 to 100 user license available for 30 days FREE TRIAL upgrade) No Endpoint Security in Trial version Support Plans: 8X5 and 24X7 plans based on appliance + per user license Free Trial Download online with support + full access to all features Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Comparison of Cyberoam Dedicated Appliance Offerings CR-SSL-800 CR-SSL-1200 CR-SSL-2400 Supports 1-50 concurrent users Supports 51-250 concurrent users Supports 251-1000 concurrent users Secure, remote Intranet & Extranet access Secure, remote Intranet & Extranet access Secure, remote Intranet & Extranet access Designed For SMEs, MSSPs and more Designed For SMEs, large enterprises, MSSPs and more Designed For large global enterprises, MSSPs Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Summary Benefits for MSSPs New Revenue Opportunities: Global SSL VPN market at $500 million in 2008 (Source: Gartner) Support: 24X7 Support and monitoring Centralized Policy Management Continuous access Familiar, easy-to-use interface Cyberoam Virtual Appliances allow MSSPs to service multiple clients through shared allocation of hardware resources Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Summary Benefits for Organizations– Cyberoam SSL VPN Reduced costs: Centralized management, minimum admin intervention, timely support Protect your Investments: Use existing networks, firewalls, servers Trusted Remote Access: Extend access to regional offices, partners, customers, telecommuters, wireless users Continuous access: Provide reliable access 24X7 Increase employee productivity (Intranet portals, ERP) Partner access to internal applications (Partner Extranet) Eliminate risks of organizational resource access from cyber cafes, customer site etc. Apply Uniform security policy Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Cyberoam SSL VPN Virtual Appliance Free Trial… Register for a free online trial A fully functional Cyberoam product Free technical support No financial obligations Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Question/Answer Session Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy Cyberoam Cyberoam - Unified Threat Management Unified Threat Management Thank You Please visit us at www.secureone.com.my Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy