Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN - Secure Remote Access
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam





Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Established in 1999.
500+ Employee Company.
ISO 9001-2000 Certified.
55 Distributors covering 75+ countries.
30000+ combined installation of
Unified Threat Management
Central Console (CCC)
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Agenda of Presentation
• The Business Need of SSL VPN
• About Cyberoam SSL VPN
• Product Walkthrough
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
The Business Need for SSL VPN
Also, An Introduction to Virtual SSL VPN
Appliances
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Secure, Remote Access is indispensable in today’s work environment
Scenario 1:
Employees and
Mobile Workers
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Secure, Remote Access is indispensable in today’s work environment
Scenario 2: Partners, Suppliers and
Customers get Extranet access
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Solutions Comparison: When to use What?
IPSec
SSL VPN
PPTP
Use SSL VPN in
Different Locations: Home, Airport,
Hotels, cyber cafe
L2TP
 Various Devices
Ideal for a limited number of
employees accessing corporate
resources through clients on
trusted devices
 laptops, home PC, PDA,
mobile phone
 Extranet access to customers,
partners, suppliers
 Web-enabled access – no need
to install client on device
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
The Onset of Virtualization in SSL VPN…
How is it done?
Utilizing virtualization environments like
VMware
 Building Virtual appliances within
existing hardware
 Running a large number of
independent, virtual SSL VPN gateways
 Implementing complex virtual
datacenters so servers are consolidated
across multiple physical servers
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
The Onset of Virtualization in SSL VPN…
Benefits
Multiple SSL VPN instances can run on
one single appliance
 Appliance-wide or individual instances
upgrades
 Optimum hardware resource allocation
 Resilience to hardware failure
 Increases deployment scalability
 Minimizes operating and maintenance
costs
 Eco-friendly
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Business Advantages of SSL VPN








Higher security due to 128-K Encryption and Authenticated Access
Granularly restrict users to specific applications and resources
Security checks on endpoint devices even before giving access
Ease of Use
Lower costs, Less Maintenance
Least Admin intervention
Access from any web-enabled device
Minimum downtime
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
About Cyberoam SSL VPN
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN – Secure Remote Access
Cyberoam SSL VPN
Different Devices
Employees,
Customers,
Partners and guest
users
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Internal
Resources
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN – How does it work?
Client Certificate
Server Certificate
Username/Password
Roaming User
User gets a list of
applications based
on policies
Cyberoam SSL VPN
Servers
(App./Web/FTP/File
Share/WTS etc)
All Published
Applications/Resources
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Why choose Cyberoam SSL VPN?
Identity-based Security
 Monitor user log-on activity including username, MAC
address, IP address of endpoint
 Know “who is doing what” in the network
Available as Virtualized Solution
 Available as virtual appliances
 Run a large number of independent virtual
gateways from existing infrastructure
Scalability and Performance
 Unlimited user license
 N+1 clustering with application load balancing
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Multiple Applications Support
Microsoft Outlook, TCP, 802.11X and UDP,
FTP, Citrix and Microsoft Terminal Servers
and more
Secure Firewall Traversal
 Works alongside existing firewalls
 Prevents exposure of UDP port ranges to
hackers
 Does not publish internal IP address
to outside network
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Authentication and Authorization
Supports LDAP, AD, RADIUS etc.
 E-mail based user-provisioning
 Support for external two-factor& biometric
authentication
Access Mode
 Clientless VPN with a browser agent for
seamless access to applications
 Linux, Windows, MAC support
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Device Profiling (Endpoint Security)
 Product checks – Anti-virus, Firewall &
Anti-spyware
 Up to 1100+ products supported
 MAC address and IP address checks
 Quarantine policy for devices that fail
profiling test
 Remediation information sent to user for
any failed access e.g. updating anti-virus
software, configuring firewall etc.
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Management
 Web-based and Command Line Insole
 Wizard-driven installation
 Role-based administration
 Monitor and disconnect live users
 Real-time status and monitoring
Auditing & Logging
 Users logon activity including time of
access, username, MAC address and IP
address of endpoint
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Product Walkthrough
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Dedicated SSL VPN appliance Deployment
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN Virtual Appliance
No need to buy separate hardware!!
 Based on VMWare virtualization platform
 Install multiple virtual SSL VPN machines
Cyberoam’s Virtualization platform, VMware allows virtual
datacenters where servers are consolidated across multiple
physical servers, for guaranteed efficiency and performance
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Virtual Appliance Deployment Diagram
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam



Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Bootstrap State
◦ Initial Installation
Configuration state
◦ State where firmware upgrades, license upgrades,
backup-restore can be performed (Involves downtime)
Run State
◦ Resource configuration on-the-fly possible
◦ State in when users connect and access their
resources
Note: Appliance can be changed from Configuration state
to Run State as and when needed or vice versa
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Create Users
Create Groups
Organize Users in Groups
Register Applications
Create Application Groups
AD/LDAP Groups
Endpoint Security Policies
Organize applications into application groups
Device Profiling
Access Filters
Access Control
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Create Policy
Mandatory Profile
Create Profile
Quarantine Profile
General Profile
Select the Policies that apply for the Profile
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Pricing and Support
Virtual Appliance Mode
Dedicated Appliance Mode
 Concurrent user license (upgrade option
 Base License – Default 5 user license
available e.g.50 to 100 user license
available for 30 days FREE TRIAL
upgrade)
 No Endpoint Security in Trial version
Support Plans: 8X5 and 24X7 plans based on
appliance + per user license
Free Trial Download online with support + full
access to all features
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Comparison of Cyberoam Dedicated Appliance Offerings
CR-SSL-800
CR-SSL-1200
CR-SSL-2400
 Supports 1-50
concurrent users
 Supports 51-250
concurrent users
 Supports 251-1000
concurrent users
 Secure, remote
Intranet & Extranet
access
 Secure, remote
Intranet & Extranet
access
 Secure, remote
Intranet & Extranet
access
 Designed For SMEs,
MSSPs and more
Designed For SMEs,
large enterprises,
MSSPs and more
Designed For large
global enterprises,
MSSPs
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Summary Benefits for MSSPs






New Revenue Opportunities: Global SSL VPN market at $500 million in
2008 (Source: Gartner)
Support: 24X7 Support and monitoring
Centralized Policy Management
Continuous access
Familiar, easy-to-use interface
Cyberoam Virtual Appliances allow MSSPs to service multiple clients
through shared allocation of hardware resources
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Summary Benefits for Organizations– Cyberoam SSL VPN








Reduced costs: Centralized management, minimum admin intervention,
timely support
Protect your Investments: Use existing networks, firewalls, servers
Trusted Remote Access: Extend access to regional offices, partners,
customers, telecommuters, wireless users
Continuous access: Provide reliable access 24X7
Increase employee productivity (Intranet portals, ERP)
Partner access to internal applications (Partner Extranet)
Eliminate risks of organizational resource access from cyber cafes,
customer site etc.
Apply Uniform security policy
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN Virtual Appliance Free Trial…
 Register for a free online trial
 A fully functional Cyberoam product
 Free technical support
 No financial obligations
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Question/Answer Session
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Thank You
Please visit us at www.secureone.com.my
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy