Securing You Cyberoam Virtual UTM Our Products Unified Threat Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Different Stages Virtualization Implementation Already Implemented In Process In Planning www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Data Center Benefits Simplify server management Reduce infrastructure costs Reduce physical server sprawl Reduce power consumption Implement scalable system to cater for future growth www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Office in a Box Workstation virtualization - Transform single host server into workgroup of multiple users Benefits Reduce infrastructure costs Centralized control Works in a BYOD scenario www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Getting office into a box : Enterprise scenario Branch office 1 Corporate office Branch office 2 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization – You Gain Some, You Lose Some www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security challenges in Virtualization Scanning InterVM traffic - Cannot scan Inter-VM traffic with externally based security hardware - A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Need of virtual security solution for virtual environment Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control - Tying service access and network usage to user Identity Security hardware cannot offer inline protection - Traffic flows are invisible; creating blindspots in network - Cannot conduct forensic analysis and display compliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Solving Virtual Problems www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual appliance Resides on the Virtual layer Scans all traffic inside virtual environment VM1 VM2 VM3 Apps Apps Apps Windows OS Linux OS Other OS Hypervisor Hardware www.cyberoam.com Best-of-breed security • Stateful inspection firewall • Intrusion Prevention System • Gateway Antivirus • Anti-spyware and Anti-spam • Web filtering • Application Visibility & Control Virtual UTM appliance • Cyberoam Web Application Firewall (WAF) • Virtual Private Network • Logging & Reporting • Layer 8 Identity-based security © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security in a Virtual Data Center Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Security in a Virtual Data Center vSwitch Internet vSwitch Cyberoam vUTM vSwitch administrator www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Enterprise/ MSSP Security in a Box Complete Virtual Security solution BO/Customer n BO/Customer 3 BO/Customer 2 BO/Customer 1 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario1: MSSP + Hosting Services Provider Customer 1 Internet Central Console & Logging /Reporting vSwitch Cyberoam vUTM vSwitch Cyberoam vUTM Customer 2 vSwitch vSwitch vSwitch vSwitch Cyberoam vUTM vSwitch Customer 3 administrator vSwitch Cyberoam vUTM www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario2: On-premise deployment On-premise deployment MSSP Internet vSwitch vSwitch Cyberoam vUTM administrator At Customer premise www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You MSSP Scenario3: ISP as an MSSP Customer 1 Internet R1 R4 vUTM - Customer 1 vUTM – Customer 2 ISP R3 Switch vUTM – Customer 3 R2 Customer 2 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam protects Virtual Office or ‘Office in a box’ Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more Access control for users - Tying service access and network usage to user Identity Provides multiple security features on single appliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Office-in-a-box setup Internet Switch Switch vSwitch LAN vSwitch Cyberoam vUTM administrator Repurposed PC Laptop www.cyberoam.com Thin Client © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers Protection for virtualized networks - Protects hypervisor management console, hypervisor & Guest OS - Scan Inter-VM traffic - Secure zero trust networks Comprehensive Security - Consolidate multiple security features on single virtual appliance - Secures virtual networks to the extent of physical networks Ease to deployment - Offers flexibility to allot number of vCPUs - Easy to upgrade with simple activation key www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam offers Compliance Management - Segregates and secures traffic and data between and around virtual entities to help stay regulatory compliant - Display compliance with indepth on-appliance reports Centralized Management for Virtual & Physical appliances - Centrally manage physical and virtual infrastructure using single interface with CCC (Cyberoam Central Console) Available as Virtual CCC and Hardware CCC - Ensure centralized, consistent and quick security actions across your network www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization platforms Supported VMware ESX/ESXi 3.5/4.0/4.1/5.0 VMware Workstation 7.0 or 8.0 VMware Player 3.0 or 4.0 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM appliance models Offering Licensing CRiV-1C Supports upto 1vCPU CRiV-2C Supports upto 2vCPU CRiV-4C Supports upto 4vCPU CRiV-8C Supports upto 8vCPU CRiV-12C Supports upto 12vCPU Get a 30 day FREE Evaluation of Cyberoam Virtual appliance. www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s Security Portfolio Software www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Take Control of Your Security Infrastructure with Cyberoam Take Control of - WHAT you want? - HOW MUCH you want? - HOW you want? www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtual UTM - Workflow www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Content Introduction – Cyberoam Virtual UTM Cyberoam Virtual UTM – Trial - Order - Registration Cyberoam Virtual UTM – Upgrade - Order - Apply Upgrade Resources www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Introduction Cyberoam Virtual UTM www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – CRiV Series Platform support: Base Configuration Required: - VMware ESX/ESXi 4.0/4.1/5.0 - One vCPU - VMware Workstation 8.0/9.0 - 1GB vRAM - 3 vNIC - Primary Disk with 4GB size - Report Disk with 80GB size - 1 Serial Port - 1 USB Port www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Subscription Cyberoam Virtual UTM appliance range Subscriptions CRiV-TR (30days Trial) CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12C CRiV-UNL Supported vCPU 32 1 2 4 8 12 32 IPS ● ○ ○ ○ ○ ○ ○ Gateway Anti-Spam ● ○ ○ ○ ○ ○ ○ Gateway Anti Virus ● ○ ○ ○ ○ ○ ○ Outbound Spam Protection ● ○ ○ ○ ○ ○ ○ Web and Application Filter ● ○ ○ ○ ○ ○ ○ Web Application Firewall ● ○ ○ ○ ○ ○ ○ Support ● ○ ○ ○ ○ ○ ○ (8x5) (8x5/24x7) (8x5/24x7) (8x5/24x7) (8x5/24x7) (8x5/24x7) (8x5/24x7) ● Available www.cyberoam.com ○ Optional © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Order www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 01 Securing You Visit www.cyberoam.com & Click on “Try & Buy” www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 02 Securing You Cyberoam sales team forwards customer lead to respective partner www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Partner Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Partner STEP 01 Securing You Visit https://partner.cyberoam.com www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You www.cyberoam.com Partner STEP 02 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You www.cyberoam.com Partner STEP 03 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Registration www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer Continued www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 03 Securing You Visit https://customer.cyberoam.com Existing Customers Login to Customer Portal New Customers create account and Login with credentials www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You www.cyberoam.com Customer STEP 04 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 05 Securing You Enter Trial Appliance Key and other details www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 06 Securing You Email to customer confirming registration of virtual appliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 07 Securing You Email to customer with steps to download Virtual UTM appliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer STEP 08 Download Virtual UTM OVF Install Cyberoam Virtual UTM (Refer Installation Guide for reference) www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer STEP 09 Click on Registered appliance key to see appliance information www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You www.cyberoam.com Customer STEP 10 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Upgrade from Trial to Full Version Upgrade to Higher model www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Order www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Partner www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Visit https://partner.cyberoam.com STEP 01 STEP 02 STEP 03 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Team sends Virtual UTM Upgrade Key to Partner Partner shares Cyberoam Virtual UTM Upgrade Key with the customer www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Apply Upgrade www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 01 Securing You Login to Virtual UTM’s CLI Console From the Menu select “License upgrade” www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 02 Securing You From the Menu select Purchased Model No. www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 03 Securing You Enter Upgrade Key to activate the purchased appliance On successful activation previous appliance expires and new registered appliance is shown in customer portal www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Resources Cyberoam Virtual UTM – CRiV Series Installation Guide Cyberoam Virtual UTM – CRiV Series Upgrade Guide www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.