Cyberoam NG series:
Future-Ready Security
A glimpse into the future of networks…
Superfast Internet
• Data moving at 10 times
current Internet speeds
• Google launched a 1000 Mbps ‘Google
Fiber’ Internet service
• IDNet launched UK 1000 Mbps Leased
Line Business Ethernet Service
Cloud: Web Applications
• Critical business applications
and Services moving to the Web
• Cloud Computing will generate more
than $45.4 billion in revenue by 2015!
Device Explosion:
Multiple Internet
devices per user
• Each device with a unique IP address
• Employee-owned smart devices to reach
350mn by 2014, up from 150mn
Cloud: Explosion of
Internet Applications
• Infinite applications moving to the cloud
How will Organizations Gain?
CONNECTIVITY
PRODUCTIVITY
SECURITY
With Network Connectivity & Productivity taking a leap,
what about Security?
Can your Security keep pace?
• The New Network Infrastructure
- SOHO /SMB Network Infrastructure is moving to Gigabit!
- Anything less than Gigabit is nearly obsolete!
- Does your security appliance have Gigabit ports?
- Does any security vendor offer network security appliances with
Gigabit ports to these segments?
• Superfast Internet Speeds
- Gigabit Internet speeds to be soon available from ISPs /Telco’s
- Can your security appliance match high Internet speeds?
- Does it offer Gigabit throughputs?
• Device Explosion
- More devices per employee connecting to the IT network
- Changing approach from ‘Users’ to ‘Devices’
- Can your security appliance support more number of Devices?
Can your Security keep pace?
• Explosion of Internet applications
- Leading to ‘Application Chaos’!
- What level of application control granularity does your Security offer?
• Critical business applications moving to Cloud
- Internet-facing applications face risk of getting hacked
- Does your security offer a web application protection?
No one wants SECURITY to become a
bottleneck in their network!
What can SOHO/SMB do to prevent Security from
becoming a bottleneck in progress?
Expand Security budgets
to buy Enterprise
security solutions
Or
IT Manager
Move to Future-Ready
security appliances
Presenting
The Cyberoam NG series
The ‘Next-Generation’ appliances built for Future-ready Security in networks!
Cyberoam NG series offers ‘Future-Ready’ Security
• The Fastest ‘UTM’ appliances for SOHO and SMB segments
• Offering Next-Generation Firewall protection for Large Enterprises!
• Offering Future-Ready security to
• SOHO, ROBO
• CR15iNG, CR25iNG, CR35iNG
• Wi-Fi appliances
• CR15wiNG, CR25wiNG, CR35wiNG
• Faster performance, broader coverage
with 3 x 3 MIMO
• Dual band support
• SMB
• CR50iNG, CR100iNG
• Enterprise
• CR2500iNG
How Cyberoam NG series offers Future-Ready
Security?
Offering upto 5 times industry average throughput
for SOHO /SMB
Appliances starting with Gigabit
Firewall Throughputs
Best in class UTM throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
Cyberoam Technologies Pvt. Ltd.
Confidential. For internal use only
Firewall throughputs
Cyberoam CR15iNG
UTM throughputs
Cyberoam
CR15iNG vs. CR15i
ONE CR15iNG vs
Dell Sonicwall TZ series
Cyberoam CR15iNG vs
Fortinet FG20C, FG40C
Cyberoam CR15iNG vs
Watchguard
WG XTM25, WG XTM26
Cyberoam Technologies Pvt. Ltd.
Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above
Confidential. For internal use only
Firewall throughputs
Cyberoam CR25iNG
UTM throughputs
Cyberoam
CR25iNG vs. CR25ia
CR25iNG vs
Dell Sonicwall NSA220,
NSA 250M
Cyberoam CR25iNG vs
Fortinet FG60C
Cyberoam CR25iNG vs
Watchguard
WG XTM33
Cyberoam Technologies Pvt. Ltd.
Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above
Confidential. For internal use only
Firewall throughputs
Cyberoam CR35iNG
UTM throughputs
Cyberoam
CR35iNG vs. CR35ia
Power to secure SMB with
SOHO appliance!
CR35iNG vs
Dell Sonicwall NSA2400,
Power to secure SMB
with SOHO appliance!
Cyberoam CR35iNG vs
Fortinet FG80C
Cyberoam CR35iNG vs
Watchguard
WG XTM330, XTM 505
Cyberoam Technologies Pvt. Ltd.
Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above
Confidential. For internal use only
Firewall throughputs
Cyberoam CR50iNG
UTM throughputs
Cyberoam
CR50iNG vs. CR50ia
Size doesn’t matter!
CR50iNG vs
Dell Sonicwall NSA2400,
NSA 3500
Size doesn’t matter!
Cyberoam CR50iNG
vs Fortinet FG100D
Size doesn’t matter!
Cyberoam CR50iNG vs
Watchguard
XTM505, XTM 515
Cyberoam Technologies Pvt. Ltd.
Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above
Confidential. For internal use only
Firewall throughputs
Cyberoam CR100iNG
UTM throughputs
Cyberoam
CR100iNG vs. CR100ia
Size doesn’t matter!
CR100iNG vs
Dell Sonicwall NSA3500,
NSA 4500
Size doesn’t matter!
Cyberoam CR100iNG vs
Fortinet FG200B, FG300C
Size doesn’t matter!
Cyberoam CR100iNG vs
Watchguard
XTM515, XTM 525
Cyberoam Technologies Pvt. Ltd.
Fortinet does not publish UTM throughputs in datasheet, shown as Not Available (NA) above
Confidential. For internal use only
NG series offers Future-Ready Security
• Powerful Hardware
• Superfast processing speed : A must for Gigabit Internet
speeds!
– Nano second security processing with multicore Gigahertz
processors
• Gigabit Ports to enable Gigabit Speeds for SOHO /SMB
networks
• A complete overhaul of appliance design
• Faster, Next-Gen Memory and High Capacity Storage
• Superior Quality for High Performance and Robustness
– Design & components supporting high speed I/O
throughput and withstanding extreme environments
NG series offers Future-Ready Security
• Increased port density
Cyberoam NG series
Cyberoam ia series
CR15iNG
3 GbE ports
CR15i
3 10/100 Ethernet ports
CR15wiNG
3 GbE ports
CR15wi
3 10/100 Ethernet ports
CR25iNG-6P
6 GbE ports
CR25ia
4 GbE ports
CR25wiNG-6P 6 GbE ports
CR25wi
4 GbE ports
CR35iNG
6 GbE ports
CR35ia
4 GbE ports
CR35wiNG
6 GbE ports
CR35wi
4 GbE ports
CR50iNG
8 GbE ports
2 hardware bypass segment
CR50ia
6 GbE ports
1 hardware bypass segment
CR100iNG
8 GbE ports
2 hardware bypass segment
CR100ia
6 GbE ports
1 hardware bypass segment
Intelligent, Powerful firmware
• Tightly integrates with Hardware for Network & Crypto
Acceleration delivering high performance
• Better use of Multicore architecture for Parallel processing
• Optimized workload distribution across cores
• Lockless path for packet forwarding
– A single core handles packets for each connection at any
given time to avoid inter-locks
• Optimized Interrupt rates for minimum CPU overhead and
latency
• High rate of interrupts - A bottleneck in high-speed data
transfers
• Fastpath packets to improve processing speed and reduce CPU
overhead
Intelligent, Powerful firmware
• CyberoamOS offers advance features with entry-level appliances
Feature availability
Cyberoam appliance
SSL-VPN
WAF
HA
CR15i/wi
X
X
X
CRR15iNG/wiNG
√
X
X
CR25ia
X
X
X
CR25iNG/iNG-6P
√
√
√
• CyberoamOS installed on flash and reports are stored in HDD*
• Auto flash recovery**
• Auto OS failover from flash to HDD in case of flash failure**
*available in models above CR15iNG/wiNG
**Future implementation
Take complete control over applications running on your
network
Prioritize applications with Cyberoam’s Layer 7 &
Layer 8 Visibility & Controls
Medium Quality
Internet
Control over
IM
Web
Bit
VoIP
ERP
CRM
Application
Torrent
mail
High Quality
Low Quality
Granular classification of applications
Risk Level
Application
Characteristics
Application
Technology
Very Low (1)
Excessive Bandwidth
Browser Based
Low (2)
Prone to misuse
Client Server
Medium (3)
Transfer files
Network Protocol
High (4)
Tunnel other apps
P2P
Very High (5)
Vulnerabilities
Widely used
Loss of Productivity
Can bypass firewall policy
Proactive Protection model:
Eliminates the need for manual intervention by administrators to update policies
for new applications added to the list
On-Appliance Web Application Firewall
• No need to buy dedicated WAF appliance
• Protect Web Servers and Web Applications from hackers
•
•
•
•
Prevents hackers from exploiting Web-Application Vulnerabilities
Positive protection model and No Signature Tables
Intuitive website flow detector automatically adapts to website changes
Protects against OWASP top 10 vulnerabilities
Cyberoam’s Layer 8 (Identity-based) security
Cyberoam
Authenticates
User Login
• User Name
• IP Address
• MAC Id
• Session Id
 Control over staff network activities
• Who can connect to the network
• Who can access what
• What have they accessed
Cyberoam
Authorizes
Cyberoam
Audits
• Internet surfing quota
• Identity - based
• Schedule control
Logs + Reports
• Security Policies
• Compliance Reports
• Web Filtering
• Application Visibility & Control
• QoS / Bandwidth Management
• IM Controls
Ability to track the user
activities; identify
attackers /victims
Take quick network
security decisions
Best-in-class Reporting
- 1000+ in-depth reports
- Real time visibility into user and
network activities
- Helps with Security & Compliance
management, Forensic Analysis
- Reports include dynamic and
animated reports, in-line graphs,
country maps
Dual Dashboard - Traffic & Security Dashboard
Country maps for Source/ Destination traffic
Application Reports
Support for new Connectivity Technologies – 4G /LTE
• Makes organizations ready for high speed future
• Easy deployment for high speed Internet connection
• Simple USB modem plug-in into Cyberoam appliance
• Ensures business connectivity
• Automatic fail-over to 4G/LTE WWAN connection
• Gateway failover over VPN
• VPN over 4G/LTE
3G
4G
Threat Protection Features
 Intrusion Prevention System
- Maximum security against emerging threats
- Identity-based IPS policies per user or group
- 4500+ signatures – broadest security cover
 Gateway Anti-Virus, Anti-spyware
- Prevents blended threats
- 4 million+ signatures
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
 Gateway Anti-Spam
- Real-time, most accurate spam protection
- Recurrent Pattern Detection (RPD) technology
- Scans SMTP, POP3, IMAP traffic
 Outbound Spam Protection
- Protects service providers against Outbound Spam
Other Security Features
 Fusion Technology driven SI Firewall
- Interface for achieving Unified Security
 Virtual Private Network (VPN)
- Threat-free remote access
- Threat Free Tunneling (TFT) Technology
- IPSec, L2TP, PPTP and SSL-VPN
 Web & Content Filtering
- Complete Visibility & Control over HTTP & HTTPS
- 82+ categories and 44 million+ URLs
 Bandwidth Management
-
Helps enhance network performance and productivity
Create a bandwidth policy on a combination of User,
Application, Category (application & web), allowing great
flexibility and real L2-L8 visibility and control
Securing You
449501
Live NG Series Demo
View Demo
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.