To offer Telecom Customers : CONNECTIVITY PRODUCTIVITY SECURITY Network Connectivity, Productivity & Security with Cyberoam Offer Cyberoam Introduction Technology Powerhouse – Founded in 1999 800+ Employees Backed by World’s Largest PE Investor ($90bn); The Carlyle Group Sales, Distribution Channel and Customers across 110+ Countries Amongst the top 3 global UTM players in terms of features Patent Pending Identity-based Management MNC Clientele FEW CUSTOMER ACQUISITIONS (2011-12) • • • • • • • • • • • • • • • • • • Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC) Carlson Suites, USA (150 x CR15i ) Indian Army, India (50 x CR500ia, CR200i with CCC) National Stock Exchange. India (240 x CR50ia with CCC) LYDEC, Morocco ( Multiple CR’s) Ministry of Justice, Morocco, (84x CR1000ia) Casablanca Stock Exchange, Morocco (4 x 500ia) Iran Postal Services, GCC, (44 x CR200i) Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC) BTT Bank, GCC, (30 X CR300i) Abu Dhabi Government, Abu Dhabi (4 x CR1500ia) Giordano, UAE/Saudi, (50 x CR25ia) Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC) Ministry of Interior, Italy, (8 x CR1500ia, CCC) Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC) Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia) British Aid, Kenya (6 x CR1500ia) And Many More…. Imperial Logistics, South Africa (20 x CR15i) Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO 2.5 Years in North Africa! Revenue grew 60% YOY 500+ success deployments Conducted 30 CCNSP & 7 CCNSE trainings 14+ CCSC Trainings 200+ CCNSPs on ground Number of end client focused events & seminars Successful Penetration in all the verticals. North African Clientele And Many More…. Typical Requirements of MSSP Providing best quality of services to clients with least effort and cost - Provide higher coverage of managed security services - Centralized control of client network’s security without allocating dedicated resources for each client Rapid deployment at client site without interrupting client operations Easy Policy setting, Modification, Monitoring Performance, Reacting to situations in time Pro-active security management Typical Requirements of MSSP Have a system that Is simple to configure and manage Helps meet the SLA’s Help customers to display compliance Ability to offer flexible security plans to clients Ability to offer easy system upgrade alternative for growing businesses Be an MSSP in 3 Simple Steps 1 2 3 Use Cyberoam UTM (Internal Network) Sell Cyberoam UTM Manage Cyberoam with CCC/ VCC/ CCMS Cyberoam Solution for MSSP Network Security Centralized security Management Network Monitoring & Analysis Securing Home users Cyberoam UTM – Layer 8 Technology Layer 8 security in DHCP environment Corporate LAN DHCP 192.168.3.105 192.168.3.110 Richard Steve Ancy Administrator Internet Applies security policies based on actual identity of users. User-specific rules for multiple users to share a common IP address Cyberoam’s Layer 8 (Identity-based) security Identity-based AAA Users Employees Management Cyberoam Authenticates Cyberoam Authorizes Cyberoam Audits • User Name • IP Address • MAC Id • Session Id • Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls • Identity–based Logs + Reports • Compliance Reports Customers Partners Control user network activities • Who can connect to the network • Who can access what • What have they accessed Ability to track the user activities; identify attackers /victims Take quick network security decisions Cyberoam UTM Features are : Fusion Technology driven SI Firewall - Interface for achieving Unified Security Intrusion Prevention System - Maximum security against emerging threats - Identity-based IPS policies per user or group - 3500+ signatures – broadest security cover Gateway Anti-Virus, Anti-spyware - Prevent blended threats - 4 million+ signatures - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic Other Cyberoam UTM Features are : Virtual Private Network (VPN) - Threat-free remote access - Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN Multi-Link Management - For an ‘always-on’ network - Support for more than 2 ISP links - Supports Wireless WAN (3G USB modems, WiMax) - Gateway failover over VPN Other Cyberoam UTM Features are : Gateway Anti-Spam - Real-time, most accurate spam protection - Recurrent Pattern Detection (RPD) technology - Scans SMTP, POP3, IMAP traffic Outbound Spam Protection - Protecting service providers against - Outbound Spam iView: Intelligent logging & reporting - Real-time visibility into network activities - On-appliance reporting. LAYER 8 - Identity-based reporting - 1200+ reports Other Cyberoam UTM Features are : Instant Messaging & Control - Identity-based controls for Yahoo messenger and Windows Live Messenger - Control who can chat with whom, file transfer, webcam Bandwidth Management - Enhance network performance and productivity - Application and Identity-based bandwidth allocation Other Cyberoam UTM Features are : 3G/WiMAX Connectivity - Secure, Uninterruped WAN Connectivity - Configure Wireless WAN as primary or back-up link ‘IPv6 Ready’ Gold Web & Content Filtering - Complete Visibility & Control over HTTP & HTTPS - 82+ categories and 44 million+ URLs Cyberoam UTM – One Stop Solution !!! Multiple security features over single appliance UTM appliance range Segment wise & Network size Large Enterprises CR 2500iNG, CR1500ia, CR1500ia-10F CR1000ia, CR1000ia-10F CR750ia, CR750ia-1F/10F CR500ia, CR500ia – RP/1F/10F Small to Medium Enterprises Small and Remote Offices CR200i, CR300i, CR100iNG, CR50iNG CR35wiNG, CR35iNG, CR 25wiNG – 6P, CR 25iNG – 6P, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG Subscriptions Bifurcations Basic Appliance Subscriptions Gateway Anti-Virus Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL Service) Gateway Anti-spam Web & Application Filtering Intrusion Prevention System (IPS) Web application firewall 8x5 Tech support & Warranty 24 x 7 Tech Support & Warranty Cyberoam UTM – Subscriptions Enables MSSP to offer flexible service packages to their customers Customers with individual security needs: - Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) Anti-Spam Web & Application Filtering Subscription Intrusion Prevention System Subscription Advanced Subscriptions include: - Web Application Firewall (WAF) Subscription Outbound Spam Protection Subscription Support Subscriptions - 8x5 support 24x7 support Cyberoam UTM – Bundled Subscriptions For customers not having mail server in their network Security Value Subscription (SVS) / SVS Plus* Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) Web & Application Filtering Subscription Intrusion Prevention System (IPS) 8x5 Tech Support & Warranty For customer having mail server in their network Total Value Subscription (TVS) / TVS Plus* Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) Gateway Anti-Spam Subscription Web & Application Filtering Subscription Intrusion Prevention System (IPS) * SVS Plus and TVS Plus offers additional 24x7 8x5 Tech Support & Warranty support service to SVS and TVS services Cyberoam UTM – Advance Subscriptions For customers having web server in their network Web Application Firewall (WAF) Subscription Protection to corporate websites and web-based applications such as CRM, ERP, MIS, Payment Gateway and others Website Flow Detector technology OWASP Top 10 web application vulnerabilities For Service Providers to protect them from Outbound spam Outbound Spam Protection Subscription Unique feature with Cyberoam UTM Scanning with Recurrent Pattern Detection (RPD) Technology Detection of Outbound Spam which is a part of global outbreak Near 98% spam detection False Positive rate of 1 in a million CCC – Cyberoam Central Console Centralized integrated management and monitoring appliance Helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam installations centrally Ease and flexibility of management Easy grouping of Cyberoam UTM appliances - Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions - Dynamic views in CCC help in managing, searching and sorting appliances - Customizable and multiple dashboards Ease and flexibility of management Group of UTM Appliances Based on Geography Based on Appliance Models Based on Client Appliance Discovery Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click Easy, instant security policy enforcement Simplified security management - Centralized policy creation and implementation for all Cyberoam UTM features Leads to uniform adoption of security practices across offices Establish policies based on workprofiles across offices - Subscription and signature updates for Cyberoam UTM features like Gateway Anti-Virus, Anti-Spam, etc. - Protection against zero-hour threats Easy, instant security policy enforcement Add UTM appliances Client based grouping of UTM appliances Easy, instant security policy enforcement Configure UTM appliance from CCC Easy, instant security policy enforcement Update configuration of UTM appliances Easy Signature Distribution Security against misuse of administrator privileges Role-based administration privileges - For CCC appliance - Individual Cyberoam appliances - Groups of Cyberoam UTM appliances Role based administration privileges CCC Access profiles Profiles considered: VPN Administrator, Security Administrator, Global Administrator Role based administration privileges CCC rights per access profile (example of VPN administrator rights) Role based administration privileges CCC admin users Role based administration privileges Access to each UTM appliance Audit logs & alerts for organization-wide security visibility Logs and views of administrator actions as well as dispersed UTM appliances - Instant security visibility - Supports regulatory compliance - Investigative analysis - Keeping track of historical activity Email alerts - Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, etc. - Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count, etc. Audit logs and alerts for greater security visibility CCC Logs Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs Audit logs and alerts for greater security visibility Alert configuration Audit logs and alerts for greater security visibility Email Alert Cyberoam’s Centralized Management Solution available as: Hardware Appliance Virtual CCC (VMWare Supported) Cloud Computing Managed Services Hardware CCC Appliance Dedicated appliance for centralized management Manage from 15 to 1000 Cyberoam UTM appliances Virtual CCC Appliance VMware based CCC Virtual appliances Server-based Virtual environment and Workstationbased Virtual environment Eliminate need for dedicated hardware, reduce cost of ownership, simplify future upgrades for users Cyberoam’s On-Cloud Management Service (CCMS) Group: Customer1 Managed security services hosted on Cyberoam’s Cloud - MSSPs don’t need to Abu Dhabi Dubai Sharjah invest in core SoC Customer Customer account management, Appliances customer appliance monitoring and management from the web portal MSSP engineer can offer services to clients from anywhere without being present at the SoC MSSP can maximize their revenue with recurring business MSSP Network Group: Customer2 Abu Dhabi Dubai Sharjah CCC Benefits Real-time protection against newly identified threats Complete control over distributed networks from central location Quick policy setting and security management Lower operational cost, complexity and time to maintain dispersed client networks Enables MSSPs to have different personnel for managing distributed Cyberoam UTM appliances for quick, error-free security management Cyberoam offers First-of-its-kind On-Appliance Reporting First-of-its-kind On-appliance reporting Eliminates the need to purchase a dedicated reporting solution - 1200+ indepth reports Real time visibility into user and network activities Logs and Reports help organizations with - Security management - Compliance Management - Forensic Analysis Reports include dynamic and animated reports, in-line graphs, country maps Interactive World Traffic Map Interactive World Traffic Map for Source and Destination traffic Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard Dual Dashboard – Traffic and Security Dashboard Security Dashboard Application Reports Compliance Reports Cyberoam Deployment for MSSP Group: Customer1 Abu Dhabi Dubai Sharjah Group: Customer2 Abu Dhabi Dubai Sharjah FTTx Network (GPON Technology) Group: Customer3 Abu Dhabi Dubai Sharjah MPLS Network Customer Appliances DSL or Wi-Max Cyberoam Central Management Hardware/Virtual/Cloud MSSP Network Taking a look at each steps in MSSP operations Client Requirement Identification Deployment & Testing Remotely managing Security of client setup Reporting & Compliance Management Cyberoam can help MSSP at each step Client Requirement Identification Based on number of users Cyberoam UTMs available for various size of organizations Security requirement of client Individual or bundled subscriptions Deployment & Testing Rapid client site deployment through pre-configured Deployment Kit Cyberoam’s industry standard design easily fits in to client’s existing infrastructure Cyberoam Deployment Kit Remote Security Management Real-time visibility of client’s network with alerts Multiple ways of remotely monitoring and managing client networks Hardware appliance VMware based virtual appliance Cloud based centralized management Reporting and Compliance Management Centrally manage logging and reporting of multiple client sites Generate reports for each client Comply to industry standard compliances as per client needs Update Protect client’s network against latest threats Automatic subscription and signature updates Cyberoam After Sales Services Before Purchase After Sales: • 24x7 to Resellers • 8x5 to Enduser While Installation After Sales: • On Chat • On Email • On Phone Presales Team Structure Cyberoam Global Presales Team Rest of World (ROW) (ANZ, APAC, ME, EU, LATAM, AFRICA) North America & Canada SAARC Dedicated Technical Account Manager (TAM) for every region Customer Engineer Team (CE) Presales Support for Partner 24x7 AVAILABILITY EMAIL: AFRICAPARTNERS@CYBEROAM.COM CHAT: HTTP://WWW.CYBEROAM.COM/PRESALESSUPPORT PHONE: +1-877-777-0368 (TOLL FREE) KNOWLEDGE Base for Partners : For How To’s, FAQ’s, Release Notes http://kb.cyberoam.com Post-sales Support for Customer’s Post-sales Support - Email - Chat - Telephone: Toll Free Post-sales Support Training & Certification Programs for Partner Developing competencies with Cyberoam UTM appliances CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP) CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE) CYBEROAM CERTIFIED TRAINER (CCT) West Africa Telecom, Liberia (MSSP) GLO – Nigeria’s Largest Telco Cobranet – Nigeria (MSSP) Busy Internet – Ghana (MSSP) Netcom – Nigeria (MSSP) Vodacom – Tanzania Biggest Telco SimbaNet – Tanzania SimbaNet – Kenya (MSSP) Access Kenya – Kenya (MSSP) CS Lox Info – Thailand (MSSP) TRUE – Thailand ISP (MSSP) CAT – Thailand (MSSP) Baltnetos – Lithuania (MSSP) DootAll – Netherlands (MSSP) Mobile 8 – Indonesia (MSSP) MTDS – Morocco AIRLINK – Morocco & many more.. NOT TO FORGET 2012 Magic Quadrant for Unified Threat Management “Cyberoam maintains a high level of loyalty from its channel partners.” Source: Gartner MQ 2011 2012: Rated #3 in UTM market in terms of Competeness of Vision Host of Awards / Certifications Premium Anti-Virus Anti-Spyware Anti-Spam Premium URL Filtering Firewall VPN IPS/IDP UTM Level 5: Cyberoam holds a unique & complete UTM certification ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability Authorised Distributor in North Africa Config Tunisia Cyberoam National Distributor Morocco | Tunisia | France Switzerland | Algeria Tel : +216 71 792 802 Fax : +216 71 792 611 Email: config.tunisie@config.tn Next Step IT Cyberoam Preferred Reseller Tel: + 216 71 90 60 41 Fax: + 216 71 90 60 43 Email: h.maalaoui@it-nextstep.com Questions? Yashesh Vaishnav Regional Manager Cyberoam www.cyberoam.com Email: yashesh.vaishnav@cyberoam.com