Securing You Cyberoam Virtual UTM Our Products Unified Threat Management www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Data Center Benefits Simplify server management Reduce infrastructure costs Reduce physical server sprawl Reduce power consumption Implement scalable system to cater for future growth www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization Strategy: Office in a Box Workstation virtualization - Transform single host server into workgroup of multiple users Benefits Reduce infrastructure costs Centralized control Works in a BYOD scenario www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Getting office into a box : Enterprise scenario Branch office 1 Corporate office Branch office 2 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization – You Gain Some, You Lose Some www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security challenges in Virtualization Scanning InterVM traffic - Cannot scan Inter-VM traffic with externally based security hardware - A single compromised virtual machine can infect the entire data center Risk of attacks on Hypervisor management console Need of virtual security solution for virtual environment Hypervisor & GuestOS Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control - Tying service access and network usage to user Identity Security hardware cannot offer inline protection - Traffic flows are invisible; creating blindspots in network - Cannot conduct forensic analysis and display compliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Solving Virtual Problems www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual appliance Resides on the Virtual layer Scans all traffic inside virtual environment VM1 VM2 VM3 Apps Apps Apps Windows OS Linux OS Other OS Hypervisor Hardware www.cyberoam.com Best-of-breed security • Stateful inspection firewall • Intrusion Prevention System • Gateway Antivirus • Anti-spyware and Anti-spam • Web filtering • Application Visibility & Control Virtual UTM appliance • Cyberoam Web Application Firewall (WAF) • Virtual Private Network • Logging & Reporting • Layer 8 Identity-based security © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Security in a Virtual Data Center Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Scenario: Security in a Virtual Data Center vSwitch Internet vSwitch Cyberoam vUTM vSwitch administrator www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtualization platforms Supported VMware ESX/ESXi 3.5/4.0/4.1/5.0 VMware Workstation 7.0 or 8.0 VMware Player 3.0 or 4.0 www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM appliance models Offering Licensing CRiV-1C Supports up to 1vCPU CRiV-2C Supports up to 2vCPU CRiV-4C Supports up to 4vCPU CRiV-8C Supports up to 8vCPU CRiV-12C Supports up to 12vCPU Get a 30 day FREE Evaluation of Cyberoam Virtual appliance. www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Take Control of Your Security Infrastructure with Cyberoam Take Control of - WHAT you want? - HOW MUCH you want? - HOW you want? www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Virtual UTM - Workflow www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Content Introduction – Cyberoam Virtual UTM Cyberoam Virtual UTM – Trial - Order - Registration Cyberoam Virtual UTM – Upgrade - Order - Apply Upgrade Resources www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Introduction Cyberoam Virtual UTM www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – CRiV Series Platform support: Base Configuration Required: - VMware ESX/ESXi 4.0/4.1/5.0 - One vCPU - VMware Workstation 8.0/9.0 - 1GB vRAM - 3 vNIC - Primary Disk with 4GB size - Report Disk with 80GB size - 1 Serial Port - 1 USB Port www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Subscription Cyberoam Virtual UTM appliance range Subscriptions CRiV-TR (30days Trial) CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12C CRiV-UNL Supported vCPU 32 1 2 4 8 12 32 IPS ● ○ ○ ○ ○ ○ ○ Gateway Anti-Spam ● ○ ○ ○ ○ ○ ○ Gateway Anti Virus ● ○ ○ ○ ○ ○ ○ Outbound Spam Protection ● ○ ○ ○ ○ ○ ○ Web and Application Filter ● ○ ○ ○ ○ ○ ○ Web Application Firewall ● ○ ○ ○ ○ ○ ○ Support ● ○ ○ ○ ○ ○ ○ (8x5) (8x5/24x7) (8x5/24x7) (8x5/24x7) (8x5/24x7) (8x5/24x7) (8x5/24x7) ● Available www.cyberoam.com ○ Optional © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Order www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 01 Securing You Visit www.cyberoam.com & Click on “Try & Buy” www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 02 Securing You Cyberoam sales team forwards customer lead to respective partner www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Trial Registration www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer Continued www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 03 Securing You Visit https://customer.cyberoam.com Existing Customers Login to Customer Portal New Customers create account and Login with credentials www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You www.cyberoam.com Customer STEP 04 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 05 Securing You Enter Trial Appliance Key and other details www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 06 Securing You Email to customer confirming registration of virtual appliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 07 Securing You Email to customer with steps to download Virtual UTM appliance www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer STEP 08 Download Virtual UTM OVF Install Cyberoam Virtual UTM (Refer Installation Guide for reference) www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer STEP 09 Click on Registered appliance key to see appliance information www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You www.cyberoam.com Customer STEP 10 © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Upgrade from Trial to Full Version Upgrade to Higher model www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Upgrade Order www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Customer places an order with partner to Buy Full Version or Upgrade Model Customer provides Previous Appliance Key to Partner (Trial appliance key or old appliance key) along with the order www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM – Apply Upgrade www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Steps For Customer www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 01 Securing You Login to Virtual UTM’s CLI Console From the Menu select “License upgrade” www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 02 Securing You From the Menu select Purchased Model No. www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Customer STEP 03 Securing You Enter Upgrade Key to activate the purchased appliance On successful activation previous appliance expires and new registered appliance is shown in customer portal www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam’s Security Portfolio Software www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Thank you www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.