Securing You
Cyberoam Virtual UTM
Our Products
Unified Threat Management
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization Strategy: Data Center
Benefits
 Simplify server management
 Reduce infrastructure costs
 Reduce physical server sprawl
 Reduce power consumption
 Implement scalable system to cater
for future growth
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization Strategy: Office in a Box
 Workstation virtualization
- Transform single host server into workgroup of multiple users
Benefits
 Reduce infrastructure costs
 Centralized control
 Works in a BYOD scenario
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Getting office into a box : Enterprise scenario
Branch office 1
Corporate office
Branch office 2
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization – You Gain Some, You Lose Some
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security challenges in Virtualization
 Scanning InterVM traffic
- Cannot scan Inter-VM traffic with externally based security hardware
- A single compromised virtual machine can infect the entire data center
 Risk of attacks on
 Hypervisor management console
Need of virtual security solution for virtual environment
 Hypervisor & GuestOS
 Exploitation of virtualized web-facing application vulnerabilities by hackers
 Protecting virtualized servers from intrusion attacks
 User-based access control
- Tying service access and network usage to user Identity
 Security hardware cannot offer inline protection
- Traffic flows are invisible; creating blindspots in network
- Cannot conduct forensic analysis and display compliance
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM –
Solving Virtual Problems
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual appliance
 Resides on the Virtual layer
 Scans all traffic inside virtual environment
VM1
VM2
VM3
Apps
Apps
Apps
Windows
OS
Linux OS
Other OS
Hypervisor
Hardware
www.cyberoam.com
Best-of-breed security
• Stateful inspection firewall
• Intrusion Prevention System
• Gateway Antivirus
• Anti-spyware and Anti-spam
• Web filtering
• Application Visibility & Control
Virtual
UTM appliance
• Cyberoam
Web Application
Firewall
(WAF)
• Virtual Private Network
• Logging & Reporting
• Layer 8 Identity-based security
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security in a Virtual Data Center
 Apply granular firewall and Security policies
to traffic in virtual network
 Scan Inter-VM traffic
 Protect virtual networks from attacks on
hypervisor management console, hypervisor
& Guest OS
 Secure zero trust networks with Layer 8
identity-based security
 Block attacks that exploit vulnerabilities in
virtualized web applications
 Protect virtual servers from attacks with IPS
 Helps display compliance with logs & reports
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Security in a Virtual Data Center
vSwitch
Internet
vSwitch
Cyberoam vUTM
vSwitch
administrator
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization platforms Supported
 VMware ESX/ESXi 3.5/4.0/4.1/5.0
 VMware Workstation 7.0 or 8.0
 VMware Player 3.0 or 4.0
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM appliance models
Offering
Licensing
CRiV-1C
Supports up to 1vCPU
CRiV-2C
Supports up to 2vCPU
CRiV-4C
Supports up to 4vCPU
CRiV-8C
Supports up to 8vCPU
CRiV-12C
Supports up to 12vCPU
Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Take Control of Your Security Infrastructure with Cyberoam
 Take Control of
- WHAT you want?
- HOW MUCH you want?
- HOW you want?
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtual UTM - Workflow
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Content
 Introduction – Cyberoam Virtual UTM
 Cyberoam Virtual UTM – Trial
- Order
- Registration
 Cyberoam Virtual UTM – Upgrade
- Order
- Apply Upgrade
 Resources
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Introduction
Cyberoam Virtual UTM
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – CRiV Series
 Platform support:
 Base Configuration Required:
- VMware ESX/ESXi 4.0/4.1/5.0
- One vCPU
- VMware Workstation 8.0/9.0
- 1GB vRAM
- 3 vNIC
- Primary Disk with 4GB size
- Report Disk with 80GB size
- 1 Serial Port
- 1 USB Port
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM Subscription
Cyberoam Virtual UTM appliance range
Subscriptions
CRiV-TR
(30days Trial)
CRiV-1C
CRiV-2C
CRiV-4C
CRiV-8C
CRiV-12C
CRiV-UNL
Supported vCPU
32
1
2
4
8
12
32
IPS
●
○
○
○
○
○
○
Gateway Anti-Spam
●
○
○
○
○
○
○
Gateway Anti Virus
●
○
○
○
○
○
○
Outbound Spam Protection
●
○
○
○
○
○
○
Web and Application Filter
●
○
○
○
○
○
○
Web Application Firewall
●
○
○
○
○
○
○
Support
●
○
○
○
○
○
○
(8x5)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
●
Available
www.cyberoam.com
○
Optional
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Order
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
01
Securing You
Visit www.cyberoam.com & Click on “Try & Buy”
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
02
Securing You
Cyberoam sales team forwards
customer lead to respective partner
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Registration
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
Continued
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
03
Securing You
Visit https://customer.cyberoam.com
 Existing Customers
Login to Customer
Portal
 New Customers create
account and Login with
credentials
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
www.cyberoam.com
Customer STEP
04
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
05
Securing You
 Enter Trial Appliance
Key and other details
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
06
Securing You
Email to customer confirming registration of virtual appliance
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
07
Securing You
Email to customer with steps to download Virtual UTM appliance
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer STEP
08
 Download Virtual UTM OVF
 Install Cyberoam Virtual UTM
(Refer Installation Guide for reference)
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer STEP
09
 Click on Registered appliance key to
see appliance information
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
www.cyberoam.com
Customer STEP
10
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Upgrade
 Upgrade from Trial to Full Version
 Upgrade to Higher model
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Upgrade Order
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer places an order with
partner to Buy Full Version or
Upgrade Model
Customer provides Previous
Appliance Key to Partner (Trial
appliance key or old appliance key)
along with the order
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Apply Upgrade
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
01
Securing You
 Login to Virtual UTM’s CLI Console
 From the Menu select “License upgrade”
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
02
Securing You
 From the Menu select Purchased Model No.
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
03
Securing You
 Enter Upgrade Key to activate the purchased appliance
 On successful activation previous appliance expires and new registered appliance is
shown in customer portal
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam’s Security Portfolio
Software
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank you
www.cyberoam.com
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.