MSSP - Cyberoam

Download Report

Transcript MSSP - Cyberoam

To offer Telecom Customers : CONNECTIVITY PRODUCTIVITY SECURITY Network Connectivity, Productivity & Security with Cyberoam

Offer

Cyberoam Introduction

Technology Powerhouse – Founded in 1999 800+ Employees Backed by World’s Largest PE Investor ($90bn); The Carlyle Group Sales, Distribution Channel and Customers across 110+ Countries Amongst the top 3 global UTM players in terms of features Patent Pending Identity-based Management

MNC Clientele

FEW CUSTOMER ACQUISITIONS (2011-12)

• • • • • • • • • • • • • • • • • • Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC) Carlson Suites, USA (150 x CR15i ) Indian Army, India (50 x CR500ia, CR200i with CCC) National Stock Exchange. India (240 x CR50ia with CCC)

LYDEC, Morocco ( Multiple CR’s) Ministry of Justice, Morocco, (84x CR1000ia) Casablanca Stock Exchange, Morocco (4 x 500ia)

Iran Postal Services, GCC, (44 x CR200i) Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC) BTT Bank, GCC, (30 X CR300i) Abu Dhabi Government, Abu Dhabi (4 x CR1500ia) Giordano, UAE/Saudi, (50 x CR25ia) Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC) Ministry of Interior, Italy, (8 x CR1500ia, CCC) Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC) Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia) British Aid, Kenya (6 x CR1500ia) Imperial Logistics, South Africa (20 x CR15i)

And Many More….

Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO

2.5 Years in North Africa!

 Revenue grew 60% YOY  500+ success deployments  Conducted 30 CCNSP & 7 CCNSE trainings  14+ CCSC Trainings  200+ CCNSPs on ground  Number of end client focused events & seminars  Successful Penetration in all the verticals.

North African Clientele

And Many More….

Typical Requirements of MSSP

 Providing best quality of services to clients with least effort and cost - Provide higher coverage of managed security services - Centralized control of client network’s security without allocating dedicated resources for each client  Rapid deployment at client site without interrupting client operations  Easy Policy setting, Modification, Monitoring Performance, Reacting to situations in time  Pro-active security management

Typical Requirements of MSSP

 Have a system that  Is simple to configure and manage  Helps meet the SLA’s  Help customers to display compliance  Ability to offer flexible security plans to clients  Ability to offer easy system upgrade alternative for growing businesses

Be an MSSP in 3 Simple Steps 1

Use Cyberoam UTM (Internal Network)

2

Sell Cyberoam UTM

3

Manage Cyberoam with CCC/ VCC/ CCMS

Cyberoam Solution for MSSP Network Security Centralized security Management Network Monitoring & Analysis Securing Home users

Cyberoam UTM – Layer 8 Technology

Layer 8 security in DHCP environment Corporate LAN DHCP

Internet Administrator  

Applies security policies based on actual identity of users. User-specific rules for multiple users to share a common IP address

Cyberoam’s Layer 8 (Identity-based) security Users

Employees Management

Cyberoam Authenticates

• User Name • IP Address • MAC Id • Session Id Customers

Identity-based AAA Cyberoam Authorizes

• Internet surfing quota • Schedule control • Security Policies • Web Filtering • Application Visibility & Control • QoS / Bandwidth Management • IM Controls Partners

Cyberoam Audits

• Identity–based Logs + Reports • Compliance Reports • • •

Control user network activities

Who can connect to the network Who can access what What have they accessed

Ability to track the user activities; identify attackers /victims Take quick network security decisions

Cyberoam UTM Features are :

Fusion Technology driven SI Firewall

- Interface for achieving Unified Security 

Intrusion Prevention System

- Maximum security against emerging threats - Identity-based IPS policies per user or group - 3500+ signatures – broadest security cover 

Gateway Anti-Virus, Anti-spyware

- Prevent blended threats - 4 million+ signatures - Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic

Other

Cyberoam

UTM Features are :

Virtual Private Network (VPN)

- Threat-free remote access - Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN 

Multi-Link Management

- For an ‘always-on’ network - Support for more than 2 ISP links - Supports Wireless WAN (3G USB modems, WiMax) - Gateway failover over VPN

Other Cyberoam UTM Features are :

Gateway Anti-Spam

- Real-time, most accurate spam protection - Recurrent Pattern Detection (RPD) technology - Scans SMTP, POP3, IMAP traffic 

Outbound Spam Protection

- Protecting service providers against - Outbound Spam 

iView: Intelligent logging & reporting

- Real-time visibility into network activities - On-appliance reporting. LAYER 8 - Identity-based reporting - 1200+ reports

Other Cyberoam UTM Features are :

Instant Messaging & Control

- Identity-based controls for Yahoo messenger and Windows Live Messenger - Control who can chat with whom, file transfer, webcam 

Bandwidth Management

- Enhance network performance and productivity - Application and Identity-based bandwidth allocation

Other Cyberoam UTM Features are :

3G/WiMAX Connectivity

- Secure, Uninterruped WAN Connectivity - Configure Wireless WAN as primary or back-up link 

‘IPv6 Ready’ Gold

Web & Content Filtering

- Complete Visibility & Control over HTTP & HTTPS - 82+ categories and 44 million+ URLs

Cyberoam UTM – One Stop Solution !!!

Multiple security features over single appliance

UTM appliance range Segment wise & Network size Large Enterprises CR 2500iNG, CR1500ia, CR1500ia-10F CR1000ia, CR1000ia-10F CR750ia, CR750ia-1F/10F CR500ia, CR500ia – RP/1F/10F Small to Medium Enterprises CR200i, CR300i, CR100iNG, CR50iNG Small and Remote Offices CR35wiNG, CR35iNG, CR 25wiNG – 6P, CR 25iNG – 6P, CR25wiNG, CR25iNG, CR15wiNG, CR15iNG

Subscriptions Bifurcations Basic Appliance

      

Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL Service) Subscriptions

      

Gateway Anti-Virus Gateway Anti-spam Web & Application Filtering Intrusion Prevention System (IPS) Web application firewall 8x5 Tech support & Warranty 24 x 7 Tech Support & Warranty

Cyberoam UTM – Subscriptions Enables MSSP to offer flexible service packages to their customers Customers with individual security needs:

Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included) Anti-Spam Web & Application Filtering Subscription Intrusion Prevention System Subscription

Advanced Subscriptions include:

Web Application Firewall (WAF) Subscription Outbound Spam Protection Subscription

Support Subscriptions

8x5 support 24x7 support

Cyberoam UTM – Bundled Subscriptions For customers not having mail server in their network Security Value Subscription (SVS) / SVS Plus*

 Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)    Web & Application Filtering Subscription Intrusion Prevention System (IPS) 8x5 Tech Support & Warranty

For customer having mail server in their network Total Value Subscription (TVS) / TVS Plus*

 Gateway Anti-Virus Subscription     (Anti-malware, phishing, spyware protection included) Gateway Anti-Spam Subscription Web & Application Filtering Subscription Intrusion Prevention System (IPS) 8x5 Tech Support & Warranty * SVS Plus and TVS Plus offers additional 24x7 support service to SVS and TVS services

Cyberoam UTM – Advance Subscriptions For customers having web server in their network Web Application Firewall (WAF) Subscription

 Protection to corporate websites and web-based applications such as   CRM, ERP, MIS, Payment Gateway and others Website Flow Detector technology OWASP Top 10 web application vulnerabilities

For Service Providers to protect them from Outbound spam Outbound Spam Protection Subscription

 Unique feature with Cyberoam UTM  Scanning with Recurrent Pattern Detection (RPD) Technology  Detection of Outbound Spam which is a part of global outbreak  Near 98% spam detection  False Positive rate of 1 in a million

CCC – Cyberoam Central Console

  Centralized integrated management and monitoring appliance Helps Managed Security Service Providers (MSSP) to manage and monitor their multiple Cyberoam installations centrally

Ease and flexibility of management

Easy grouping of Cyberoam UTM appliances

- Based on geography, Cyberoam UTM models, firmware, organizations (for MSSPs) and service subscriptions - Dynamic views in CCC help in managing, searching and sorting appliances - Customizable and multiple dashboards

Ease and flexibility of management Group of UTM Appliances Based on Geography Based on Appliance Models Based on Client

Appliance Discovery Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click

Easy, instant security policy enforcement

Simplified security management

- Centralized policy creation and implementation for all Cyberoam UTM features  Leads to uniform adoption of security practices across offices  Establish policies based on work profiles across offices - Subscription and signature updates for Cyberoam UTM features like Gateway Anti-Virus, Anti-Spam, etc.

- Protection against zero-hour threats

Easy, instant security policy enforcement Add UTM appliances Client based grouping of UTM appliances

Easy, instant security policy enforcement Configure UTM appliance from CCC

Easy, instant security policy enforcement Update configuration of UTM appliances

Easy Signature Distribution

Security against misuse of administrator privileges

Role-based administration privileges

- For CCC appliance - Individual Cyberoam appliances - Groups of Cyberoam UTM appliances

Role based administration privileges CCC Access profiles Profiles considered: VPN Administrator, Security Administrator, Global Administrator

Role based administration privileges CCC rights per access profile (example of VPN administrator rights)

Role based administration privileges CCC admin users

Role based administration privileges Access to each UTM appliance

Audit logs & alerts for organization-wide security visibility

 

Logs and views of administrator actions as well as dispersed UTM appliances

- Instant security visibility - Supports regulatory compliance - Investigative analysis - Keeping track of historical activity

Email alerts

- Based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits, etc. - Alert configuration on various parameters like excessive CPU usage, spam mail count, virus count, etc.

Audit logs and alerts for greater security visibility CCC Logs

Audit logs and alerts for greater security visibility Cyberoam UTM appliance logs

Audit logs and alerts for greater security visibility Alert configuration

Audit logs and alerts for greater security visibility Email Alert

Cyberoam’s Centralized Management Solution available as:

Hardware Appliance Virtual CCC (VMWare Supported) Cloud Computing Managed Services

Hardware CCC Appliance

  Dedicated appliance for centralized management Manage from 15 to 1000 Cyberoam UTM appliances

Virtual CCC Appliance

   VMware based CCC Virtual appliances Server-based Virtual environment and Workstation based Virtual environment Eliminate need for dedicated hardware, reduce cost of ownership, simplify future upgrades for users

Cyberoam’s On-Cloud Management Service (CCMS)

   

Group: Customer1

Managed security services hosted on Cyberoam’s Cloud - MSSPs don’t need to

Abu Dhabi Dubai Sharjah

invest in core SoC

Customer

Customer account management,

Appliances

customer appliance monitoring and management from the web portal MSSP engineer can offer services to clients from anywhere without being present at the SoC MSSP can maximize their revenue with recurring business

MSSP Network Abu Dhabi Dubai Sharjah Group: Customer2

CCC Benefits

     Real-time protection against newly identified threats Complete control over distributed networks from central location Quick policy setting and security management Lower operational cost, complexity and time to maintain dispersed client networks Enables MSSPs to have different personnel for managing distributed Cyberoam UTM appliances for quick, error-free security management

Cyberoam offers First-of-its-kind On-Appliance Reporting

First-of-its-kind On-appliance reporting

   

Eliminates the need to purchase a dedicated reporting solution

- 1200+ indepth reports

Real time visibility into user and network activities Logs and Reports help organizations with

- Security management - Compliance Management - Forensic Analysis

Reports include dynamic and animated reports, in-line graphs, country maps

Interactive World Traffic Map Interactive World Traffic Map for Source and Destination traffic

Dual Dashboard – Traffic and Security Dashboard Traffic Dashboard

Dual Dashboard – Traffic and Security Dashboard Security Dashboard

Application Reports

Compliance Reports

Abu Dhabi Dubai Sharjah

Cyberoam Deployment for MSSP

Group: Customer1 Group: Customer2 Group: Customer3 Abu Dhabi Dubai Sharjah Abu Dhabi Dubai Sharjah MPLS Network FTTx Network (GPON Technology) DSL or Wi-Max Customer Appliances Cyberoam Central Management Hardware/Virtual/Cloud MSSP Network

Taking a look at each steps in MSSP operations

    Client Requirement Identification Deployment & Testing Remotely managing Security of client setup Reporting & Compliance Management

Cyberoam can help MSSP at each step

Client Requirement Identification

  Based on number of users  Cyberoam UTMs available for various size of organizations Security requirement of client  Individual or bundled subscriptions

Deployment & Testing

  Rapid client site deployment through pre-configured Deployment Kit Cyberoam’s industry standard design easily fits in to client’s existing infrastructure Cyberoam Deployment Kit

Remote Security Management

  Real-time visibility of client’s network with alerts Multiple ways of remotely monitoring and managing client networks  Hardware appliance  VMware based virtual appliance  Cloud based centralized management

Reporting and Compliance Management

   Centrally manage logging and reporting of multiple client sites Generate reports for each client Comply to industry standard compliances as per client needs

Update

  Protect client’s network against latest threats Automatic subscription and signature updates

Cyberoam After Sales Services Before Purchase • • After Sales: 24x7 to Resellers 8x5 to Enduser While Installation • • • After Sales: On Chat On Email On Phone

Presales Team Structure

Cyberoam Global Presales Team Rest of World (ROW) (ANZ, APAC, ME, EU, LATAM, AFRICA) North America & Canada SAARC Dedicated Technical Account Manager (TAM) for every region Customer Engineer Team (CE)

Presales Support for Partner

24x7 AVAILABILITY EMAIL: [email protected]

CHAT: HTTP://WWW.CYBEROAM.COM/PRESALESSUPPORT PHONE: +1-877-777-0368 (TOLL FREE) KNOWLEDGE Base for Partners : For How To’s, FAQ’s, Release Notes http://kb.cyberoam.com

Post-sales Support for Customer’s

Post-sales Support

- Email - Chat - Telephone: Toll Free

Post-sales Support

Training & Certification Programs for Partner

Developing competencies with Cyberoam UTM appliances

CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP) CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE) CYBEROAM CERTIFIED TRAINER (CCT)

West Africa Telecom, Liberia (MSSP) GLO – Nigeria’s Largest Telco Cobranet – Nigeria (MSSP) Busy Internet – Ghana (MSSP) Netcom – Nigeria (MSSP) Vodacom – Tanzania Biggest Telco SimbaNet – Tanzania

SimbaNet – Kenya (MSSP) Access Kenya – Kenya (MSSP) CS Lox Info – Thailand (MSSP) TRUE – Thailand ISP (MSSP) CAT – Thailand (MSSP) Baltnetos – Lithuania (MSSP) DootAll – Netherlands (MSSP)

Mobile 8 – Indonesia (MSSP) MTDS – Morocco AIRLINK – Morocco & many more..

NOT TO FORGET

2012 Magic Quadrant for Unified Threat Management

“Cyberoam maintains a high level of loyalty from its channel partners.”

Source: Gartner MQ 2011

2012: Rated #3 in UTM market in terms of Competeness of Vision

Host of Awards / Certifications

Premium Premium Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN UTM Level 5: Cyberoam holds a unique & complete UTM certification IPS/IDP

ICSA Certified Firewall IPv6 Ready Member of Internet Watch Foundation ICSA Certified High-Availability VPNC Certified for Basic VPN & AES Interoperability

Authorised Distributor in North Africa

Morocco | Tunisia | France Switzerland | Algeria

Config Tunisia Cyberoam National Distributor

Tel : +216 71 792 802 Fax : +216 71 792 611 Email: [email protected]

Next Step IT Cyberoam Preferred Reseller Tel: + 216 71 90 60 41 Fax: + 216 71 90 60 43

Email: [email protected]

Questions?

Yashesh Vaishnav Regional Manager Cyberoam www.cyberoam.com

Email: [email protected]