Cyberoam SSL VPN Presentation
Download
Report
Transcript Cyberoam SSL VPN Presentation
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN - Secure Remote Access
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Established in 1999.
500+ Employee Company.
ISO 9001-2000 Certified.
55 Distributors covering 75+ countries.
30000+ combined installation of
Unified Threat Management
Central Console (CCC)
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Agenda of Presentation
• The Business Need of SSL VPN
• About Cyberoam SSL VPN
• Product Walkthrough
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
The Business Need for SSL VPN
Also, An Introduction to Virtual SSL VPN
Appliances
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Secure, Remote Access is indispensable in today’s work environment
Scenario 1:
Employees and
Mobile Workers
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Secure, Remote Access is indispensable in today’s work environment
Scenario 2: Partners, Suppliers and
Customers get Extranet access
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Solutions Comparison: When to use What?
IPSec
SSL VPN
PPTP
Use SSL VPN in
Different Locations: Home, Airport,
Hotels, cyber cafe
L2TP
Various Devices
Ideal for a limited number of
employees accessing corporate
resources through clients on
trusted devices
laptops, home PC, PDA,
mobile phone
Extranet access to customers,
partners, suppliers
Web-enabled access – no need
to install client on device
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
The Onset of Virtualization in SSL VPN…
How is it done?
Utilizing virtualization environments like
VMware
Building Virtual appliances within
existing hardware
Running a large number of
independent, virtual SSL VPN gateways
Implementing complex virtual
datacenters so servers are consolidated
across multiple physical servers
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
The Onset of Virtualization in SSL VPN…
Benefits
Multiple SSL VPN instances can run on
one single appliance
Appliance-wide or individual instances
upgrades
Optimum hardware resource allocation
Resilience to hardware failure
Increases deployment scalability
Minimizes operating and maintenance
costs
Eco-friendly
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Business Advantages of SSL VPN
Higher security due to 128-K Encryption and Authenticated Access
Granularly restrict users to specific applications and resources
Security checks on endpoint devices even before giving access
Ease of Use
Lower costs, Less Maintenance
Least Admin intervention
Access from any web-enabled device
Minimum downtime
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
About Cyberoam SSL VPN
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN – Secure Remote Access
Cyberoam SSL VPN
Different Devices
Employees,
Customers,
Partners and guest
users
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Internal
Resources
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN – How does it work?
Client Certificate
Server Certificate
Username/Password
Roaming User
User gets a list of
applications based
on policies
Cyberoam SSL VPN
Servers
(App./Web/FTP/File
Share/WTS etc)
All Published
Applications/Resources
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Why choose Cyberoam SSL VPN?
Identity-based Security
Monitor user log-on activity including username, MAC
address, IP address of endpoint
Know “who is doing what” in the network
Available as Virtualized Solution
Available as virtual appliances
Run a large number of independent virtual
gateways from existing infrastructure
Scalability and Performance
Unlimited user license
N+1 clustering with application load balancing
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Multiple Applications Support
Microsoft Outlook, TCP, 802.11X and UDP,
FTP, Citrix and Microsoft Terminal Servers
and more
Secure Firewall Traversal
Works alongside existing firewalls
Prevents exposure of UDP port ranges to
hackers
Does not publish internal IP address
to outside network
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Authentication and Authorization
Supports LDAP, AD, RADIUS etc.
E-mail based user-provisioning
Support for external two-factor& biometric
authentication
Access Mode
Clientless VPN with a browser agent for
seamless access to applications
Linux, Windows, MAC support
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Device Profiling (Endpoint Security)
Product checks – Anti-virus, Firewall &
Anti-spyware
Up to 1100+ products supported
MAC address and IP address checks
Quarantine policy for devices that fail
profiling test
Remediation information sent to user for
any failed access e.g. updating anti-virus
software, configuring firewall etc.
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Key Features
Management
Web-based and Command Line Insole
Wizard-driven installation
Role-based administration
Monitor and disconnect live users
Real-time status and monitoring
Auditing & Logging
Users logon activity including time of
access, username, MAC address and IP
address of endpoint
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Product Walkthrough
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Dedicated SSL VPN appliance Deployment
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN Virtual Appliance
No need to buy separate hardware!!
Based on VMWare virtualization platform
Install multiple virtual SSL VPN machines
Cyberoam’s Virtualization platform, VMware allows virtual
datacenters where servers are consolidated across multiple
physical servers, for guaranteed efficiency and performance
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Virtual Appliance Deployment Diagram
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Bootstrap State
◦ Initial Installation
Configuration state
◦ State where firmware upgrades, license upgrades,
backup-restore can be performed (Involves downtime)
Run State
◦ Resource configuration on-the-fly possible
◦ State in when users connect and access their
resources
Note: Appliance can be changed from Configuration state
to Run State as and when needed or vice versa
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Create Users
Create Groups
Organize Users in Groups
Register Applications
Create Application Groups
AD/LDAP Groups
Endpoint Security Policies
Organize applications into application groups
Device Profiling
Access Filters
Access Control
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Create Policy
Mandatory Profile
Create Profile
Quarantine Profile
General Profile
Select the Policies that apply for the Profile
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Pricing and Support
Virtual Appliance Mode
Dedicated Appliance Mode
Concurrent user license (upgrade option
Base License – Default 5 user license
available e.g.50 to 100 user license
available for 30 days FREE TRIAL
upgrade)
No Endpoint Security in Trial version
Support Plans: 8X5 and 24X7 plans based on
appliance + per user license
Free Trial Download online with support + full
access to all features
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Comparison of Cyberoam Dedicated Appliance Offerings
CR-SSL-800
CR-SSL-1200
CR-SSL-2400
Supports 1-50
concurrent users
Supports 51-250
concurrent users
Supports 251-1000
concurrent users
Secure, remote
Intranet & Extranet
access
Secure, remote
Intranet & Extranet
access
Secure, remote
Intranet & Extranet
access
Designed For SMEs,
MSSPs and more
Designed For SMEs,
large enterprises,
MSSPs and more
Designed For large
global enterprises,
MSSPs
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Summary Benefits for MSSPs
New Revenue Opportunities: Global SSL VPN market at $500 million in
2008 (Source: Gartner)
Support: 24X7 Support and monitoring
Centralized Policy Management
Continuous access
Familiar, easy-to-use interface
Cyberoam Virtual Appliances allow MSSPs to service multiple clients
through shared allocation of hardware resources
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Summary Benefits for Organizations– Cyberoam SSL VPN
Reduced costs: Centralized management, minimum admin intervention,
timely support
Protect your Investments: Use existing networks, firewalls, servers
Trusted Remote Access: Extend access to regional offices, partners,
customers, telecommuters, wireless users
Continuous access: Provide reliable access 24X7
Increase employee productivity (Intranet portals, ERP)
Partner access to internal applications (Partner Extranet)
Eliminate risks of organizational resource access from cyber cafes,
customer site etc.
Apply Uniform security policy
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Cyberoam SSL VPN Virtual Appliance Free Trial…
Register for a free online trial
A fully functional Cyberoam product
Free technical support
No financial obligations
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Question/Answer Session
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy
Cyberoam
Cyberoam
- Unified
Threat Management
Unified
Threat
Management
Thank You
Please visit us at www.secureone.com.my
Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy