Cyberoam Virtual UTM – Trial

Download Report

Transcript Cyberoam Virtual UTM – Trial

Securing You
Cyberoam Virtual UTM
Our Products
Unified Threat Management
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Different Stages Virtualization Implementation
 Already Implemented
 In Process
 In Planning
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization Strategy: Data Center
Benefits
 Simplify server management
 Reduce infrastructure costs
 Reduce physical server sprawl
 Reduce power consumption
 Implement scalable system to cater
for future growth
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization Strategy: Office in a Box
 Workstation virtualization
- Transform single host server into workgroup of multiple users
Benefits
 Reduce infrastructure costs
 Centralized control
 Works in a BYOD scenario
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Getting office into a box : Enterprise scenario
Branch office 1
Corporate office
Branch office 2
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization – You Gain Some, You Lose Some
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security challenges in Virtualization
 Scanning InterVM traffic
- Cannot scan Inter-VM traffic with externally based security hardware
- A single compromised virtual machine can infect the entire data center
 Risk of attacks on
 Hypervisor management console
Need of virtual security solution for virtual environment
 Hypervisor & GuestOS
 Exploitation of virtualized web-facing application vulnerabilities by hackers
 Protecting virtualized servers from intrusion attacks
 User-based access control
- Tying service access and network usage to user Identity
 Security hardware cannot offer inline protection
- Traffic flows are invisible; creating blindspots in network
- Cannot conduct forensic analysis and display compliance
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM –
Solving Virtual Problems
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual appliance
 Resides on the Virtual layer
 Scans all traffic inside virtual environment
VM1
VM2
VM3
Apps
Apps
Apps
Windows
OS
Linux OS
Other OS
Hypervisor
Hardware
www.cyberoam.com
Best-of-breed security
• Stateful inspection firewall
• Intrusion Prevention System
• Gateway Antivirus
• Anti-spyware and Anti-spam
• Web filtering
• Application Visibility & Control
Virtual
UTM appliance
• Cyberoam
Web Application
Firewall
(WAF)
• Virtual Private Network
• Logging & Reporting
• Layer 8 Identity-based security
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Security in a Virtual Data Center
 Apply granular firewall and Security policies
to traffic in virtual network
 Scan Inter-VM traffic
 Protect virtual networks from attacks on
hypervisor management console, hypervisor
& Guest OS
 Secure zero trust networks with Layer 8
identity-based security
 Block attacks that exploit vulnerabilities in
virtualized web applications
 Protect virtual servers from attacks with IPS
 Helps display compliance with logs & reports
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Security in a Virtual Data Center
vSwitch
Internet
vSwitch
Cyberoam vUTM
vSwitch
administrator
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Enterprise/ MSSP Security in a Box
Complete Virtual Security solution
BO/Customer n
BO/Customer 3
BO/Customer 2
BO/Customer 1
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario1: MSSP + Hosting Services Provider
Customer 1
Internet
Central Console &
Logging /Reporting
vSwitch
Cyberoam vUTM
vSwitch
Cyberoam vUTM
Customer 2
vSwitch
vSwitch
vSwitch
vSwitch
Cyberoam vUTM
vSwitch
Customer 3
administrator
vSwitch
Cyberoam vUTM
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario2: On-premise deployment
On-premise deployment
MSSP
Internet
vSwitch
vSwitch
Cyberoam vUTM
administrator
At Customer premise
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario3: ISP as an MSSP
Customer 1
Internet
R1
R4
vUTM - Customer 1
vUTM – Customer 2
ISP
R3
Switch
vUTM – Customer 3
R2
Customer 2
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam protects Virtual Office or ‘Office in a box’
 Protects network and assets with
features like Firewall, IPS, Gateway AV,
AS, WAF, VPN and more
 Access control for users
- Tying service access and network
usage to user Identity
 Provides multiple security features on
single appliance
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Office-in-a-box setup
Internet
Switch
Switch
vSwitch
LAN
vSwitch
Cyberoam vUTM
administrator
Repurposed
PC
Laptop
www.cyberoam.com
Thin Client
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam offers
 Protection for virtualized networks
- Protects hypervisor management console, hypervisor & Guest OS
- Scan Inter-VM traffic
- Secure zero trust networks
 Comprehensive Security
- Consolidate multiple security features on single virtual appliance
- Secures virtual networks to the extent of physical networks
 Ease to deployment
- Offers flexibility to allot number of vCPUs
- Easy to upgrade with simple activation key
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam offers
 Compliance Management
- Segregates and secures traffic and data between and around virtual entities to
help stay regulatory compliant
- Display compliance with indepth on-appliance reports
 Centralized Management for Virtual & Physical appliances
- Centrally manage physical and virtual infrastructure using single interface with
CCC (Cyberoam Central Console)

Available as Virtual CCC and Hardware CCC
- Ensure centralized, consistent and quick security actions across your network
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization platforms Supported
 VMware ESX/ESXi 3.5/4.0/4.1/5.0
 VMware Workstation 7.0 or 8.0
 VMware Player 3.0 or 4.0
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM appliance models
Offering
Licensing
CRiV-1C
Supports upto 1vCPU
CRiV-2C
Supports upto 2vCPU
CRiV-4C
Supports upto 4vCPU
CRiV-8C
Supports upto 8vCPU
CRiV-12C
Supports upto 12vCPU
Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam’s Security Portfolio
Software
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Take Control of Your Security Infrastructure with Cyberoam
 Take Control of
- WHAT you want?
- HOW MUCH you want?
- HOW you want?
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtual UTM - Workflow
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Content
 Introduction – Cyberoam Virtual UTM
 Cyberoam Virtual UTM – Trial
- Order
- Registration
 Cyberoam Virtual UTM – Upgrade
- Order
- Apply Upgrade
 Resources
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Introduction
Cyberoam Virtual UTM
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – CRiV Series
 Platform support:
 Base Configuration Required:
- VMware ESX/ESXi 4.0/4.1/5.0
- One vCPU
- VMware Workstation 8.0/9.0
- 1GB vRAM
- 3 vNIC
- Primary Disk with 4GB size
- Report Disk with 80GB size
- 1 Serial Port
- 1 USB Port
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM Subscription
Cyberoam Virtual UTM appliance range
Subscriptions
CRiV-TR
(30days Trial)
CRiV-1C
CRiV-2C
CRiV-4C
CRiV-8C
CRiV-12C
CRiV-UNL
Supported vCPU
32
1
2
4
8
12
32
IPS
●
○
○
○
○
○
○
Gateway Anti-Spam
●
○
○
○
○
○
○
Gateway Anti Virus
●
○
○
○
○
○
○
Outbound Spam Protection
●
○
○
○
○
○
○
Web and Application Filter
●
○
○
○
○
○
○
Web Application Firewall
●
○
○
○
○
○
○
Support
●
○
○
○
○
○
○
(8x5)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
(8x5/24x7)
●
Available
www.cyberoam.com
○
Optional
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Order
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
01
Securing You
Visit www.cyberoam.com & Click on “Try & Buy”
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
02
Securing You
Cyberoam sales team forwards
customer lead to respective partner
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Partner
Partner contacts customer and confirms customer
request for Cyberoam Virtual UTM Trial
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Partner STEP
01
Securing You
Visit https://partner.cyberoam.com
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
www.cyberoam.com
Partner STEP
02
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
www.cyberoam.com
Partner STEP
03
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Team sends Virtual UTM Trial
Appliance Key to Partner
Partner shares Cyberoam Virtual UTM
Trial Appliance Key with the customer
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Registration
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
Continued
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
03
Securing You
Visit https://customer.cyberoam.com
 Existing Customers
Login to Customer
Portal
 New Customers create
account and Login with
credentials
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
www.cyberoam.com
Customer STEP
04
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
05
Securing You
 Enter Trial Appliance
Key and other details
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
06
Securing You
Email to customer confirming registration of virtual appliance
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
07
Securing You
Email to customer with steps to download Virtual UTM appliance
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer STEP
08
 Download Virtual UTM OVF
 Install Cyberoam Virtual UTM
(Refer Installation Guide for reference)
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer STEP
09
 Click on Registered appliance key to
see appliance information
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
www.cyberoam.com
Customer STEP
10
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Upgrade
 Upgrade from Trial to Full Version
 Upgrade to Higher model
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Upgrade Order
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer places an order with
partner to Buy Full Version or
Upgrade Model
Customer provides Previous
Appliance Key to Partner (Trial
appliance key or old appliance key)
along with the order
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Partner
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit https://partner.cyberoam.com
STEP
01
STEP
02
STEP
03
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Team sends Virtual UTM
Upgrade Key to Partner
Partner shares Cyberoam Virtual UTM
Upgrade Key with the customer
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Apply Upgrade
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
01
Securing You
 Login to Virtual UTM’s CLI Console
 From the Menu select “License upgrade”
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
02
Securing You
 From the Menu select Purchased Model No.
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Customer STEP
03
Securing You
 Enter Upgrade Key to activate the purchased appliance
 On successful activation previous appliance expires and new registered appliance is
shown in customer portal
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Resources
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Resources
 Cyberoam Virtual UTM – CRiV Series Installation Guide
 Cyberoam Virtual UTM – CRiV Series Upgrade Guide
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank you
www.cyberoam.com
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.