8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
1/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
Identity-Based Unified Threat Management
One Identity One Security
Presentation
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
2/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
Agenda of Presentation
About Company Challenges of UTM Scenario Introduction to Cyberoam Cyberoam Credentials / Awards/ Accreditations Cyberoam Product Walk-thru
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
3/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
Est. in 1999
500+ EmployeesISO 9001-2000 CertifiedPresence in USA, Asia, Middle EastProduct installations in 55+ Countries
Invested by $90bn Worlds LargestPrivate Equity Group
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
4/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
UTM : Unified Threat Management
A solution to fight against multiple attacks and threats
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
5/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
A true UTM Appliance should have following features in singlesolution:
1. Firewall2. VPN
3. Intrusion Detection & Prevention
4. Gateway Level Anti-virus for Mails, Website, File Transfers
5. Gateway level Anti-spam
6. Content Identification & Filtering
7. Bandwidth Management for Applications & Services
8. Load Balancing & Failover Facilities
UTM
Unified threat management (UTM) refers to a comprehensivesecurity product which integrates a range of security featuresinto a single appliance.
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
6/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
Benefits of UTM Appliances
Reduced complexity All-in-one approach simplifies product selection, integration and support
Easy to deployCustomers, VARs, VADs, MSSPs can easily install and maintain the products
Remote ManagementRemote sites may not have security professionals requires plug-and-play appliance foreasy installation and management
Better Man Power Management
Reduction in dependency and number of high end skilled Human resources
Managed ServicesSecurity requirements & day to day operations can be outsourced to MSSPs
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
7/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Lack of user Identity recognition and controlInadequate in handling threats that target the user Phishing, Pharming
Unable to Identify source of Internal ThreatsEmployee with malicious intent posed a serious internal threatIndiscriminate surfing exposes network to external threats50 % of security problems originate from internal threats Yankee GroupSource of potentially dangerous internal threats remain anonymous
Unable to Handle Dynamic Environments Wi-FiDHCP
Unable to Handle Blended Threats
Threats arising out of internet activity done by internal members of organizationExternal threats that use multiple methods to attack - Slammer
Lack of In-depth FeaturesSacrificed flexibility as UTM tried to fit in many features in single appliance.Inadequate Logging, reporting, lack of granular features in individual solutions
Challenges with Current UTM Products
Need for Identity based UTM
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
8/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Layer 8 Firewall (Patent-pending Technology)
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
9/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Patent Pending: Identity-Based Technology
User
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
10/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Cyberoam is the only Identity-based Unified ThreatManagement appliance that provides integrated Internetsecurity to enterprises and educational institutions throughits unique granular user-based controls.
Cyberoam Identity Based Security
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
11/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Cyberoam Appliances CRi Series
CRi series for SOHO (Small Office-Home Office)& ROBO (Remote Office-Branch Office)
CR 15wi - WirelessCR 15iCR 25iaCR 35ia
CRi series for Small to Medium Business
CR 50iaCR 100iaCR 200i
CRi series for Medium EnterprisesCR 300i CR 500iaCR 750ia
CRi series for Large Enterprises
CR 1000i
CR 1500i
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
12/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity-based Firewall VPN Bandwidth Management Multiple Link Management On Appliance Reporting 8*5 Tech Support & 1 Year Warranty
Subscriptions
Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)
Gateway Anti-spam SubscriptionWeb & Application Filtering SubscriptionIntrusion Prevention System (IPS) 8*5 Tech Support & 1 Year Warranty
Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis
Basic Appliance
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
13/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
2008 - Emerging Vendor of the Year
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
14/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Certifications
UTM Lev el 5 complete UTM certification
Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP
Premium
ICSA CertifiedFirewall
VPNC Certif ied for Basic VPN& AES Interoperabil i ty
Certifications - pipeline
ICSA Cert if icat ionfor HighAvai labi l i tyIPv6 com pliance
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
15/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
console is well organized andintuitive to navigate flexible and very powerful
Fully loaded, with many greatfeatures packs a more serious punch can restrict or open internet access bybandwidth usage, surf time or datatransfer.
March 2008 UTM Round upCyberoam CR1000i
Five Star Rated Three Years RunningJuly 2007 UTM Roundup
Cyberoam CR250i
Finalist in SC Magazine Awards 2009, Europe
Cyberoam has been short-listed as a finalist for the Best SME SecurityCategory
Year 2009 UTM RoundupOne of the best UTM
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
16/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
deserves credit for its flexible configuration options,extensive security, content filtering, and bandwidthmanagement features.
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
17/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Get top tech companyFrom Zdnet Asia 2008/09
Tomorrows Technology Today2007
2007 Finalist American Business Awards
2007 Finalist Network Middle East AwardBest Security ProductBest SMB Networking Vendor
VAR Editors Choice for BestUTM (2007 left , 2008-right)
Finalist - 2008 Global Excellencein Network Security Solution
CRN Emerging Tech Vendors2007
Awards
Finalist PC pro awards 2009for the Business Hardware of the year
Received Gold Award from IDGChannel World MagazineBest network security vendor 2009
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
18/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
GLOBAL PRESENCE (Over 55 Countries)
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
19/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Global Clientele
USA Largest Chain Store
http://www.lordandtaylor.com/gifts/OnlineShopping/LT?Dsp=1&cm_id=hdr_logo8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
20/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Education:
DY Patil Institute ofManagement
http://www.pascack.k12.nj.us/7027513016124/blank/browse.asp?A=383&BMDRN=2000&BCOB=0&C=533168/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
21/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
22/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
BFSI & Govt. Clientele
BSNL
b
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
23/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Malaysia Government Clients
C b
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
24/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Malaysia Corporate Clients
C b
http://www.annjoo.com.my/http://upload.wikimedia.org/wikipedia/en/1/18/Tunku_Abdul_Rahman_College.jpg8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
25/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Cyberoam Product walk thru
f
C b
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
26/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Normal Firewall
Rule matching criteria- Source address- Destination address- Service (port)- Schedule
Action- Accept
- NAT- Drop- Reject
- Identity
Cyberoam - Identity Based UTM
Unified Threat Controls (per Rule Matching Criteria)- IDP Policy- Internet Access Policy- Bandwidth Policy- Anti Virus & Anti Spam- Routing decision
However, fails in DHCP, Wi-Fi environment
C b U ifi d Th M
f d hC b
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
27/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Next GenerationLayer 7 Firewall
C b U ifi d Th M
U ifi d Th MC b
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
28/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Port 443
Port 80
443
80
443
8021
1 st Generation Firewalls
C b U ifi d Th t M t
U ifi d Th MC beroam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
29/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
MailSkype WebBit
Torrent
Application Firewalls CR Version 9
C b U ifi d Th t M t
U ifi d Th t M tCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
30/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
CRMERPSalesforce YouTubeIM
ApplicationWebmailCasualTraffic
Application Firewall Crowd of Applications Bandwidth Management
Next Generation Firewalls Version X
C beroam Unified Threat Management
U ifi d Th t M g tCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
31/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
CRM
ERP
Salesforce
You
Tube
IMApplication
Webmail
CasualTraffic
Application Firewall Crowd of Applications Bandwidth Management
Next Generation Firewalls
Cyberoam Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
32/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
New Architecture &
Firmware
Cyberoam Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
33/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Salient Features of theNG GUI
Cyberoam Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
34/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Accordion Menu & TABs for easy navigation of menu items
Cyberoam Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
35/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Easy Access Top Panel
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
36/80
Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam
Identity-Based Content Filtering
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
37/80
Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam
Database of millions of sites in 82+ categories
Blocks phishing, pharming, spyware URLs
HTTP upload control & reporting
Web and Application Filtering Features
Block & Control Applications such as P2P, Streaming, Videos/Flash
Local Content Filter Database to reduces latency and dependence
on network connectivity.
Customized blocked message to educate users about organizational
policies and reduce support calls
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
38/80
Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam
Identity Based Policies
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
39/80
Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam
Educate Users with Custom Denied Messages andReduce Your Support Calls
James
http://www.screensaver.com
Dear Mark,
The web site you are trying to accessis listed within the category SpywareandP2P
It can result in download of spyware and adware which result in popups.They are a threat to you and the enterprise and can slow the network down
http://www.screensaver.comhttp://www.screensaver.com
Dear Mark,
The web site you are trying to accessis listed within the category SpywareandP2P
It can result in download of spyware and adware which result in popups.They are a threat to you and the enterprise and can slow the network down
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
40/80
Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam
Application and Identity-based bandwidth allocation
Committed and burstable bandwidth
Time-based, schedule-based bandwidth allocation
Restrict Bandwidth usage to a combination of source, destination and
service/service group
Identity-based Bandwidth Management
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
41/80
Cyberoam Unified Threat ManagementUnified Threat ManagementCyberoam
External Authentication
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
42/80
y gU ed eat a age e tCybe oa
Authentication and External Integration
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
43/80
y ggy
Advanced Multiple Gateway Features
Schedule based bandwidth assignment
Gateway Alerts on Dashboard
Bandwidth Utilization Graphs
Active-Active Auto Link Failover & Load Balancing
Active-Passive Auto Link Failover
Source & Destination Routing
Support for more than 2+ ISP links
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
44/80
y ggy
Gateway Anti-Virus
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
45/80
y ggy
Scans WEB, FTP, Pop3, SMTP & IMAP traffic
Self-service quarantine area Signature update ever 30 Mins Identity-based HTTP virus reports Disclaimer Addition to outbound emails Spyware and other malware protection including Phishing emails Block attachment based on Extensions (exe, .bat, .wav etc)
Gateway Anti- Virus Features
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
46/80
y ggy
Gateway Anti-Spam
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
47/80
y
Spam filtering with (RPD) Recurrent Pattern Detection technology Virus Outbreak Detection (VOD) for zero hour protection
Self-Service quarantine area
Content-agnostic
Change recipients of emails
Scans SMTP, POP3, IMAP traffic
Gateway Anti-Spam Features
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
48/80
Protects against Image-based Spam and spam in different languages
The spam catch rate of over 98%1 in Million false positives in spam
Local cache is effective for >70% of all spam resolution cases
RPD (Recurrent Pattern Detection)
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
49/80
Intrusion Prevention System (IPS)
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
50/80
Multiple and Custom IPS policies Identity-based policies
Identity-based intrusion reporting Ability to define multiple policies
Reveals User Identity in Internal Threats scenario
IPS Features
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
51/80
Cyberoam in Numbers
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
52/80
Other Network / System Features
High Availability (Active-Active / Active-Passive) Stateful Failover
VPN Failover
Dynamic Routing (RIP, OSPF, BGP)
NTP Support
Multiple Configurable Syslog Server Support
GUI based Real Time Firewall Log
Roll Back (Roll back to last upgraded version)
And Much More
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
53/80
What is Multi-core:
More than one processors working together to achieve highprocessing power.
Benefits:
Purpose-built Hardware
True Parallel Processing
Each processor is programmed to run tasks parallel
In case of a new attack, Cyberoam appliances do not suffer from
performance degradation associated with switching from ASIC-based acceleration to general-purpose processors.
Multicore Processor-based Cyberoam
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
54/80
Cyberoam Reports are placed on Appliance
Other UTMsReporting Module/
Device
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
55/80
Integrated iViewReporting
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
56/80
Subscription free On-Appliance Reporting
Real-time Monitoring and Alerting
Over 1100+ Drilldown Reports
Reports in HTML, MHTML, PDF, & CSV formats & Email Alerts
Web 2.0 GUI and Reporting interface.
iView(Cyberoam Aggregated Reporting & Logging Software)
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
57/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
58/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
59/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
60/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
61/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
62/80
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
63/80
Instant MessagingLogging & Control
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
64/80
Instant Messaging Logging & Control
Yahoo & Windows Live Messaging
Control Who Communicates with Whom
Control Webcam usage
Control Voice Usage
Individual as well as Group Control
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
65/80
Control who can chat with whom
ArchiveCommunication
Control communication medium(chat, video, voice)
Data Protection
Productivity
Instant Messaging & Control
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
66/80
Cyberoam supports IPSec, SSL VPN, L2TP, PPTP
Threat Free Tunneling (TFT) VPN Firewall Management VPN Bandwidth Management VPN Protection Antivirus / Antispam / IPS / Content Filtering / DoS
VPN Topologies: Road-Warrior (Remote Access), Site to Site Hub & Spoke VPN Failover
Main Mode / Aggressive Mode
Identity based VPN control using xAuth
Local digital certification authority (CA) and support external CA
VPN Features
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
67/80
SSL VPN Enhancements
Application Access Mode within Web Browzer HTTP, HTTPS
RDP
Telnet , SSH
FTP
SSL VPN Client
Save Password
Auto Start VPN Connection
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
68/80
Stability& Performance
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
69/80
Stability & Performance
Firmware based approach
~10 second Soft Reboot Time
Fast GUI Access
Extensible Architecture vs ASIC
Preparing for upcoming threats
HTTP Proxy Enhancements for HTTP 1.1 protocol
Extensive Logging and Log Viewer for Instant Troubleshooting
Getting ready for the Enterprise.
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
70/80
And Much More
Role Based Access Control
Multiple Authentication Support for User
External Authentication for Administrator
Customer My Account Revamp
HTTP DDoS attack protection Naming Firewall Rules for easy troubleshooting
HTTP & FTP scanning over custom ports
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
71/80
And Much More
Inline Captive Portal
HTTPS
Super Enhanced Packet Capture Log & Log Viewer
VLAN over WAN
Support for MD5 Authentication for RIP & OSPF Enhanced IPS Actions
Drop Connection
Drop Attack Source
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
72/80
IPv6 Ready
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
73/80
IPV
Cyberoam With IPv6 Ready Logo Only 2
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
74/80
IPv6 Ready
Only the 2 nd UTM
IPv4 IPv6 tunneling
IPv6 IPv4 tunneling
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
75/80
3G & Wimax USB Card Connectivity
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
76/80
Version XSummary
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
77/80
Security
Productivity
Connectivity
Application Control
SSL (HTTPS)Scanning
Instant MessagingControl
Firmware based Approach
Usable GUI
3G Support
IPv6 Ready
SSL VPN Application AccessMode
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
78/80
Overview of Cyberoams Security Approach:
Who do you give access to: An IP Address or a User?
Whom do you wish to assign security policies:
Username or IP Addresses?
In case of an insider attempted breach, whom do you wish tosee: User Name or IP Address?
How do you create network address based policies in a DHCP
and a Wi-Fi network?
How do you create network address based policies for shared
desktops?
Cyberoam: Identity-based Security
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
79/80
Question/Answer Session
Cyberoam - Unified Threat Management
Unified Threat ManagementCyberoam
8/12/2019 Cyberoam UTM With Version X Presentation Slide - Updated
80/80
Thank You