Post on 21-Dec-2015
By:Yashesh VaishnavCyberoamwww.cyberoam.com
Why are we here? Company Profile MSSP
Requirements Cyberoam Solution Action Plan References Q&A
AGENDA
Why Are we Here ?
To Sign up Business alliance..
ISP to become as an MSSP
To offer Telecom Customers :
Network Connectivity, Productivity & Security with Cyberoam
CONNECTIVITY PRODUCTIVITY
&SECURITY
Offer
Company pROFILE
Cyberoam IntroductionCyberoam Introduction
Sales, Distribution Channel and Customers across 110+ Countries
Backed by World’s Largest PE Investor ($90bn); The Carlyle Group
Technology Powerhouse – Founded in 1999
800+ Employees
Patent Pending Identity-based Management
Amongst the top 3 global UTM players in terms of features
FEW CUSTOMER ACQUISITIONS (2011-12)
• Coffee Caribou USA (480 x CR15wi, CR1500ia HA @ HO with CCC)• Carlson Suites, USA (150 x CR15i )• Indian Army, India (50 x CR500ia, CR200i with CCC)• National Stock Exchange. India (240 x CR50ia with CCC)• LYDEC, Morocco ( Multiple CR’s)• Ministry of Justice, Morocco, (84x CR1000ia)• Casablanca Stock Exchange, Morocco (4 x 500ia)• Iran Postal Services, GCC, (44 x CR200i)• Islamic Azad University, GCC (10 x 500i, CR1000ia, CR1500ia, CCC)• BTT Bank, GCC, (30 X CR300i)• Abu Dhabi Government, Abu Dhabi (4 x CR1500ia)• Giordano, UAE/Saudi, (50 x CR25ia)• Clermont Ferrand, France (2 x CR1500ia, 14 x CR25ia, CCC)• Ministry of Interior, Italy, (8 x CR1500ia, CCC) • Ocean Life Insurance, Thailand (CR 25i 250 x CR25wi, CR500ia with CCC)• Ahli United Bank, Kuwait (34 x CR25ia, 2 x CR100ia)• British Aid, Kenya (6 x CR1500ia)• Imperial Logistics, South Africa (20 x CR15i)
Ministry of Defense, Nigeria (4000 x CR25ia, CCC5000, 8x1500i, 2000 NG SOHO
And Many More….
2.5 Years in North Africa!2.5 Years in North Africa!
Revenue grew 60% YOY500+ success deploymentsConducted 30 CCNSP & 7 CCNSE trainings14+ CCSC Trainings200+ CCNSPs on groundNumber of end client focused events & seminarsSuccessful Penetration in all the verticals.
North African ClienteleNorth African Clientele
And Many More….
MSSP?
Typical Requirements of MSSPTypical Requirements of MSSP
Providing best quality of services to clients with least effort and cost- Provide higher coverage of managed security services- Centralized control of client network’s security without
allocating dedicated resources for each clientRapid deployment at client site without
interrupting client operationsEasy Policy setting, Modification, Monitoring
Performance, Reacting to situations in timePro-active security management
Typical Requirements of MSSPTypical Requirements of MSSP
Have a system thatIs simple to configure and manageHelps meet the SLA’sHelp customers to display compliance
Ability to offer flexible security plans to clientsAbility to offer easy system upgrade alternative
for growing businesses
Business proposal
Be an MSSP in 3 Simple StepsBe an MSSP in 3 Simple Steps
Use Cyberoam UTM (Internal Network)
Sell Cyberoam UTM
Manage Cyberoam with CCC/ VCC/ CCMS
1
2
3
Cyberoam Solution for MSSP
Centralized security Management
Network Monitoring & Analysis
Network Security
Securing Home users
Cyberoam UTM – Layer 8 TechnologyCyberoam UTM – Layer 8 Technology
192.168.3.110Ancy192.168.3.105Richard Internet
Corporate LAN
DHCP
Administrator
Applies security policies based on actual identity of users.
User-specific rules for multiple users to share a common IP address
192.168.3.110Steve
Layer 8 security in DHCP environmentLayer 8 security in DHCP environment
Cyberoam’s Layer 8 (Identity-based) security
Cyberoam Audits
• Identity–based Logs + Reports • Compliance
Reports
Cyberoam Authorizes • Internet surfing quota• Schedule control• Security Policies• Web Filtering• Application Visibility &
Control• QoS / Bandwidth
Management• IM Controls
Cyberoam Authenticates • User Name• IP Address• MAC Id• Session Id
Users
Customers
Employees
Management
Partners
Identity-based AAA
Control user network activities• Who can connect to the network• Who can access what• What have they accessed
Ability to track the user activities; identify attackers /victims
Take quick network security decisions
Cyberoam UTM Features are :Cyberoam UTM Features are :
Fusion Technology driven SI Firewall- Interface for achieving Unified Security
Intrusion Prevention System- Maximum security against emerging threats- Identity-based IPS policies per user or group- 3500+ signatures – broadest security cover
Gateway Anti-Virus, Anti-spyware- Prevent blended threats- 4 million+ signatures- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
Other Cyberoam UTM Features are :
Other Cyberoam UTM Features are : Virtual Private Network (VPN)
- Threat-free remote access- Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN
Multi-Link Management- For an ‘always-on’ network- Support for more than 2 ISP links- Supports Wireless WAN (3G USB modems, WiMax)- Gateway failover over VPN
Other Cyberoam UTM Features are :Other Cyberoam UTM Features are :
Gateway Anti-Spam- Real-time, most accurate spam protection- Recurrent Pattern Detection (RPD) technology- Scans SMTP, POP3, IMAP traffic
Outbound Spam Protection- Protecting service providers against - Outbound Spam
iView: Intelligent logging & reporting- Real-time visibility into network activities- On-appliance reporting. LAYER 8 - Identity-based
reporting- 1200+ reports
Other Cyberoam UTM Features are :Other Cyberoam UTM Features are :
Instant Messaging & Control- Identity-based controls for Yahoo messenger and
Windows Live Messenger- Control who can chat with whom, file transfer, webcam
Bandwidth Management- Enhance network performance and productivity- Application and Identity-based bandwidth allocation
Other Cyberoam UTM Features are :Other Cyberoam UTM Features are :
3G/WiMAX Connectivity- Secure, Uninterruped WAN Connectivity- Configure Wireless WAN as primary or back-up link
‘IPv6 Ready’ Gold
Web & Content Filtering- Complete Visibility & Control over HTTP & HTTPS- 82+ categories and 44 million+ URLs
Multiple security features over single appliance
Cyberoam UTM – One Stop Solution !!!
Cyberoam UTM – One Stop Solution !!!
UTM appliance range Segment wise & Network size
UTM appliance range Segment wise & Network size
Small and Remote Offices
Small to Medium Enterprises
Large Enterprises
CR35wiNG, CR35iNG,CR 25wiNG – 6P, CR 25iNG – 6P,
CR25wiNG, CR25iNG,CR15wiNG, CR15iNG
CR200i, CR300i, CR100iNG, CR50iNG
CR 2500iNG, CR1500ia, CR1500ia-10F
CR1000ia, CR1000ia-10FCR750ia, CR750ia-1F/10F
CR500ia, CR500ia –RP/1F/10F
Subscriptions BifurcationsSubscriptions Bifurcations
Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam
(RBL Service)
Basic ApplianceBasic Appliance Subscriptions
Gateway Anti-Virus Gateway Anti-spam Web & Application Filtering Intrusion Prevention System (IPS) Web application firewall 8x5 Tech support & Warranty 24 x 7 Tech Support & Warranty
Cyberoam UTM – SubscriptionsCyberoam UTM – Subscriptions
Enables MSSP to offer flexible service packages to their customers
Customers with individual security needs:- Gateway Anti-Virus Subscription
(Anti-malware, phishing, spyware protection included)- Anti-Spam- Web & Application Filtering Subscription- Intrusion Prevention System Subscription
Advanced Subscriptions include:- Web Application Firewall (WAF) Subscription- Outbound Spam Protection Subscription
Support Subscriptions- 8x5 support- 24x7 support
Cyberoam UTM – Bundled SubscriptionsCyberoam UTM – Bundled Subscriptions
For customers not having mail server in their networkSecurity Value Subscription (SVS) / SVS Plus*
Gateway Anti-Virus Subscription(Anti-malware, phishing, spyware protection included)
Web & Application Filtering Subscription Intrusion Prevention System (IPS) 8x5 Tech Support & Warranty
For customer having mail server in their networkTotal Value Subscription (TVS) / TVS Plus*
Gateway Anti-Virus Subscription(Anti-malware, phishing, spyware protection included)
Gateway Anti-Spam Subscription Web & Application Filtering Subscription Intrusion Prevention System (IPS) 8x5 Tech Support & Warranty * SVS Plus and TVS Plus offers additional 24x7
support service to SVS and TVS services
Cyberoam UTM – Advance SubscriptionsCyberoam UTM – Advance Subscriptions
For customers having web server in their networkWeb Application Firewall (WAF) Subscription
Protection to corporate websites and web-based applications such as CRM, ERP, MIS, Payment Gateway and others
Website Flow Detector technology OWASP Top 10 web application vulnerabilities
For Service Providers to protect them from Outbound spamOutbound Spam Protection Subscription
Unique feature with Cyberoam UTM Scanning with Recurrent Pattern Detection (RPD) Technology Detection of Outbound Spam which is a part of global outbreak Near 98% spam detection False Positive rate of 1 in a million
CCC – Cyberoam Central ConsoleCCC – Cyberoam Central Console
Centralized integrated management and monitoring appliance
Helps Managed Security Service Providers (MSSP) to manage and
monitor their multiple Cyberoam installations centrally
Ease and flexibility of managementEase and flexibility of management
Easy grouping of Cyberoam UTM appliances- Based on geography, Cyberoam UTM models, firmware, organizations
(for MSSPs) and service subscriptions- Dynamic views in CCC help in managing, searching and sorting
appliances- Customizable and multiple dashboards
Group of UTM Appliances
Ease and flexibility of managementEase and flexibility of management
Based on Geography
Based on Appliance Models
Based on Client
Appliance DiscoveryAppliance Discovery
Automatically discover new unmanaged Cyberoam UTM appliances and add just with one click
Easy, instant security policy enforcementEasy, instant security policy enforcement
Simplified security management- Centralized policy creation and
implementation for all Cyberoam UTM features
Leads to uniform adoption of security practices across offices
Establish policies based on work-profiles across offices
- Subscription and signature updates for Cyberoam UTM features like Gateway Anti-Virus, Anti-Spam, etc.
- Protection against zero-hour threats
Easy, instant security policy enforcementEasy, instant security policy enforcement
Add UTM appliances Client based grouping of UTM appliances
Configure UTM appliance from CCC
Easy, instant security policy enforcementEasy, instant security policy enforcement
Easy, instant security policy enforcementEasy, instant security policy enforcement
Update configuration of UTM appliances
Easy Signature DistributionEasy Signature Distribution
Security against misuse of administrator privilegesSecurity against misuse of administrator privileges
Role-based administration privileges- For CCC appliance- Individual Cyberoam appliances- Groups of Cyberoam UTM appliances
CCC Access profiles
Profiles considered: VPN Administrator, Security Administrator, Global Administrator
Role based administration privilegesRole based administration privileges
CCC rights per access profile (example of VPN administrator rights)
Role based administration privilegesRole based administration privileges
CCC admin users
Role based administration privilegesRole based administration privileges
Role based administration privilegesRole based administration privileges
Access to each UTM appliance
Audit logs & alerts for organization-wide security visibilityAudit logs & alerts for organization-wide security visibility
Logs and views of administrator actions as well as dispersed UTM appliances- Instant security visibility- Supports regulatory compliance- Investigative analysis - Keeping track of historical activity
Email alerts - Based on expiry of subscription modules, excess disk usage, IPS and
virus threat counts, unhealthy surfing hits, etc. - Alert configuration on various parameters like excessive CPU usage,
spam mail count, virus count, etc.
Audit logs and alerts for greater security visibilityAudit logs and alerts for greater security visibility
CCC Logs
Audit logs and alerts for greater security visibilityAudit logs and alerts for greater security visibility
Cyberoam UTM appliance logs
Audit logs and alerts for greater security visibilityAudit logs and alerts for greater security visibility
Alert configuration
Audit logs and alerts for greater security visibilityAudit logs and alerts for greater security visibility
Email Alert
Cyberoam’s Centralized Management Solution available as:Cyberoam’s Centralized Management Solution available as:
Hardware Appliance
Virtual CCC (VMWare Supported)
Cloud Computing Managed Services
Hardware CCC ApplianceHardware CCC Appliance
Dedicated appliance for centralized management
Manage from 15 to 1000 Cyberoam UTM appliances
Virtual CCC ApplianceVirtual CCC Appliance
VMware based CCC Virtual appliances
Server-based Virtual environment and Workstation-
based Virtual environment
Eliminate need for dedicated hardware, reduce cost
of ownership, simplify future upgrades for users
Cyberoam’s On-Cloud Management Service (CCMS)Cyberoam’s On-Cloud Management Service (CCMS)
Managed security services hosted on
Cyberoam’s Cloud - MSSPs don’t need to
invest in core SoC
Customer account management,
customer appliance monitoring and
management from the web portal
MSSP engineer can offer services to
clients from anywhere without being
present at the SoC
MSSP can maximize their revenue with
recurring business
Abu DhabiDubai
Sharjah
Group: Customer2
Abu DhabiDubai
Sharjah
Group: Customer1
MSSP Network
Customer
Appliances
CCC BenefitsCCC Benefits
Real-time protection against newly identified threats
Complete control over distributed networks from central location
Quick policy setting and security management
Lower operational cost, complexity and time to maintain dispersed client
networks
Enables MSSPs to have different personnel for managing distributed
Cyberoam UTM appliances for quick, error-free security management
Cyberoam offers First-of-its-kind
On-Appliance Reporting
Eliminates the need to purchase a dedicated reporting solution
- 1200+ indepth reports Real time visibility into user and network activities Logs and Reports help organizations with
- Security management- Compliance Management- Forensic Analysis
Reports include dynamic and animated reports, in-line graphs, country maps
First-of-its-kind On-appliance reporting
Interactive World Traffic Map
Interactive World Traffic Map for Source and Destination traffic
Dual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
Dual Dashboard – Traffic and Security Dashboard
Security Dashboard
Application Reports
Compliance Reports
Abu DhabiDubai
Sharjah
Group: Customer2
Abu DhabiDubai
Sharjah
Group: Customer1
MSSP Network
Customer
Appliances
Abu DhabiDubai
Sharjah
Group: Customer3
Cyberoam Deployment for MSSPCyberoam Deployment for MSSP
Cyberoam Central ManagementHardware/Virtual/Cloud
MPLS Network
FTTx Network(GPON Technology)
DSL or Wi-Max
Taking a look at each steps in MSSP operationsTaking a look at each steps in MSSP operations
Client Requirement Identification
Deployment & Testing
Remotely managing Security of client setup
Reporting & Compliance Management
Cyberoam can help MSSP at each step
Client Requirement IdentificationClient Requirement Identification
Based on number of users
Cyberoam UTMs available for various size of organizations
Security requirement of client
Individual or bundled subscriptions
Deployment & TestingDeployment & Testing
Rapid client site deployment through pre-configured Deployment Kit
Cyberoam’s industry standard design easily fits in to client’s existing
infrastructure
Cyberoam Deployment Kit
Remote Security ManagementRemote Security Management
Real-time visibility of client’s network with alerts
Multiple ways of remotely monitoring and managing client networks
Hardware appliance
VMware based virtual appliance
Cloud based centralized management
Reporting and Compliance ManagementReporting and Compliance Management
Centrally manage logging and reporting of multiple client sites
Generate reports for each client
Comply to industry standard compliances as per client needs
UpdateUpdate
Protect client’s network against latest threats
Automatic subscription and signature updates
Before Purchase While Installation
After Sales: • On Chat• On Email• On Phone
After Sales: • 24x7 to
Resellers• 8x5 to
Enduser
Cyberoam After Sales Services
Customer Engineer Team (CE)
Dedicated Technical Account Manager (TAM) for every region
Rest of World (ROW)
(ANZ, APAC, ME, EU,LATAM, AFRICA)
North America & Canada SAARC
Cyberoam Global Presales Team
Presales Team StructurePresales Team Structure
Presales Support for PartnerPresales Support for Partner
EMAIL: AFRICAPARTNERS@CYBEROAM.COM
CHAT: HTTP://WWW.CYBEROAM.COM/PRESALESSUPPORT
PHONE: +1-877-777-0368 (TOLL FREE)
24x7 AVAILABILITY
KNOWLEDGE Base for Partners :For How To’s, FAQ’s, Release Notes http://kb.cyberoam.com
Post-sales Support
- Chat
- Telephone: Toll Free
Post-sales Support
Post-sales Support for Customer’sPost-sales Support for Customer’s
Developing competencies with Cyberoam UTM appliances
CYBEROAM CERTIFIED NETWORK & SECURITY EXPERT (CCNSE)
CYBEROAM CERTIFIED TRAINER (CCT)
CYBEROAM CERTIFIED NETWORK & SECURITY Professional (CCNSP)
Training & Certification Programs for PartnerTraining & Certification Programs for Partner
ISP REFERENCES
ISP’s References Worldwide
West Africa Telecom, Liberia (MSSP)
GLO – Nigeria’s Largest Telco
Cobranet – Nigeria (MSSP)
Busy Internet – Ghana (MSSP)
Netcom – Nigeria (MSSP)
Vodacom – Tanzania Biggest Telco
SimbaNet – Tanzania
ISP’s References Worldwide
SimbaNet – Kenya (MSSP)
Access Kenya – Kenya (MSSP)
CS Lox Info – Thailand (MSSP)
TRUE – Thailand ISP (MSSP)
CAT – Thailand (MSSP)
Baltnetos – Lithuania (MSSP)
DootAll – Netherlands (MSSP)
ISP’s References Worldwide
Mobile 8 – Indonesia (MSSP)
MTDS – Morocco
AIRLINK – Morocco
& many more..
Certifications
2012Magic Quadrant for Unified
Threat Management
NOT TO FORGET
“Cyberoam maintains a high level of loyalty from its channel partners.” Source: Gartner MQ 2011
2012: Rated #3 in UTM market in terms of Competeness of Vision
Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP
UTM Level 5: Cyberoam holds a unique & complete UTM certification
ICSA Certified Firewall VPNC Certified for Basic VPN & AES Interoperability
ICSA Certified High-Availability
PremiumPremium
IPv6Ready
Member of Internet Watch
Foundation
Host of Awards / CertificationsHost of Awards / Certifications
Authorised Distributor in North AfricaAuthorised Distributor in North Africa
Config TunisiaCyberoam National Distributor
Tel : +216 71 792 802Fax : +216 71 792 611 Email: config.tunisie@config.tn
Morocco | Tunisia | FranceSwitzerland | Algeria
Next Step ITCyberoam Preferred Reseller
Tel: + 216 71 90 60 41Fax: + 216 71 90 60 43Email: h.maalaoui@it-nextstep.com
Questions?
Yashesh VaishnavRegional Manager Cyberoamwww.cyberoam.comEmail: yashesh.vaishnav@cyberoam.com