Cyberoam Virtual UTM
description
Transcript of Cyberoam Virtual UTM
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM
Our Products
Unified Threat Management
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Different Stages Virtualization ImplementationDifferent Stages Virtualization Implementation
Already Implemented In Process In Planning
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization Strategy: Data CenterVirtualization Strategy: Data Center
Simplify server management
Reduce infrastructure costs
Reduce physical server sprawl
Reduce power consumption
Implement scalable system to cater for future growth
Benefits
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Workstation virtualization- Transform single host server into workgroup of multiple users
Reduce infrastructure costs
Centralized control
Works in a BYOD scenario
Benefits
Virtualization Strategy: Office in a BoxVirtualization Strategy: Office in a Box
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Getting office into a box : Enterprise scenarioGetting office into a box : Enterprise scenario
Corporate office
Branch office 1
Branch office 2
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization – You Gain Some, You Lose SomeVirtualization – You Gain Some, You Lose Some
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scanning InterVM traffic- Cannot scan Inter-VM traffic with externally based security hardware- A single compromised virtual machine can infect the entire data center
Risk of attacks on Hypervisor management console Hypervisor & GuestOS
Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control
- Tying service access and network usage to user Identity
Security hardware cannot offer inline protection- Traffic flows are invisible; creating blindspots in network- Cannot conduct forensic analysis and display compliance
Security challenges in VirtualizationSecurity challenges in Virtualization
Need of virtual security solution for virtual environmentNeed of virtual security solution for virtual environment
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Solving Virtual ProblemsCyberoam Virtual UTM – Solving Virtual Problems
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Resides on the Virtual layer Scans all traffic inside virtual environment
Cyberoam Virtual applianceCyberoam Virtual appliance
VM2
AppsApps
Linux OSLinux OS
VM1
Windows OS
Windows OS
AppsApps
VM3
Other OSOther OS
AppsApps
Cyberoam Virtual UTM appliance
Hardware
Hypervisor
Best-of-breed security• Stateful inspection firewall• Intrusion Prevention System• Gateway Antivirus• Anti-spyware and Anti-spam• Web filtering• Application Visibility & Control• Web Application Firewall (WAF)• Virtual Private Network• Logging & Reporting• Layer 8 Identity-based security
Best-of-breed security• Stateful inspection firewall• Intrusion Prevention System• Gateway Antivirus• Anti-spyware and Anti-spam• Web filtering• Application Visibility & Control• Web Application Firewall (WAF)• Virtual Private Network• Logging & Reporting• Layer 8 Identity-based security
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Apply granular firewall and Security policies to traffic in virtual network Scan Inter-VM traffic Protect virtual networks from attacks on hypervisor management
console, hypervisor & Guest OS Secure zero trust networks with Layer 8 identity-based security Block attacks that exploit vulnerabilities in virtualized web applications Protect virtual servers from attacks with IPS Helps display compliance with logs & reports
Security in a Virtual Data CenterSecurity in a Virtual Data Center
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Security in a Virtual Data CenterScenario: Security in a Virtual Data Center
Internet
administrator
Cyberoam vUTMvSwitch
vSwitch
vSwitch
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Enterprise/ MSSP Security in a BoxScenario: Enterprise/ MSSP Security in a Box
BO/Customer 1
BO/Customer 3
BO/Customer 2
BO/Customer n
Complete Virtual Security solution
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario1: MSSP + Hosting Services ProviderMSSP Scenario1: MSSP + Hosting Services Provider
administrator
Cyberoam vUTM
vSwitch
Customer 2
InternetCyberoam vUTM
vSwitch
Customer 1
Cyberoam vUTM
vSwitch
Customer 3
vSwitch
vSwitch
vSwitch
Cyberoam vUTM
vSwitch
vSwitch
Central Console & Logging /Reporting
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario2: On-premise deploymentMSSP Scenario2: On-premise deployment
On-premise deployment
Internet
administrator
Cyberoam vUTM
vSwitch
vSwitch
MSSP
At Customer premise
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario3: ISP as an MSSPMSSP Scenario3: ISP as an MSSP
vUTM - Customer 1
vUTM – Customer 2
vUTM – Customer 3
Customer 1
ISP
Customer 2
SwitchR3
R1
R2
R4
Internet
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more
Access control for users- Tying service access and network
usage to user Identity
Provides multiple security features on single appliance
Cyberoam protects Virtual Office or ‘Office in a box’Cyberoam protects Virtual Office or ‘Office in a box’
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Office-in-a-box setupScenario: Office-in-a-box setup
administrator
Cyberoam vUTM
vSwitch
vSwitch
LAN
LaptopRepurposed PC
Thin Client
Switch
Internet
Switch
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam offersCyberoam offers
Protection for virtualized networks - Protects hypervisor management console, hypervisor & Guest OS- Scan Inter-VM traffic- Secure zero trust networks
Comprehensive Security- Consolidate multiple security features on single virtual appliance- Secures virtual networks to the extent of physical networks
Ease to deployment- Offers flexibility to allot number of vCPUs- Easy to upgrade with simple activation key
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam offersCyberoam offers
Compliance Management- Segregates and secures traffic and data between and around virtual entities to
help stay regulatory compliant- Display compliance with indepth on-appliance reports
Centralized Management for Virtual & Physical appliances- Centrally manage physical and virtual infrastructure using single interface with
CCC (Cyberoam Central Console) Available as Virtual CCC and Hardware CCC
- Ensure centralized, consistent and quick security actions across your network
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization platforms SupportedVirtualization platforms Supported
VMware ESX/ESXi 3.5/4.0/4.1/5.0 VMware Workstation 7.0 or 8.0 VMware Player 3.0 or 4.0
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM appliance modelsCyberoam Virtual UTM appliance models
Offering Licensing
CRiV-1C Supports upto 1vCPU
CRiV-2C Supports upto 2vCPU
CRiV-4C Supports upto 4vCPU
CRiV-8C Supports upto 8vCPU
CRiV-12C Supports upto 12vCPU
Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam’s Security PortfolioCyberoam’s Security Portfolio
Software
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Take Control of Your Security Infrastructure with CyberoamTake Control of Your Security Infrastructure with Cyberoam
Take Control of - WHAT you want?- HOW MUCH you want?- HOW you want?
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtual UTM - WorkflowVirtual UTM - Workflow
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ContentContent
Introduction – Cyberoam Virtual UTM Cyberoam Virtual UTM – Trial
- Order- Registration
Cyberoam Virtual UTM – Upgrade- Order- Apply Upgrade
Resources
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
IntroductionCyberoam Virtual UTM
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – CRiV SeriesCyberoam Virtual UTM – CRiV Series
Platform support:
- VMware ESX/ESXi 4.0/4.1/5.0
- VMware Workstation 8.0/9.0
Base Configuration Required:
- One vCPU
- 1GB vRAM
- 3 vNIC
- Primary Disk with 4GB size
- Report Disk with 80GB size
- 1 Serial Port
- 1 USB Port
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Subscriptions
Cyberoam Virtual UTM appliance range
CRiV-TR(30days Trial)
CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12CCRiV-UNL
Supported vCPU 32 1 2 4 8 12 32
IPS ● ○ ○ ○ ○ ○ ○
Gateway Anti-Spam ● ○ ○ ○ ○ ○ ○
Gateway Anti Virus ● ○ ○ ○ ○ ○ ○
Outbound Spam Protection ● ○ ○ ○ ○ ○ ○
Web and Application Filter ● ○ ○ ○ ○ ○ ○
Web Application Firewall ● ○ ○ ○ ○ ○ ○
Support ●(8x5)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
● Available ○ Optional
Cyberoam Virtual UTM SubscriptionCyberoam Virtual UTM Subscription
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – TrialCyberoam Virtual UTM – Trial
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Order
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit www.cyberoam.com & Click on “Try & Buy”
STEP01
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam sales team forwards customer lead to respective partner
STEP02
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial
Steps For Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit https://partner.cyberoam.com
STEP01
Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP02
Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP03
Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer
Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Registration
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
Continued
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit https://customer.cyberoam.com
Existing Customers Login to Customer Portal
Existing Customers Login to Customer Portal
New Customers create account and Login with credentials
New Customers create account and Login with credentials
STEP03
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP04
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Enter Trial Appliance Key and other details
Enter Trial Appliance Key and other details
STEP05
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Email to customer confirming registration of virtual appliance
STEP06
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Email to customer with steps to download Virtual UTM appliance
STEP07
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Download Virtual UTM OVF Download Virtual UTM OVF
Install Cyberoam Virtual UTM(Refer Installation Guide for reference)
Install Cyberoam Virtual UTM(Refer Installation Guide for reference)
STEP08
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Click on Registered appliance key to see appliance information
Click on Registered appliance key to see appliance information
STEP09
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP10
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – UpgradeCyberoam Virtual UTM – Upgrade
Upgrade from Trial to Full Version
Upgrade to Higher model
Upgrade from Trial to Full Version
Upgrade to Higher model
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Upgrade Order
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer places an order with partner to Buy Full Version or
Upgrade Model
Customer provides Previous Appliance Key to Partner (Trial
appliance key or old appliance key) along with the order
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
STEP01
STEP02
STEP03
Visit https://partner.cyberoam.com
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Partner shares Cyberoam Virtual UTM Upgrade Key with the customer
Cyberoam Team sends Virtual UTM Upgrade Key to Partner
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Apply Upgrade
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
From the Menu select “License upgrade” From the Menu select “License upgrade”
Login to Virtual UTM’s CLI Console Login to Virtual UTM’s CLI Console
STEP01
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
From the Menu select Purchased Model No. From the Menu select Purchased Model No.
STEP02
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
On successful activation previous appliance expires and new registered appliance is shown in customer portal
On successful activation previous appliance expires and new registered appliance is shown in customer portal
Enter Upgrade Key to activate the purchased appliance Enter Upgrade Key to activate the purchased appliance
STEP03
Customer
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ResourcesResources
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ResourcesResources
Cyberoam Virtual UTM – CRiV Series Installation Guide
Cyberoam Virtual UTM – CRiV Series Upgrade Guide
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank you