Automate your IT Security Services - bluechipit.com.aubluechipit.com.au/eMarketing/technews/30.07.14/Cyberoam.pdf · Inside the mind of today’s cyber criminal 1. Indulge in multi-step,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Rising number of cyber threats against advanced nations such as the US.
What happened to all state-of-the-art firewalls?
www.cyberoam.com
Inside the mind of today’s cyber criminal
1. Indulge in multi-step, elaborate targeted attacks
2. Motivation goes beyond money, involves
hacktivism, nation-state espionage, business
rivalry, fame etc
3. Run deep investigation for potential vulnerabilities
– from firewalls to unpatched servers to poorly
guarded web apps to vulnerable users in the
target organization
www.cyberoam.com
Why is Security everywhere in this slide?
Cyber-infrastructure Visualized
www.cyberoam.com
Anatomy of a typical targeted attack
www.cyberoam.com
Automating IT Security: From Plugging Security Holes to Driving Proactive Defense
www.cyberoam.com
What necessitates automating IT security?
Common security concerns…
How to auto-provision uniform security policies for HQ, Data Center and Remote Branch offices
Inability to assess vulnerability exposure of network due to web apps, risky users etc
Lack of understanding on network intrusion attacks, network segmentation
Struggle with IPS security configuration
Don’t know what to allow or deny?
www.cyberoam.com
Here’s how automated IT security saves the day!
www.cyberoam.com
How Cyberoam helps automate IT security?
www.cyberoam.com
We know how IT and IT consumerization has changed…
www.cyberoam.com
We know how network and data centers environments have evolved
www.cyberoam.com
Cyberoam – addressing key challenges
Complexity Centrally manage complicated network security policies for hundreds of users, applications and networking devices Evolving business Enable support and security for new business applications while monitoring controlling risk prone apps Connectivity with productivity High-availability, automatic fail-over for business continuity; intelligent QoS management and prioritization for users and apps Reporting and compliance Providing ready and in-depth support for displaying compliance and reports on user and network activities
www.cyberoam.com
Currently available security automation with Cyberoam
- Identifying users instead of just IP address - Scheduled reports over email - Email scanning and shifting to quarantine - Identifying risky users - Compliance - HA, Failover, Load balancing - Burstable bandwidth - Centralized Security Management - ConnectWise integration - Cyberoam API - Pro-active security protection in IPS
www.cyberoam.com
Cyberoam addresses a commonplace catch 22 faced by today's CXOs
www.cyberoam.com
• Centralized Security Management for remote / branch offices
www.cyberoam.com
Dubai Head Office
New York Branch Office
Mumbai Branch Office
Boston Branch Office
Cyberoam
Cyberoam
Cyberoam
Cyberoam
Cyberoam Central Console (CCC)
CCC is for centralized, integrated management and monitoring of Cyberoam network security devices
- Complete control over distributed networks / remote branch offices from head office (H.O.)
Centralized Security Management
www.cyberoam.com
Servers
Firewalls
IDP / IPS
Switches Routers
UTM / NGFW
Applications
Desktop systems
Logs & Events
Identity
Logging Reporting
Compliance Management
Forensic Analysis
Log Management
Security Management
Automated Logging and Reporting
Ability to log and report activities from various users, devices / vendors