Cyberoam Next-Generation Security for Enterprises With organizations experiencing newer trends like high Internet speeds, virtualization, application explosion, increasing use of Web applications and BYOD, they ought to prepare for emerging security risks in their networks along with increasing concerns on insider threats, vanishing ‘trust boundaries’, compliance management and more. Growing businesses and rapidly expanding network horizons have lead to an increased demand for next-generation security, higher performance, easy security management and quick compliance, in enterprises. Cyberoam’s next-generation security caters to the security anxiety and demand for advanced network security in organizations today. www.cyberoam.com Securing You
8
Embed
Cyberoam Next-Generation Security for Enterprises : Brochure · 2019-11-23 · leakage over websites and applications, sophisticated & blended attacks, malware, spam, spyware and
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
CyberoamNext-Generation Security for Enterprises
With organizations experiencing newer trends like high
Internet speeds, virtualization, application explosion,
increasing use of Web applications and BYOD, they
ought to prepare for emerging security risks in their
networks along with increasing concerns on insider
threats, vanishing ‘trust boundaries’, compliance
management and more. Growing businesses and rapidly
expanding network horizons have lead to an increased
demand for next-generation security, higher
performance, easy security management and quick
compliance, in enterprises. Cyberoam’s next-generation
security caters to the security anxiety and demand for
advanced network security in organizations today.
www.cyberoam.com S e c u r i n g Y o u
The Cyberoam Solution for Network Security
Cyberoam is an award-winning global IT security
company with a presence in 125+ countries. With an
array of globally acclaimed and certified products,
Cyberoam offers reliable solutions for varied needs of
SOHO/ROBO, SMBs and Enterprises, including
network security, centralized security management and
centralized visibility. Trusted by thousands of customers
across the globe for its innovative products and
technology, Cyberoam enjoys a proven track record of
serving many well-known customers across various
industries.
Cyberoam’s Security Product Portfolio:
L7
L8
L6
L5
L4
L3
L2
L1
Application
Presentation
Session
Transport
Network
Data Link
Physical
USER
00-17-BB-8C-E3-E7
192.168.1.1
TCP, UDP
L2TP, PPTP
ASCII, EBCDIC, ICA
Cyberoam's treats “User Identity” as the 8th Layer in the protocol stack
Layer 8 Technology
Cyberoam Next Generation Firewall (NGFW) offers security across Layer 2-Layer 8 using Identity-based policies
Network SecurityOffers flexibility of hardware and virtual
network security appliances for security in
physical as well as virtual networks
Centralized Security ManagementAllows enterprises/MSSPs to manage multiple,
dispersed Cyberoam security installations across
remote or branch offices
Cyberoam’s Layer 8 Technology treats User Identity as the 8th
layer or the “human layer” in the network protocol stack. This
allows organizations to uniquely identify users, control user
activities in the network, and enable policy-setting and
reporting by username, even in dynamic IP environments like
DHCP and Wi-Fi. Cyberoam’s Layer 8 Technology adds speed
to security in a network by offering instant visibility into the
source of attacks by identifying victims/attackers by
username, which allows proactive remediation of security
incidents. With Layer 8 identification and controls, Cyberoam
enables security management, data protection, forensic
analysis and compliance management in organizations.
CYBEROAM’S LAYER 8 IDENTITY-BASED SECURITY
Centralized VisibilityOffers real-time visibility into user and network
activities across the enterprise network
Training & SupportEnables faster resolution of issues with customer
support and efficient deployment and
management of Cyberoam solutions with
trainings
Cyberoam integrates multiple security features on a single
appliance to offer comprehensive network security.
Cyberoam security appliances work at the network gateway
and protect networks against application threats,
vulnerabilities in web applications, BYOD challenges, data
leakage over websites and applications, sophisticated &
blended attacks, malware, spam, spyware and other
evolving external threats. With the flexibility of hardware as
well as virtual security appliances, Cyberoam protects both
the physical and virtual organizational networks.
NETWORK SECURITY
Next-Generation security features on Cyberoam network security appliances:
ŸStateful Inspection Firewall
ŸApplication Visibility & Control
ŸWeb Application Firewall
ŸVPN (SSL VPN & IPSec)
Ÿ Intrusion Prevention System
Ÿ Anti-Virus & Anti-Spyware
ŸAnti-Spam
ŸOutbound Spam Protection
ŸWeb Filtering
ŸBandwidth Management
Ÿ3G / 4G / WiMAX Connectivity *
ŸIM Archiving & Controls
ŸMultiple Link Management
ŸOn-Appliance Reporting
ŸIPv6 Ready
ŸWi-Fi Appliances *
ŸFleXi Ports *
* Features not available on virtual network security appliances
S e c u r i n g Y o u
Security Connectivity Productivity
Cyberoam network security appliances ensure Security, without compromising on the equally
essential, Connectivity and Productivity. Organizations can achieve a balanced growth with a network
security appliance that offers policy controls over its features to help achieve security, connectivity and
productivity, without compromising any one of them. With such an ideal combination of best-of-breed
assembly of features over a single interface, organisations get a complete networking solution in
Cyberoam.
CYBEROAM SECURITY APPLIANCES ASSURE
KEY HIGHLIGHTS:
! Sales, channel and customer presence across 125+ countries! Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group! 450+ employees globally; Industry leading R&D ! Patent-pending Identity-based Layer 8 Technology ! Common Criteria EAL4+ certified security! Recognized as a ‘Network Security Innovator’ by SC Magazine! Recognized as ‘Visionary’ in Gartner’s UTM Magic Quadrant
st! World’s 1 network security and UTM vendor with ISO 20000:2011 certified Customer Support
Services
Cyberoam NG series – Future-ready Security
Ÿ Offers protection against newly evolving threats with