Virtualization is offering cost and scalability benefits to organizations, removing the barriers of their physical network infrastructure. With 58 million virtual machines in 2012 – a rise of 47.2 million virtual machines since 2010, virtualization seems to be the preferred choice among organizations today. However, security in virtual environments still remains an issue in these organizations.
Cyberoam virtual UTM appliances offer industry-leading network security to virtual data-centers, “Security-in-a-Box” set-up for MSSPs/organizations, and “Office-in-a-Box” set-up. By offering comprehensive security features available in its hardware UTM appliances, in virtualized form, Cyberoam virtual UTM offers security for virtual networks on a single virtual appliance, which is as strong as security for the physical networks.
Cyberoam offers a complete virtual security solution to organizations with its virtual UTM appliances, virtual Cyberoam Central Console for centralized management, and Cyberoam iView software for centralized logging and reporting.
Take control of what you want, how much you want, how you want it with Cyberoam virtual UTMs!
WHAT you want
Get a virtual security solution for virtualized environments without deploying a hardware security appliance anymore
Get support to scale-up your security in virtual network as your business grows
HOW MUCH you want
Upgrade your virtual UTM appliances using a simple activation key to match your growing business needs
Get benefits of a shared infrastructure by capitalizing on the lean and peak periods of network activities
HOW you want
Choose between individual and a mix of physical and virtualized environments without worrying about security
Get deployment flexibility with a licensing model that is based on the number of vCPUs
Upgrade to a higher virtual UTM model only when you want to even when the number of network users increase beyond the recommended number for a given model
The virtual platforms supported by Cyberoam virtual UTMs:
Along with the flexibility to deploy hardware and virtual UTM appliances for network security, Cyberoam virtual UTMs protect virtual networks from attacks on hypervisor management console, hypervisor & Guest OS, virtualized web-facing applications and servers and allows organizations to secure Zero Trust Networks with comprehensive security features in virtualized form.
Protection for Virtualized Networks Cyberoam virtual UTM appliances remove blind spots within the virtualized environments with their ability to scan inter-VM traffic, also allowing granular firewall and security policies over inter-VM traffic. In cases where the hypervisor management console is placed in live production virtual environment due to lack of segmentation within virtual environments, organizations get security from threats like hyperjacking and other hypervisor vulnerabilities with administrators segregating the Hypervisor Management Console in DMZ and routing all traffic through the virtual UTM. Cyberoam enables role-based administrator controls even in collapsed DMZ in case of virtualized networks, allowing separation of administrator duties along with identity-based logs and reports with Cyberoam’s on-appliance reporting feature. The virtual UTM allows Identity-based security policies over user authentication, service authorization and reporting (AAA) that offers visibility and user-based access controls in virtual environments, thus securing Zero Trust Networks.
Comprehensive Virtual Security Cyberoam virtual UTMs consolidate multiple security features like firewall, VPN, Anti-Spam, Anti-Virus, IPS, WAF, Web & Application Filtering, Bandwidth Management, and more, in a single virtual appliance that makes virtual environments as secure as the physical infrastructure.
Ease of Deployment Cyberoam virtual UTMs are easy to deploy with a licensing model that provides the flexibility to allot the number of vCPUs for Cyberoam virtual UTM based on customer requirements. A simple key activation to upgrade to higher models and no hard limits on crossing recommended usage limits make Cyberoam virtual UTMs easy to deploy in your virtualized set-ups.
Compliance Management Cyberoam virtual UTMs segregate and secure traffic and data in virtualized environments, enabling organizations and MSSPs to meet regulatory requirements. Identity-based logs and reports with the on-appliance reporting feature supports display of compliance.
Centralized Management Organizations have the flexibility to deploy individual and a mix of hardware and virtual security appliances in their network infrastructure, which can be managed centrally using the virtual Cyberoam Central Console.
Complete Virtual Security Solution Cyberoam virtual UTMs, along with other security offerings like the virtual Cyberoam Central Console and Cyberoam iView software, offer a complete virtual security package to organizations.
Virtual Data Center
In cases where the hypervisor management console is placed in live production virtual environment due to lack of segmentation within virtual environments, virtual networks are prone to attacks like hyperjacking; exploits attacking vulnerabilities in hypervisor, management console, hypervisor & Guest OS; security risks arising out of loss of separation of duties between security/network security and operations; and attacks on virtualized servers and web-facing applications. With an external hardware security appliance that lacks the ability to scan traffic within the virtual environments, organizations are left with blind spots in their networks. Cyberoam virtual UTM appliances, offering consolidated security, can scan traffic within the virtual environments and allow granular firewall and security policy enforcement on inter-VM traffic, besides allowing logs and reports, which enables the virtual data center to display and manage compliance requirements
Enterprises and MSSPs face the challenge of handling the growth and expansion of their business or customers’ business that requires immediate capacity upgrades. Those managing multiple virtual appliances for security of their own/ customers’ networks need a centralized security management solution for consistent security policies across branch offices and customer networks along with a centralized logging and reporting solution. Cyberoam virtual UTM consolidates the security requirements of branch offices/ multiple customer networks into a virtual security appliance that offers comprehensive virtual security. Its easy upgrade enables enterprises and MSSPs to upgrade their subscription services in no time and respond immediately to the rising security needs of their branch offices and customers. Cyberoam offers a complete virtual security solution to enterprises/MSSPs with Cyberoam virtual UTM, virtual Cyberoam Central Console for centralized management and Cyberoam iView software for centralized logging and reporting.
Security in Virtual office or “Office-in-a-Box”
Users connecting to an ‘Office-in-a-Box’ network using multiple devices, specifically their personal devices that lack security, increase the risk of security threat in the entire virtual network. User-based access controls become even more important in a virtual office set-up or a Virtual Desktop Infrastructure (VDI). Cyberoam’s Layer 8 Identity-based security policies over user authentication, service authorization and reporting (AAA) secure the Zero Trust virtual networks. Cyberoam’s user-based controls enable controlled access to network resources. For users working from home, Cyberoam virtual UTM’s VPN feature allows a threat-free tunnel for secure access to network resources.