SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Cyberoam Certifications
                          Westcoast Labs Checkmark Certification:
                          UTM Level 5
                          Categories:
       Cyberoam                  Enterprise Firewall
                                 VPN
          vs.                    Anti-Virus and Anti Spyware Gateway
                                 Premium Level Anti-Spam
       FortiGate                 IPS
                                 URL Filtering

                          ICSA Certification
                          Category:
                                Corporate Firewall
                                High Availability

                          Awards
                          Winner of 2008/2009 ZDNet Award
                          Category:
                                 IT Leader
 The design philosophy           Asia's Most Promising Asian
behind Cyberoam UTM is           TechnoVisionaries
to balance between One    Winner of 2007 Global Product Excellence
 Box Total Solution and   Awards - Customer Trust Category:
Optimum Performance to           For Integrated Security Appliance
                                 For Security Solution for Education
 provide superior value
                                 For Unified Security
       for money.
                          Product Review
                                 SC Magazine : Cyberoam UTM Overall
                                 Rating:        - 5 Stars

                          Cyberoam UTM is Certified by Virtual
 Fortinet lacks the One   Private Network Consortium (VPNC) :
Box Solution philosophy          Basic Interop
                                 AES Interop
                                 SSL Portal
                                 SSL Firefox
                                 SSL Java Script
                                 SSL Basic Network Extension
    www.cyberoam.com
                                 SSL Advanced Network Extension
SC Magazine’s Comparative Review:
     Cyberoam – CR200i: 5 Stars Rating                      FortiGate-110C: 4 Stars Rating




Cyberoam’s Real-Time RPD™ Anti Spam Technology
Cyberoam’s RPD™ technology focuses on detecting recurrent message patterns in outbreaks.
Message patterns are extracted from the message envelope, headers, and body. Patterns are
extracted in real time from the message hashes being continuously sent to the detection centers.
A Graphical comparison of Anti Spam Spastics:
1. Cyberoam’s Better Spam Detection Rate:
2. Cyberoam UTM’s Minimal False Positive Rate:




If the user wants, Cyberoam also provides a Self Service Spam Quarantine area.

Note:
   • The Fortigate numbers were taken from the Fortigate Knowledge Base. The link has now been
      disabled.
   • Fortigate publishes number of Fortimail. It is a secure email appliance and entails extra capital
      and operational overheads.

Cyberoam Minimizes the Window of Vulnerability
Cyberoam provides proactive protection against new email-borne virus outbreaks, hours before the
signatures are released. It has introduced the proactive virus detection technology which detects and
blocks the new outbreaks immediately and accurately.
It provides a critical first layer of defense by intelligently blocking suspicious mail during the
earliest stage of a virus outbreak.




Gateway Load Balancing vs. Load Sharing: Automated vs. Manual
Cyberoam UTM provides Load Balancing. FortiGate provides Load Sharing.
Load sharing means one can split the traffic from a network to be transported by different routers
(paths). So it requires a pre-specified manual route configuration and there is no balancing.
Load balancing means distributing the traffic as per defined weights dynamically among different
paths to avoid link congestion and saturation. This can be done per destination in a round-robin
fashion. The packets sent by a host follow different paths to the same destination. All paths belong to
all hosts. So, as per the pre defined weights, the links are used. In case a specific user needs to use a
particular gateway; that can also be configured.


Multiple Gateway Support: Cyberoam Checks the Link for its Functional Requirement
FortiGate supports a Single Ping Rule to query the status of multiple gateways. If the ISP or the
external site has blocked the ICMP Ping, this rule can fail.
Cyberoam supports Multiple Failover Conditions using which a link status can be queried for the
specific functional purpose. Apart from the ICMP ping, Cyberoam also supports UDP and TCP
protocols to query the link status.
This implies that in case a specific link is used for a database server for UDP traffic and the ping does
not reply, FortiGate will consider it non-functional. While Cyberoam UTM will send an UDP Echo to
check the link status, and in case it received a reply, the link is functional.


Reporting




To get reporting in FortiGate the customer need to purchase and deploy FortiAnalyzer with a Fortigate
appliance. This is a steep escalation in terms of Capital Expenditure and Operational Expenditure.
In spite of this extra Capex and Opex there are a few reporting features that Fortinet still lacks:
  1. User-wise reports of all types (Web Filtering, Internet Surfing, IPS)
  2. User-wise Data Transfer
  3. User-wise Search Keywords (reports of web searches)
  4. Web Surfing Trends reports per: User, Organization, Site, Category(graphical reports)
  5. Compliance reporting comprising of: HIPAA, GLBA, SOX, PCI, FISMA
Cyberoam also supports external reporting – iView.


Overview of Cyberoam’s Security Approach:
• Who do you give access to: An IP Address or a User?
• Whom do you wish to assign security policies: User Name or IP Addresses?
• In case of an insider attempted breach, whom do you wish to see: User Name or IP Address?
• How do you create network address based policies in a DHCP and a Wi-Fi network?
• How do you create network address based policies for shared desktops?
Cyberoam UTM approaches the Security paradigm from the identity perspective. The blended threats
circumvent the perimeter defense and launch an attack from within. The network’s own resources are
used to subvert it. The main target is thus the end user who knowingly or unknowingly breaches the
perimeter defense.
While providing a robust perimeter defense, Cyberoam UTM’s Identity-based access control
technology ensures that every user is encapsulated in a tight, yet granular security policy that spans
across Cyberoam UTM’s Firewall/VPN, Gateway Anti Virus, Anti-Spam, Web Filtering, Intrusion
Prevention (IPS) and Bandwidth Management solutions.
Head to Head:
Points to Ponder                    Fortigate                          Cyberoam UTM

Identity based security –           Fortigate lacked a user-centric    Cyberoam was one of the first UTM
Cyberoam’s First Movers             approach till Forti OS 4.0.        solutions that embedded user
Advantage:                          It has recently added this         identity in the firewall rule matching
UTM’s Single platform demands       feature, which is still a catch-   criteria apart from MAC address, IP
an approach that holds the          up feature and lacks the level     address, protocol and time
diverse solutions together to       of maturity.                       schedule.
strengthen and provide a                                               Similarly, the firewall actions are
simplistic operational synergy.                                        extended to include policy based
The best security system is                                            control over all the member security
vulnerable to human error. If the                                      features like Filtering, Anti Virus,
end user is contained in a                                             Anti Spam, IPS and Bandwidth
decision matrix, it lends                                              Management.
completeness.                                                          User’s identity binds Cyberoam
                                                                       UTM’s security features together to
                                                                       create a single consolidated
                                                                       security unit.

Total VPN Solution:                 Fortigate has PPTP, L2TP,          Cyberoam has PPTP, L2TP, IPSec
With mobile workforce on the        IPSec and SSL VPN, on              and SSL VPN, on appliance.
rise, VPN has become a              appliance.
mainstay to promote secure
connectivity to remote users.
VPN ensures that the
organizational resources are
utilized securely over public
networks.
Points to Ponder                   Fortigate                         Cyberoam UTM

Comprehensive Anti Virus and       Fortigate does not have a         Cyberoam has the industry’s best
Anti Spam Protection:              Zero Day Protection.              gateway anti virus solution –
Viruses, Trojans, Spyware and      As they have a proprietary        Kaspersky. It has one of the best
other Malware infiltrate an        anti virus feature which is       response-time as compared to
organization through internet      signature driven and reactive     Fortinet AV.
using various vectors. From mail   in nature, the security gap is    Cyberoam’s Virus Outbreak
to Web surfing to Instant          glaring.                          Detection technology is a proactive,
Messaging all are the most         Fortigate has a response time     signature-less proactive security
common mediums of infection.       of three (3) hours to release     technology, which primarily defends
Zero day attacks are a very        an anti-malware signature.        the organization against Zero Day
potent weapon which is wielded                                       Attacks.
                                   Reference:
to achieve maximum penetration     www.fortinet.com/doc/solution     Cyberoam detects all malware on
as the traditional security        brief/antivirus_sol_brief.pdf     all Web, Mail and IM protocols. It
systems are reactive in natures                                      also scans forty (40) different types
and rely heavily on signatures.                                      of compressed files.
                                                                     Kaspersky has a response time that
                                                                     is less than 2 hours.
                                                                     References:
                                                                     http://forum.kaspersky.com/index.p
                                                                     hp?showtopic=7735
                                                                     http://usa.kaspersky.com/about-
                                                                     us/comparative_test.php?test=Resp
                                                                     onse

Adaptable AV/AS Scans:             Fortigate provides limited        Using Cyberoam UTM you can
For most users, missing a          control over its AV and AS        define custom spam filtering rules
legitimate email is an order of    scans.                            based on sender or recipient, IP
magnitude worse than receiving     To get granular controls over     address, mime header and
spam or virus.                     the mail traffic, the users are   message size.

When a critical mail gets          urged to buy, FortiMail.          You have the flexibility to tweak a
classified as a virus or a spam    This is a separate mail           spam scan as per your needs,
you should have the right to       security device.                  rather than adjusting yourself to the
choose; what to allow and block                                      way a security solution operates.
                                                                     All these are features are given in
                                                                     One Box – Cyberoam.
Points to Ponder                                     Fortigate                                    Cyberoam UTM

Self-service AV Quarantine                           Fortigate does not have self-                The Self-service quarantine area
Area:                                                service quarantine facility.                 from Cyberoam UTM enables
The user first has to know that a                                                                 individual mail recipients to view
mail has been quarantined and                                                                     and manage their infected
then get access, to deal with it.                                                                 messages.
So a Gateway AV quarantine                                                                        The self-service feature removes
area proves to be a bottle-neck                                                                   user’s dependency on administrator
for users and administrator,                                                                      to manage user’s quarantine mails.
alike.
Self-Service quarantine area is
the solution.

Superior Spam Filtering:                             Fortigate is not effectively                 Cyberoam has an OEM with
Spammers use various                                 equipped spam.                               Commtouch Software Ltd.
techniques to circumvent the                         The users are urged to buy,                  Recurrent Patterns Detection (RPD)
gateway anti spam solutions.                         FortiMail.                                   technology, based on the
Minor changes in the content                                                                      identification and classification of
and language can easily for the                                                                   message patterns delivers the
traditional anti spam solutions.                                                                  industry’s best and highest spam
                                                                                                  and threat detection capabilities
                                                                                                  providing protection all types of
                                                                                                  email-borne threats.
                                                                                                  The spam detection is not based on
                                                                                                  the language or the content of the
                                                                                                  mail.

Category Based Bandwidth                             Fortigate does not have this                 Cyberoam UTM provides a
Management:                                          feature.                                     comprehensive category based
Enterprises often need to                                                                         bandwidth management. This
provide category based                                                                            ensures productivity.
bandwidth management.
Productive and business related
categories need to be given a
priority over other categories.




Disclaimer:
The comparison is based on our interpretation of the publicly available information of the compared product.
Either of the product features is likely to change without prior notice.
This document is strictly confidential and intended for private circulation only.
                                                                                                     Document Version: 5.0 – 96016 – 14052009

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
support_cyberoam
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
Bố Su
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
vfmindia
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
Belsoft
 

Was ist angesagt? (20)

Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
Ccnsp
CcnspCcnsp
Ccnsp
 
CCNSP
CCNSPCCNSP
CCNSP
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
1. introduzione a TMG
1. introduzione a TMG1. introduzione a TMG
1. introduzione a TMG
 
Forti web
Forti webForti web
Forti web
 
CCNSE
CCNSECCNSE
CCNSE
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
Microsoft India  - Forefront Threat Management Gateway 2010 Case StudyMicrosoft India  - Forefront Threat Management Gateway 2010 Case Study
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 

Andere mochten auch

FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
chephz DJ
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 

Andere mochten auch (12)

Cyberoam cr300i
Cyberoam cr300iCyberoam cr300i
Cyberoam cr300i
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Amazon Network Security
Amazon Network SecurityAmazon Network Security
Amazon Network Security
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web services
 
Oracle crm on demand
Oracle crm on demandOracle crm on demand
Oracle crm on demand
 
Oracle CRM on Demand
Oracle CRM on DemandOracle CRM on Demand
Oracle CRM on Demand
 
Smart hr ppt v1.0
Smart hr  ppt v1.0Smart hr  ppt v1.0
Smart hr ppt v1.0
 
Maple CRM - SaaS based web application.
Maple CRM - SaaS based web application.Maple CRM - SaaS based web application.
Maple CRM - SaaS based web application.
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Ähnlich wie Cr vs fortinet

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
Kerry Desberg
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Private Cloud
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
sharetech
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
tswong
 

Ähnlich wie Cr vs fortinet (20)

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
MMPL Watchguard overview
MMPL Watchguard overviewMMPL Watchguard overview
MMPL Watchguard overview
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Cr vs fortinet

  • 1. Cyberoam Certifications Westcoast Labs Checkmark Certification: UTM Level 5 Categories: Cyberoam Enterprise Firewall VPN vs. Anti-Virus and Anti Spyware Gateway Premium Level Anti-Spam FortiGate IPS URL Filtering ICSA Certification Category: Corporate Firewall High Availability Awards Winner of 2008/2009 ZDNet Award Category: IT Leader The design philosophy Asia's Most Promising Asian behind Cyberoam UTM is TechnoVisionaries to balance between One Winner of 2007 Global Product Excellence Box Total Solution and Awards - Customer Trust Category: Optimum Performance to For Integrated Security Appliance For Security Solution for Education provide superior value For Unified Security for money. Product Review SC Magazine : Cyberoam UTM Overall Rating: - 5 Stars Cyberoam UTM is Certified by Virtual Fortinet lacks the One Private Network Consortium (VPNC) : Box Solution philosophy Basic Interop AES Interop SSL Portal SSL Firefox SSL Java Script SSL Basic Network Extension www.cyberoam.com SSL Advanced Network Extension
  • 2. SC Magazine’s Comparative Review: Cyberoam – CR200i: 5 Stars Rating FortiGate-110C: 4 Stars Rating Cyberoam’s Real-Time RPD™ Anti Spam Technology Cyberoam’s RPD™ technology focuses on detecting recurrent message patterns in outbreaks. Message patterns are extracted from the message envelope, headers, and body. Patterns are extracted in real time from the message hashes being continuously sent to the detection centers. A Graphical comparison of Anti Spam Spastics: 1. Cyberoam’s Better Spam Detection Rate:
  • 3. 2. Cyberoam UTM’s Minimal False Positive Rate: If the user wants, Cyberoam also provides a Self Service Spam Quarantine area. Note: • The Fortigate numbers were taken from the Fortigate Knowledge Base. The link has now been disabled. • Fortigate publishes number of Fortimail. It is a secure email appliance and entails extra capital and operational overheads. Cyberoam Minimizes the Window of Vulnerability Cyberoam provides proactive protection against new email-borne virus outbreaks, hours before the signatures are released. It has introduced the proactive virus detection technology which detects and blocks the new outbreaks immediately and accurately. It provides a critical first layer of defense by intelligently blocking suspicious mail during the earliest stage of a virus outbreak. Gateway Load Balancing vs. Load Sharing: Automated vs. Manual Cyberoam UTM provides Load Balancing. FortiGate provides Load Sharing. Load sharing means one can split the traffic from a network to be transported by different routers (paths). So it requires a pre-specified manual route configuration and there is no balancing.
  • 4. Load balancing means distributing the traffic as per defined weights dynamically among different paths to avoid link congestion and saturation. This can be done per destination in a round-robin fashion. The packets sent by a host follow different paths to the same destination. All paths belong to all hosts. So, as per the pre defined weights, the links are used. In case a specific user needs to use a particular gateway; that can also be configured. Multiple Gateway Support: Cyberoam Checks the Link for its Functional Requirement FortiGate supports a Single Ping Rule to query the status of multiple gateways. If the ISP or the external site has blocked the ICMP Ping, this rule can fail. Cyberoam supports Multiple Failover Conditions using which a link status can be queried for the specific functional purpose. Apart from the ICMP ping, Cyberoam also supports UDP and TCP protocols to query the link status. This implies that in case a specific link is used for a database server for UDP traffic and the ping does not reply, FortiGate will consider it non-functional. While Cyberoam UTM will send an UDP Echo to check the link status, and in case it received a reply, the link is functional. Reporting To get reporting in FortiGate the customer need to purchase and deploy FortiAnalyzer with a Fortigate appliance. This is a steep escalation in terms of Capital Expenditure and Operational Expenditure. In spite of this extra Capex and Opex there are a few reporting features that Fortinet still lacks: 1. User-wise reports of all types (Web Filtering, Internet Surfing, IPS) 2. User-wise Data Transfer 3. User-wise Search Keywords (reports of web searches) 4. Web Surfing Trends reports per: User, Organization, Site, Category(graphical reports) 5. Compliance reporting comprising of: HIPAA, GLBA, SOX, PCI, FISMA Cyberoam also supports external reporting – iView. Overview of Cyberoam’s Security Approach: • Who do you give access to: An IP Address or a User? • Whom do you wish to assign security policies: User Name or IP Addresses? • In case of an insider attempted breach, whom do you wish to see: User Name or IP Address? • How do you create network address based policies in a DHCP and a Wi-Fi network? • How do you create network address based policies for shared desktops? Cyberoam UTM approaches the Security paradigm from the identity perspective. The blended threats circumvent the perimeter defense and launch an attack from within. The network’s own resources are used to subvert it. The main target is thus the end user who knowingly or unknowingly breaches the perimeter defense. While providing a robust perimeter defense, Cyberoam UTM’s Identity-based access control technology ensures that every user is encapsulated in a tight, yet granular security policy that spans across Cyberoam UTM’s Firewall/VPN, Gateway Anti Virus, Anti-Spam, Web Filtering, Intrusion Prevention (IPS) and Bandwidth Management solutions.
  • 5. Head to Head: Points to Ponder Fortigate Cyberoam UTM Identity based security – Fortigate lacked a user-centric Cyberoam was one of the first UTM Cyberoam’s First Movers approach till Forti OS 4.0. solutions that embedded user Advantage: It has recently added this identity in the firewall rule matching UTM’s Single platform demands feature, which is still a catch- criteria apart from MAC address, IP an approach that holds the up feature and lacks the level address, protocol and time diverse solutions together to of maturity. schedule. strengthen and provide a Similarly, the firewall actions are simplistic operational synergy. extended to include policy based The best security system is control over all the member security vulnerable to human error. If the features like Filtering, Anti Virus, end user is contained in a Anti Spam, IPS and Bandwidth decision matrix, it lends Management. completeness. User’s identity binds Cyberoam UTM’s security features together to create a single consolidated security unit. Total VPN Solution: Fortigate has PPTP, L2TP, Cyberoam has PPTP, L2TP, IPSec With mobile workforce on the IPSec and SSL VPN, on and SSL VPN, on appliance. rise, VPN has become a appliance. mainstay to promote secure connectivity to remote users. VPN ensures that the organizational resources are utilized securely over public networks.
  • 6. Points to Ponder Fortigate Cyberoam UTM Comprehensive Anti Virus and Fortigate does not have a Cyberoam has the industry’s best Anti Spam Protection: Zero Day Protection. gateway anti virus solution – Viruses, Trojans, Spyware and As they have a proprietary Kaspersky. It has one of the best other Malware infiltrate an anti virus feature which is response-time as compared to organization through internet signature driven and reactive Fortinet AV. using various vectors. From mail in nature, the security gap is Cyberoam’s Virus Outbreak to Web surfing to Instant glaring. Detection technology is a proactive, Messaging all are the most Fortigate has a response time signature-less proactive security common mediums of infection. of three (3) hours to release technology, which primarily defends Zero day attacks are a very an anti-malware signature. the organization against Zero Day potent weapon which is wielded Attacks. Reference: to achieve maximum penetration www.fortinet.com/doc/solution Cyberoam detects all malware on as the traditional security brief/antivirus_sol_brief.pdf all Web, Mail and IM protocols. It systems are reactive in natures also scans forty (40) different types and rely heavily on signatures. of compressed files. Kaspersky has a response time that is less than 2 hours. References: http://forum.kaspersky.com/index.p hp?showtopic=7735 http://usa.kaspersky.com/about- us/comparative_test.php?test=Resp onse Adaptable AV/AS Scans: Fortigate provides limited Using Cyberoam UTM you can For most users, missing a control over its AV and AS define custom spam filtering rules legitimate email is an order of scans. based on sender or recipient, IP magnitude worse than receiving To get granular controls over address, mime header and spam or virus. the mail traffic, the users are message size. When a critical mail gets urged to buy, FortiMail. You have the flexibility to tweak a classified as a virus or a spam This is a separate mail spam scan as per your needs, you should have the right to security device. rather than adjusting yourself to the choose; what to allow and block way a security solution operates. All these are features are given in One Box – Cyberoam.
  • 7. Points to Ponder Fortigate Cyberoam UTM Self-service AV Quarantine Fortigate does not have self- The Self-service quarantine area Area: service quarantine facility. from Cyberoam UTM enables The user first has to know that a individual mail recipients to view mail has been quarantined and and manage their infected then get access, to deal with it. messages. So a Gateway AV quarantine The self-service feature removes area proves to be a bottle-neck user’s dependency on administrator for users and administrator, to manage user’s quarantine mails. alike. Self-Service quarantine area is the solution. Superior Spam Filtering: Fortigate is not effectively Cyberoam has an OEM with Spammers use various equipped spam. Commtouch Software Ltd. techniques to circumvent the The users are urged to buy, Recurrent Patterns Detection (RPD) gateway anti spam solutions. FortiMail. technology, based on the Minor changes in the content identification and classification of and language can easily for the message patterns delivers the traditional anti spam solutions. industry’s best and highest spam and threat detection capabilities providing protection all types of email-borne threats. The spam detection is not based on the language or the content of the mail. Category Based Bandwidth Fortigate does not have this Cyberoam UTM provides a Management: feature. comprehensive category based Enterprises often need to bandwidth management. This provide category based ensures productivity. bandwidth management. Productive and business related categories need to be given a priority over other categories. Disclaimer: The comparison is based on our interpretation of the publicly available information of the compared product. Either of the product features is likely to change without prior notice. This document is strictly confidential and intended for private circulation only. Document Version: 5.0 – 96016 – 14052009