Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

The Clavister

Aurora Security
Framework
The new way of managing security starts
with taking a holistic approach

BUSINESS
CONTINUITY

T
EC
N
N
CO CT
TE
O
PR

T
EN
EV
PR
ORCHESTRATION
& AUTOMATION

Clavister Aurora Security Framework

Security of old was a basic affair. Buy a UTM appliance, segment the network, manage the log
data. But that was then, and this is now. For robust 21st century cybersecurity you need not
only to secure your network, but to manage end points, secure access to the cloud, you have to
validate the identify of users accessing the network, applications and information systems. And
all the while you need the best management and analytics tools to keep abreast of the threats to
protect your business’s operational excellence.

How do you do it? By using a portfolio approach, by applying a clever ecosystem of products
and solutions to tackle the challenges. You do it by deploying Clavister’s Aurora Security
Framework innovative solutions that work hand in hand with each other to create an umbrella of
cybersecurity.

With Clavister products and solutions, you deploy any of the many use-cases in the areas of
Connect, Protect and Prevent to get that robust security that your business demands. Connecting
business locations to each other and to the Internet with focus on security and reliability.
Inspecting traffic and behavior of traffic for threats in order to protect your digital assets. And
enabling preventative security measures and rules that can reduce the risk of users making
mistakes to threaten or compromise the digital perimeter of your business. Orchestrated and
automated the use cases work together with the focus to provide you with business continuity.

2 – The Clavister Aurora Security Framework - Product Portfolio


Product Portfolio

Clavister Clavister
MANAGEMENT & ANALYTICS
InControl InCenter
Central management with zero-touch

IDENTITY & ACCESS DEVICE NETWORK CLOUD


MANAGEMENT SECURITY SECURITY SERVICES

Clavister Clavister Clavister Clavister


EasyPassword OneConnect NetWall InCenter Cloud

Clavister Clavister Clavister Clavister


EasyAccess OneTouch NetShield NetEye Cloud

Clavister Clavister
EndPoint Client NetEye

SERVICES

Clavister Training Clavister Care Clavister Consulting

Security Use Cases


Our robust products are the perfect platforms for what our real passion is: innovative software
that delivers the very best use cases solutions for our customers. Be it our excellent VPNs or
traffic optimization use cases, you can bet that Clavister’s keeps you connected, protected and far
from harm infiltrating your business.

CONNECT PROTECT PREVENT

Reliable
Reliable
SecureSecure
VPN
Reliable
VPNSecure VPN Firewalling Firewalling
Firewalling Application
Application
Visibility
Visibility
& Control
Application & Visibility
Control & Control
Connecting
Connecting
branchConnecting
branch
officesoffices
andbranch
remote
and remote
offices and remote Network
Network Firewalling
Network
Firewalling securing
Firewalling
securing IT IT securing IT ControlControl
applications
applications
and user
Control andbehaviour
user behaviour
applications and user behaviour
locations
locations
securely
securely
locations
and cost
andeffectively
securely
cost effectively
and cost effectively resources
resources and
resources
and users users and users to optimize
to optimize
networknetwork
to resource
resource
optimize usage usage
network resource usage

Routing
Routing
& Load & Balancing
Load
Routing
Balancing
& Load Balancing NetworkNetwork
AttackAttack
Network
Protection
Protection Attack Protection Web Content
Web Content
Filtering
Filtering
Web Content Filtering
Avoid downtime
Avoid downtime
and
Avoid
secure
and
downtime
secure
business
business
and secure business Intrusion
Intrusion detection
detectionIntrusionand
detection
prevention
and prevention and prevention Restrict
Restrict
accessaccess
to inappropriate
to inappropriate
Restrict accesscontent content
to inappropriate content
continuity
continuity
with redundancy
with
continuity
redundancy
with redundancy systemsystem and system
and Denial Denial of
and
of ServiceService
Denialprotection
of Service protection
protection and high
andrisk
high
sites
riskand
sites
high risk sites

SecureSecure
Network
Network
Zones
Secure Zones
Network Zones Antivirus
Antivirus Scanning
Scanning Antivirus Scanning ActiveActive
TrafficTraffic
Optimisation
Optimisation
Active Traffic Optimisation
Network
Network
segmentation
segmentation
Network
to protect
segmentation
to protect to protect Streaming
Streaming scanning
scanningStreamingof scanning
attachments
of attachments of attachments
in mail,
in mail, in mail, Traffic Traffic
prioritisation
prioritisation
securing
Traffic securing
preferred
preferred
prioritisation securing preferred
company’s
company’s
digital digital
assets
company’s
assetsdigital assets web
web and fileand fileweb
downloads
downloads and
for file for
downloads
malicious
malicious for
contentcontent
malicious content use of use
resources
of resources
use of resources

ServerServer
Load Balancing
LoadServer
Balancing
Load Balancing End-user
End-user DeviceDevice
End-user
Security
Security Device Security Multi-Factor
Multi-Factor
Authentication
Authentication
Multi-Factor Authentication
Simplifying
Simplifying
scalingscaling
Simplifying
and allowing
and allowing
scaling and allowing Blocking
Blocking threatsthreats
Blocking
and and threats
detecting
detecting dataanddata
lossdetecting
loss data loss One platform
One platform
ensuring
Oneensuring
authenticity
authenticity
platform of
ensuring of
authenticity of
preventive
preventive
maintenance
maintenance
preventive maintenance at endpoint
at endpoint devicesat
devices
endpoint devices end-users
end-users
for Cloud/
for Cloud/
Web apps,
end-users Web VPN’s
apps, etc.
for Cloud/VPN’s etc. VPN’s etc.
Web apps,

SecureSecure
Remote Remote
Access
Secure
Access
Remote Access ControlControl Signalling
Signalling Control Validation
Signalling Validation
Validation Password
Password
Self Service
Self ServiceSelf Service
Password
Empowering
Empowering
remoteEmpowering
remote
workersworkers
and
remote
andworkers and GatewayGateway function
function Gateway
for for function
specific specific signalling
for specific signalling
signalling Empower
Empower
end users
end to
users
manage
Empower toend
manage
users to manage
devicesdevices
with flexible
withdevices
flexible
securewith
secure
access
flexible
access
secure access validation
validation including
includingvalidation
DNS,
DNS, SIP, including
GTPSIP,and
GTPDNS,
andSIP,
SCTP SCTPGTP and SCTP corporate
corporate
passwords
passwords
corporate passwords

SingleSingle
Sign-On
Sign-On
Single Sign-On SecureSecure
ServerServer
Secure
Protection
Protection Server Protection Captive
Captive
PortalPortal
Authentication
Authentication
Captive Portal Authentication
One quick
One secure
quick secure
login
One quick
to
login
your
secure
toapps,
yourlogin
apps,
to your apps, ServerServer trafficServer
decryption
traffic decryption traffic
for fullfor
decryption
full inspection
inspection for full inspection
LOGIN
Integration
LOGIN
Integration
with Active
LOGIN
with Active
Directory
Integration Directory
and
with 2FAand
Active 2FA
Directory and 2FA
VPNs and
VPNscloud
and services
cloud
VPNsservices
and cloud services of inbound
of inbound traffic traffic
of inbound traffic procedures
procedures
for open
fornetwork
open network
procedures access access
for open network access

Resilient
Resilient
Interconnect
Interconnect
Resilient
Connectivity
Interconnect
Connectivity Connectivity BotnetBotnet
Blocking
Blocking
Botnet Blocking
Interconnection
Interconnection
with
Interconnection
Border
with Border
Gateway
with
Gateway
Border Gateway Block outgoing
Block outgoing
andBlock
incoming
and incoming
traffic
outgoing traffic
and incoming traffic
RoutingRouting
(BGP) for
(BGP)
carrier
Routing
for carrier
independence
(BGP)independence
for carrier independence through
through
IP reputation
IP reputation
through IP reputation

Carrier
Carrier
GradeGrade
NATCarrier
NAT Grade NAT User Verification
User Verification
User Verification
High performance
High performance
High
IPv4 performance
– IPv4
IPv6 –network
IPv6 network
IPv4 – IPv6 network Easy on
Easy
demand
on demand
validation
validation
Easy on of the ofvalidation
demand the of the
address
address
translation
translation
address translation end-user’s
end-user’s
identityidentity
end-user’s identity

The Clavister Aurora Security Framework - Product Portfolio – 3


MANAGEMENT & ANALYTICS

Clavister
InCenter
Almost every enterprise has implemented a
firewall to deal with the increasing threats to
their business. But most organizations deal
with the facts when it is already too late… the
approach is reactive. So what is missing is clear
view of what is going on… real time, to be able
to take necessary actions.

That’s when Clavister InCenter gets to work.


Using our real time, web-based GUI, powered
by machine learning, this tool gives IT managers
a holistic view of threats and traffic with drill
down capabilities anomaly detection and
simple to understand dashboards that will
decrease TCO compared to 3rd party log
managements systems. With Clavister InCenter
MSSPs and IT Security Administrators will be
better informed to improve their security.

Clavister InCenter Cloud enables IT administrators to gain


insight into their networks with little setup and no hardware
Clavister
investment. Clavister InCenter Cloud provides all the user
InCenter Cloud stories including forensics with log search, dashboarding,
alerting and reporting as well as health monitoring.

Clavister
InControl
Clavister InControl is our premium centralized
management system built to handle thousands
of Clavister Next-Generation Firewalls in large
networks.

Zero-Touch provisioning support enables newly


deployed firewalls to automatically find their
way to the right Clavister InControl server.
From there, direct management capabilities will
enable safe onboarding and policy deployment.

With integrated support for reporting,


configuration management and version control
With Zero-touch, new gateways will automatically
Clavister InControl is the ideal centralized find their way to specified home InControl server.
management solution for large enterprises and
Managed Security Service Providers.

4 – The Clavister Aurora Security Framework - Product Portfolio


IDENTITY & ACCESS MANAGEMENT

Clavister Something

EasyAccess you KNOW

Simple combinations of username and


passwords are one of the major reasons
for larger security incidents and breaches,
a situation that can no longer be trusted Something
for protection of business applications and you HAVE
sensitive data.
Clavister EasyAccess with Multi Factor
Authentication (MFA) provides the strength of
security needed to protect your environment
against these issues. By leveraging something
Something
the user already has, knows and can answer,
you ARE
our MFA solution enables a seamless and cost
effective solution to authenticate users.

Clavister
OneTouch
Clavister OneTouch is the mobile application
used for biometric authorization of any multi
factor login request. Dozens of passwords
across an equal number of platforms; how to
remember them all without falling into the trap
of using one common, hackable password?
With Clavister OneTouch you never have
to worry: just use your thumb print or face
identification to unlock all the applications and
services that you work and play on, securely.

Clavister
EasyPassword
Then there’s that situation where we’ve all been: calling our IT administrators to give us a new
password because we can’t retrieve or have forgotten ours. With Clavister’s EasyPassword it’s a
breeze and the best part, you do it yourself in minutes. No shame and back in action in no time.

The Clavister Aurora Security Framework - Product Portfolio – 5


NETWORK SECURITY

Clavister
NetShield
SERVICE-BASED FIREWALLS
The Service-Based Firewall (SBFW) is a revolutionary product that answers the needs of modern
network users and administrators, ideal for datacenter protection and network infrastructure
requiring carrier-grade speeds and features. Besides flexible perimeter protection, the product
can terminate secure traffic to a web-server farm and perform inspection with built in intrusion
detection system both securing and offloading the server infrastructure. It includes functionality
to provide screening for specific critical signaling, like DNS, GTP and SIP and provides carrier
services including carrier-grade network address translation and BGP routing functionality that
make this product ideal for large network protection such as campus networks, public WiFi or
mobile and fixed communication service provider networks. Clavister NetShield can be deployed
in a high throughput appliance or deployed virtually optimized for performance in KVM and
VMWare environments.

CLAVISTER SECURITY SUBSCRIPTION


Clavister customers are offered two types of services: the comprehensive, all-inclusive Clavister
Security Subscription (CSS), or the cost-effective Clavister Product Subscription (CPS), which
can be upgraded to the CSS at any time. The Clavister Product Subscription (CPS) includes both
software services, such as upgrades and maintenance and direct 24/7 vendor support (online, by
phone), as well as the central management system Clavister InControl.
Alternatively, the Clavister Security Subscription (CSS) includes all the services included in Clavister
Product Subscription with the addition of the full Next-Generation Firewall and Unified Threat
Management (UTM) capabilities, with services such as Anti-Virus, Web Content Filtering, Intrusion
Detection and Prevention (IDP) IP reputation intelligence and true Application Control.
Each model of the Clavister NetWall range, appliance or virtual, supported the same use cases
and advanced features.

6 – The Clavister Aurora Security Framework - Product Portfolio


NETWORK SECURITY

Clavister
NetWall
NEXT-GENERATION FIREWALLS
Hackers, viruses, ransomware, data theft, industrial espionage and even government sponsored
attacks. The list of cyber threats that could put your business at risk goes on and on. Add to this
all the new types of technologies such as the Cloud, BYOD, WiFi and other that is supposed to
make your company more productive.
Our compact, fast and powerful desktop appliances deliver complete security use cases for
remote offices or as CPEs. For the larger enterprise users or deployment at headquarter, our rack
mountable appliances give best in class protection for even the biggest companies.
Last but not least, Clavister has been a pioneer in virtual products since 2008 and uses a record
low amount of resources making it ideal for creating secure cells in cloud environments.

Clavister
OneConnect
Clavister OneConnect is our SSL VPN Client that offers a simple and easy to use solution for
remote access using the Clavister’s NetWall Next-Generation Firewalls.

Connecting securely is as easy as utilizing our built-in provisioning portal in Clavister NetWall,
downloading and installing the client and you’re ready to connect.

With support for Microsoft Windows and Apple macOS there’s support for a wide range of devices.
Together with Clavister EasyAccess, Clavister OneConnect provides a unique one-click access
experience for the user to start with VPN connectivity and login to their favorite application – SaaS
or on premise.

The Clavister Aurora Security Framework - Product Portfolio – 7


NETWORK SECURITY

Clavister
NetEye
ADVANCED THREAT PROTECTION
Clavister NetEye is the superior way to deliver Advanced Threat Protection to inspect and neutralize
SSL embedded threats by identifying them and alerting the administrator through Clavister’s InCenter
management tool to take action. Additionally, Clavister Sandbox Cloud detonation capabilities allow
for suspicious files and packets to be sent off to a secure cloud environment, quarantined and
investigated for malicious behavior that tries to evade the perimeter security. Once done, the sandbox
cloud will notify Clavister InCenter of the activity and alert network administrators of the malware to
take action in the network.

Clavister NetEye is easy to implement for any firewall, Clavister or 3rd party, and requires minimum
time to get started. It does not impact the firewall’s performance significantly and provides an easy way
to scale over multiple sites with one central offering. The IT manager can now easily manage cost while
feeling ensured all traffic is scanned for threats.

Clavister
NetEye Cloud
Clavister’s NetEye Cloud deliver full de-coding and
filtering of encrypted web traffic. Protect, log and report
on SSL web activity. No client software required. On top
of that, Clavister NetEye Sandbox Cloud, is an excellent
tool to take exe files to a inspection and detonation area
and report back to Clavister InCenter for further action.

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden


Phone: +46 (0)660 29 92 00 — Web: www.clavister.com

Copyright © 2019 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other
product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change
without prior notification.

You might also like