Securing You
Cyberoam banner NU banner
CALL US:  0800 085 6661
IPv6 Ready
IPv6 Ready

UTM Level 5 Checkmark Certification

ICSA Certified
ICSA Labs Certified Firewall

Network Products Guide - Best Products and Services 2008 2007 Global Excellence Awards
Winning the Battle for Bandwidth




According to the Journal of the American Academy of Pediatrics, 42 percent of surveyed teens were found to have seen pornography on websites - a full two-thirds of them had come across the content accidentally, possibly through misspelled web addresses, pop-up ads that enter the network via malware or spam mails. What's more, nine percent of the incidents reportedly occurred while the teens were at school.

Educational institutions, like enterprises, need to go beyond just filtering and have complete security in place to protect users against blended threats like spyware, phishing and more. Complete protection lies in installing not just filtering software, but a complete set of security solutions

Cyberoam delivers complete Internet security to educational institutions for creating not just a secure network, but also a safe academic environment.

Cyberoam Identity-based UTM firewall offers complete Internet security system to institutions with VPN Firewall, Anti-Virus, Anti-Spam, Intrusion Prevention System, Content & Application Filtering in addition to Bandwidth Management and Multiple Link Management over a single platform.

The Cyberoam Advantage:

  • Linking user identity with security

    Cyberoam UTM firewall functions on the basis of user identity rather than on IP addresses, eliminating the need for complex IP pooling. This reduces the complexities involved in creating and implementing security policies in a dynamic setting in an educational institution where large numbers of users (Students and Faculty) exit at the end of every academic year while an equally large number enters each year.

    In the Multiple User-Single Machine situation faced by educational institutions and libraries where multiple students and faculty access the Internet over shared machines, Cyberoam is the only solution that can pinpoint the user who has accessed unauthorised porn, dating, hacking sites, carried out illegal P2P file sharing, gaming, gambling, extensive non-academic chatting, downloaded virus-carrying files, or received excessive, non-academic spam.

    A user-based firewall appliance would enable schools and libraries to assign policies based on the user requirement and set temporary or permanent policies to groups or individual students who require access to sites that are normally blocked. In addition to creating lenient policies for faculty and administrators, it can recognise frequent visitors among adult patrons and assign individualised policies on login, eliminating the need for daily manual intervention. Such a solution recognises users logged anywhere in the network, allowing them personalised internet access policy.

    By identifying the users within the network, even in Wi-Fi and DHCP scenarios, it allows administrators to zero in on harmful activity within the network instantly. In addition, this approach can instantly identify internal users indulging in activity that is harmful to fellow students like cyber bullying or anything that may compromise the institution's network itself.

    Cyberoam is the only VPN firewall solution that can meet the security needs even in a DHCP and Wi-Fi environment effectively.

  • Children's Internet Protection Act (CIPA) Compliance with Cyberoam

    The US Congress in December 2000, enacted the Children's Internet Protection Act (CIPA) to deal with the issues concerning Internet access in schools and libraries. CIPA requires that schools and libraries which receive funding for Internet access under the E-Rate program must have an Internet Safety Policy in place, ensuring the safety and security of minors online.

    With Cyberoam, school district can comply with CIPA requirements, helping them qualify for E-rate funding. Cyberoam's powerful web and email content filtering allows school districts and libraries to enforce an Internet safety policy that blocks and filters Internet access in accordance with CIPA requirements. Cyberoam identifies student activity by the user name instantly, enabling institutions to easily monitor online activities, which is not possible with IP-address based solutions. In doing so, Cyberoam prevents students, faculty and administration from accessing inappropriate matter on the Internet, protects them when using e-mail, chat rooms and more in addition to preventing them from disclosing personal or confidential information.

  • Granular User-based Policies

    Traditional and emerging threats, including viruses, worms, Trojans, DoS attacks, spyware, phishing, pharming are taking a blended approach to enter the network, using the weakest link in the security chain - The user - to gain entry.

    These threats rely on the cover of user anonymity as they are identified by an IP address. Positive identification is virtually impossible without the user name. Hence, user identity-based approach is critical for dependable security for the educational institution.

    Cyberoam's granular user-based policies offer a high degree of flexibility in operation and control, in contrast to obsolete blanket policies based on IP address. They ensure high scalability with no compromise on security, offering policy-based controls for individual users, groups, departments and applications.

    In the dynamic IP scenario of Wi-Fi access, these policies ensure the same level of control and security as in a wired network.

  • Time-based Policies

    Cyberoam is the only unified threat management solution that offers comprehensive time-based access policies. These policies are particularly suited to the unique requirements of educational institutions where effective Internet access management is based on scheduled, time-based access to student batches.

    Such policies provide automatic controls over the time spent by students over the Internet, ensuring sufficient Internet access time for all. Accounts can be created based on hours, days and time of the day. In addition, Cyberoam delivers accounting on hours and data transfer by user and host, making the task of planning and policy-setting more effective.

  • Safe Academic Environment

    Cyberoam's focus on the institution's requirements enables it to deliver complete protection over web, IM, P2P traffic, completely controlling access. With 50% youth accidentally landing on a porn site, Cyberoam controls this factor with its content & application filtering solution. This reduces threat incidence, acting as a complement to gateway level anti-virus and spyware protection.

    This comprehensive protection ensures that student research work is not virus-infected or lost due to the presence of viruses, worms or Trojans in the network or that the network is up for uninterrupted Internet access.

    Cyberoam also provides comprehensive controls ensuring protection from upload of sensitive images and video files that could tarnish the institution's reputation. Anti-spam prevents porn and scam related spam from being delivered into the institute's mail boxes, preserving a safe academic environment. This in turn reduces the institution's legal liability.

  • Ease of Management

    The Cyberoam firewall appliance is easy to deploy with no integration problems and is easy to manage and implement. Their easy to use GUI requires hardly any technical knowledge, reducing the need for qualified technical manpower.

    Easy policy setting for students up to thousands when the academic year begins, as well as the user-based policy supported easy resetting when the students move to higher academic levels, makes it a simple process that can be completed in less than a day.

  • Bandwidth and Internet Availability

    Effective bandwidth and access time controls prevent bandwidth choking and ensure that all the users, including students, staff and administration get sufficient bandwidth and access time. By implementing policies that control access time to users, departments and applications, Cyberoam ensures that no single user or group takes an inordinate share of Internet time or bandwidth.

  • Safe Search - Filter Adult Content

    With Cyberoam Safe Search, educational institutions can protect minors from exposure to unhealthy surfing by controlling search results in Google, Yahoo and other search engines. When enabled, web sites containing pornography and explicit sexual content can be blocked from search results.

  • Intelligent On-Appliance Reporting

    Cyberoam's Traffic Discovery brings suspicious traffic patterns to the IT department's notice as they happen and its on-appliance reporting offers a range of analytical reports that show trends in Internet usage. This enables IT department to identify emerging applications, pattern changes in usage and fine tune institute policies accordingly, supporting the creation of advanced levels of security and productivity.

Cyberoam CR Appliance Series
Cyberoam appliances - CR15i, CR25i, CR50i, CR50ia, CR100i, CR100ia, CR200i, CR250i, CR300i, CR500i, CR1000i and CR1500i, suit the requirements educational institutions of all sizes. Cyberoam's comprehensive security protects the educational institutions from Internet threats, including spyware, phishing, pharming, viruses, worms, Trojans and more.

Cyberoam Benefits:
Cyberoam offers measurable and intangible benefits to educational institutions:

  • Eliminates IP address an intermediate component to identify and control the students
  • Provides complete Student/Faculty/Admin security in any environment, including DHCP and Wi-Fi
  • Allows students to carry their access rights anywhere in the network
  • Controls non-academic, non productive surfing and bandwidth abuse

Request an Evaluation Unit

For price quote or further product detail, contact us