Securing You
Cyberoam banner NU banner
CALL US:  0800 085 6661
CERTIFICATION »
IPv6 Ready
IPv6 Ready

Checkmark
UTM Level 5 Checkmark Certification

ICSA Certified
ICSA Labs Certified Firewall

AWARDS »
Review
Network Products Guide - Best Products and Services 2008 2007 Global Excellence Awards
WHITEPAPERS »
Whitepaper
Winning the Battle for Bandwidth

Whitepaper
Whitepaper
IDC - UTM APPLIANCES & IDENTITY BASED SECURITY

Whitepaper
 

COMPREHENSIVE INTERNET SECURITY SYSTEM


Cyberoam’s integrated Security Appliances are purpose-built for comprehensive network protection and high performance needs of small, medium and large enterprises. Cyberoam’s Check Mark Level 5 certified, ICSA firewall certified identity-based Internet Security Appliances offer protection against external as well as internal threats.
 
Cyberoam offers multi-lingual support with Chinese, Hindi and English language GUI's, enhancing user experience in some of the largest and fastest growing markets.

Identity-based Security - Patent Pending Technology
Cyberoam’s unique user identity-based Internet Security Appliances solve today’s need to control individual user behavior to ensure comprehensive threat management. It gives complete visibility into “Who is doing What” in the network and allows policies to be created at the user level based on work profiles. With the finest level of controls and an unprecedented degree of control, flexibility and ease of management, the Cyberoam Internet Security Appliance is a highly effective UTM solution that reduces capital and operating expenses.

Architecture Flexibility
Cyberoam’s architectural flexibility can easily accommodate emerging applications like VoIP through own enhancements and easy third party plug-ins with no architectural changes, keeping enterprises in a state of constant threat-readiness in a rapidly evolving threat scenario. Cyberoam appliances balance performance and security by using technologies like multi core processors, regular expressions co processors and hardware based Advanced Cryptography Engine for accelerating key functions of the UTM appliance.

Cyberoam’s Active-Active High Availability provides efficient, continuous access to business-critical applications, information, and services. Active-Active HA increases overall network performance by sharing the load of processing network traffic between two Cyberoam appliances and providing continued security by eliminating the problem of single point failure. The cluster appears to your network to be a single device, adding increased performance without changing your network configuration. Primary appliance acts as the load balancer and load balances all the TCP communications including TCP communications from Proxies but will not load balance VPN traffic.

Segment Key Benefits Cyberoam Appliances
SOHO :
Small Office-Home Office
Identity-based Unified Threat Management (UTM) features including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks.
Zero-hour malware protection that does not wait for signature release
Complete ease of management, eliminating the need for technical resource
CR15i
CR25i
ROBO :
Remote Office- Branch Office
Identity-based Unified Threat Management (UTM) security features including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks.
Encrypted VPN tunnel for secure communication with branch office
Identity-based security with visibility into and control over individual user activity at branches
Zero-hour protection at branch offices with enterprise-wide security policy enforcement
CR15i
CR25i
Small and Medium Enterprises
Purpose-built UTM Security Appliances providing comprehensive security and high performance
Identity-based Unified Threat Management (UTM) security features including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks and limited capital, operating expense.
Identity-based visibility and control even in dynamic IP environments like Wi-Fi and DHCP, enabling regulatory compliance
Dynamic routing, and VLAN, supporting rapid network expansion
High Availability for business continuity
CR50i
CR50ia
CR100i
CR100ia
CR200i
CR250i
CR300i
Large Enterprises
Identity-based security with visibility into and control over individual user activity, for protection against external and internal threats. Also enables regulatory compliance
Purpose-built Security Appliances providing comprehensive security against network and application-level attacks and high performance
Multicore architecture delivering high throughput and flexibility for high traffic requirements
Enterprise-grade security with High Availability, dynamic routing and Virtual LAN capability
Identity-based Unified Threat Management (UTM) features, including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks
Encrypted tunnel for secure communication with remote locations
Centralized security control onver remote offices
CR500i
CR1000i
CR1500i

 

Request an Evaluation Unit

For price quote or further product detail, contact us