|
|
|
|
|
UTM for SOHO/ROBO
|
|
|
UTM for SMBs
|
|
|
UTM for Large Enterprise
|
|
|
|
|
|
|
|
|
|
OVERVIEW
|
|
|
|
|
Cyberoam’s integrated Security Appliances are purpose-built for comprehensive network
protection and high performance needs of small, medium and large enterprises. Cyberoam’s
Check Mark Level 5 certified, ICSA firewall certified identity-based Internet Security
Appliances offer protection against external as well as internal threats.
|
|
|
Cyberoam’s unique user identity-based Internet Security Appliances solve today’s
need to control individual user behavior to ensure comprehensive threat management.
Functioning with Layer 8 technology, Cyberoam gives complete visibility into “Who
is doing What” in the network and allows policies to be created at the user level
based on work profiles. With the finest level of controls and an unprecedented degree
of control, flexibility and ease of management, the Cyberoam Internet Security Appliance
is a highly effective UTM solution that reduces capital and operating expenses.
|
|
|
The Cyberoam UTM appliances deliver high performance through the use of multi-core
processors optimized through its software architecture. Cyberoam’s architectural
flexibility can easily accommodate emerging applications like VoIP through own enhancements
and easy third party plug-ins with no architectural changes, keeping organizations
in a state of constant threat-readiness in a rapidly evolving threat scenario. Cyberoam
appliances balance performance and security by using technologies like multi core
processors, regular expressions co processors and hardware based Advanced Cryptography
Engine for accelerating key functions of the UTM appliance.
|
|
|
Cyberoam’s Active-Active High Availability provides efficient, continuous access
to business-critical applications, information, and services. Active-Active HA increases
overall network performance by load balancing the network traffic between two Cyberoam
appliances. Further it offers auto failover, eliminating the problem of single point
failure. The cluster appears to your network to be a single device, adding increased
performance without changing your network configuration. Primary appliance acts
as the load balancer and load balances all the TCP communications including TCP
communications from Proxies but will not load balance VPN traffic.
|
|
Segment
|
Key Benefits
|
Cyberoam Appliances
|
SOHO :
Small Office-Home Office
|
|
Identity-based Unified Threat Management (UTM) features including Stateful Inspection
Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-spyware, Gateway
Anti-spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth
Management and Multiple Link Management for comprehensive network protection from
blended attacks.
|
|
Zero-hour malware protection that does not wait for signature release
|
|
Complete ease of management, eliminating the need for technical resource
|
|
|
CR15i
|
|
CR15wi
|
|
CR25ia
|
|
CR25wi
|
|
CR35ia
|
|
CR35wi
|
|
ROBO :
Remote Office- Branch Office
|
|
Identity-based Unified Threat Management (UTM) security features including Stateful
Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-malware,
Gateway Anti-spam, Intrusion Prevention System, Content & Application Filtering,
Bandwidth Management and Multiple Link Management for comprehensive network protection
from blended attacks.
|
|
Encrypted VPN tunnel for secure communication with branch office, road warriors,
telecommuters, partners and customers
|
|
Identity-based security with visibility into and control over individual user activity
at branches
|
|
Zero-hour protection at branch offices with enterprise-wide security policy enforcement
|
|
|
CR15i
|
|
CR15wi
|
|
CR25ia
|
|
CR25wi
|
|
CR35ia
|
|
CR35wi
|
|
Small and Medium Enterprises
|
|
Purpose-built UTM Security Appliances providing comprehensive security and high
performance
|
|
Identity-based Unified Threat Management (UTM) security features including Stateful
Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-malware,
Gateway Anti-spam, Intrusion Prevention System, Content & Application Filtering,
Bandwidth Management and Multiple Link Management for comprehensive network protection
from blended attacks and limited capital, operating expense.
|
|
Identity-based visibility and control even in dynamic IP environments like Wi-Fi
and DHCP, enabling regulatory compliance
|
|
Dynamic routing, and VLAN, supporting rapid network expansion
|
|
Active-Active High Availability for business continuity
|
|
|
CR50ia
|
|
CR100ia
|
|
CR200i
|
|
CR300i
|
|
Large Enterprises
|
|
Identity-based security with visibility into and control over individual user activity,
for protection against external and internal threats. Also enables regulatory compliance
|
|
Purpose-built Security Appliances providing comprehensive security against network
and application-level attacks and High performance
|
|
Multicore architecture delivering Gigabit throughputs
|
|
Enterprise-grade security with High Availability, dynamic routing and Virtual LAN
capability
|
|
Identity-based Unified Threat Management (UTM) features, including Stateful Inspection
Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-spyware, Gateway
Anti-spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth
Management and Multiple Link Management for comprehensive network protection from
blended attacks
|
|
Encrypted tunnel for secure communication with remote locations
|
|
Centralized security control over remote offices
|
|
Centralized logging and reporting for multiple locations
|
|
|
CR500ia
|
|
CR750ia
|
|
CR1000i
|
|
CR1500i
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SC Mag "Best Buy"
Cyberoam CR15i
|
|
|
“Superb value, a remarkable feature set, extensive policy-based security, easy deployment,
good reporting”
|
|
|
|
|
|
|
Review
Cyberoam CR50ia
|
|
|
“This appliance couples low cost with a lot of features that are flexible and easy
to configure.”
|
|
|
|
|
|
Review
Cyberoam CR1500i
|
|
|
“Compared with many enterprise UTM security appliances, the CR1500i looks good value
and it also offers Cyberoam’s unique identity based security.”
|
|
|
|
|
|
|
|