Cyberoam

Cyberoam

Cyberoam security appliance is certified with CheckMark UTM Level 5 Certification and has received the Basic and AES Interop as well as SSL VPN certifications of the VPN Consortium. Cyberoam is also IPv6 Gold Logo certified, thereby, offering identification and processing of IPv6 traffic across its network security appliances which is now a mandatory requirement in government and enterprises worldwide.
http://www.cyberoam.com

Flexibility

The FleXi Ports available in the FleXi Port (XP) security appliances offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing enterprises to upgrade to new technologies easily and cost-effectively, making them future-ready. The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency, reduced network complexity and reduced operational costs.
To know more about Cyberoam solutions please visit www.cyberoam.com

Cyberoam Virtual Security

Cyberoam Next-Generation Firewalls (NGFW) with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security.

Cyberoam virtual network security

Cyberoam virtual network security appliances can be deployed as Next-Generation Firewalls or UTMs and offer industry-leading network security to virtual data-centers, “Security-in-a-Box” set-up for MSSPs/organizations, and “Office-in-a-Box” set-up.
Cyberoam offers a complete virtual security solution to organizations with its virtual network security appliances (Next-Generation Firewalls/UTMs), virtual Cyberoam Central Console for centralized management, and Cybero .am iView software for centralized logging and reporting.

Intelligent Logging & Reporting

Cyberoam iView offers centralized logging and reporting of network and user activity over multiple devices across distributed locations, providing real-time and historical information of security events to MSSPs and large enterprises. Available as an open source solution and as a dedicated appliance, it offers intelligent logging and reporting with Layer 8 Identity-based visibility.

Actionable Intelligence & Controls

Cyberoam’s Human Layer 8 acts like a standard abstract layer that binds with real Layers 2-7, enabling enterprises to regain lost security controls. By binding User Identity across Layers 2-7, enterprises can put security checks where they want to from L2-L8, along with complete visibility into user and network activities.

Centralized Management

Cyberoam Central Console (CCC) appliances offer the flexibility of hardware CCC appliances and virtual CCC appliances to provide centralized security management across distributed Cyberoam network security appliances, enabling high levels of security for MSSPs and large enterprises. With Layer 8 Identity-based policies and centralized reports and alerts, CCC hardware and virtual appliances provide granular security and visibility into remote and branch offices across the globe.

CyberoamOS

Cyberoam Next-Generation Firewalls are based on CyberoamOS – an intelligent and powerful firmware that offers next-generation security features include inline application inspection and control, website filtering, HTTPS inspection, Intrusion Prevention System, VPN (IPSec and SSL) and QoS/bandwidth management. Additional security features like Web Application Firewall, Gateway Anti-Virus, and Gateway Anti-Spam are also available.

High Performance

Cyberoam offers high performance for enterprises with its powerful hardware appliances and CybeoamOS that has the ability to extract highest level of performance from a multi-core platform and tightly integrates with the hardware for network and crypto acceleration.

Scalability

Cyberoam’s Extensible Security Architecture supports future enhancements like new security features and security updates that can be developed rapidly and deployed with minimum efforts without the need to change the appliance, offering future-ready security to large enterprises. In addition, enterprises can add another appliance in cluster/HA to support more number of users.

Cyberoam Next-Generation Firewalls

The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with increasing number of users like customers and partners connecting to an enterprise network from outside is leading to de-parameterization of enterprise networks.