Post on 12-May-2020
CyberoamNext-Generation Security for Enterprises
With organizations experiencing newer trends like high
Internet speeds, virtualization, application explosion,
increasing use of Web applications and BYOD, they
ought to prepare for emerging security risks in their
networks along with increasing concerns on insider
threats, vanishing ‘trust boundaries’, compliance
management and more. Growing businesses and rapidly
expanding network horizons have lead to an increased
demand for next-generation security, higher
performance, easy security management and quick
compliance, in enterprises. Cyberoam’s next-generation
security caters to the security anxiety and demand for
advanced network security in organizations today.
www.cyberoam.com S e c u r i n g Y o u
The Cyberoam Solution for Network Security
Cyberoam is an award-winning global IT security
company with a presence in 125+ countries. With an
array of globally acclaimed and certified products,
Cyberoam offers reliable solutions for varied needs of
SOHO/ROBO, SMBs and Enterprises, including
network security, centralized security management and
centralized visibility. Trusted by thousands of customers
across the globe for its innovative products and
technology, Cyberoam enjoys a proven track record of
serving many well-known customers across various
industries.
Cyberoam’s Security Product Portfolio:
L7
L8
L6
L5
L4
L3
L2
L1
Application
Presentation
Session
Transport
Network
Data Link
Physical
USER
00-17-BB-8C-E3-E7
192.168.1.1
TCP, UDP
L2TP, PPTP
ASCII, EBCDIC, ICA
Cyberoam's treats “User Identity” as the 8th Layer in the protocol stack
Layer 8 Technology
Cyberoam Next Generation Firewall (NGFW) offers security across Layer 2-Layer 8 using Identity-based policies
Network SecurityOffers flexibility of hardware and virtual
network security appliances for security in
physical as well as virtual networks
Centralized Security ManagementAllows enterprises/MSSPs to manage multiple,
dispersed Cyberoam security installations across
remote or branch offices
Cyberoam’s Layer 8 Technology treats User Identity as the 8th
layer or the “human layer” in the network protocol stack. This
allows organizations to uniquely identify users, control user
activities in the network, and enable policy-setting and
reporting by username, even in dynamic IP environments like
DHCP and Wi-Fi. Cyberoam’s Layer 8 Technology adds speed
to security in a network by offering instant visibility into the
source of attacks by identifying victims/attackers by
username, which allows proactive remediation of security
incidents. With Layer 8 identification and controls, Cyberoam
enables security management, data protection, forensic
analysis and compliance management in organizations.
CYBEROAM’S LAYER 8 IDENTITY-BASED SECURITY
Centralized VisibilityOffers real-time visibility into user and network
activities across the enterprise network
Training & SupportEnables faster resolution of issues with customer
support and efficient deployment and
management of Cyberoam solutions with
trainings
Cyberoam integrates multiple security features on a single
appliance to offer comprehensive network security.
Cyberoam security appliances work at the network gateway
and protect networks against application threats,
vulnerabilities in web applications, BYOD challenges, data
leakage over websites and applications, sophisticated &
blended attacks, malware, spam, spyware and other
evolving external threats. With the flexibility of hardware as
well as virtual security appliances, Cyberoam protects both
the physical and virtual organizational networks.
NETWORK SECURITY
Next-Generation security features on Cyberoam network security appliances:
ŸStateful Inspection Firewall
ŸApplication Visibility & Control
ŸWeb Application Firewall
ŸVPN (SSL VPN & IPSec)
Ÿ Intrusion Prevention System
Ÿ Anti-Virus & Anti-Spyware
ŸAnti-Spam
ŸOutbound Spam Protection
ŸWeb Filtering
ŸBandwidth Management
Ÿ3G / 4G / WiMAX Connectivity *
ŸIM Archiving & Controls
ŸMultiple Link Management
ŸOn-Appliance Reporting
ŸIPv6 Ready
ŸWi-Fi Appliances *
ŸFleXi Ports *
* Features not available on virtual network security appliances
S e c u r i n g Y o u
Security Connectivity Productivity
Cyberoam network security appliances ensure Security, without compromising on the equally
essential, Connectivity and Productivity. Organizations can achieve a balanced growth with a network
security appliance that offers policy controls over its features to help achieve security, connectivity and
productivity, without compromising any one of them. With such an ideal combination of best-of-breed
assembly of features over a single interface, organisations get a complete networking solution in
Cyberoam.
CYBEROAM SECURITY APPLIANCES ASSURE
KEY HIGHLIGHTS:
! Sales, channel and customer presence across 125+ countries! Backed by World’s Largest PE Investor ($156bn) – the Carlyle Group! 450+ employees globally; Industry leading R&D ! Patent-pending Identity-based Layer 8 Technology ! Common Criteria EAL4+ certified security! Recognized as a ‘Network Security Innovator’ by SC Magazine! Recognized as ‘Visionary’ in Gartner’s UTM Magic Quadrant
st! World’s 1 network security and UTM vendor with ISO 20000:2011 certified Customer Support
Services
Cyberoam NG series – Future-ready Security
Ÿ Offers protection against newly evolving threats with
Intrusion Prevention System, Gateway Anti-Virus/Anti-
Spyware, Gateway Anti-Spam, offering security at par
with best-of-breed solutions
Advanced Threat Protection [IPS, AV, AS]
Ÿ Patent-pending Layer 8 technology penetrates through all
security modules of Cyberoam network security
appliances, offering Identity-based controls over user
authentication, service authorization and reporting (AAA)
Layer 8 Technology for Identity-based Security
The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with
increasing number of users like customers and partners connecting to an office network from outside is leading to de-
perimeterization of networks. Besides, trends like rise in number of network users and devices, application explosion,
virtualization, increasing use of web applications and more are leading to loss of security controls for organizations
over their networks.
Cyberoam offers future-ready security to SOHO/ROBO, SMEs and Enterprises with its NG Series network security
appliances, available as Next-Generation Firewalls and UTMs. Cyberoam’s security appliances offer next-generation
security features to help organizations secure their networks against risk emerging from adoption of IT trends.
Cyberoam NGFW Hardware Appliance Range:
CR NG Series
CR ia Series
500iNG-XP, 750iNG-XP, 2500iNG
500ia, 500ia-1F/10F/RP, 750ia, 750ia-1F/10F, 1000ia,
1000ia-10F, 1500ia, 1500ia-10F
Ÿ Industry-leading coverage for 2000+ key applications
Ÿ Prioritizes applications based on combination of User,
Time, Applications and Bandwidth
Ÿ Granular application controls with classification based on
risk level, characteristics, technology
Ÿ Pro-active protection model eliminates the need for
manual intervention by administrator to update policy for
new applications
Application Visibility & Control
Ÿ On-appliance reporting with real-time logs and reports,
saving the cost of a dedicated reporting solution
Ÿ Offers 1200+ reports offer real-time visibility into user and
network activities
Ÿ Helps organizations with security management,
compliance management and forensic analysis
Ÿ One-click compliance reports on PCI DSS, HIPAA, SOX and
more
On-appliance reporting
Cyberoam NGFWs with Layer 8 Identity-based technology
offer actionable intelligence and controls to enterprises
that allow complete security control, over L2-L8 for their
future-ready security. Cyberoam NGFW protection offers
Layer 8 Identity-based security, Application visibility &
control, IPS, VPN (IPSec and SSL), website filtering, and
QoS. Based on the security needs, enterprise customers
can avail additional security features like Web Application
Firewall, Gateway Anti-Virus, Anti-Spam, and more.
Cyberoam offers the fastest UTM appliances for
SOHO/SMB and Branch offices with comprehensive
network security. Cyberoam NG series offers future-ready
security through its enterprise-grade security features,
gigabit ports and best-in-class hardware & software.
Multiple security features integrated over a single, Layer 8
Identity-based platform making security simple, yet
highly effective.
Next-Generation Firewalls (NGFW) Unified Threat Management Appliances
Key Features
Cyberoam UTM Hardware Appliance Range:
CR NG Series
CR ia Series
15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG,
100iNG, 200iNG, 200iNG-XP, 300iNG, 300iNG-XP
15i, 25ia, 35ia, 15wi, 25wi, 35wi, 50ia, 100ia, 200i, 300i
Future-Ready Security.
Ÿ QoS/Bandwidth allocation to users, user groups, Applications,
Website Categories and Firewall rules
Ÿ Prioritize business critical applications and users, ensuring
assured QoS for business-critical applications like VoIP and CRM
Ÿ Option to commit bandwidth at all times or assign idle bandwidth
automatically to other applications /users /website categories
QoS or Bandwidth management
Ÿ Ensures secure remote access with IPSec VPN, LT2P,
PPTP and SSL VPN over its network security appliances
Ÿ Threat-free Tunneling technology scans traffic for
malware, intrusion attempts
Ÿ Offers Mobile VPN clients for Android and iOS devices,
simplifying communications
Ÿ Comprehensive URL database with 100 million URLs in
89+ categories
ŸCreate policy on a combination of user, website
category, time and bandwidth
ŸBlocks harmful websites, preventing malware, phishing,
pharming attacks and enhances productivity by limiting
access to unproductive content
VPN
Web filtering
Ÿ Available as an on-appliance subscription module
Ÿ Protects websites and web-based applications against OWASP
Top 10 web application attacks like SQL injection, cross-site
scripting (XSS), URL parameter tampering, and more
Ÿ Follows a positive security model through Intuitive Website Flow
Detector - automatically identifies and blocks all application layer
attacks without relying on signature tables or pattern-matching
techniques
Web Application Firewall (WAF)
Extensible Security Architecture (ESA)
Cyberoam’s Extensible Security Architecture helps
organizations tackle unknown threats of the future by
offering the agility to prolong the life and performance of
its security appliances to support newer security features
and enhancements.
Scalability
Besides the Extensible Security Architecture that
supports future security needs without the need to
change the appliance, organizations can add another
appliance in cluster/HA to support more number of users.
Flexibility
The FleXi Ports available in the FleXi Port (XP) security
appliances, offer flexible network connectivity with I/O
slots that allow additional Copper/Fiber 1G/10G ports on
the same security appliance, allowing organizations to
upgrade to new technologies easily and cost-effectively,
making them future-ready.
High Performance Security Appliances
Cyberoam offers high performance for enterprises with its
powerful hardware appliances and CybeoamOS that has
the ability to extract highest level of performance from a
multi-core platform and tightly integrates with the
hardware for network and crypto acceleration.
Cyberoam offers the “fastest UTM appliances” for SOHO/
SMB segments.With the entry-level NG series appliance
starting with gigabit firewall throughputs, organizations
get assured high performance security, even for small and
branch offices.
Actionable Intelligence & Controls
Cyberoam’s Human Layer 8 acts like a standard abstract
layer, which binds with the existing Layers 2-7, enabling
enterprises to regain lost security controls and put
security checks where they want to from L2-L8, along
with complete visibility into user and network activities.
OSIntelligent Firmware - CyberoamOS
Integrated seamlessly with the hardware, for network and
crypto acceleration, CyberoamOS extracts the highest
level of performance from a multi-core platform and offers
minimum latency. It comes with Next-Generation security
features to protect against newly evolving threats.
Cyberoam virtual network security appliance range:
CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C
Cyberoam virtual security appliances offer:
1. Security for virtualized networks by scanning traffic within virtual
networks; protecting hypervisor management console, hypervisor
and Guest OS; and securing zero trust networks.
2. Comprehensive network security with multiple security features, in a
single virtual appliance that makes virtual environments as secure as
the physical infrastructure.
3. Ease of deployment and upgrade.
4. One-click compliance reports and logging/reporting that helps in
compliance management.
5. Centralized Security Management of branch offices using
physical/virtual network security appliances over a single interface
of Cyberoam Central Console (CCC), available in both virtual and
hardware forms.
6. Centralized Visibility into network and user activities with logging and
reporting offered by Cyberoam iView software.
7. Complete virtual security solution with Cyberoam’s virtual network
security appliances, virtual CCC, and Cyberoam iView software for
centralized logging and reporting.
Cyberoam virtual security appliances support multiple virtualization
platforms like VMware and Hyper-V.
Virtual Security
Cyberoam virtual network security appliances are designed to address the security needs for virtualised environments
like virtual data-centers, ‘Security-in-a-Box’ set-up for MSSPs/Enterprises, and ‘Office-in-a-Box’. Cyberoam virtual
network security appliance can be deployed as Next Generation Firewalls or UTMs.
Centralized Security Management across Branch Offices Centralized Visibility across Networks
Enterprises can centrally manage security across
dispersed branch offices using Cyberoam security
appliances with Cyberoam Central Console (CCC),
available as hardware and virtual appliances.
Enterprises can get complete centralized real-time
visibility into network and user activities with logs and
reports offered by Cyberoam iView.
Cyberoam iView Appliance Range:
Hardware appliances
- CR-iVU25, CR-iVU100, CR-iVU200
Software
•
•
•
•
•
•
•
Centrally push policies, security subscriptions and
firmware/signature upgrades with change management for
uniform policies and protection against zero hour threats.
Enables quick management with the flexibility to group
Cyberoam security appliances deployed across offices
based on geography, appliance models, firmware versions,
and security subscriptions
Role-based administrative controls with logs /views of
administrator actions
Pro-active alerts on subscription expiry, excess disk usage,
IPS and virus threat counts, unhealthy surfing hits, and
more
Enables pre-provisioning (auto-appliance discovery) of
Cyberoam devices with configuration templates to create
policies in minimum time
•
•
•
•
•
1200+ reports help with log and security management,
compliance management, and forensic analysis Logs, reports and alerts across multiple devices,
protocols and locations provide user and network activity
information to identify security breaches, enabling quick
action and minimizing network downtime One-click compliance reports on HIPAA, PCI DSS, GLBA,
SOX and drill-down reports /alerts for security breach,
data leakage helps to meet compliance needs Helps with forensic analysis by reconstructing the
sequence of events of security breach with logs and
reports, reducing cost of investigation and minimizing
network downtime Compatibility with a wide range of devices including
Proxy Firewalls, Custom Applications and any Syslog-
compatible devices enables organizations to store logs
and reports of multiple devices
CCC Appliance Range:
•
•
Hardware CCC Appliances
- CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000
Virtual CCC Appliances
- CCCV15, CCCV50, CCCV100, CCCV200, CCCV500
Awards and Certifications
Registered Trademark of Cyberoam Technologies Pvt. Ltd.
sales@cyberoam.com | www.cyberoam.com
S e c u r i n g Y o u
Cyberoam Technologies
505 Thornall Street, Suite # 304 Edison,
NJ - 08837, USA, Tel: +1-847-235-4684
Toll Free Number: +1-800-686-2360
Cyberoam Threat Research Labs consists of a dedicated team of
researchers that ensure detection and identification of security
threats at early stages of propagation and protect Cyberoam
customers against numerous zero day vulnerabilities and
malware attacks. CTRL ensures appropriate security protection
by continuously releasing suitable signatures, timely security
upgrade and research reports.
Cyberoam Threat Research LabTraining and Support
Cyberoam offers trainings and product updates to its
customers for efficient deployment, configuration and
management of Cyberoam solutions.
Training
Cyberoam’s dedicated global pre-sales team offers
security planning and migration assistance for Cyberoam
deployment and implementation to enterprises
Pre-sales Support
Cyberoam’s ISO 20000:2011 certified Global Support
Team offers 24x7 or 8x5 support – as subscribed by the
customers, over phone, email and chat.
Post-Sales Support
www.check-mark.com
CERTIFIED
VPNC
InteropBasic
AES
Interop
CERTIFIED
VPNC
SSL Advanced Network Extension
SSL Basic Network Extension
SSL JavaScript
SSLFirefox
SSLExchange
SSLPortal
RECOMMENDS
BEST BUY
EDITOR’S C H O I C E
www.itpro.co.ukPROPCRECOMMENDED