Cyberoam NG series: Future-ready Security. The Future of networks…
-
Upload
sara-bradford -
Category
Documents
-
view
221 -
download
0
Transcript of Cyberoam NG series: Future-ready Security. The Future of networks…
![Page 1: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/1.jpg)
Cyberoam NG series: Future-ready Security
![Page 2: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/2.jpg)
The Future of networks…
![Page 3: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/3.jpg)
Where are Networks moving to?
• Superfast Internet: 1000 Mbps Internet speed a reality today!• More devices per user – More devices connecting to Internet• More web-applications being accessed• Increase in usage of data
![Page 4: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/4.jpg)
How will Organizations Gain?
With Network Connectivity & Productivity taking a leap, what about Security?
SECURITYCONNECTIVITY PRODUCTIVITY
![Page 5: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/5.jpg)
No one wants SECURITY to become a bottleneck in their network!
![Page 6: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/6.jpg)
Presenting The Cyberoam NG seriesThe ‘Next-Generation’ appliances built for Future-ready Security in networks!
![Page 7: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/7.jpg)
Cyberoam NG (Next-Generation) series offers ‘Future-Ready’ Security
• The Fastest ‘UTM’ appliances for SOHO and SMB segments• Offering Next-Generation Firewall protection for Large
Enterprises!
• Offering Future-Ready security to• SOHO, ROBO
– CR15iNG, CR25iNG, CR35iNG– Wi-Fi appliances: CR15wiNG, CR25wiNG, CR35wiNG
• SMB– CR50iNG, CR100iNG
• Enterprise– CR2500iNG
![Page 8: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/8.jpg)
The Cyberoam NG Series
Powerful Hardware
Superior Quality
Performance Leap
Value for Money
All-New Firmware
Future-Ready Security
![Page 9: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/9.jpg)
Powerful Hardware for Future-Ready Security
• Superfast processing speed• A must for Gigabit Internet speeds!• Nano second security processing with Giga Hertz processors• Parallel security processing with Dual core
• Next-Gen Memory• High Internet speed and data transfer demand Next-Gen
memory• Larger memory size for Enterprise-grade security • DDR3 RAM for more number of data transfers per clock cycle• Faster, Next-Gen memory for higher I/O throughput
![Page 10: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/10.jpg)
Powerful Hardware for Future-Ready Security
• Gigabit Ports for Gigabit Speeds• Any network security appliance with having less than Gigabit
port is nearly obsolete!– All network components have moved to Gigabit ports
• Gigabit Ethernet for future SOHO & SMB networks• Higher port density
• More Storage• Today, higher throughput leads to more activities,
generating more data. – More storage for more reports– Reports stored for longer duration
![Page 11: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/11.jpg)
Superior Quality
• Better performance• Design & components supporting high speed I/O
throughput• Highly robust
• Designed to protect against power surge & fluctuations• Industrial grade components to withstand extreme
environments
![Page 12: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/12.jpg)
Wi-Fi Security appliances for SOHO/ROBO networks
• Faster performance, broader coverage with 3x3 MIMO Technology• Dual band support: 2.4 GHz or 5 GHz• Higher performance by aggressively transmitting and
receiving data over Wi-Fi channels• Faster handling of video streaming and high bandwidth
downloads• High performance integrated security over WLAN
• Secures wireless networks to the extent of wired networks
![Page 13: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/13.jpg)
Appliances starting with Gigabit Firewall Throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
![Page 14: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/14.jpg)
Best in class UTM throughputs
* CR15wiNG, CR25wiNG, CR35wiNG have same throughputs as equivalent models above
![Page 15: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/15.jpg)
CR2500iNG: Next-Generation Firewall throughput
36000 MbpsFirewall throughput
0 10000 20000 30000 40000
UTM throughput: 4000 Mbps• Supports upto 4000 users
![Page 16: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/16.jpg)
Get Ready for Future Networks
• 6.5 times increase in Firewall throughputs• 5 times increase in UTM throughputs• Best in class throughput against competitor models
An Anti-aging remedy for your network offering the best value for money!
![Page 17: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/17.jpg)
The NG Series-Loaded with All-New Firmware
![Page 18: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/18.jpg)
The NG Series-All-New-GUI
![Page 19: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/19.jpg)
![Page 20: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/20.jpg)
![Page 21: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/21.jpg)
![Page 22: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/22.jpg)
![Page 23: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/23.jpg)
![Page 24: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/24.jpg)
![Page 25: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/25.jpg)
![Page 26: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/26.jpg)
The need for “Intelligent Software”
• Key challenges• Keep up with the exponentially rising Network Traffic• Reduce overall cost of networking & security equipments• Minimize power consumption
– Limitation of “Hardware”• Increasing clock frequencies to boost performance leads to
prohibitively high power consumption
– Shift to Multicore architecture to • Meet every increasing performance• Maintain manageable levels of power consumption
![Page 27: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/27.jpg)
CyberoamOSwith ‘Intelligent Software’
![Page 28: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/28.jpg)
‘Intelligent Software’: Doing more with less
• Tightly integrates with Hardware for Network & Crypto Acceleration delivering high performance
• Better use of Multicore architecture for Parallel processing • Optimize workload distribution across cores• Lockless path for packet forwarding
– A single core handles packets for each connection at any given time to avoid inter-locks
• Optimize Interrupt rate for minimum CPU overhead and latency• High rate of interrupts - A bottleneck in high-speed data
transfers
![Page 29: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/29.jpg)
‘Intelligent Software’: Doing more with less
• Fastpath packets to improve processing speed and reduce CPU overhead
• Avoid firewalling for file packets once Firewall decision is taken (unless in event of rule change).
• E.g. 200 mb file. Once the Firewall decision is taken on the file, the rest file packets need not go through Firewalling decision.
![Page 30: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/30.jpg)
The need for Next Generation Security features…
![Page 31: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/31.jpg)
The need to be more application-layer aware than ever before-Explosion of Internet Applications-Risk: ‘Application Chaos’ in organization
Internet
![Page 32: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/32.jpg)
NG series offers Advanced Application Controls
![Page 33: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/33.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Take control of which applications can run on your networkTake control of which applications can run on your network
Risk Level
Very Low (1)
Low (2)
Medium (3)
High (4)
Very High (5)
Application Characteristics
Excessive Bandwidth
Prone to misuse
Transfer files
Tunnel other apps
Widely used
Loss of Productivity
Can bypass firewall policy
Application Technology
Browser Based
Client Server
Network Protocol
P2P
Application Classification based on
![Page 34: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/34.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Application ClassificationApplication Classification
Applications are classified based on
![Page 35: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/35.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Proactive Protection ModelProactive Protection Model
Administrator can simply select filtering criteria Technology, Risk Level or Characteristics
Set action – regardless of application name Allow or Deny
Allow/Block all future applications included for respective criteria
No need of administrator intervention to add new applications to policy
![Page 36: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/36.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Proactive Protection ModelProactive Protection Model
Select P2P Applications
Set ActionBlock all future P2P
application without adding applications manually
![Page 37: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/37.jpg)
VoIPBitTorrentCRM ERP
IM ApplicationWebmail
Internet
Medium Quality
High Quality
Low Quality
5000+ Applications
Control over
Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls
Prioritize applications with Cyberoam’s Layer 7 & Layer 8 Visibility & Controls
![Page 38: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/38.jpg)
The increasing need to protect Web Applications from hackers
• Critical business applications and Services moving to the Web. Risk of web-application attack.
• Firewalls/IPS cannot protect a web application from unknown threats
Critical business applications
CRM
ERP
Intranet
HR
Mobile Apps
Email Server
![Page 39: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/39.jpg)
NG series offers On-Appliance Web Application Firewall
![Page 40: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/40.jpg)
On-Appliance Web Application FirewallOn-Appliance Web Application Firewall
Protect Web Servers and Web Applications from hackers No need to buy dedicated WAF appliance Cyberoam WAF blocks hackers from exploiting Web-Application
Vulnerabilities WAF Features include
– Positive protection model and No Signature Tables
– Intuitive website flow detector automatically adapts to website
changes– Protects against OWASP
top 10 vulnerabilities
– SSL Offloading
– Monitoring & Reporting
![Page 41: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/41.jpg)
The need to support BYOD & handle security risks
• Device Explosion Trend: Multiple Internet Access Devices per User
• Each device has a unique IP address• Employee-owned smart devices to reach 350mn
by 2014, up from 150mn this yr
![Page 42: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/42.jpg)
Embrace BYOD with Cyberoam
![Page 43: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/43.jpg)
Mobile VPN for iOS and Android devicesMobile VPN for iOS and Android devices
• Cyberoam’s Layer 8 Identity based security extended to mobile devices• Securely connect your iPhone, iPad and Android devices to your corporate
network through VPN
L2TP VPN (New)
Android
IPSec VPN (New)L2TP VPNPPTP VPN
iOS
![Page 44: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/44.jpg)
Support for new Connectivity Technologies – 4G/ LTE
![Page 45: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/45.jpg)
• Making organizations ready for high speed future• Easy deployment for high speed internet connection
• Simple USB modem plug-in into Cyberoam appliance
• Maximize business connectivity• Automatic fail-over to 4G/LTE WWAN connection• Gateway failover over VPN
• VPN over 4G/LTE4G
Support for new Connectivity Technologies – 4G /LTESupport for new Connectivity Technologies – 4G /LTE
![Page 46: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/46.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
First-of-its-kind Reporting
![Page 47: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/47.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
![Page 48: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/48.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Traffic Dashboard
Others: Rest of recordsN/A: Private IP
![Page 49: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/49.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Security Dashboard
![Page 50: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/50.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Dual Dashboard – Traffic and Security DashboardDual Dashboard – Traffic and Security Dashboard
Security Dashboard
Others: Rest of recordsN/A: Private IP
![Page 51: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/51.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
• Graphical overview of Data transfer and Risk level
Country Maps for Source/Destination TrafficCountry Maps for Source/Destination Traffic
![Page 52: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/52.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Application ReportsApplication Reports
![Page 53: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/53.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security FeaturesOther Security Features
Fusion Technology driven SI Firewall- Interface for achieving Unified Security
Layer 8 Technology: Identity-based controls- Identity-based security from Layer 2 to Layer 8- Allows control over
- Who can connect to network, Who can access what, What have they accessed
- Ability to track the user activities; identify attackers /victims
- Take quick network security decisions
![Page 54: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/54.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security FeaturesOther Security Features
Intrusion Prevention System- Maximum security against emerging threats- Identity-based IPS policies per user or group- 3500+ signatures – broadest security cover
Gateway Anti-Virus, Anti-spyware- Prevent blended threats- 4 million+ signatures- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM
traffic
![Page 55: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/55.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security FeaturesOther Security Features
Gateway Anti-Spam- Real-time, most accurate spam protection- Recurrent Pattern Detection (RPD) technology- Scans SMTP, POP3, IMAP traffic
Web & Content Filtering- Complete Visibility & Control over HTTP & HTTPS- 82+ categories and 44 million+ URLs
‘IPv6 Ready’ Gold
![Page 56: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/56.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security FeaturesOther Security Features
Virtual Private Network (VPN) - Threat-free remote access- Threat Free Tunneling (TFT) Technology - IPSec, L2TP, PPTP and SSL-VPN
Multi-Link Management- For an ‘always-on’ network- Support for more than 2 ISP links- Supports Wireless WAN (3G USB modems, WiMax)- Gateway failover over VPN
![Page 57: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/57.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Other Security FeaturesOther Security Features
Instant Messaging & Control- Identity-based controls for Yahoo messenger and
Windows Live Messenger- Control who can chat with whom, file transfer,
webcam
Bandwidth Management- Enhance network performance and productivity- Create a bandwidth policy on a combination of User,
Application, Category (application & web), allowing great flexibility and real L2-L8 visibility and control
Outbound Spam Protection- Protecting service providers against Outbound Spam
![Page 58: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/58.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
The Next-Generation Security Appliances built for Future Networks.
![Page 59: Cyberoam NG series: Future-ready Security. The Future of networks…](https://reader036.fdocuments.in/reader036/viewer/2022062321/56649d9e5503460f94a88cf0/html5/thumbnails/59.jpg)
www.cyberoam.com © Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank You!