Home Products Solutions Contact Us Resources
e-NETSource Global Sourcing Solutions
Home
Products
Solutions
Contact Us
Resources
Cambium Networks
Cyberoam
Emerson Network Power
Ericsson
HUAWEI
Mitel
Netcomm Wireless
Proxim Wireless
Robustel
Siklu
ZyXEL
 
e-NETSource
SOURCING SOLUTIONS








Cyberoam-Banner








PRODUCT RESOURCES

CR15wi Appliance Datasheet





CR15i Appliance Datasheet



Cyberoam Tech & Datasheets




QUICK LINKS

Cyberoam Portfolio






Cyberoam Videos












The Deadly Insider


This entertaining animated film depicts an anthropomorphic portrayal of various Cyberoam UTM features that work together as part of a real-world team to deal with the bad guys in cyber-security: viruses, worms, spam, intrusions, indiscriminate downloads and insider threats.

In part 2 of the film, you will be introduced to an organization called Natex Corp where a wily insider is attempting to leak sensitive data from within the organization, across to an outsider. Will he succeed in his dirty game? Will Team Cyberoam find out about his intentions and stop data from going out of Natex Corp?
















Implementing Layer 8 Security


In this presentation, you will learn about Cyberoam’s unique identity-based security mechanism using “Layer 8 technology” which is based on the premise that the individual user is the weakest link in an organization’s security landscape.

To overcome threats coming from the user, organizations must have full visibility and control over who is doing what in the network. Cyberoam’s Identity-based advantage runs across each of its features and gives information on each user’s activities within the network. This visibility helps organizations remain secure from internal as well as external threats.
















Product Demo - Identity-Based UTM


Learn through this video about how Cyberoam Identity-based UTM secures the user – the weakest link in any organization’s security chain, with Cyberoam’s Layer 8 Technology.

The video moves on to the product demo explaining the ease with which Cyberoam UTM’s various security modules can be configured.


 













Cyberoam CR15wi



Cyberoam-CR15wi-Appliance






















Cyberoam CR15wi


CR15wi offers high performance security over WLAN to Small Office-Home Office (SOHO) and Remote Office Branch Office (ROBO) users. It supports 802.11n/b/g wireless standards. Combined with security over wired networks offered by its range of UTM appliances,

Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.

Cyberoam's Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow identity-based security policies in dynamic IP environment.

Insecure WLANs are easily susceptible to unauthorized intrusion by outsiders and malware attacks.

Cyberoam extends its set of security features over wired networks Firewall, VPN, Anti-Virus/Anti- Spyware, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management over WLAN, securing organizations from threats of data leakage and malware attacks.



Hardware Specifications
  • 10/100 Ethernet ports                            3           
  • Configurable Internal/DMZ/WAN ports     Yes        
  • Console ports (RJ45/DB9)                     1           
  • USB ports                                            1           
 
System Performance*                  
  • UTM Throughput (Mbps)                        15          
  • Firewall Throughput (UDP) (Mbps)          150        
  • Firewall Throughput (TCP) (Mbps)          90          
  • New sessions/second                           2,000     
  • Concurrent sessions                            30,000  
  • 3DES/AES throughput (Mbps)              15/25     
  • Anti-Virus Throughput (Mbps)                20          
  • IPS Throughput (Mbps)                         40
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.


Cyberoam UTM features assure Security, Connectivity, Productivity


SECURITY

Network Security
  • Firewall
  • Intrusion Prevention System
  • Wireless security
Content Security
  • Anti-Virus/Anti-Spyware
  • Anti-Spam
  • HTTPS/SSL Content Security
Administrative Security
  • Next-Gen UI
  • iView- Logging & Reporting

CONNECTIVITY

Business Continuity
  • Multiple Link Management
  • High Availability
Network Availability
  • VPN
  • 3G/WiMAX Connectivity
Future-ready Connectivity
  • “IPv6 Ready” Gold Logo

PRODUCTIVITY

Employee Productivity
  • Content Filtering
  • Instant Messaging Archiving & Controls
IT Resource Optimization
  • Bandwidth Management
  • Traffic Discovery
  • Application Layer 7 Management
Administrator Productivity
  • Next-Gen UI
For further product details and information, please download the spec sheet.




CR15wi Reviews









Overall Rating
6 stars out of 6

Features & Design
6 stars out of 6

Value for Money
6 stars out of 6

Performance
5 stars out of 6

Verdict: The security host with the most: it offers the best range of features available for SMBs at an incredibly low price

Full Review: click here or Logo.








Features
Review-Ratings-SC-5-Stars

Ease of Use
Review-Ratings-SC-4.5-Stars

Performance
Review-Ratings-SC-5-Stars

Documentation
Review-Ratings-SC-4.5-Stars

Support
Review-Ratings-SC-5-Stars

Value for Money
Review-Ratings-SC-5-Stars

Overall Rating

Review-Ratings-SC-5-Stars

For: Remarkably good value, identity-based security, simple deployment, extensive security measures, top quality reporting software
Against: No complaints at this low price
Verdict: The CR15wi delivers an incredible range of security measures, which can all be applied to wired and wireless traffic and is easily the best value SMB appliance available

Full Review
: click here or Logo.








Cyberoam CR15i


Cyberoam-CR15i-Appliance















Cyberoam CR15i


Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses.

This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security.

Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies. Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance.

ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.


Hardware Specifications
  • 10/100 Ethernet ports                               3           
  • Configurable Internal/DMZ/WAN ports        Yes        
  • Console ports (RJ45/DB9)                        1           
  • USB ports                                               1           
 
System Performance*                  
  • UTM Throughput (Mbps)                          15          
  • Firewall Throughput (UDP) (Mbps)           150        
  • Firewall Throughput (TCP) (Mbps)            90          
  • New sessions/second                             2,000     
  • Concurrent sessions                              30,000  
  • 3DES/AES throughput (Mbps)                15/25     
  • Anti-Virus Throughput (Mbps)                  20          
  • IPS Throughput (Mbps)                           40
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.


Cyberoam UTM features assure Security, Connectivity, Productivity

SECURITY

Network Security
  • Firewall
  • Intrusion Prevention System
  • Wireless security
Content Security
  • Anti-Virus/Anti-Spyware
  • Anti-Spam
  • HTTPS/SSL Content Security
Administrative Security
  • Next-Gen UI
  • iView- Logging & Reporting

CONNECTIVITY

Business Continuity
  • Multiple Link Management
  • High Availability
Network Availability
  • VPN
  • 3G/WiMAX Connectivity
Future-ready Connectivity
  • “IPv6 Ready” Gold Logo

PRODUCTIVITY

Employee Productivity
  • Content Filtering
  • Instant Messaging Archiving & Controls
IT Resource Optimization
  • Bandwidth Management
  • Traffic Discovery
  • Application Layer 7 Management
Administrator Productivity
  • Next-Gen UI
For further product details and information, please download the spec sheet.




C
R15i Reviews








Overall Rating
6 stars out of 6

Features & Design
6 stars out of 6

Value for Money
6 stars out of 6

Performance
5 stars out of 6

Verdict: A feature packed UTM appliance ideally suited to small or remote offices with a sophisticated security solution offered at a very low price

Full Review: click here or Logo










Features
Review-Ratings-SC-5-Stars

Ease of Use
Review-Ratings-SC-4.5-Stars

Performance
Review-Ratings-SC-4.5-Stars

Documentation
Review-Ratings-SC-5-Stars

Support
Review-Ratings-SC-4.5-Stars

Value for Money
Review-Ratings-SC-5-Stars

Overall Rating

Review-Ratings-SC-5-Stars

For: Superb value, a remarkable feature set, extensive policy-based security, easy deployment, good reporting
Against: The sheer number of features could be overwhelming for small offices
Verdict: It may be small, but the CR15i delivers an incredible range of features for the price, making it one of the best value small business security appliances on the market

Full Review
: click here or Logo.








Cyberoam Small Office – Branch Office Appliance Range
                


Cyberoam-Appliance-Small-Office-Branch-Office-Range





     CR15wi  CR25wi  CR35wi                                             CR15i  CR25ia  CR35ia


Cyberoam Appliance Range – Small Office – Branch Office (Up to 50-60 Users)

Small offices implementing limited security like a firewall and anti-virus leave themselves exposed to the high volume and range of external and internal threats.

  • CR15i
  • CR15wi
  • CR25ia
  • CR25wi
  • CR35ia
  • CR35wi

Cyberoam SOHO and SOBO appliances are powerful identity-based network security appliances, delivering comprehensive protection from blended threats that include malware, virus, spam, phishing, and pharming attacks.

Their unique identity-based security based on Layer 8 technology protects small office and remote, branch office users from internal threats that lead to data theft and loss.

With 3G support, Cyberoam UTM appliances also provide high speed secure wireless WWAN connectivity.

All above appliances deliver the complete set of robust security features, including

  • Stateful Inspection Firewall (ICSA Labs certified),
  • SSL VPN & IPSec (VPNC-certified),
  • Gateway Anti-virus and Anti-spyware,
  • Gateway Anti-Spam,
  • Intrusion Prevention System,
  • Content & Application Filtering,
  • IM Management and Control,
  • Layer 7 Visibility,
  • Data Leakage Prevention,
  • Bandwidth Management,
  • Multiple Link Management with Link Failover ,
  • Integrated iView Reporting and IPv6 Traffic forwarding support over a single security appliance.

Cyberoam’s wireless UTM appliances - CR15wi, CR25wi and CR35wi offer small and remote offices upto 50 users, secure wireless networks that eliminate the need for routers, firewalls and other security solutions, thus saving on costs.


                                                         CR15wi    CR25wi    CR35wi    CR15i    CR25ia    CR35ia

Hardware Specifications

    10/100 Ethernet Ports                                   3              -               -               3              -               -

    10/100/1000 GBE Ports                                 -               4              4              -               4              4

    Configurable Internal/DMZ/WAN ports       Yes          Yes          Yes          Yes          Yes          Yes

    Console ports (RJ45/DB9)                           1              1              1              1              1              1

    SFP (Mini GBIC) Ports                                   -               -               -               -               -               -

    USB ports                                                     1              1              1              1              1              1

    Hardware Bypass Segments                       -               -               -               -               -               -

                                                                                                                 

System Performance*

    UTM Throughput (Mbps)                              15            50            90            15            50            90

    Firewall Throughput (UDP) (Mbps)             150          450          750          150          450          750

    Firewall Throughput (TCP) (Mbps)              90            225          500          90            225          500

    New sessions/second                                2,000       3,500       5,500       2,000       3,500       5,500

    Concurrent sessions                                  30,000     130,000   175,000   30,000     130,000   175,000

    3DES/AES throughput (Mbps)                    15/25       30/75       50/80       15/25       30/75       50/80

    Anti-virus Throughput (Mbps)                    20            65            125          20            65            125

    IPS Throughput (Mbps)                               40            70            150          40            70            150

    Authenticated Users/Nodes                       Unlim        Unlim        Unlim      Unlim        Unlim        Unlimited


* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.

Cyberoam-Banner-Awards-Certifications





Home | Products | Solutions | Contact Us | Resources
Site Map