Home Products Solutions Contact Us Resources
e-NETSource Global Sourcing Solutions
Home
Products
Solutions
Contact Us
Resources
Cambium Networks
Cyberoam
Emerson Network Power
Ericsson
HUAWEI
Mitel
Netcomm Wireless
Proxim Wireless
Robustel
Siklu
ZyXEL
 
e-NETSource
SOURCING SOLUTIONS








Cyberoam-Banner








PRODUCT RESOURCES

CR35wi Appliance Datasheet





CR35ia Appliance Datasheet





Cyberoam Tech & Datasheets



QUICK LINKS

Cyberoam Portfolio







Cyberoam Videos









The Deadly Insider


This entertaining animated film depicts an anthropomorphic portrayal of various Cyberoam UTM features that work together as part of a real-world team to deal with the bad guys in cyber-security: viruses, worms, spam, intrusions, indiscriminate downloads and insider threats.

In part 2 of the film, you will be introduced to an organization called Natex Corp where a wily insider is attempting to leak sensitive data from within the organization, across to an outsider. Will he succeed in his dirty game? Will Team Cyberoam find out about his intentions and stop data from going out of Natex Corp?

















Implementing Layer 8 Security


In this presentation, you will learn about Cyberoam’s unique identity-based security mechanism using “Layer 8 technology” which is based on the premise that the individual user is the weakest link in an organization’s security landscape.

To overcome threats coming from the user, organizations must have full visibility and control over who is doing what in the network. Cyberoam’s Identity-based advantage runs across each of its features and gives information on each user’s activities within the network. This visibility helps organizations remain secure from internal as well as external threats.

















Product Demo - Identity-Based UTM

Learn through this video about how Cyberoam Identity-based UTM secures the user – the weakest link in any organization’s security chain, with Cyberoam’s Layer 8 Technology.

The video moves on to the product demo explaining the ease with which Cyberoam UTM’s various security modules can be configured.



 













Cyberoam CR35wi




Cyberoam-CR35wi-Appliance





















Cyberoam CR35wi

CR35wi offers high performance security over WLAN to Small Office-Home Office (SOHO) and Remote Office Branch Office (ROBO) users. It supports 802.11n/b/g wireless standards.

Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.

Cyberoam's Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow identity-based security policies in dynamic IP environment.

Insecure WLANs are easily susceptible to unauthorized intrusion by outsiders and malware attacks. Cyberoam extends its set of security features over wired networks Firewall, VPN, Anti-Virus/Anti-Spyware, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management over WLAN, securing organizations from threats of data leakage and malware attacks.



Hardware Specifications
  • 10/100/1000 GBE ports                         4          
  • Configurable Internal/DMZ/WAN ports     Yes        
  • Console ports (RJ45/DB9)                     1           
  • USB ports                                           1           
 
System Performance*                  
  • UTM Throughput (Mbps)                        90         
  • Firewall Throughput (UDP) (Mbps)          750        
  • Firewall Throughput (TCP) (Mbps)           500          
  • New sessions/second                           5,500     
  • Concurrent sessions                             175,000  
  • 3DES/AES throughput (Mbps)               50/80    
  • Anti-Virus Throughput (Mbps)                125         
  • IPS Throughput (Mbps)                         150
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.



Cyberoam UTM features assure Security, Connectivity, Productivity


SECURITY

Network Security
  • Firewall
  • Intrusion Prevention System
  • Wireless security
Content Security
  • Anti-Virus/Anti-Spyware
  • Anti-Spam
  • HTTPS/SSL Content Security
Administrative Security
  • Next-Gen UI
  • iView- Logging & Reporting

CONNECTIVITY

Business Continuity
  • Multiple Link Management
  • High Availability
Network Availability
  • VPN
  • 3G/WiMAX Connectivity
Future-ready Connectivity
  • “IPv6 Ready” Gold Logo

PRODUCTIVITY

Employee Productivity
  • Content Filtering
  • Instant Messaging Archiving & Controls
IT Resource Optimization
  • Bandwidth Management
  • Traffic Discovery
  • Application Layer 7 Management
Administrator Productivity
  • Next-Gen UI
For further product details and information, please download the spec sheet.










Cyberoam CR35ia




Cyberoam-CR35ia-Appliance












Cyberoam CR35ia

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses.

This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.



Hardware Specifications
  • 10/100/1000 GBE ports                         4          
  • Configurable Internal/DMZ/WAN ports     Yes        
  • Console ports (RJ45/DB9)                     1           
  • USB ports                                            1           
 
System Performance*                  
  • UTM Throughput (Mbps)                        90         
  • Firewall Throughput (UDP) (Mbps)          750        
  • Firewall Throughput (TCP) (Mbps)           500          
  • New sessions/second                           5,500     
  • Concurrent sessions                            175,000  
  • 3DES/AES throughput (Mbps)               50/80    
  • Anti-Virus Throughput (Mbps)                125         
  • IPS Throughput (Mbps)                         150
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.



Cyberoam UTM features assure Security, Connectivity, Productivity


SECURITY

Network Security
  • Firewall
  • Intrusion Prevention System
  • Wireless security
Content Security
  • Anti-Virus/Anti-Spyware
  • Anti-Spam
  • HTTPS/SSL Content Security
Administrative Security
  • Next-Gen UI
  • iView- Logging & Reporting

CONNECTIVITY

Business Continuity
  • Multiple Link Management
  • High Availability
Network Availability
  • VPN
  • 3G/WiMAX Connectivity
Future-ready Connectivity
  • “IPv6 Ready” Gold Logo

PRODUCTIVITY

Employee Productivity
  • Content Filtering
  • Instant Messaging Archiving & Controls
IT Resource Optimization
  • Bandwidth Management
  • Traffic Discovery
  • Application Layer 7 Management
Administrator Productivity
  • Next-Gen UI
For further product details and information, please download the spec sheet.









Cyberoam Small Office – Branch Office Appliance Range

                

Cyberoam-Appliance-Small-Office-Branch-Office-Range





     CR15wi  CR25wi  CR35wi                                             CR15i  CR25ia  CR35ia


Cyberoam Appliance Range – Small Office – Branch Office (Up to 50-60 Users)


Small offices implementing limited security like a firewall and anti-virus leave themselves exposed to the high volume and range of external and internal threats.

  • CR15i
  • CR15wi
  • CR25ia
  • CR25wi
  • CR35ia
  • CR35wi

Cyberoam SOHO and SOBO appliances are powerful identity-based network security appliances, delivering comprehensive protection from blended threats that include malware, virus, spam, phishing, and pharming attacks.

Their unique identity-based security based on Layer 8 technology protects small office and remote, branch office users from internal threats that lead to data theft and loss.

With 3G support, Cyberoam UTM appliances also provide high speed secure wireless WWAN connectivity.

All above appliances deliver the complete set of robust security features, including

  • Stateful Inspection Firewall (ICSA Labs certified),
  • SSL VPN & IPSec (VPNC-certified),
  • Gateway Anti-virus and Anti-spyware,
  • Gateway Anti-Spam,
  • Intrusion Prevention System,
  • Content & Application Filtering,
  • IM Management and Control,
  • Layer 7 Visibility,
  • Data Leakage Prevention,
  • Bandwidth Management,
  • Multiple Link Management with Link Failover ,
  • Integrated iView Reporting and IPv6 Traffic forwarding support over a single security appliance.

Cyberoam’s wireless UTM appliances - CR15wi, CR25wi and CR35wi offer small and remote offices upto 50 users, secure wireless networks that eliminate the need for routers, firewalls and other security solutions, thus saving on costs.


                                                         CR15wi    CR25wi    CR35wi    CR15i    CR25ia    CR35ia

Hardware Specifications

    10/100 Ethernet Ports                                   3              -               -               3              -               -

    10/100/1000 GBE Ports                                 -               4              4              -               4              4

    Configurable Internal/DMZ/WAN ports       Yes          Yes          Yes          Yes          Yes          Yes

    Console ports (RJ45/DB9)                           1              1              1              1              1              1

    SFP (Mini GBIC) Ports                                   -               -               -               -               -               -

    USB ports                                                     1              1              1              1              1              1

    Hardware Bypass Segments                       -               -               -               -               -               -

                                                                                                                 

System Performance*

    UTM Throughput (Mbps)                              15            50            90            15            50            90

    Firewall Throughput (UDP) (Mbps)             150          450          750          150          450          750

    Firewall Throughput (TCP) (Mbps)              90            225          500          90            225          500

    New sessions/second                                2,000       3,500       5,500       2,000       3,500       5,500

    Concurrent sessions                                  30,000     130,000   175,000   30,000     130,000   175,000

    3DES/AES throughput (Mbps)                    15/25       30/75       50/80       15/25       30/75       50/80

    Anti-virus Throughput (Mbps)                    20            65            125          20            65            125

    IPS Throughput (Mbps)                               40            70            150          40            70            150

    Authenticated Users/Nodes                       Unlim        Unlim        Unlim      Unlim        Unlim        Unlimited


* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.



Cyberoam-Banner-Awards-Certifications





Home | Products | Solutions | Contact Us | Resources
Site Map