Home Products Solutions Contact Us Resources
e-NETSource Global Sourcing Solutions
Home
Products
Solutions
Contact Us
Resources
Cambium Networks
Cyberoam
Emerson Network Power
Ericsson
HUAWEI
Mitel
Netcomm Wireless
Proxim Wireless
Robustel
Siklu
ZyXEL
 
e-NETSource
SOURCING SOLUTIONS








Cyberoam-Banner








PRODUCT RESOURCES

Download all Datasheets





UTM Portfolio Tech Sheet





Cyberoam Tech & Datasheets



QUICK LINKS


SOHO / ROBO Appliances


SME Appliances


Enterprise Appliances


Endpoint Data Protection






























Cyberoam Videos










The Deadly Insider


This entertaining animated film depicts an anthropomorphic portrayal of various Cyberoam UTM features that work together as part of a real-world team to deal with the bad guys in cyber-security: viruses, worms, spam, intrusions, indiscriminate downloads and insider threats.

In part 2 of the film, you will be introduced to an organization called Natex Corp where a wily insider is attempting to leak sensitive data from within the organization, across to an outsider. Will he succeed in his dirty game? Will Team Cyberoam find out about his intentions and stop data from going out of Natex Corp?
















Implementing Layer 8 Security

In this presentation, you will learn about Cyberoam’s unique identity-based security mechanism using “Layer 8 technology” which is based on the premise that the individual user is the weakest link in an organization’s security landscape.

To overcome threats coming from the user, organizations must have full visibility and control over who is doing what in the network. Cyberoam’s Identity-based advantage runs across each of its features and gives information on each user’s activities within the network. This visibility helps organizations remain secure from internal as well as external threats.















Product Demo - Identity-Based UTM


Learn through this video about how Cyberoam Identity-based UTM secures the user – the weakest link in any organization’s security chain, with Cyberoam’s Layer 8 Technology.

The video moves on to the product demo explaining the ease with which Cyberoam UTM’s various security modules can be configured.




SPECIAL OFFER

SnapGear SG300 / SG310 End of Life Trade In Offer

Offer ends 30th June 2012
 













Cyberoam UTM Appliances




Cyberoam-Stacked-Appliances



























Cyberoam UTM Appliances

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to organizations by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses.












Layer 8 technology functions along with each of Cyberoam security features to allow
creation of identity-based security policies. Cyberoam’s multi-core technology allows parallel processing of all its security features – ensuring security without compromising performance.












Its future-ready Extensible Security Architecture (ESA) offers a security platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.





SOHO & ROBO Appliances


Cyberoam-CR35wi-Appliance




















Cyberoam 35wi


Cyberoam Small Office – Branch Office
Appliances Range

Small offices implementing limited security like a firewall and anti-virus leave themselves exposed to the high volume and range of external and internal threats.

  • CR15i
  • CR15wi
  • CR25ia
  • CR25wi
  • CR35ia
  • CR35wi

Cyberoam SOHO and SOBO appliances are powerful identity-based network security appliances, delivering comprehensive protection from blended threats that include malware, virus, spam, phishing, and pharming attacks.

With 3G support, Cyberoam UTM appliances also provide high speed secure wireless WWAN connectivity.

Their unique identity-based security based on Layer 8 technology protects small office and remote, branch office users from internal threats that lead to data theft and loss.

All above appliances deliver the complete set of robust security features, including

  • Stateful Inspection Firewall (ICSA Labs certified),
  • SSL VPN & IPSec (VPNC-certified),
  • Gateway Anti-virus and Anti-spyware,
  • Gateway Anti-Spam,
  • Intrusion Prevention System,
  • Content & Application Filtering,
  • IM Management and Control,
  • Layer 7 Visibility,
  • Data Leakage Prevention,
  • Bandwidth Management,
  • Multiple Link Management with Link Failover ,
  • Integrated iView Reporting and IPv6 Traffic forwarding support over a single security appliance.

Cyberoam’s wireless UTM appliances - CR15wi, CR25wi and CR35wi offer small and remote offices upto 50 users, secure wireless networks that eliminate the need for routers, firewalls and other security solutions, thus saving on costs.


Cyberoam Appliance Range – Small Office – Branch Office (Up to 50-60 Users)

Cyberoam-Appliance-Small-Office-Branch-Office-Range






CR15wi  CR25wi  CR35wi                                             CR15i  CR25ia  CR35ia


                                                         CR15wi    CR25wi    CR35wi    CR15i    CR25ia    CR35ia

Hardware Specifications

    10/100 Ethernet Ports                                   3              -               -               3              -               -

    10/100/1000 GBE Ports                                 -               4              4              -               4              4

    Configurable Internal/DMZ/WAN ports       Yes          Yes          Yes          Yes          Yes          Yes

    Console ports (RJ45/DB9)                           1              1              1              1              1              1

    SFP (Mini GBIC) Ports                                   -               -               -               -               -               -

    USB ports                                                     1              1              1              1              1              1

    Hardware Bypass Segments                       -               -               -               -               -               -

                                                                                                                 

System Performance*

    UTM Throughput (Mbps)                              15            50            90            15            50            90

    Firewall Throughput (UDP) (Mbps)             150          450          750          150          450          750

    Firewall Throughput (TCP) (Mbps)              90            225          500          90            225          500

    New sessions/second                                2,000       3,500       5,500       2,000       3,500       5,500

    Concurrent sessions                                  30,000     130,000   175,000   30,000     130,000   175,000

    3DES/AES throughput (Mbps)                    15/25       30/75       50/80       15/25       30/75       50/80

    Anti-virus Throughput (Mbps)                    20            65            125          20            65            125

    IPS Throughput (Mbps)                               40            70            150          40            70            150

    Authenticated Users/Nodes                       Unlim        Unlim        Unlim      Unlim        Unlim        Unlimited


Key Features

  • Layer 8 Identity-based policies          
    • Role-based access at remote locations
    • Visibility into who is doing what                            
  • Comprehensive UTM Security
    • Stateful Inspection Firewall
    • Intrusion Prevention System
    • Anti-Virus & Anti-Spyware
    • Anti-Spam
    • Web Filtering
    • On-appliance Reporting                             
  • Secure Remote Access         
    • IPSec VPN
    • L2TP
    • PPTP
    • SSL VPN                           
  • WAN Connectivity & Availability         
    • Bandwidth Management
    • Multiple Link Management
    • 3G / WiMAX Support                             
  • Endpoint Data Protection    
    • Data Protection & Encryption
    • Device Management
    • Application Control
    • Asset Management                         
  • Centralized Security Management       
    • CCC Appliances
    • Cyberoam iView Open Source Solution – Logging & Reporting
    • Cyberoam iView Appliances – Logging & Reporting                            
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.







SME Appliances


Cyberoam-CR300i-Appliance








Cyberoam CR300i

Small and medium enterprises are as much at risk as large enterprises from the targeted attacks of today. They need to protect their networks effectively from external and internal threats without a large security budget.

  • CR50ia
  • CR100ia
  • CR200i
  • CR300i

Cyberoam SME appliances are powerful identity-based unified threat management appliances, delivering comprehensive protection to small and medium enterprises (SMEs) with limited investment in financial and technical resources.

Cyberoam gateway security appliance offers protection from blended threats that include virus, spam, malware, phishing, pharming. Its unique identity-based security based on Layer 8 technology protects enterprises from internal threats that lead to data theft and 
loss by giving complete visibility into and control over internal users.

Comprehensive Security
These gateway security appliances deliver the complete set of robust security features, including Stateful Inspection Firewall (ICSA Labs certified), SSL VPN & IPSec (VPNC-certified), Gateway Anti-virus and Anti-spyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, IM Management and Control, Layer 7 Visibility, Data Leakage Prevention, Bandwidth Management, Multiple Link Management with Link Failover , Integrated iView Reporting and IPv6 Traffic forwarding support.

Cyberoam UTM appliances also support connectivity over wireless WWAN networks through a USB-based 3G/GPRS link and supports WAN load balancing and failover and VPN.

Cyberoam security appliances offer a comprehensive, yet cost-effective and easy-to-manage solution that lowers capital and operating expenses in addition to lower technical resource requirement.






Enterprise - Security Appliances

Cyberoam-CR1500i-Appliance















Cyberoam CR1500i

For large enterprises with distributed networks, implementing a secure, reliable and centrally managed network is critical to ensure high levels of security at the central and remote offices. 

  • CR500ia
  • CR750ia
  • CR1000i
  • CR1500i

Deployment of a range of individual security solutions brings in issues of management and control of the solutions, particularly at the time of security incident, delaying response. In addition, with insider threats accounting for 50 % of threats, identifying the user becomes critical to security.

Cyberoam Enterprise appliances are powerful identity-based network security appliances that deliver comprehensive protection to large enterprises from blended threats that include malware, virus, spam, phishing, and pharming attacks.

Cyberoam’s unique identity-based Network Security Appliance protects large enterprise users from internal threats that lead to data theft and loss too.






Endpoint Data Protection



















Secure corporate data over endpoints   


Cyberoam Endpoint Data Protection controls the risk of data leakage posed by large segments of corporate data residing on endpoints, usage of endpoints outside the network by road warriors and unrestricted use of removable storage devices, applications, network sharing and printing.

Cyberoam offers Layer-8 Identity based controls over endpoints, controlling access to these media in addition to activity over the endpoints while providing extensive logs and shadow copies.

Thus, it prevents data leakage, ensuring that organizations meet the requirements of regulatory compliance like HIPAA, CIPA, GLBA. It also prevents malware entry and enhances employee productivity and efficiency in IT asset management.


Cyberoam-Banner-Awards-Certifications






Home | Products | Solutions | Contact Us | Resources
Site Map