Call a Specialist Today! 800-886-2269

Cyberoam Firewall
Stateful and deep packet inspection for network, application and user identity-based security.



Firewall security extended to Layer 8

Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam UTM Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.

Cyberoam’s patent pending, Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all the UTM features, providing ease of management and high security with flexibility.

Feature Feature Description Benefit
Human Layer 8 Identity-based Security
  • Hardware firewall with Identity-based policy creation
  • Access Control Criteria (ACC) - User-Identity, Source & Destination Zone, MAC and IP address, Service
  • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
  • User identity-based decision making prevents errors associated with IP address-based policies
  • Simplifies audit requirements with instant user identification
FUSION Technology
  • Policy creation for multiple security features through single interface in firewalls
  • Firewalls well-integrated with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management
  • Blends Security, Connectivity, Productivity
  • Provides integrated perimeter security
Thin Client Support
  • Thin client authentication with session IDs
  • Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
  • Identity-based policies in thin client environment
  • Supports SaaS deployments and Cloud environment
Enterprise-Grade Security
  • UTM firewall with High Availability with stateful failover
  • Multiple Security Zones
  • Firewall appliance offering Dynamic Routing
  • VLAN support
  • Virtual host capability
  • Multi-casting
  • Multi-core technology allows high-speed parallel processing
  • ICSA-certified firewalls
  • Checkmark Level 5 Certified
  • Faster up-times, reduced latency, simplified configuration, supports rapid network growth
  • Supports creation of work profile-based groups across distributed locations
  • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
  • Supports applications that work on real-time updates like stock updates for financial institutions
  • High throughput
Centralized Management
  • Centralized Security with CCC
  • Simplified security management
Logging & Reporting
  • Layer 8 Identity-based Reporting
  • Firewall logs
  • Centralized logging and reporting with Cyberoam iView and CCC
Meets compliance requirements for CIPA, HIPAA, PCI DSS