Cyberoam Firewall
Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam UTM Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.
Cyberoam’s patent pending, Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all the UTM features, providing ease of management and high security with flexibility.
Feature |
Feature Description |
Benefit |
Human Layer 8 Identity-based Security |
- Hardware firewall with Identity-based policy creation
- Access Control Criteria (ACC) - User-Identity, Source & Destination Zone, MAC and IP address, Service
|
- Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
- User identity-based decision making prevents errors associated with IP address-based policies
- Simplifies audit requirements with instant user identification
|
FUSION Technology |
- Policy creation for multiple security features through single interface in firewalls
- Firewalls well-integrated with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management
|
- Blends Security, Connectivity, Productivity
- Provides integrated perimeter security
|
Thin Client Support |
- Thin client authentication with session IDs
- Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
- Identity-based policies in thin client environment
|
- Supports SaaS deployments and Cloud environment
|
Enterprise-Grade Security |
- UTM firewall with High Availability with stateful failover
- Multiple Security Zones
- Firewall appliance offering Dynamic Routing
- VLAN support
- Virtual host capability
- Multi-casting
- Multi-core technology allows high-speed parallel processing
- ICSA-certified firewalls
- Checkmark Level 5 Certified
|
- Faster up-times, reduced latency, simplified configuration, supports rapid network growth
- Supports creation of work profile-based groups across distributed locations
- Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
- Supports applications that work on real-time updates like stock updates for financial institutions
- High throughput
|
Centralized Management |
- Centralized Security with CCC
|
- Simplified security management
|
Logging & Reporting |
- Layer 8 Identity-based Reporting
- Firewall logs
- Centralized logging and reporting with Cyberoam iView and CCC
|
Meets compliance requirements for CIPA, HIPAA, PCI DSS |