Future-ready Security for the Medium Enterprise

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls.

Shop Cyberoam Medium Enterprise UTM Appliances in our Store

Layer 8 Technology

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features along with performance required for future networks. The NG series for SMEs are the “fastest UTMs” made for this segment. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security to SMEs.

Cyberoam CR50iNG CR100iNG, CR200iNG, CR200iNG-XP, CR300iNG and the CR300iNG-XP are powerful identity-based unified threat management appliances, delivering comprehensive protection to small and medium enterprises (SMEs) with limited investment in financial and technical resources.

Comprehensive Security

These gateway security appliances deliver the complete set of robust security features, including Stateful Inspection Firewall, VPN (SSL VPN & IPSec), gateway Anti-virus and Anti-spyware, gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth Management and Multiple Link Management over a single security appliance. Cyberoam security appliances offer a comprehensive, yet cost-effective and easy-to-manage solution that lowers capital and operating expenses in addition to lower technical resource requirement.

Regulatory Compliance

Through user identification and access control policies for information security, Cyberoam gateway security appliance enables enterprises to meet regulatory compliance requirements like HIPAA, GLBA, PCI-DSS, SOX, CIPA and more. Further, it helps shorten audit and reporting cycles through instant visibility into Who is accessing What in the enterprise network.

Centralized Security

Organizations can deploy centralized security with complete control over globally distributed networks through the Cyberoam Central Console, enjoying zero-hour protection at branch offices against emerging network attacks despite the lack of technical resources at these locations. Cyberoam iView - the Intelligent Logging and Reporting solution offers a central view of remote network activity by the username, enabling them to take rapid action.

Detailed Features (click on links)
Stateful Inspection Firewall Web Filtering Multiple Link Management
VPN (SSL VPN & IPSec) Bandwidth Management On-Appliance Reporting
Intrusion Prevention System Application Visibility & Control IPv6 Ready
Anti-Virus & Anti-Spyware Web Application Firewall Wi-Fi Appliances
Anti-Spam 3G / 4G / WiMAX Connectivity  
Outbound Spam Protection IM Archiving & Controls  
NG Series CR50i-NG CR100i-NG CR200iNG CR200iNG-XP CR300iNG CR300iNG-XP
 
Hardware Specifications
Copper GbE Ports 8 8 10 14 10 14
1GbE SFP (Mini GBIC) Ports - - 10 6 (Fixed) 10 6 (Fixed)
10GbE SFP (Mini GBIC) Ports - - - 8 / 8 / 4 - 8 / 8 / 4
Console Ports (RJ45) 1 1 1 1 1 1
USB Ports 2 2 2 2 2 2
Hardware Bypass Segments# 2 2 2 2 2 2
Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Yes
             
System Performance*            
Firewall Throughput (UDP) (Mbps) 3,250 4,500 10,000 10,000 12,000 12,000
Firewall Throughput (TCP) (Mbps) 3,000 3,500 8,000 8,000 9,500 9,500
New sessions/second 30,000 45,000 70,000 70,000 85,000 85,000
Concurrent sessions 1,000,000 1,250,000 1,500,000 1,500,000 2,000,000 2,000,000
IPSec VPN Throughput (Mbps) 400 450 800 800 1,200 1,200
No. of IPSec Tunnels 200 250 300 300 400 400
SSL VPN Throughput (Mbps) 300 400 450 450 500 500
WAF Protected Throughput (Mbps) 300 500 650 650 850 850
Anti-Virus Throughput (Mbps) 1,000 1,400 2,200 2,200 2,600 2,600
IPS Throughput (Mbps) 750 1,200 2,000 2,000 2,400 2,400
UTM Throughput (Mbps) 550 750 1,200 1,200 1,500 1,500
Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited

 

Data Sheets
NG Series CR50iNG CR100iNG CR200iNG CR200iNG-XP CR300iNG CR300iNG-XP


# If Enabled, will bypass traffic only in case of Power failure.
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.

Cyberoam UTM Techsheet (PDF)