With high-speed Internet now a reality in organizations along with rising number of devices per user and data usage increasing at exponential rates, the next-generation security appliances must match the needs of future networks.
Cyberoam NG series delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match. The NG series appliances for SOHO, SMEs are the fastest UTMs made for this segment.Shop Cyberoam SMB UTM Appliances in our Store
Small Office Protection
Cyberoam CR10iNG, C19wiNG, CR15iNG, CR15wiNG, CR25iNG, CR25wiNG, CR35iNG and CR35wiNG are powerful identity-based network security appliances, delivering comprehensive protection from blended threats that include malware, virus, spam, phishing, and pharming attacks. Their unique identity-based security based on Layer 8 technology protects small office and remote, branch office users from internal threats that lead to data theft and loss. With 3G support, Cyberoam UTM appliances also provide high speed secure wireless WWAN connectivity.
All above appliances deliver the complete set of robust security features, including Stateful Inspection Firewall (ICSA Labs certified), SSL VPN & IPSec (VPNC-certified), Gateway Anti-virus and Anti-spyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, IM Management and Control, Layer 7 Visibility, Data Leakage Prevention, Bandwidth Management, Multiple Link Management with Link Failover , Integrated iView Reporting and IPv6 Traffic forwarding support over a single security appliance.
Cyberoam’s Wireless UTM Appliances
CR10wiNG, CR15wiNG, CR25wiNG and CR35wiNG offer small and remote offices upto 50 users, secure wireless networks that eliminate the need for routers, firewalls and other security solutions, thus saving on costs. These appliances come with an in-built wireless access point featuring support for 802.11 n/b/g standards, MIMO technology, IP address pool and up to eight virtual access points. With multiple virtual access points, organizations can create independent, segregated networks in the same physical area of the organization (sales zone, marketing zone, guest user zone, and more), preventing rogue users from connecting to networks where they don’t belong.
Cyberoam UTM appliances now support connectivity over wireless WWAN networks through a USB-based 3G/GPRS link and supports WAN load balancing and failover and VPN. It's extremely useful for traveling executives constantly on the move and without an Internet connection, mobile and cellular network users, temporary network set-ups such as trade shows and more.
Remote Branch Office Security
For enterprises with branch and remote offices, Cyberoam security appliances offer complete visibility into and control over remote users, showing "Who is doing What". Given this identity information with user access patterns, enterprises can meet regulatory compliances and shorten audit cycles. Enterprises can create access policies based on user work profiles, enabling them to deploy the same level of security in remote offices as in central offices.
Further, Cyberoam offers SSL VPN* and IPSec for secure remote access to branch and remote offices in addition to road warriors, telecommuters, partners and customers.
Organizations can also deploy centralized security with complete control over globally distributed networks through the Cyberoam Central Console, enjoying zero-hour protection at all offices against emerging network attacks.
Further, with Cyberoam iView - the Intelligent Logging and Reporting solution, organizations can have a central view of remote network activity by the username, enabling them to take rapid action. Certifications Checkmark UTM level-5 certified, dual-certified by the Virtual Private Network Consortium (VPNC) for Basic and AES Interoperability and ICSA Lab Certification for Firewall with High Availability.
|Copper GbE Ports||3||3||4||6||3||3||4||6|
|Console Ports (RJ45)||1||1||1||1||1||1||1||1|
|Hardware Bypass Segments#||-||-||-||-||-||-||-||-|
|Configurable Internal/DMZ/WAN Ports||Yes||Yes||Yes||Yes||Yes||Yes||Yes||Yes|
|Firewall Throughput (UDP) (Mbps)||400||1,000||1,500||2.3||400||1,000||1,500||2,300|
|Firewall Throughput (TCP) (Mbps)||300||750||1,000||2,000||300||750||1,000||2,000|
|IPSec VPN Throughput (Mbps)||100||110||210||250||100||110||210||250|
|No. of IPSec Tunnels||25||50||100||150||25||50||100||150|
|SSL VPN Throughput (Mbps)||25||50||75||100||25||50||75||100|
|WAF Protected Throughput (Mbps)||-NA-||-NA-||45||65||-NA-||-NA-||45||65|
|Anti-Virus Throughput (Mbps)||100||180||300||525||100||180||300||525|
|IPS Throughput (Mbps)||90||140||200||350||90||140||200||350|
|UTM Throughput (Mbps)||60||80||110||210||60||80||110||210|
|UTMs for Small Office - Branch Office|
|NG Series Data Sheet|
# If Enabled, will bypass traffic only in case of Power failure.
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
|Key Feature Overview|
|Layer 8 Identity-based policies||Role-based access at remote locations|
|Visibility into who is doing what|
|Comprehensive UTM Security||Stateful Inspection Firewall|
|Intrusion Prevention System|
|Anti-Virus & Anti-Spyware|
|Application Visibility & Control|
|Web Application Firewall|
|Outbound Spam Protection|
|Secure Remote Access||IPSec VPN|
|WAN Connectivity & Availability||Bandwidth Management|
|Multiple Link Management|
|3G / WiMAX Support|
|Advanced Networking||Multi-core Processing|
|Extensible Security Architecture|
|Active-Active High Availability|
|IPv6 Ready Gold Certified|
|Wi-Fi Security||Wireless Standards IEEE 802.11 n/b/g (WEP, WPA, WPA2, 802.11i, TKIP, AES, PSK, 802.1x EAP)|
|Up to 8 bssid Access Points|
|Centralized Security Management||CCC Appliances|
|Cyberoam iView Open Source Solution – Logging & Reporting|
|Cyberoam iView Appliances – Logging & Reporting|