With high-speed Internet now a reality in organizations along with rising number of devices per user and data usage increasing at exponential rates, the next-generation security appliances must match the needs of future networks.

Cyberoam NG series delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match. The NG series appliances for SOHO, SMEs are the fastest UTMs made for this segment.

Shop Cyberoam SMB UTM Appliances in our Store

Small Office Protection

Cyberoam CR10iNG, C19wiNG, CR15iNG, CR15wiNG, CR25iNG, CR25wiNG, CR35iNG and CR35wiNG are powerful identity-based network security appliances, delivering comprehensive protection from blended threats that include malware, virus, spam, phishing, and pharming attacks. Their unique identity-based security based on Layer 8 technology protects small office and remote, branch office users from internal threats that lead to data theft and loss. With 3G support, Cyberoam UTM appliances also provide high speed secure wireless WWAN connectivity.

All above appliances deliver the complete set of robust security features, including Stateful Inspection Firewall (ICSA Labs certified), SSL VPN & IPSec (VPNC-certified), Gateway Anti-virus and Anti-spyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, IM Management and Control, Layer 7 Visibility, Data Leakage Prevention, Bandwidth Management, Multiple Link Management with Link Failover , Integrated iView Reporting and IPv6 Traffic forwarding support over a single security appliance.

Cyberoam’s Wireless UTM Appliances

CR10wiNG, CR15wiNG, CR25wiNG and CR35wiNG offer small and remote offices upto 50 users, secure wireless networks that eliminate the need for routers, firewalls and other security solutions, thus saving on costs. These appliances come with an in-built wireless access point featuring support for 802.11 n/b/g standards, MIMO technology, IP address pool and up to eight virtual access points. With multiple virtual access points, organizations can create independent, segregated networks in the same physical area of the organization (sales zone, marketing zone, guest user zone, and more), preventing rogue users from connecting to networks where they don’t belong.

Cyberoam UTM appliances now support connectivity over wireless WWAN networks through a USB-based 3G/GPRS link and supports WAN load balancing and failover and VPN. It's extremely useful for traveling executives constantly on the move and without an Internet connection, mobile and cellular network users, temporary network set-ups such as trade shows and more.

Remote Branch Office Security

For enterprises with branch and remote offices, Cyberoam security appliances offer complete visibility into and control over remote users, showing "Who is doing What". Given this identity information with user access patterns, enterprises can meet regulatory compliances and shorten audit cycles. Enterprises can create access policies based on user work profiles, enabling them to deploy the same level of security in remote offices as in central offices.

Further, Cyberoam offers SSL VPN* and IPSec for secure remote access to branch and remote offices in addition to road warriors, telecommuters, partners and customers.

Centralized Security

Organizations can also deploy centralized security with complete control over globally distributed networks through the Cyberoam Central Console, enjoying zero-hour protection at all offices against emerging network attacks.

Further, with Cyberoam iView - the Intelligent Logging and Reporting solution, organizations can have a central view of remote network activity by the username, enabling them to take rapid action. Certifications Checkmark UTM level-5 certified, dual-certified by the Virtual Private Network Consortium (VPNC) for Basic and AES Interoperability and ICSA Lab Certification for Firewall with High Availability.

  CR10wiNG CR15wiNG CR25wiNG CR35wiNG CR10iNG CR15iNG CR25iNG CR35iNG
Hardware Specifications
Copper GbE Ports 3 3 4 6 3 3 4 6
Console Ports (RJ45) 1 1 1 1 1 1 1 1
USB Ports 2 2 2 2 2 2 2 2
Hardware Bypass Segments# - - - - - - - -
Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Yes Yes Yes


System Performance*                
Firewall Throughput (UDP) (Mbps) 400 1,000 1,500 2.3 400 1,000 1,500 2,300
Firewall Throughput (TCP) (Mbps) 300 750 1,000 2,000 300 750 1,000 2,000
New sessions/second 2000 3,500 5,000 11,000 2000 3,500 5,000 11,000
Concurrent sessions 27,500 60,000 150,000 350,000 27,500 60,000 150,000 350,000
IPSec VPN Throughput (Mbps) 100 110 210 250 100 110 210 250
No. of IPSec Tunnels 25 50 100 150 25 50 100 150
SSL VPN Throughput (Mbps) 25 50 75 100 25 50 75 100
WAF Protected Throughput (Mbps) -NA- -NA- 45 65 -NA- -NA- 45 65
Anti-Virus Throughput (Mbps) 100 180 300 525 100 180 300 525
IPS Throughput (Mbps) 90 140 200 350 90 140 200 350
UTM Throughput (Mbps) 60 80 110 210 60 80 110 210
Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited
NG Series Data Sheet PDFPDF

# If Enabled, will bypass traffic only in case of Power failure.

* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.

Key Feature Overview
Layer 8 Identity-based policies Role-based access at remote locations
Visibility into who is doing what
Comprehensive UTM Security Stateful Inspection Firewall
Intrusion Prevention System
Anti-Virus & Anti-Spyware
Web Filtering
Application Visibility & Control
On-appliance Reporting
Web Application Firewall
Outbound Spam Protection
Secure Remote Access IPSec VPN
WAN Connectivity & Availability Bandwidth Management
Multiple Link Management
3G / WiMAX Support
Advanced Networking Multi-core Processing
Extensible Security Architecture
Active-Active High Availability
IPv6 Ready Gold Certified
Wi-Fi Security Wireless Standards IEEE 802.11 n/b/g (WEP, WPA, WPA2, 802.11i, TKIP, AES, PSK, 802.1x EAP)
Up to 8 bssid Access Points
Centralized Security Management CCC Appliances
Cyberoam iView Open Source Solution – Logging & Reporting
Cyberoam iView Appliances – Logging & Reporting