Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls.Shop Cyberoam Medium Enterprise UTM Appliances in our Store
Layer 8 Technology
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features along with performance required for future networks. The NG series for SMEs are the “fastest UTMs” made for this segment. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security to SMEs.
Cyberoam CR50iNG CR100iNG, CR200iNG, CR200iNG-XP, CR300iNG and the CR300iNG-XP are powerful identity-based unified threat management appliances, delivering comprehensive protection to small and medium enterprises (SMEs) with limited investment in financial and technical resources.
These gateway security appliances deliver the complete set of robust security features, including Stateful Inspection Firewall, VPN (SSL VPN & IPSec), gateway Anti-virus and Anti-spyware, gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth Management and Multiple Link Management over a single security appliance. Cyberoam security appliances offer a comprehensive, yet cost-effective and easy-to-manage solution that lowers capital and operating expenses in addition to lower technical resource requirement.
Through user identification and access control policies for information security, Cyberoam gateway security appliance enables enterprises to meet regulatory compliance requirements like HIPAA, GLBA, PCI-DSS, SOX, CIPA and more. Further, it helps shorten audit and reporting cycles through instant visibility into Who is accessing What in the enterprise network.
Organizations can deploy centralized security with complete control over globally distributed networks through the Cyberoam Central Console, enjoying zero-hour protection at branch offices against emerging network attacks despite the lack of technical resources at these locations. Cyberoam iView - the Intelligent Logging and Reporting solution offers a central view of remote network activity by the username, enabling them to take rapid action.
|Copper GbE Ports||8||8||10||14||10||14|
|1GbE SFP (Mini GBIC) Ports||-||-||10||6 (Fixed)||10||6 (Fixed)|
|10GbE SFP (Mini GBIC) Ports||-||-||-||8 / 8 / 4||-||8 / 8 / 4|
|Console Ports (RJ45)||1||1||1||1||1||1|
|Hardware Bypass Segments#||2||2||2||2||2||2|
|Configurable Internal/DMZ/WAN Ports||Yes||Yes||Yes||Yes||Yes||Yes|
|Firewall Throughput (UDP) (Mbps)||3,250||4,500||10,000||10,000||12,000||12,000|
|Firewall Throughput (TCP) (Mbps)||3,000||3,500||8,000||8,000||9,500||9,500|
|IPSec VPN Throughput (Mbps)||400||450||800||800||1,200||1,200|
|No. of IPSec Tunnels||200||250||300||300||400||400|
|SSL VPN Throughput (Mbps)||300||400||450||450||500||500|
|WAF Protected Throughput (Mbps)||300||500||650||650||850||850|
|Anti-Virus Throughput (Mbps)||1,000||1,400||2,200||2,200||2,600||2,600|
|IPS Throughput (Mbps)||750||1,200||2,000||2,000||2,400||2,400|
|UTM Throughput (Mbps)||550||750||1,200||1,200||1,500||1,500|
# If Enabled, will bypass traffic only in case of Power failure.
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.