Complete Internet Security

Cyberoam : Unified Internet Threat Management Cyberoam : Unified Internet Threat Management
Home Contact Us Email Sitemap  
Cyberoam : Hardware Firewall Appliance

Hardware Firewall Appliance - Robust Perimeter Defense


Cyberoam’s identity-based hardware firewall appliance secures the enterprise perimeter with control over incoming and outgoing traffic.

With Cyberoam’s powerful hardware firewall security providing access control, user authentication, network and application-level protection, enterprises operate within a highly secure network.
Cyberoam’s enterprise-class security prevents damaging web-based attacks, allowing administrators to block or allow access based on preset user identity-based policies. Suspicious traffic is identified and blocked after inspecting networking and application information. The firewall provides secure access to public hosted servers over the Internet.
It blocks sites and links that are known spyware, phishing, pharming generators and reduces the attack incidence, forming a powerful defense in combination with Cyberoam’s pre-integrated anti-spam solution.
Identity-based Firewall
  Cyberoam is the only UTM that embeds user identity in firewall rule matching criteria, eliminating IP addresses as intermediate components to identify and control the user. This offers instant visibility and proactive controls over security breaches.
  With Cyberoam, enterprises receive complete security in dynamic IP environments like DHCP and Wi-Fi where the user cannot be identified through IP addresses. In doing so, Cyberoam identifies the user, eliminating anonymity within network unlike IP-address based solutions. It offers a clear view of usage and threat patterns for user identity-based dynamic policy setting.
  User Identity binds the security features to create a single, consolidated Cyberoam security unit, enabling administrators to define policies across all security and productivity features over a single firewall page.
Stateful Packet Inspection
  The Cyberoam firewall analyzes packet headers and tracks packet communications over a period of time, allowing only those incoming packets that conform to the application protocol rules and user requests.
Deep Packet Inspection
  Cyberoam examines the packet’s payload, including application data and disallows traffic that does not conform to the particular application protocol, offering dynamic packet filtering.
Protection from DoS and Other Flooding Attacks
  The Cyberoam firewall offers protection from Denial of Service, SYN Flood, UDP, TCP, ICMP flooding attacks and from IP spoofing that generate useless, excessive traffic or reroute traffic, bringing the network to a halt.
NAT Protection
  Dynamic network address translation enables the firewall to keep the network structure hidden from the outside world, reducing threat incidence and protecting the corporate network from unauthorized external access. In addition, it can offer internal protection, preventing unauthorized access to a particular subnet, work group or LAN within the corporate network.
Threat Management and Information Security
  The Cyberoam firewall offers another layer of surfing security, by implementing blacklists and whitelists, allowing administrators to block or allow access based on preset user-based policies. Further, it prevents enterprise users from sending confidential information outside the network.
Easy Management
  Purpose-built to meet enterprise needs for the basic first line of defense, Cyberoam firewall introduces granular controls with user and group-based policies.
Auditing and Reporting Capabilites
  Cyberoam Firewall offers auditing and inbuilt reporting capabilities with details of policy changes, network traffic and current connections.
  Cyberoam firewall comes with IPSec VPN capabilities.
  Online DEMO  
  View Online Demo View Demo View Online Demo  
  White Papers  
  Download Whitepapers Download More White Papers  
  Data Sheets  
  Download Datasheets Download More Data Sheets  
  Tech Sheet  
  Download Tech Sheet Download Download Tech Sheet  
© Copyright 2007 Elitecore Technologies Limited. All Rights Reserved.      Elitecore Technologies Ltd.
Cyberoam : Unified Internet Threat Management