Cyberoam’s Firewall is available as a Next-Generation Firewall and UTM firewall. It offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.
- Layer 8 Identity-based Security
Cyberoam’s Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all features, providing ease of management and high security with flexibility.
- Anti-Virus & Anti-Spyware
Cyberoam’s Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and key loggers.
Cyberoam’s Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more.
Cyberoam VPN (IPsec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.
- Intrusion Prevention System
Cyberoam’s Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.
Cyberoam’s award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 89+ categories. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.
Cyberoam enables organizations to tie bandwidth policies to users, user groups, Applications, Website Categories, Firewall rules, and more. Cyberoam’s granular Layer 7 and Layer 8 Bandwidth controls allow prioritization of business-critical applications and users for bandwidth allocation, ensuring assured QoS for business-critical applications like VoIP and CRM. Granular bandwidth controls allow committed bandwidth to critical users at all times and also allow policies to assign idle bandwidth to other applications automatically, delivering optimal use of idle bandwidth and higher ROI.
Cyberoam’s Multiple Link Management supports WAN redundancy and delivers assured WAN availability and reliable connectivity. With Cyberoam’s management of WAN connectivity, organizations have assured access to business applications involved in collaboration, Cloud and SaaS deployments. It optimizes multiple links, delivering ROI and minimizing overload.
Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.
Other security features in the Cyberoam NG series appliances include High Availability 3G/4G/WiMAX connectivity, Application Visibility & Control, Web Application Firewall, IM Archiving & Controls, IPv6 Ready, Traffic Discovery and Wi-Fi appliances.