Support Center

  • CYBEROAM NEXT-GENERATION FIREWALLS

    The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with increasing number of users like customers and partners connecting to an enterprise network from outside is leading to de-perimeterization of enterprise networks. Besides, trends like rise in number of network users and devices, application explosion, virtualization, and more are leading to loss of security controls for enterprises over their networks Cyberoam ext-Generation Firewalls (NGFW) with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security.

    • Firewall Throughput (UDP) (Mbps):From 1000 to 600000
    • Firewall Throughput (TCP) (Mbps):From 750 to 36000

    Actionable Intelligence & Controls

    Cyberoam's Human Layer 8 acts like a standard abstract layer that binds with real Layers 2-7, enabling enterprises to regain lost security controls. By binding User Identity across Layers 2-7, enterprises can put security checks where they want to from L2-L8, along with complete visibility into user and network activities.
    CyberoamOS
    Cyberoam Next-Generation Firewalls are based on CyberoamOS – an intelligent and powerful firmware that offers next-generation security features include inline application inspection and control, website filtering, HTTPS inspection, Intrusion Prevention System, VPN (IPSec and SSL) and QoS/bandwidth management. Additional security features like Web Application Firewall, Gateway Anti-Virus, Gateway Anti-Spam are also available.
    High Performance
    Cyberoam offers high performance for enterprises with its powerful hardware appliances and CybeoamOS that has the ability to extract highest level of performance from a multi-core platform and tightly integrates with the hardware for network and crypto acceleration.
    Scalability
    Cyberoam's Extensible Security Architecture supports future enhancements like new security features and security updates that can be developed rapidly and deployed with minimum efforts without the need to change the appliance, offering future-ready security to large enterprises. In addition, enterprises can add another appliance in cluster/HA to support more number of users.
    Flexibility
    The FleXi Ports available in the FleXi Port (XP) security appliances offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing enterprises to upgrade to new technologies easily and cost-effectively, making them future-ready. The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency, reduced network complexity and reduced operational costs.

    NG SERIES : FUTURE-READY SECURITY
    Gigabit Firewall Throughputs
    The NG series appliances deliver the best in class Firewall and UTM throughputs. The entry-level NG series model starts with Gigabit Firewall throughputs


    The all-new Firmware – CyberoamOS
    The NG series appliances are based on CyberoamOS– the most
    intelligent and powerful Cyberoam firmware till date. The new firmware tightly integrates with the hardware for network and crypto acceleration to deliver high performance. The CyberoamOS also extracts the highest level of performance from a multi-core platform, along with offering minimum latency and improved processing speed with use of optimized Interrupt Rates and Fast Path technology. Its next-generation security features offer protection against newly evolving threats.

    A
    dvanced Application Controls
    Cyberoam’s Application Visibility & Control feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.

    On-appliance Web Application Firewall

    The Web Application Firewall, available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities,without the need to invest in a separate WAF appliance.
    FleXi Ports (XP)
    The FleXi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.
    Support for new Connectivity Technologies, 4G/LTE
    Cyberoam makes organizations ready for high speed future over Wireless WAN with support for new connectivity technologies – 4G /LTE. Easy to deploy with a simple USB modem plug-in into Cyberoam appliance, organizations can ensure business connectivity with automatic failover to 3G / 4G / WiMAX connection, and VPN connection over 3G / 4G / WiMax.
    First-of-its-kind On-appliance Reporting
    Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.
    Identity-based Controls with Layer 8 Technology
    Cyberoam’s Layer 8 Technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.
    Advanced Threat Protection
    Cyberoam NG series offers best-of-breed security of Intrusion Prevention System, Gateway Anti-Virus/Anti-Spyware, Gateway Anti-Spam, Web & Content Filtering and Outbound Spam Protection to offer protection against newly evolving threats.
    FUSION Technology-driven SI Firewall
    Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.
    Remote Access
    Cyberoam VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.
    Intrusion Prevention System
    Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.
    Web Filtering
    Cyberoam's award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 89+ categories. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.
    Web Application Firewall
    Cyberoam offers an on-appliance Web Application Firewall subscription to secure websites and Web-based applications in organizations against attacks such as SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows, and more, including the OWASP Top 10 Web application vulnerabilities.


    Cyberoam iNG Product Range:

       SOHO-ROBO Segment:
    CR15wiNG , CR255wiNG , CR35wiNG , CR15iNG , CR25iNG , CR35iNG
    Small & Medium Segment:
    CR50iNG , CR100iNG , CR200iNG , CR200iNG-XP , CR300iNG , CR300iNG-XP
    Medium & Enterprise Segment:
    CR500iNG-XP , CR750iNG-XP , CR1000iNG-XP , CR1500iNG-XP , CR2500iNG , CR2500iNG-XP





     
  • Overview:

    Cyberoam network security appliances, available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. Cyberoam ensures high levels of network security, network connectivity, continuous availability and secure remote access with controlled network access to road warriors, telecommuters, partners, customers.
    With granular controls and advanced networking features, Cyberoam network security appliances offer enterprise-class security and high flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakage.

    • Firewall Throughput (UDP) (Mbps):From 150 to 12000
    • Firewall Throughput (TCP) (Mbps):From 90 to 10000

    Features:

    Layer 1 to Human Layer 8 Firewall 

    The Cyberoam Firewall implements policies based on the Physical Layer 1 to Application Layer 7 and Human Layer 8 with User Identity in addition to source, destination zone, IP address and application. It enables organizations to control access to network resources based on the user identity, work profile and application access requirement of external users like customers and partners, internal LAN users and employees outside the perimeter like road warriors, telecommuters. It also offers user identity-based security in dynamic Wi-Fi, DHCP and shared endpoint environments.

    Advanced Network Security
    Cyberoam offers advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance requirements through the following capabilities –:

    • High Availability with stateful failover
    • Dynamic routing
    • Multiple VLAN zones to create work-profile based groups across distributed locations
    • Virtual host capability, enabling secure hosting of services inside the LAN and DMZ

    VPN
    Cyberoam offers VPNC-certified IPSec and SSL VPN over its network security appliances, ensuring easy-to-manage secure remote access with high business flexibility while lowering the capital and operating expense involved in deploying dedicated VPN appliances


    Identity-based Controls with Layer 8 Technology
    Cyberoam’s Layer 8 Technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

    Intrusion Prevention System
    Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

    Web Application Firewall For CR500 and Above
    Cyberoam offers an on-appliance Web Application Firewall subscription to secure websites and Web-based applications in organizations against attacks such as SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows, and more, including the OWASP Top 10 Web application vulnerabilities



    Cyberoam iNG Product Range:

       SOHO-ROBO Segment:
    CR15wi , CR25wi , CR35wi , CR15i , CR25i , CR35i

    Small & Medium Segment:
    CR50ia , CR100ia , Cr200i , CR300i

    Medium & Large Segment:
    CR500ia/1F/10F , CR500ia-RP , CR750ia/1F/10F , CR1000ia/1F , CR1500ia/10F




  •  

    Overview:

    Cyberoam virtual network security appliances can be deployed as Next-Generation Firewalls or UTMs and offer industry-leading network security to virtual data-centers, “Security-in-a-Box” set-up for MSSPs/organizations, and “Office-in-a-Box” set-up. By offering comprehensive security features available in its hardware security appliances, in virtualized form, these virtual appliances offer Layer 8 Identity-based security on a single virtual appliance, which is as strong as security for the physical networks.
    Cyberoam offers a complete virtual security solution to organizations with its virtual network security appliances (Next-Generation Firewalls/UTMs), virtual Cyberoam Central Console for centralized management, and Cyberoam iView software for centralized logging and reporting.
    Take control of what you want, how much you want, how you want it with Cyberoam Virtual Network Security Appliances!


    WHAT you want?

    Get a virtual security solution for virtualized environments without deploying a hardware security appliance anymore
    Get support to scale-up your security in virtual network as your business grows


    HOW MUCH you want?

    Upgrade your virtual security appliances using a simple activation key to match your growing business needs
    Get benefits of a shared infrastructure by capitalizing on the lean and peak periods of network activities

    HOW you want?
    Choose between individual and a mix of physical and virtualized environments without worrying about security
    Get deployment flexibility with a licensing model that is based on the number of vCPUs
    Upgrade to a higher virtual security appliance model only when you want to even when the number of network users increase beyond the recommended number for a given model

    Product:

    Cyberoam virtual network security appliance range includes :CRiV-1C (Support upto 1 vCPU)
    • CRiV-2C (Support upto 2 vCPU)
    • CRiV-4C (Support upto 4 vCPU)
    • CRiV-8C (Support upto 8 vCPU)
    • CRiV-12C (Support upto 12 vCPU)
    The virtual platforms supported by Cyberoam virtual network security appliances:
    • VMware ESX/ESXi
    • VMware Workstation
    • VMware Player
    • Hyper-V
    Features:

    Protection for Virtualized Networks
    Cyberoam virtual network security appliances remove blind spots within the virtualized environments with their ability to scan inter-VM traffic, also allowing granular firewall and security policies over inter-VM traffic. In cases where the hypervisor management console is placed in live production virtual environment due to lack of segmentation within virtual environments, organizations get security from threats like hyperjacking and other hypervisor vulnerabilities with administrators segregating the Hypervisor Management Console in DMZ and routing all traffic through the virtual security appliance. Cyberoam enables role-based administrator controls even in collapsed DMZ in case of virtualized networks, allowing separation of administrator duties along with identity-based logs and reports with Cyberoam’s on-appliance reporting feature. The virtual security appliance allows Identity-based security policies over user authentication, service authorization and reporting (AAA) that offers visibility and user-based access controls in virtual environments, thus securing Zero Trust Networks.

    Comprehensive Virtual Security
    Cyberoam virtual security appliances consolidate multiple security features like firewall, VPN, Anti-Spam, Anti-Virus, IPS, WAF, Web & Application Filtering, Bandwidth Management, and more, in a single virtual appliance that makes virtual environments as secure as the physical infrastructure.

    Ease of Deployment
    Cyberoam virtual security appliances are easy to deploy with a licensing model that provides the flexibility to allot the number of vCPUs for Cyberoam virtual security appliance based on customer requirements. A simple key activation to upgrade to higher models and no hard limits on crossing recommended usage limits make Cyberoam virtual security appliances easy to deploy in your virtual set-ups.

    Compliance Management
    Cyberoam virtual security appliances segregate and secure traffic and data in virtualized environments, enabling organizations and MSSPs to meet regulatory requirements. Identity-based logs and reports with the on-appliance reporting feature supports display of compliance.

    Centralized Management
    Organizations have the flexibility to deploy individual and a mix of hardware and virtual security appliances in their network infrastructure, which can be managed centrally using the virtual Cyberoam Central Console.

    Complete Virtual Security
    Solution Cyberoam virtual security appliances, along with other security offerings like the virtual Cyberoam Central Console and Cyberoam iView software, offer a complete virtual security package to organizations.





  • Overview:

    Cyberoam Central Console (CCC) appliances offer the flexibility of hardware CCC appliances and virtual CCC appliances to provide centralized security management across distributed Cyberoam network security appliances, enabling high levels of security for MSSPs and large enterprises. With Layer 8 Identity-based policies and centralized reports and alerts, CCC hardware and virtual appliances provide granular security and visibility into remote and branch offices across the globe.

    Virtual Cyberoam Central Console Appliances
    • Virtual CCC appliances support VMware and Hyper-V virtualization platforms
    • Eliminate need for dedicated hardware, reduce cost of ownership, simplify future upgrades for users
    • Offer full set of features as CCC hardware appliances

    Virtual Cyberoam Central Console Appliances Models
    • CCCV15
    • CCCV50
    • CCCV100
    • CCCV200
    • CCCV500

    Features:

    Centralized Policy Management & Security Updates
    CCC simplifies security management by enabling centralized policy creation and implementation, subscription and signature updates for Cyberoam network security appliances deployed at branch offices and client offices for all security features like Firewall, Intrusion Prevention System, Anti-Virus scanning, and more. This allows real-time protection against zero-hour threats in enterprises and reduces response time against newly identified threats across multiple customer networks of MSSPs.

    With a single, web-based GUI across all security features, CCC ensures centralized policy implementation, simplifying security management and maintaining high levels of security across all customer locations and remote offices despite the lack of technical resources at these locations. Update of rules and policies can be centrally scheduled for individual or group of network security appliances.

    Group-based Management 
    CCC provides flexibility to manage security across various offices and clients by allowing grouping of security appliances based on their geography, Cyberoam network security appliance models, Firmware versions, organizations (especially for MSSPs), and service subscriptions. Enhanced with Web 2.0 benefits, the dynamic views in CCC provide at-a-glance information on the dashboard that helps in managing, searching and sorting appliances by firmware versions, appliance models and all appliances. This helps in quick monitoring and action. CCC offers flexibility in sorting appliance views on the dashboard by allowing customizable selection criteria for sorting.

    Role-based Administrator Controls
    CCC enables enterprises and MSSPs to set role-based administration for CCC hardware and virtual appliances as well as individual Cyberoam security appliance and group of Cyberoam security appliances.


    Alerts and Audit Logs
    CCC’s Log Viewer offers logs and views of administrator actions on CCC as well as dispersed Cyberoam network security appliances, which helps in investigative analysis, supports regulatory compliance as well as keeps track of historical activities across distributed networks.
    Email alerts can be set for individual or group of Cyberoam security appliances across branch offices and client offices based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits and other parameters. CCC’s alert configuration facility helps enterprises and MSSPs reduce false alarms. Administrators can set an alert when the CPU usage reaches above 90% for a specific time period (say 20 minutes) instead of setting an alert when it momentarily peaks to 90% — which can trigger a false alarm.







  • For Live CCC Demo Click
    HERE
    Username : guest
    Password : guest

    For Live  iNG Series De
    mo Click HERE

    Username : guest
    Password : guest

    For Live ia Series Demo Click HERE
    Username : guest
    Password : guest