The Cyberoam NG Series offers next-generation security features to organizations to protect against newly-evolving threats. |
|
|
Advanced Application Controls
Cyberoam's Application Visibility & Control feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list. Granular classification of applications |
|
|
|
On-appliance Web Application Firewall
The Web Application Firewall, available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance. |
|
|
|
Support for new Connectivity Technologies, 4G/LTE
Cyberoam makes organizations ready for high speed future over Wireless WAN with support for new connectivity technologies - 4G /LTE. Easy to deploy with a simple USB modem plug-in into Cyberoam appliance, organizations can ensure business connectivity with automatic failover to 3G / 4G / WiMAX connection, and VPN connection over 3G / 4G / WiMax. |
|
|
|
First-of-its-kind On-appliance Reporting
Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1000+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any UTM vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps. |
|
|
|
Identity-based Controls with Layer 8 Technology
Cyberoam's Layer 8 Technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security. |
|
|
|
|
FUSION Technology-driven SI Firewall
Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks. |
|
|
|