CYBEROAM UTM FIREWALL
Cyberoam’s integrated Security Appliances are purpose-built for comprehensive network protection and high performance needs of small, medium and large enterprises. Cyberoam’s Check Mark Level 5 certified, ICSA firewall certified identity-based Internet Security Appliances offer protection against external as well as internal threats.
The Cyberoam UTM appliances deliver high performance through the use of multi-core processors optimized through its software architecture. Cyberoam’s architectural flexibility can easily accommodate emerging applications like VoIP through own enhancements and easy third party plug-ins with no architectural changes, keeping organizations in a state of constant threat-readiness in a rapidly evolving threat scenario. Cyberoam appliances balance performance and security by using technologies like multi core processors, regular expressions co processors and hardware based Advanced Cryptography Engine for accelerating key functions of the UTM appliance. Cyberoam’s Active-Active High Availability provides efficient, continuous access to business-critical applications, information, and services. Active-Active HA increases overall network performance by load balancing the network traffic between two Cyberoam appliances. Further it offers auto failover, eliminating the problem of single point failure. The cluster appears to your network to be a single device, adding increased performance without changing your network configuration. Primary appliance acts as the load balancer and load balances all the TCP communications including TCP communications from Proxies but will not load balance VPN traffic.
Cyberoam CR Series – Firewall Appliances
Cyberoam firewall is the only UTM firewall that embeds user identity in firewall rule matching criteria, enabling enterprises to configure policies and identify users directly by the username rather than through IP addresses.
Cyberoam’s powerful hardware firewall provides stateful and deep packet inspection, access control, user authentication, network and application-level protection.
• Identity-based Security - Patent Pending Technology
• Real Unified Threat Management
• Multiple Authentication
• User/MAC Address Binding
• Enterprise-class security solution
• Centralized Management and Identity-based Reporting