Take security beyond ports and protocols
Application Security
Cyberoam delivers comprehensive Application Security against malware, intrusions and data leakage. It controls unauthorized application usage while supporting business-critical applications, secure collaboration, Cloud and SaaS adoption.

Key Highlights

Application Visibility & Control – Cyberoam’s Layer 7 capabilities identify and control applications which use standard Port 80, 443, non-standard ports, port hopping or tunnel through encrypted SSL traffic. Cyberoam implements application-based Bandwidth Management, accelerating critical applications while blocking malware-laden sites through Web Filtering. Organizations can group applications as per their requirements into business-critical, entertainment, communication, collaboration and control access through Firewall policies.

Applications QoS — Cyberoam allows the creation of Firewall rules based on Application-User-Time-Bandwidth, ensuring assured bandwidth for business-critical applications and minimizing the peaks and troughs of bandwidth consumption.

Instant Messaging Controls — Cyberoam scans, logs and controls access to Instant Messaging applications like Yahoo Messenger and Windows Live Messenger. Organizations can implement Layer 8 Identity-based controls by username or IM address over:

  • Access to IM applications
  • Audio-video chat
  • Conversations based on keywords
  • File transfer
Data Leakage Prevention – Cyberoam’s Application Visibility & Control can block file transfer over webmails like Gmail and Yahoo, file sharing via P2P applications in addition to the above IM controls, preventing data leakage and helping organizations meet the requirements of regulatory compliance.

Application Security — Cyberoam Firewall blocks games and tunneling software that result in malware entry. Cyberoam scans FTP and encrypted HTTPS / SSL traffic in addition to guarding against web application vulnerabilities which are exploited to launch backdoor, zero-hour attacks. It blocks anomalous traffic through its extensive and constantly updated database of IPS signatures.

Identity Based Security with Cyberoam's Layer 8 Technology
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
By Verticals
Government & Defense
Banking & Finance
ISPs & Email Service Providers
Unified Threat Management
Anti-Virus / Anti-Spyware
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
Cyberoam iView
Open Source
Cyberoam Central Console (CCC)
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Techsheet & Datasheets
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
ROI Calculator
Find a Partner
Become a Partner
Partner Login
Training & Events
Training Portal
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
Cyberoam Clients
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam