Comprehensive Security from Layer 2 to Layer 8
Network Security
Cyberoam UTM delivers enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application controls. It ensures high levels of network security, network connectivity, continuous availability and secure remote access with controlled network access to road warriors, telecommuters, partners, customers.

With granular controls and advanced networking features, Cyberoam UTM appliances offer enterprise-class security and high flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakage.

Key Highlights

Shift from Firewall to UTM Security – Cyberoam offers Stateful Inspection Firewall that is tightly integrated with VPN (IPSec & SSLVPN), Intrusion Prevention System, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management to provide unified security.

Layer 1 to Human Layer 8 Firewall – Cyberoam UTM’s Stateful Inspection Firewall implements policies based on the Physical Layer 1 to Application Layer 7 and Human Layer 8 with User Identity in addition to source, destination zone, IP address and application. It enables organizations to control access to network resources based on the user identity, work profile and application access requirement of external users like customers and partners, internal LAN users and employees outside the perimeter like road warriors, telecommuters. It also offers user identity-based security in dynamic Wi-Fi, DHCP and shared endpoint environments.

VPN – Cyberoam UTM offers VPNC-certified IPSec and SSL VPN over the UTM appliance, ensuring easy-to-manage secure remote access with high business flexibility while lowering the capital and operating expense involved in deploying dedicated VPN appliances.

IPS – Cyberoam offers advanced Intrusion Prevention System (IPS) carrying thousands of signatures applicable with human and application layer policies to automatically detect and block intrusions, IM and P2P exploits, backdoor attacks and other malware. Cyberoam’s IPS carries HTTP proxy signatures and custom signature capability, offering customized protection to meet the unique security requirements of each organization.

Advanced Network Security – Cyberoam offers advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance requirements through the following capabilities –

  • High Availability with stateful failover
  • Dynamic routing
  • Multiple VLAN zones to create work-profile based groups across distributed locations
  • Virtual host capability, enabling secure hosting of services inside the LAN and DMZ
  • Centralized management and logging-reporting
Identity Based Security with Cyberoam's Layer 8 Technology
   
Solutions
 
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
 
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
 
By Verticals
MSSP
Government & Defense
Education
Healthcare
Banking & Finance
Retail
ISPs & Email Service Providers
   
Products
 
Overview
Unified Threat Management
Firewall
VPN
IPS
Anti-Virus / Anti-Spyware
Anti-Spam
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
 
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
 
Cyberoam iView
Open Source
Appliances
 
Cyberoam Central Console (CCC)
 
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
 
   
Resources
 
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Brochures
Techsheet & Datasheets
Whitepapers
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
Testimonials
ROI Calculator
Blog
   
Partners
 
Find a Partner
Become a Partner
Partner Login
 
Training & Events
 
Training Portal
Events
   
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
 
   
Support
 
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
RMA
Download
Cyberoam Clients
Upgrades
 
Company
 
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam