Threat-free & Flexible remote access
Cyberoam offers secure remote access for remote offices, road warriors, tele-commuters and business partners, preventing intrusions and malware from entering the central network.

Flexible VPN Options

Cyberoam delivers Any Where, Any Time, Any Device access with a range of VPN options, ensuring uninterrupted business operations, enhanced productivity and lower cost of operations by minimizing travel and infrastructure expenses.

IPSec, L2TP, PPTP and SSL VPN over Cyberoam UTM appliance offer cost-effective, secure remote access to organizations

SSL VPN over Cyberoam UTM appliances delivers flexible client-less VPN access

Key Highlights
Solution Components

Cyberoam’s IPSec VPN offers site-to-site VPN with cost-effective site-to-site remote connectivity, eliminating the need for expensive private remote access networks like leased lines, Asynchronous Transfer Mode (ATM) and Frame Relay. Automatic failover with L2TP delivers uninterrupted remote connectivity similar to that of leased lines.

Cyberoam SSL VPN offers clientless, web-based access to remote users with the assurance of SSL encrypted security without the complexity of pre-installed IPSec client software over endpoints. With its ability to create an encrypted SSL tunnel through firewalls, Cyberoam SSL VPN overcomes firewall blocks when users work behind a customer or partner firewall. Users can access the corporate network from a range of devices: laptops, desktops, PDAs, smart phones, ipads, iphones and more, functioning with Any Time, Anywhere, Any Device access.

Layer 8 Identity-based Remote Access – Cyberoam offers Layer 8 Identity-based policies to allow organizations to create differential policies based on username and work requirement. Eg. Access to pre-specified applications for partners, full access to telecommuters and more, limiting data leakage and exposure to network threats.

Threat-Free VPN Access – Cyberoam’s Threat Free Tunneling (TFT) technology scans IPSec, L2TP, PPTP and SSL VPN traffic for malware, spam, inappropriate content and intrusions, ensuring protection to corporate resources from threats residing on remote devices.

Logging and Reporting – Cyberoam’s Human Layer 8 Identity-based logging and reporting offers comprehensive visibility into VPN traffic, ensuring security and compliance. Cyberoam offers on-appliance reporting over UTM in addition to centralized reporting over CCC appliances and Cyberoam iView.

Identity Based Security with Cyberoam's Layer 8 Technology
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
By Verticals
Government & Defense
Banking & Finance
ISPs & Email Service Providers
Unified Threat Management
Anti-Virus / Anti-Spyware
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
Cyberoam iView
Open Source
Cyberoam Central Console (CCC)
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Techsheet & Datasheets
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
ROI Calculator
Find a Partner
Become a Partner
Partner Login
Training & Events
Training Portal
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
Cyberoam Clients
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam