Security against web-based threats and data leakage
Content and Web Security
Cyberoam offers a wide security cover against web-based threats, including the entry of malware, phishing, pharming, intrusions and unauthorized data uploads.

Key Highlights

Wide Security Cover from Web Threats - Cyberoam’s Gateway Anti-Virus & Anti-Spyware scans web, Instant Messaging, HTTPS and FTP traffic, delivering security against emerging malware.

Cyberoam IPS detects, blocks or drops intrusion attempts by detecting anomalous traffic.

Cyberoam Web Filtering detects and blocks third-party proxy and tunneling software, Google cache pages, embedded URLs and ‘safe search’ over search engines to prevent harmful websites from appearing in search results.

Data Leakage Prevention - Cyberoam Web Filtering blocks file uploads over HTTP, HTTPS and FTP while Instant Messaging and Application Visibility & Control block file transfers over IM and P2P applications, ensuring data leakage prevention and meeting HIPAA, CIPA, PCI DSS compliance requirements.

Layer 8 Identity-based Controls - Cyberoam Web Filtering’s Layer 8 Identity-based surfing policies based on user, group, work function, web category and duration or time of the day deliver high flexibility and security.

Coupled with Bandwidth Management which ensures bandwidth availability and data transfer limit based on duration and schedule of access for specific web categories, Cyberoam limits rather than blocks non-productive sites.

Layer 8 Identity-based Reporting - Cyberoam’s on-appliance reporting offers visibility into user and system activity, allowing organizations to take instant and preventive action to meet compliance requirements, enhance web content security and productivity. Based on the Layer 8 Identity-based visibility from Cyberoam reporting, organizations can create policies to prevent illegal download of copyright material, unproductive surfing, high bandwidth-consuming downloads and network attacks. The centralized logging and reporting requirements of enterprises are met by CCC appliances and Cyberoam iView.

Identity Based Security with Cyberoam's Layer 8 Technology
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
By Verticals
Government & Defense
Banking & Finance
ISPs & Email Service Providers
Unified Threat Management
Anti-Virus / Anti-Spyware
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
Cyberoam iView
Open Source
Cyberoam Central Console (CCC)
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Techsheet & Datasheets
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
ROI Calculator
Find a Partner
Become a Partner
Partner Login
Training & Events
Training Portal
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
Cyberoam Clients
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam