yberoam Unified Threat Management appliances offer comprehensive security, connectivity and productivity to organizations, ranging from large enterprises to small and branch offices, through following features:
Cyberoam Firewall offers stateful and deep packet inspection, embedding user identity in the firewall rule-matching criteria, to offer robust security of the network, application and users. Cyberoam UTM Firewall protects organizations from DoS, DDoS and IP Spoofing attacks.
The VPNC-certified Cyberoam offers the option of IPSec, LT2P, PPTP and SSL VPN over its UTM appliances, delivering granular, secure, identity-based network access control to branch offices and other remote users while making it compatible with existing network infrastructure.
Intrusion Prevention System
Cyberoam IPS provides comprehensive, zero-hour protection by blocking intrusion attempts, against malware, Trojans, DoS attacks, malicious code transmission, backdoor activity and blended threats.
Anti-Virus & Anti-Spyware
The Gateway Anti-Virus and Anti-Spyware solution protects against blended threats viruses and other malware at the gateway before they reach users, making the use of web, email, and IM, safe .
The Anti-Spam solution blocks spam messages over SMTP, POP3, IMAP protocols in real time and provides comprehensive Zero hour protection to organizations against spam. It minimises business mail loss with 98% protection against zero-hour attacks and .0001% false positive rate.
Outbound Spam Protection
The Outbound Spam Protection helps service providers proactively identify spam sources and establishes the location of botnet infections thus repairing or disabling spamming accounts and in the process, eliminating outbound Spam. Existing solutions use anti spam in reverse technology to block outbound spam which is not effective in dealing with root causes as result of which even genuine mails are lost which may mean huge business loss.
Cyberoam’s award-winning Web Filtering blocks access to harmful, inappropriate, and dangerous websites through its comprehensive URL databases with millions of URLs grouped into 82+ categories. Cyberoam extends the filtering security up to Layer 8 where policies based on users’ identity provides comprehensive access controls and data & productivity loss.
Cyberoam Bandwidth Management offers Layer 8 Identity-based bandwidth control, enabling organizations to apply and administer policies that accurately control valuable bandwidth resources & business-critical applications, optimize network performance and improve network congestion. The solution supports Cloud and SaaS deployments while lowering capital expense involved in bandwidth purchase.
Application Visibility & Control
Cyberoam offers Application Layer 7 to User Layer 8 visibility and controls, allowing policies based on User-Time-Bandwidth-Application in organizations. This allows security against application-based threats, controls applications usage by users, and prioritises bandwidth allocation to business critical, non-critical, socio-business and undesirable applications