Professional Documents
Culture Documents
SSL
Firefox
VPNC SSL
CERTIFIED JavaScript
Basic SSL Basic
Interop Network Extension
AES SSL Advanced
www.check-mark.com Interop Network Extension
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user
identity-based policy controls.
Gartner positions
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
Cyberoam UTM as a protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
“Visionary” in Magic solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
instant visibility into the source of attacks by username rather than IP address – allowing immediate
Quadrant for SMB remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
Multifunction of Cyberoam security features to allow creation of identity-based security policies.
Firewalls
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
grow with the future security needs of an organization without degrading system performance. ESA
supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
L8 USER
L7 Application
Cyberoam's Layer 8 Technology treats
L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer
in the protocol stack
L5 Session L2TP, PPTP
L1 Physical
- Virus, Worm, Trojan Detection & Removal - Network access - Split and Full tunneling - Integrated Web-based Reporting tool - VIEW
- Spyware, Malware, Phishing protection - Browser-based (Portal) Access - Clientless access Cyberoam-iView
- Automatic virus signature database update - Lightweight SSL VPN Tunneling Client - 1000+ drilldown reports
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - Granular access control to all the Enterprise Network - 45+ Compliance Reports
VPN Tunnels resources - Historical and Real-time reports
- Customize individual user scanning - Administrative controls - Session timeout, Dead Peer - Multiple Dashboards
- Self Service Quarantine area Detection, Portal customization - Username, Host, Email ID specific Monitoring
- Scan and deliver by file size - TCP- based Application Access - HTTP, HTTPS, RDP, Dashboard
- Block by file types TELNET, SSH - Reports - Security, Virus, Spam, Traffic, Policy
- Add disclaimer/signature violations, VPN, Search Engine keywords
Instant Messaging (IM) Management - Multi-format reports - tabular, graphical
Gateway Anti-Spam - Yahoo and Windows Live Messenger - Exportable formats - PDF, Excel
- Real-time Blacklist (RBL), MIME header check - Virus Scanning for IM traffic - Automated Report Scheduling
- Filter based on message header, size, sender, recipient - Allow/Block Login
- Subject line tagging - Allow/Block File Transfer IPSec VPN Client**
- IP address Black list/White list - Allow/Block Webcam - Inter-operability with major IPSec VPN Gateways
- Redirect Spam mails to dedicated email address - Allow/Block one-to-one/group chat - Supported platforms: Windows 2000, WinXP 32/64-bit,
- Image-based Spam filtering using RPD Technology - Content-based blocking Windows 2003 32-bit, Windows 2008 32/64-bit,
- Zero hour Virus Outbreak Protection - IM activities Log Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
- Self Service Quarantine area - Archive files transferred - Import Connection configuration
- Spam Notification through Digest - Custom Alerts
- IP Reputation-based Spam filtering Certification
Wireless WAN - ICSA Firewall - Corporate
#
Intrusion Prevention System - USB port 3G and Wimax Support - Checkmark UTM Level 5 Certification
- Signatures: Default (3000+), Custom - Primary WAN link - VPNC - Basic and AES interoperability
- IPS Policies: Multiple, Custom - WAN Backup link - “IPv6 Ready” Gold Logo
- User-based policy creation
- Automatic real-time updates from CRProtect networks Bandwidth Management Compliance
- Protocol Anomaly Detection - Application and User Identity based Bandwidth CE
- DDoS attack prevention Management FCC
- Guaranteed & Burstable bandwidth policy
Web Filtering - Application & User Identity based Traffic Discovery Dimensions
- Inbuilt Web Category Database - Multi WAN bandwidth reporting H x W x D (inches)
- Category-based bandwidth restriction 1.7 x 6 x 9.1
- URL, keyword, File type block H x W x D (cms) 4.4 x 15.3 x 23.2
- Categories: Default(82+), Custom Weight 2.3 kg, 5.07 lbs
- Protocols supported: HTTP, HTTPS User Identity and Group Based Controls
- Block Malware, Phishing, Pharming URLs - Access time restriction Power
- Schedule-based access control - Time and Data Quota restriction Input Voltage 100-240 VAC
- Custom block messages per category - Schedule based Committed and Burstable Bandwidth Consumption 33.5W
- Block Java Applets, Cookies, Active X - Schedule based P2P and IM Controls Total Heat Dissipation (BTU) 114
- CIPA Compliant
- Data leakage control via HTTP, HTTPS upload Networking Environmental
- Failover - Automated Failover/Failback, Multi-WAN Operating Temperature 0 to 40 °C
Application Filtering failover, 3GModem failover Storage Temperature -25 to 75 °C
- Inbuilt Application Category Database - WRR based load balancing Relative Humidity (Non condensing) 10 to 90%
- Application Categories: e.g. Gaming, IM, P2P, - Policy routing based on Application and User
Proxy : 11+ - IP Address Assignment - Static, PPPoE, L2TP, PPTP &
- Schedule-based access control DDNS Client, Proxy ARP, DHCP server, DHCP relay
- Block - Support for HTTP Proxy
- P2P applications e.g. Skype - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
- Anonymous proxies e.g. UItra surf Forwarding
- “Phone home” activities - Parent Proxy support with FQDN
- Keylogger - “IPv6 Ready” Gold Logo
- Layer 7 (Applications) & Layer 8 (User - Identity)
Visibility High Availability
- Active-Active
- Active-Passive with State Synchronization
- Stateful failover
- Alerts on appliance status change
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
# ##
**Additional Purchase Required. 3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices. Subscription available in all the Models of CR50ia & above.
www.cyberoam.com I sales@cyberoam.com