Professional Documents
Culture Documents
Cyberoam C 5 I "Best Buy" R 0 A Rated As by SC Magazine
Cyberoam C 5 I "Best Buy" R 0 A Rated As by SC Magazine
F/D
RESET
CR 50ia VPNC
CERTIFIED
SSL
Portal
SSL
Exchange
SSL
Firefox
VPNC SSL
CERTIFIED JavaScript
Basic SSL Basic
Interop Network Extension
AES SSL Advanced
www.check-mark.com Interop Network Extension
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
small and medium enterprises (SMEs) by allowing user identity-based policy controls.
BEST BUY
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
Cyberoam CR50ia solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
instant visibility into the source of attacks by username rather than IP address – allowing immediate
rated as remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
“BEST BUY” by of Cyberoam security features to allow creation of identity-based security policies.
SC Magazine Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
grow with the future security needs of an organization without degrading system performance. ESA
supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
L8 USER
L7 Application
Cyberoam's Layer 8 Technology treats
L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer
in the protocol stack
L5 Session L2TP, PPTP
L1 Physical
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - Administrative controls - Session timeout, Dead Peer On-Appliance Cyberoam-iView Reporting Cyberoam
VIEW
VPN Tunnels Detection, Portal customization - Integrated Web-based Reporting tool -
- Customize individual user scanning - TCP- based Application Access - HTTP, HTTPS, RDP, Cyberoam-iView
- Self Service Quarantine area TELNET, SSH - 1000+ drilldown reports
- Scan and deliver by file size - 45+ Compliance Reports
- Block by file types Instant Messaging (IM) Management - Historical and Real-time reports
- Add disclaimer/signature - Yahoo and Windows Live Messenger - Multiple Dashboards
- Virus Scanning for IM traffic - Username, Host, Email ID specific Monitoring
Gateway Anti-Spam - Allow/Block Login Dashboard
- Real-time Blacklist (RBL), MIME header check - Allow/Block File Transfer - Reports - Security, Virus, Spam, Traffic, Policy
- Filter based on message header, size, sender, recipient - Allow/Block Webcam violations, VPN, Search Engine keywords
- Subject line tagging - Allow/Block one-to-one/group chat - Multi-format reports - tabular, graphical
- IP address Black list/White list - Content-based blocking - Exportable formats - PDF, Excel
- Redirect Spam mails to dedicated email address - IM activities Log - Automated Report Scheduling
- Image-based Spam filtering using RPD Technology - Archive files transferred
- Zero hour Virus Outbreak Protection - Custom Alerts IPSec VPN Client***
- Self Service Quarantine area - Inter-operability with major IPSec VPN Gateways
- Spam Notification through Digest Wireless WAN - Supported platforms: Windows 2000, WinXP 32/64-bit,
- IP Reputation-based Spam filtering - USB port 3G and Wimax Support
#
Windows 2003 32-bit, Windows 2008 32/64-bit,
- Primary WAN link Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
Intrusion Prevention System - WAN Backup link - Import Connection configuration
- Signatures: Default (3000+), Custom
- IPS Policies: Multiple, Custom Bandwidth Management Certification
- User-based policy creation - Application and User Identity based Bandwidth - ICSA Firewall - Corporate
- Automatic real-time updates from CRProtect networks Management - Checkmark UTM Level 5 Certification
- Protocol Anomaly Detection - Guaranteed & Burstable bandwidth policy - VPNC - Basic and AES interoperability
- DDoS attack prevention - Application & User Identity based Traffic Discovery - “IPv6 Ready” Gold Logo
- Multi WAN bandwidth reporting
Web Filtering - Category-based bandwidth restriction Compliance
- Inbuilt Web Category Database CE
- URL, keyword, File type block User Identity and Group Based Controls FCC
- Categories: Default(82+), Custom - Access time restriction
- Protocols supported: HTTP, HTTPS - Time and Data Quota restriction Dimensions
- Block Malware, Phishing, Pharming URLs - Schedule based Committed and Burstable Bandwidth H x W x D (inches) 1.7 x 16.8 x 10.3
- Schedule-based access control - Schedule based P2P and IM Controls H x W x D (cms) 4.3 x 42.7 x 26.2
- Custom block messages per category Weight 5.3 kg, 11.68 lbs
- Block Java Applets, Cookies, Active X Networking
- CIPA Compliant - Failover - Automated Failover/Failback, Multi-WAN Power
- Data leakage control via HTTP, HTTPS upload failover, 3GModem failover Input Voltage 100-240 VAC
- WRR based load balancing Consumption 90W
Application Filtering - Policy routing based on Application and User Total Heat Dissipation (BTU) 200
- Inbuilt Application Category Database - IP Address Assignment - Static, PPPoE, L2TP, PPTP &
- Application Categories: e.g. Gaming, IM, P2P, DDNS Client, Proxy ARP, DHCP server, DHCP relay Environmental
Proxy : 11+ - Support for HTTP Proxy Operating Temperature 5 to 40 °C
- Schedule-based access control - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Storage Temperature 0 to 70 °C
- Block Forwarding Relative Humidity (Non condensing) 10 to 90%
- P2P applications e.g. Skype - Parent Proxy support with FQDN
- Anonymous proxies e.g. UItra surf - “IPv6 Ready” Gold Logo
- “Phone home” activities
- Keylogger
- Layer 7 (Applications) & Layer 8 (User - Identity)
Visibility
*If Enabled, will bypass traffic only in case of power failure. ##Subscription available in all the Models of CR50ia & above. For further details refer to WAF Datasheet.
**Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
***Additional Purchase Required. #3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices.
www.cyberoam.com I sales@cyberoam.com