Hardware Firewall Appliance
Cyberoam firewall is the UTM firewall that embeds user identity in firewall rule matching criteria, enabling enterprises to configure policies and identify users directly by the username rather than through IP addresses. Cyberoam’s powerful hardware firewall provides stateful and deep packet inspection, access control, user authentication, network and application-level protection.
The ICSA-certified Cyberoam firewall is available along with VPN (SSL VPN & IPSec), gateway anti-virus and anti-spyware, gateway anti-spam, intrusion prevention system, content & application filtering, bandwidth management and multiple link management, providing comprehensive security to small, medium and large enterprises, including remote and branch offices. Cyberoam is a Check Mark Level 5 certified UTM solution.
Key Features:
- Stateful Inspection Firewall
- Centralized management for multiple security features
- Embeds user identity in rule-matching criteria
- Multiple zone security
- Granular IM, P2P controls
- ICSA certified
Identity-based Security - Patent Pending Technology
Given that firewalls are meant to compare corporate access policies with connection information, Cyberoam offers the only firewall that adds user identity to the firewall rule matching criteria in addition to source, destination zone and IP address and service rather than rely on blanket corporate policies. In doing so, it controls access based on the individual user’s work profile. It offers control over P2P, IM traffic with high granularity, allowing access to the application where necessary, but disallows file sharing. In addition, Cyberoam offers schedule-based access control to enterprises.
In case of multiple gateways, enterprises can create Cyberoam firewall rules to route user and application traffic over a pre-defined gateway. With user identity as the central point, Cyberoam’s hardware firewall appliance allows policies to be created for all the UTM features on a single firewall page, delivering higher levels of security.
Thin Client Support
A thin client is a computer or a program that relies heavily on other computer (server) for most of its processing roles. Thin Client machines are driven by the idea to limit the client's capabilities to only essential applications. As Software as a Service (SaaS) gains popularity in the cloud environment, the thin clients are expected to replace desktop PCs in many work and educational environments. In general, they are not as vulnerable to malware attacks, have a longer life cycle, use less power and are less expensive to purchase.
The server in the thin client environment keeps track of the client machine using Session IDs, and not IP Addresses. Cyberoam Authentication for Thin Client (CATC) feature enables user to login to Cyberoam with session oriented authentication and user based rules can be applied. The solution works for authenticating thin client users through Citrix - XenApp Server or Microsoft Windows Server (Microsoft TSE).
Enterprise-Grade Security:
- Cyberoam offers high availability with stateful failover to minimize single point of failure and ensure business continuity.
- Cyberoam meets enterprise level security requirement through dynamic routing that provides faster up-times, increased network throughput with reduced latencies and trouble-free configuration while supporting rapid network growth.
- It provides VLAN support that enhances enterprises’ ability to create work profile-based groups across distributed locations.
- Cyberoam’s virtual host capability enables secure hosting of servers inside LAN and DMZ for enterprises. It enables efficient use of the limited public address pool to host services.
- Cyberoam UTM firewall offers stateful and deep-packet inspection, protecting enterprises from DoS attacks and IP spoofing attacks.
- Cyberoam provides detailed information related to enterprise traffic through firewall logs.
Multicast for Stock Updates
Cyberoam firewall supports multicasting for stock updates, enabling financial institutions and enterprises to receive stock information that is transmitted as multicast traffic. Multicasting of bandwidth hungry applications that include audio-video traffic allows Cyberoam to increase network efficiency and limit bandwidth consumption, lowering operating costs.
Cyberoam hardware firewall with SSL and IPSec VPN offers enterprise-grade security across distributed locations.