Cyberoam CR15i UTM Appliance








- Stock: 2
- Code: BS17309
- Model: CR15i
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls. Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies. Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
Technical Details
Specification | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Interfaces
System Performance*
Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall GatewayAnti-Virus & Anti-Spyware -Virus,Worm,Trojan: Detection &Removal Gateway Anti-Spam - Inbound/Outbound Scanning Intrusion Prevention System - Signatures: Default (4500+), Custom Web Filtering - InbuiltWeb Category Database Application Filtering - Inbuilt Application Category Database - P2Papplications e.g. Skype- Layer 7 (Applications) & Layer 8 (User - Identity) Visibility | Web Application Firewall - Positive Protection model Virtual Private Network - IPSec, L2TP, PPTP SSL VPN -TCP&UDPTunneling Instant Messaging (IM) Management -Yahoo and Windows Live Messenger WirelessWAN -USBport 3G/4G and Wimax Support Bandwidth Management - Application and User Identity based Bandwidth Management User Identity and Group Based Controls -Access time restriction Networking - Failover - Automated Failover/Failback, Multi-WAN failover, 3GModem failover High Availability - Active-Active | Administration & System Management -Web-based configuration wizard User Authentication - Internal database Logging/Monitoring - Graphical real-time and historical monitoring Logging/Monitoring - IntegratedWeb-based Reporting tool IPSecVPNClient** - Inter-operability with major IPSecVPNGateways Certification - ICSAFirewall - Corporate
Compliance -CE
Power
Environmental
|