logo
Firewall security extended to Layer 8
Hardware Firewalls
Cyberoam Firewall is available as a Next-Generation Firewall and UTM firewall. It offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.

Cyberoam’s patent pending, Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all features, providing ease of management and high security with flexibility.

Feature Feature Description Benefit
Human Layer 8 Identity-based Security
Firewall with Identity-based policy creation
 
Access Control Criteria (ACC) - User-Identity, Source & Destination Zone, MAC and IP address, Service
 
 
Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
 
 
 
User identity-based decision making prevents errors associated with IP address-based policies
 
 
 
Simplifies audit requirements with instant user identification
 
FUSION Technology
Policy creation for multiple security features through single interface in firewalls
 
 
Firewalls well-integrated with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management
 
 
Blends Security, Connectivity, Productivity
 
 
Provides integrated perimeter security
 
Thin Client Support
Thin client authentication with session IDs
   
Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
 
   
Identity-based policies in thin client environment
Supports SaaS deployments and Cloud environment
 
Enterprise-Grade Security
Firewall with High Availability with stateful failover
 
Available as Next-Generation Firewalls and UTMs
 
Multiple Security Zones
 
Firewall appliance offering Dynamic Routing
 
VLAN support
 
Virtual host capability
 
Multi-casting
 
Multi-core technology allows high-speed parallel processing
 
ICSA-certified firewalls
 
Checkmark Level 5 Certified
Faster up-times, reduced latency, simplified configuration, supports rapid network growth
 
 
 
Supports creation of work profile-based groups across distributed locations
 
 
 
 
Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
 
 
 
 
Supports applications that work on real-time updates like stock updates for financial institutions
 
 
 
High throughput
Centralized Management
Centralized Security with CCC
Simplified security management
Logging & Reporting
Layer 8 Identity-based Reporting
 
Firewall logs
 
Centralized logging and reporting with Cyberoam iView and CCC
 
Meets compliance requirements for CIPA, HIPAA, PCI DSS
 
Products we offer



Whitepapers

Case Studies