Overview
Product
Features
Cyberoam vs. Competition

Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective. Cyberoam’s Extensible Security Architecture (ESA) and multi-core technology carry the ability to combat future threats for organizations’ security.

Cyberoam’s NG series UTM appliances offer future-ready security with best-in-class hardware, along with software to match, to offer up to 5 times the industry average throughputs, making them the “fastest UTM appliances” for SOHO/ SMB segments. The FleXi Ports (XP) available in NG Series appliances starting with CR200iNG-XP offer organizations the network flexibility and configuration freedom with I/O slots that allow choice of Copper GbE and Fiber 1GbE/10GbE network connectivity.

NG SERIES : FUTURE-READY SECURITY

Gigabit Firewall Throughputs
The NG series appliances deliver the best in class Firewall and UTM throughputs.

  

Powerful Hardware
The NG series appliances come with a powerful hardware consisting of Gigahertz processors for nano second security processing along with Gigabit Ethernet ports and high port density. A complete overhaul of the appliance design has resulted into an unmatched performance gain with next-generation memory and more storage capacity.

FleXi Ports (XP)
The FleXi Ports in NG Series appliances offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing organizations to upgrade to new technologies easily and cost-effectively, making them future-ready. The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency, reduced network complexity and reduced operational costs.

Wi-Fi security
Cyberoam offers security over Wi-Fi with its Wi-Fi range of appliances that combine the features of a router and Cyberoam’s complete set of UTM features, offering reduced TCO to organizations. The appliances offer Layer 8 Identity-based security, allowing administrators to apply identity-based security policies to gain visibility over user activity in the Wi-Fi network. The appliances come with an in-built wireless access point featuring 802.11 n/b/g standards, MIMO technology and up to eight virtual access points.

The all-new Firmware – CyberoamOS
The NG series appliances are based on CyberoamOS– the most intelligent and powerful Cyberoam firmware till date. The new firmware tightly integrates with the hardware for network and crypto acceleration to deliver high performance. The CyberoamOS also extracts the highest level of performance from a multi-core platform, along with offering minimum latency and improved processing speed with use of optimized Interrupt Rates and Fast Path technology. Its next-generation security features offer protection against newly evolving threats.

Cyberoam NG Series
Cyberoam ia Series

The NG Series appliances offer future-ready security to:
UTM appliances for SOHO – ROBO Segment


CR10iNG
Datasheet | Image

CR10wiNG
Datasheet | Image

CR15iNG
Datasheet | Image

CR15wiNG
Datasheet | Image

CR25iNG
Datasheet | Image

CR25wiNG
Datasheet | Image

CR35iNG
Datasheet | Image

CR35wiNG
Datasheet | Image


UTM appliances for Small to Medium Enterprises


CR50iNG:
Datasheet | Image

CR100iNG:
Datasheet | Image

CR200iNG:
Datasheet | Image

CR300iNG:
Datasheet | Image

CR200iNG-XP:
(Refer FleXi Ports Modules below)
Datasheet | Image

CR300iNG-XP:
(Refer FleXi Ports Modules below)
Datasheet | Image

FleXi Ports(XP) Module Options:

Appliances for SOHO – ROBO Segment


CR15i:
Datasheet | Image

CR15wi:
Datasheet | Image

CR25ia:
Datasheet | Image

CR25wi:
Datasheet | Image

CR35ia:
Datasheet | Image

CR35wi:
Datasheet | Image


Appliances for Small to Medium Enterprises


CR50ia:
Datasheet | Image

CR100ia:
Datasheet | Image

CR200i:
Datasheet | Image

CR300i:
Datasheet | Image

The Cyberoam NG Series offers next-generation security features to organizations to protect against newly-evolving threats.

  • Advanced Application Controls
    Cyberoam’s Application Visibility & Control feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.

  • On-appliance Web Application Firewall
    The Web Application Firewall, available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance.

  • FleXi Ports (XP)
    The FleXi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.

  • Support for new Connectivity Technologies, 4G/LTE
    Cyberoam makes organizations ready for high speed future over Wireless WAN with support for new connectivity technologies – 4G /LTE. Easy to deploy with a simple USB modem plug-in into Cyberoam appliance, organizations can ensure business connectivity with automatic failover to 3G / 4G / WiMAX connection, and VPN connection over 3G / 4G / WiMax.

  • First-of-its-kind On-appliance Reporting
    Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

  • Identity-based Controls with Layer 8 Technology
    Cyberoam’s Layer 8 Technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

  • Advanced Threat Protection
    Cyberoam NG series offers best-of-breed security of Intrusion Prevention System, Gateway Anti-Virus/Anti-Spyware, Gateway Anti-Spam, Web & Content Filtering and Outbound Spam Protection to offer protection against newly evolving threats.

  • FUSION Technology-driven SI Firewall
    Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.

  • On-appliance VPN
    Cyberoam VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.

Other security features in the Cyberoam NG series appliances include Gateway Anti-Spam, Bandwidth Management, High Availability 3G/4G/WiMAX connectivity, IM Archiving & Controls, Multiple Link Management, IPv6 Ready, Traffic Discovery and Wi-Fi appliances.

CR10iNG

Throughputs in Mbps

CR15iNG

Throughputs in Mbps

CR25iNG

Throughputs in Mbps

CR35iNG

Throughputs in Mbps

CR50iNG

Throughputs in Mbps

CR100iNG

Throughputs in Mbps

CR200iNG

Throughputs in Mbps

CR300iNG

Throughputs in Mbps


Granular classification of applications
Risk Level Application Characteristics Application Technology
Very Low (1) Excessive Bandwidth Browser Based
Low (2) Prone to misuse Client Server
Medium (3) Transfer files Network Protocol
High (4) Tunnel other apps P2P
Very High (5) Widely used  
  Loss of Productivity  
  Can bypass firewall policy  
  Vulnerabilities