CYBEROAM IDENTITY-BASED APPLIANCES DELIVER BREAKTHROUGH PERFORMANCE WITH SOFTWARE OPTIMIZATION OVER MULTI-CORE PROCESSORS
Cyberoam First to Market with Identity-Based Multi-Core Technology with High Performance and Dynamic Security Against Emerging and Existing Threats
Newburyport, MA, April 2, 2008
Cyberoam, a division of Elitecore Technologies and the leading innovator of identity-based Unified Threat Management solutions, today announces high performance enhancements to its powerful CR product line with the use of multi-core processors. With high throughput and price efficiencies derived out of innovative multi-core optimized software, Cyberoam UTM appliances offer granular and comprehensive security in addition to high performance, ensuring that organizations receive optimum network security against emerging and existing threats without impacting the bottom line.
With these latest enhancements, the new Cyberoam UTM appliances now run on dual core to dual-quad core processors. Coupled with innovative software design that leverages the power of multi-core architecture, Cyberoam provides unprecedented throughputs beyond 3 Gbps of IPS and 600 Mbps of UTM throughput over HTTP unlike competitive solutions that publish UDP throughput figures. Cyberoam’s best-of-breed multi-core UTM now offers increased granular network visibility in a single, highly-scalable appliance to provide enterprise-level security without increasing capital and operating expenses. The multi-core appliances coupled with Cyberoam’s software innovations allow for parallel processing of security operations, resulting in a high-speed, low-latency solution.
“Organizations of all sizes and IT budgets demand best-of-breed network security solutions to keep their employees and infrastructure protected 24×7, which is why we are happy to announce that the move to multi-core processors has enabled us to deliver high performance without impacting our price point,” says Abhilash Sonwane, Vice President, Product Management, Cyberoam. “These latest enhancements demonstrate our continued commitment to improving our unique identity-based solutions, and provide us with a stronger platform for future innovations that will enable our customers to respond to any dynamic threat scenario.”
As user-targeted threats proliferate and compliance requirements rise, having truly granular visibility into the network security picture has become necessary – which is best delivered via an identity-based approach. This approach coupled with these latest enhancements enables Cyberoam to provide customers with a powerful yet cost-effective solution for fighting both emerging and existing threats no matter how dynamic the threat landscape is.
Cyberoam delivers a robust network security strategy that reaches far beyond the capabilities of traditional hardware-accelerated security solutions that are restricted in delivering the modifications required to defend against emerging threats. Unlike the static hard-wired nature of hardware acceleration, Cyberoam’s software-optimized multi-core security delivers continually updated security with high performance updates that are based on continuous software development, which is highly flexible in nature.
Cyberoam’s award winning CRi UTM product line provides customers with a robust set of security features including all the standard UTM functionality, including Firewall, VPN, Gateway Anti-Virus and Anti-Spyware, Gateway Anti-Spam, Intrusion Prevention System, and URL/Web Content Filtering, all of which are Identity-based. In addition, and at no extra cost, the Cyberoam CRi series includes Bandwidth Management with Multiple Link Management – all over a single platform. Unlike conventional UTM solutions that bind security to IP addresses, Cyberoam’s identity-based UTM security appliances deliver real-time network protection against evolving Internet threats through unique user-based policies, attaching individual user identity to policy control.
Cyberoam is unveiling its powerful enhanced appliances at the RSA Conference 2008 in San Francisco. To learn more about Cyberoam’s software driven multi-core enhancements and how it delivers its patent-pending identity-based network security that handles user-targeted threats, visit Cyberoam at RSA – Booth 345.
Members of the press interested in reviewing Cyberoam’s identity-based UTM security appliances are invited to contact Rebecca Paquette at email@example.com. Press from India, EMEA and APAC countries are requested to contact L. K. Pathak at firstname.lastname@example.org.
Cyberoam identity-based UTM appliances offer comprehensive protection against existing and emerging Internet threats, including viruses, worms, Trojans, spyware, phishing, pharming and more. Cyberoam identity-based solutions provide the complete range of security features expected in a traditional UTM platform such as Stateful Inspection Firewall, VPN, Gateway Anti-Virus, Gateway Anti-Spyware, Gateway Anti-Spam, Intrusion Prevention System, URL/Web Content Filtering in addition to Bandwidth Management and Multiple Link Management over a single platform. Cyberoam solutions are certified by the West Coast Labs with CheckMark UTM Level 5 Certification, ICSA Labs, an independent division of Verizon Business, and the Virtual Private Network Consortium. Cyberoam has also received the 2007 Global Excellence Awards for Integrated Security Appliance, Security Solution for Education and Unified Security, and the 2007 Tomorrow’s Technology Today Award for Unified Security. Cyberoam has offices in India, Newburyport, MA and Asia-Pacific. For more information, please visit www.cyberoam.com
India, EMEA, APAC
L. K. Pathak
Elitecore Technologies Ltd.
VP Sales – India,
VP – New Business Development