en tr


Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats. Cyberoam's Layer 8 Technology treats user identity as the 8th layer or the human layer in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security. Cyberoam's Layer 8 security binds with Layer 2 to Layer 7 giving better security controls over the network and offers Layer 8 Identity-based security over AAA (User Authentication, Service Authorization, Audit with logs /reports).

Features Feature Description Benefits
.Human Layer 8 Identity-based Security .Firewall with Identity-based policy creation
.Access Control Criteria (ACC) - User - Identity, Source & Destination Zone, MAC and IP address, Service
.Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
.User identity-based decision making prevents errors associated with IP address-based policies
.Simplifies audit requirements with instant user identification
.FUSION Technology .Policy creation for multiple security features through single interface in firewalls
.Firewalls well-integrated with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management
.Blends Security, Connectivity, Productivity
.Provides integrated perimeter security
.Thin Client Support .Thin client authentication with session IDs
.Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
.Identity-based policies in thin client environment
.Supports SaaS deployments and Cloud environment
.Enterprise-Grade Security .Firewall with High Availability with stateful failover
.Multiple Security Zones
.Firewall appliance offering Dynamic Routing
.VLAN support
.Virtual host capability
.Multi-core technology allows high-speed parallel processing
.ICSA-certified firewalls
.Checkmark Level 5 Certified
.Faster up-times, reduced latency, simplified configuration, supports rapid network growth
.Supports creation of work profile-based groups across distributed locations
.Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
.Supports applications that work on real-time updates like stock updates for financial institutions
.High throughput
.Centralized Management
.Centralized Security with CCC
.Simplified security management
.Logging & Reporting
.Layer 8 Identity-based Reporting
.Firewall logs
.Centralized logging and reporting with Cyberoam iView and CCC
.Meets compliance requirements for CIPA, HIPAA, PCI DSS