Cyberoam CR10iNG Unified Threat Management

Rating:
0%
In stock
Part Code :
CR10iNG
$10.00

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices.



Product: Cyberoam CR10iNG Unified Threat Management are being added to cart ...
x
x
Product: Cyberoam CR10iNG Unified Threat Management was added to cart.

    • Customized Solution

      Want any customized solution?
        Contact Us

  • Complete Logistic Solutions

    We provide complete service
    for logistic management.

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices.
The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment.
This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.
With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack.
It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address.
Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations.

  • Security
  • Connectivity
  • Productivity

Stateful Inspection Firewall
- Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based
Access Control Policy
- Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application
Filtering, Anti-virus, Anti-spam and QoS
- Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway
Specific NAT Policy
- H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention

Part Code:

CR10iNG

Write Your Own Review

You're reviewing:Cyberoam CR10iNG Unified Threat Management
Your Rating *
1 star 2 star 3 star 4 star 5 star
Quality