Cyberoam CR15i Unified Threat Management

Rating:
0%
In stock
Part Code :
CR15i
$10.00

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.



Product: Cyberoam CR15i Unified Threat Management are being added to cart ...
x
x
Product: Cyberoam CR15i Unified Threat Management was added to cart.

    • Customized Solution

      Want any customized solution?
        Contact Us

  • Complete Logistic Solutions

    We provide complete service
    for logistic management.

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack.
It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses.
This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security.
Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

  • Security
  • Connectivity
  • Productivity

Stateful Inspection Firewall
- Layer 8 (User - Identity) Firewall
- Multiple Security Zones
- Access Control Criteria (ACC) - User - Identity, Source & Destination Zone, MAC and IP address, Service
- UTM policies - IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
- Layer 7 (Application) Control & Visibility -Access Scheduling
- Policy based Source & Destination NAT
- H.323, SIP NATTraversal
- 802.1q VLAN Support
- DoS & DDoS attack prevention
- MAC & IP-MAC filtering and Spoof prevention
GatewayAnti-Virus &Anti-Spyware
- Virus, Worm, Trojan Detection & Removal
- Spyware, Malware, Phishing protection
-Automatic virus signature database update
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
- Customize individual user scanning
- Scan and deliver by file size
- Block by file types
-Add disclaimer/signature

Part Code:

CR15i

Write Your Own Review

You're reviewing:Cyberoam CR15i Unified Threat Management
Your Rating *
1 star 2 star 3 star 4 star 5 star
Quality