Cyberoam CR100iNG Unified Threat Management

Rating:
0%
In stock
Part Code :
CR100iNG
$10.00

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features along with performance required for future networks.
The NG series for SMEs are the “fastest UTMs” made for this segment.



Product: Cyberoam CR100iNG Unified Threat Management are being added to cart ...
x
x
Product: Cyberoam CR100iNG Unified Threat Management was added to cart.

    • Customized Solution

      Want any customized solution?
        Contact Us

  • Complete Logistic Solutions

    We provide complete service
    for logistic management.

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features along with performance required for future networks.
The NG series for SMEs are the “fastest UTMs” made for this segment.
The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment.
This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security to SMEs.
With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity.
The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack.
It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address.
Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations.

  • Security
  • Connectivity
  • Productivity

Stateful Inspection Firewall
- Layer 8 (User - Identity) Firewall
- Multiple Security Zones
- Location-aware and Device-aware Identity-based Access Control Policy
- Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service
- Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS
- Country-based Traffic Control
- Access Scheduling
- Policy based Source and Destination NAT, Gateway Specific NAT Policy
- H.323, SIP NAT Traversal
- DoS and DDoS attack prevention
- MAC and IP-MAC filtering
- Spoof Prevention
Intrusion Prevention System
- Signatures: Default (4500+), Custom
- IPS Policies: Pre-configured Zone-based multiple policies, Custom
- Filter based selection: Category, Severity, Platform and Target (Client/Server)
- IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session
- User-based policy creation
- Automatic signature updates via Cyberoam Threat Research Labs
- Protocol Anomaly Detection
- SCADA-aware IPS with pre-defined category for ICS and SCADA signatures

Part Code:

CR100iNG

Write Your Own Review

You're reviewing:Cyberoam CR100iNG Unified Threat Management
Your Rating *
1 star 2 star 3 star 4 star 5 star
Quality