Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices.
Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks.
The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices.
The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment.
This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.
With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. .
The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack.
It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address.
Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations
Stateful Inspection Firewall
- Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based
Access Control Policy
- Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention
Intrusion Prevention System
- Signatures: Default (4500+), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat
- Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures