Small Office Firewall Appliance

- 00.53

photo src: www.cyberoam.com

Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, with presence in more than 125 countries. The company offers User Identity-based network security in its Firewalls/ Unified Threat Management appliances, allowing visibility and granular control into users' activities in business networks. For SOHO, SMB and large enterprise networks, this ensures security built around the network user for protection against APTs, insider threats, malware, hacker, and other sophisticated network attacks.

Cyberoam has sales offices in North America, EMEA and APAC. The company has its customer support and development centers in India and has 550+ employees across the globe. It has a channel-centric approach for its sales with a global network of 4500+ partners. The company also conducts training programs for its customers and partners.


Cisco ASA 5505 - Adaptive Security Appliance - Firewall - UTM ...
photo src: www.ebay.com


Maps, Directions, and Place Reviews



Product Overview

Cyberoam's product range offers network security solution (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam NetGenie for home and small office networks.

Cyberoam network security appliances include multiple features like Firewall - VPN (SSL VPN & IPSec), Gateway Anti-Virus, Anti-Spyware & Anti-Spam, Intrusion Prevention System (IPS), Content & Application Filtering, Web Application Firewall, Application Visibility & Control, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover, over a single platform.

Cyberoam offers visibility and control over 2000+ key applications. It offers complete visibility on which applications are being accessed within the organization and by which user, irrespective of their ports and protocols. This stops sophisticated application-layer threats right at the network perimeter, ensuring Application Security. Granular controls over applications ensure QoS of critical applications.

Cyberoam UTM's on-appliance reporting gives details on every type of attack, vector, attacker details, victim details and also graphically represents the general security trends in organization. Cyberoam solutions aid the compliance regulatory needs of organizations.


Small Office Firewall Appliance Video



Certifications

Common Criteria EAL4+ Certifications

Cyberoam's firewall technology is EAL4+ certified. EAL4+ certification for a security product such as a Firewall requires in-depth evaluation from an independent third-party test lab and is globally regarded a decisive measure of the quality for security product.

ISO 20000:2011 Certification for Support services

Cyberoam GSMC is global ISO 20000: 2011 certified, for the post sales technical services for its global customers.

Checkmark Certification

The Cyberoam CR Series is UTM Level 5 Checkmark certified.

ICSA Labs Certified Firewall

Cyberoam Firewall is certified by the ICSA Labs Firewall Certification. The ICSA Labs Firewall certification demands required by ICSA Labs, an independent division of Cybertrust, validating Cyberoam's firewall capabilities in effectively protecting customers' networks from malicious Internet threats.

IPv6 Ready certification

Cyberoam is 'IPv6 Ready' certified, as it can identify and process IPv6 traffic. The IPv6 Ready Logo program driven by the IPv6 Forum is an international testing program that has some 3000 test cases through which a product is rigorously tested.


Cisco ASA 5505 - Adaptive Security Appliance - Firewall - UTM ...
photo src: www.ebay.com


Identity based Security- Layer 8 Technology

Cyberoam's patented Layer 8 Technology also known as Identity based Security, adds an 8th Layer (HUMAN layer) in the network protocol stack, thereby considering user's identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing & auditing (AAA), the network allowing a network administrator to see and control the 'user' on a network instead of just an IP address. This enables the administrators to identify users, control Internet activity of users in the network, set user based policies and reporting by username.


Cisco Small Business Online Device Emulators | Cisco Support Community
photo src: supportforums.cisco.com


Cyberoam Security Training Academy

Cyberoam Launched a global mission to sign up academies to bridge the demand-supply gap in network security recently called Cyberoam Academy.

In order to propagate knowledge on Identity-based technology among upcoming IT and networking students, Cyberoam has tied up with NESCOT (North East Surrey College of Technology) -its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which includes basic-level course namely 'CCNSP' (Cyberoam Certified Security Professional) and advanced-level course namely 'CCNSE' (Cyberoam Certified Security Expert).


3000 Security Appliances | Check Point Software
photo src: www.checkpoint.com


Cyberoam Threat Research Labs

Cyberoam Threat Research Labs (CTRL) identifies security threats eventually raising resistance against various vulnerabilities such as malware attacks by publishing security upgrades and research reports. Such reports help users remain protected with detailed guidance and malware threat prevention advice using appropriate configuration of parameters on Cyberoam appliances. CTRL goes beyond finding emerging potential threats and aims at providing insightful investigation into how advanced threats are engineered and imagined around today's internet usage and apps.


Amazon.com: CUJO Smart Internet Security Firewall (180-Day Free ...
photo src: www.amazon.com


Security flaw in HTTPS traffic inspection

A Tor Project researcher and a Google software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default. This made it possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device - or, indeed, to extract the key from the device and import it into other DPI deep packet inspection devices, and use those for interception.

Cyberoam issued an over-the-air (OTA) update for its unified threat management (UTM) appliances in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks. After the hotfix was applied, each individual appliance was required to have its unique CA certificate.

Source of the article : Wikipedia



EmoticonEmoticon

 

Start typing and press Enter to search