UTM

Overview

Sophos Unified Threat Management hardware appliances comes with complete security for all kind of organizations, whether it is large Enterprise or the small one. Layer 8 Identity-based platform integrated with many other security features make security simple as well as effective. Security Architecture (ESA) and multi-core technology are able to resist future threats for the security of organizations.

Gigabit Firewall Throughputs

The NG ‘s Firewall and UTM throughputs are the best in the market. The basic NG series model contains Gigabit Firewall throughputs.

Powerful Hardware

The NG’s powerful hardware consists of Gigahertz processors, Gigabit Ethernet ports and high port density set NG apart from competitors. Next-generation memory and more storage capacity and appliance design cause tremendous performance.

FleXi Ports (XP)

The NG’s FleXi Ports offer flexible network connectivity with I/O slots that let organizations to upgrade to new technology with easy and cost efficient way by allowing additional Copper/Fiber 1G/10G ports on the same security appliance. Reduced network complexity, power efficiency and reduced operational costs are some of the benefits which is provided by the FleXi ports.

Wi-Fi Security

Security is provided over Wi-Fi with a huge range of Wi-Fi which reduces TCO to organizations by combining features of Cyberoam’s complete set of UTM and a router. The appliances provide excellent visibility over each user activity in the Wi-Fi network by offering Layer 8 Identity-based security.

Features Details

The Cyberoam UTM & NG Series offers next-generation security features to provide complete network security solution with advance feature.

Advanced Application Controls

The Application Visibility & Control feature of Cyberoam allows prioritization of applications on the basis of time, User Identity, bandwidth and applications, with high flexibility and real L2-L8 control & visibility. Applications are classified by advanced application controls on the basis of their level of risk, technology and characteristics by offering even more granular controls.

The administrator’s manual intervention need is reduced to great extent through the pro-active protection model to tailor and update the policy for those new applications that are being included in the list.

On-appliance Web Application Firewall

The web servers and Web applications are protected by the Web Application Firewall from hackers and other OWASP Top 10 Web application vulnerabilities, with no need to capitalize in a separate WAF appliance.

FleXi Ports (XP)

Now you can enjoy flexible connectivity of network options and freedom of configuration to organizations, with flexible I/O slots that allow supplementary Fiber 1G/10G, Copper 1G ports in the same security appliance by Flexi Ports.

Support for new Connectivity Technologies

Cyberoam turns organizations ready for full of speed future over Wireless WAN to support new connectivity technologies like 4G /LTE. It comes with ease of deploying with a simple USB modem plug-in into Cyberoam appliance. It ensures organizations about business connectivity with automatic failover to3G / 4G / WiMAX connection, and VPN connection over 3G / 4G / WiMax.

First of its Kind On-appliance Reporting

With real time logs and reports, Cyberoam has been enjoying the status of being the only vendor in the industry to offer “On-appliance reporting”. There are 1200+ in depth reports which help to manage security, meet compliance requirement and forensic analysis, real time visibility into network and user activities etc. it also contains animated and dynamic reports, country maps and in-line graphs which make Cyberoam matchless by any network security vendor.

Layer 8 Identity-based Security

User identity is treated by the Layer 8 technology of Cyberoam as the 8th layer or the “human layer” in the network protocol stack. This technology enables administrator to not only identify the user but control his internet activity and configure policy setting, adding speed to security etc. It crunches with Layer 2 to Layer 7 resulting in better security controls over the network. Layer-8 identity based security over AAA (service authorization, user authentication and audit with logs/reports) is offered too.

Advanced Threat Protection

NG Series of Cyberoam offers the best class security of Gateway Anti-Virus/Anti-Spyware, Intrusion Prevention System, Gateway Anti-Spam, outbound spam protection and Web & Content Filtering to offer protection against newly emerging threats.

FUSION Technology-Driven SI Firewall

Hardware firewall of Cyberoam provides deep network packet inspection, user identity & application based security. The exclusive FUSION Technology permits policy formation different security features by single firewall interface, connectivity and productivity benefits for networks and blending security.

Virtual Private Network

In order to assure secure endpoints and network with its Threat-free Tunneling technology, Cyberoam VPN (IPsec and SSL) comes with safe remote access.