Techsheet – Cyberoam Product Rang
Cyberoam offers Next-Generation security along with high performance to SOHO, SMEs and Enterprise networks with its Next-Generation Firewalls and UTM appliances. Cyberoam
moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution,
Cyberoam Central Console (CCC), and its centralized visibility solution, Cyberoam iView. These future-ready security solutions are available for both physical and virtual networks.
Cyberoam Products Portfolio
Cyberoam Network Security Appliances
CyberoamOS
– The Security-Hardened Operating System
Extensible Security Architecture
– Agility to prolong the life and performance of its NGFW appliances
– Supports newer enterprise security features and enhancements
Stateful Inspection Firewall
– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) : User-Identity, Source and
Destination Zone, MAC and IP address, Service
Intrusion Prevention System
– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
– SCADA-aware IPS with pre-defined category for ICS and SCADA
signatures
Web Filtering
– On-Cloud Web Categorization
– Web Categories: Default(89+), Custom
– Protocols supported: HTTP, HTTPS
Application Filtering
– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility
– Control over 2,000+ Applications, classified in 21 Categories
– Filter based selection: Category, Risk Level, Characteristics and
Technology
– Securing SCADA Networks
– SCADA/ICS Signature-based Filtering for Protocols
– Modbus, DNP3, IEC, Bacnet etc
– Control various Commands and Functions
1 Web Application Firewall
– Positive Protection model
– Unique “Intuitive Website Flow Detector” technology
– Protection against SQL Injections, Cross-site Scripting (XSS),
Session Hijacking, URL Tampering, Cookie Poisoning etc
* High Availability
– Active-Active and Active-Passive
– Stateful Failover
Bandwidth Management
– Application and User Identity based Bandwidth Management
– Category-based Bandwidth restriction
Networking
– Automated Failover/Failback, Multi-WAN
– WRR based Load balancing
– Dynamic Routing: RIP v1&v2, OSPF, BGP, PIM-SM, Multicast
Forwarding
Wireless WAN
– USB port 3G/4G and WiMax Support
– Primary WAN link
– WAN Backup link
Virtual Private Network
– IPSec, L2TP, PPTP
– Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
– Authentication: Preshared key, Digital certificates
# IPSec VPN Client
– Inter-operability with major IPSec VPN Gateways
– Supported platforms: Windows 2000, WinXP 32/64-bit, Windows
2003 32-bit, Windows 2008 32/64-bit, Windows Vista 3 2/64-
bit, Windows 7 RC1 32/64-bit, Windows 8 RC1 32/64-bit
SSL VPN
– TCP & UDP Tunneling
– Authentication – Active Directory, LDAP, R ADIUS, Cyberoam
(Local)
– TCP-based Application Access – HTTP, HTTPS, RDP, TELNET, SSH
Administration and System Management
– Web-based configuration wizard
– Command line interface (Serial, SSH, Telnet)
– SNMP (v1, v2c)
User Authentication
– Internal database
– AD Integration with support for OU-based Security Policies
– Automatic Windows Single Sign On
– External LDAP/DAPS/RADIUS database Integration
2 On-Appliance Cyberoam – iView Reporting
– Integrated Web-based Reporting tool
– 1,200+ drill-down reports
– Compliance reports – HIPAA, GLBA, SOX, PCI, FISMA
– Historical and Real-time report
– Reports – Application, Internet & Web Usage, Mail Usage, Attacks,
Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high
risk users and more
– Supports 3rd party PSA Solution – ConnectWise
Logging and Monitoring
– Graphical real-time and historical Monitoring
– Log Viewer – IPS, Web filter, WAF, Anti-Virus, Anti-Spam,
Authentication, System and Admin Events
Gateway Anti-Virus & Anti-Spyware
– Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels
3 – Self Service Quarantine area
Gateway Anti-Spam
4 – Inbound, Outbound Scanning
– Real-time Blacklist (RBL), MIME header check
5 – Self Service Quarantine area
Certification
6 – Common Criteria – EAL4+
– ICSA Firewall – Corporate
– Checkmark UTM Level 5 Certification
– VPNC – Basic and AES interoperability
– IPv6 Ready Gold Logo
Cyberoam Virtual Appliance advantages
– Supported Virtualization Platforms: VMware, Microsoft Hyper-V,
KVM and Citrix XenServer
– Protects virtual data-centers, “Security-in-a-Box”, and “Office-in-a-
Box” set-ups
– Scans traffic within virtual networks, protecting hypervisor
management console, hypervisor & Guest OS, securing zero trust
networksa
Centralized Security Management with Cyberoam Central Console (CCC)
Centralized Remote Management
Configure and Manage
– Individual Appliances
– Appliance Groups
Global Policy Enforcement
– Firewall
– Network configuration
– Web Filter
– Application Filter
– QoS Policy
– IPS
– Anti Virus, Anti Spam
– Web Application Firewall
– Logs & Reports
– VPN
– User, User Groups and Guest Users
and more…
Configuration Management
– Template-based configuration
– Configuration Synchronization
– Backup and Restore
Appliance Monitoring & Alerts
– Dashboard for Appliance Group, Individual
Appliance
– Appliance Monitor Graph
– Email Alerts
Centralized logging
– Audit and System log
Upgrade Distribution Service
– Security Upgrades
– AV, IPS & Application Signatures
– Web Filtering Categories
– CyberoamOS Firmware Updates
Administration
– Role-based Granular control over
Appliance and Appliance Groups
– Health Monitoring: CCC, Managed
Appliances
Communication
– Secure Encryption
– Mutual Authentication
– HTTP, HTTPS, Syslog & Secure Syslog
System Management
– Web Based User Interface
– Command Line Interface
Compliance
– CE, FCC, UL, RoHS
Centralized Visibility across Networks with Cyberoam iView*
Logs
– Real-time/Archived logs
– Log storage (Backup/restore)
– Audit logs Categories – Mail, User, Device,
Application, Views, Data, Archive, Report
Reports
– 1,200+ drilldown Reports
– Compliance Reports – HIPAA, SOX, FISMA,
GLBA, PCI
Administration
– Web based Management Console
– Role-based administration
– Multiple Dashboards – Resource, Device,
User, Host, Email Address
– Device Grouping – Device type & models
Supported Web Browsers
– Microsoft Internet Explorer 8.0+
– Mozilla Firefox 3.0+ (Best view)
– User and Group based Reports
– Internet Usage Reports – Data Transfer,
Surfing Time, Client Type
– Security Reports – Firewall, Attacks, Spam,
Virus, Blocked Attempts, WAF
– Remote Access Reports
– Exportable formats – PDF, Excel
– Email Alerts/automated Report Scheduling
Operating Environment
– Hardened Linux OS
Supported Network and Security
Devices
– Custom/Proprietary devices including UTMs
– Proxy Firewalls, Access Gateway
– Smart Wireless Router
– Endpoint Security Solution
– Syslog-compatible devices
1 دیدگاه. ارسال دیدگاه جدید
سلام، این یک دیدگاه است.
برای شروع مدیریت، ویرایش و پاک کردن دیدگاهها، لطفا بخش دیدگاهها در پیشخوان را ببینید.
تصاویر نویسندگان دیدگاه از Gravatar گرفته میشود.