Product ComparisonCyberoam vs. Forefront Threat Management GatewayFeatures Comparison(Based on Datasheets)CyberoamCR ia and CR NG SeriesForefront Threat ManagementGateway 2010 *Security - Firewall, Intrusion Prevention System, Application FilteringCyberoam shieldFirewall Decision Parameters - Identity, Group, MAC and IPAddress, Services basedNumber of IPS signatures – 4500+Application Categories - 11+ e.g. Gaming, IM, P2P, ProxyBenefitsAccess to vital resources based on user’s identityProtection against internal and external intrusion attemptsProtection against Denial of Service attacksProvide business friendly environment to critical applicationsStateful Inspection Firewall Yes Not Identity basedAppliance Deployment Modes:Gateway (Route), Transparent(Bridge), Mix ModeYes Gateway Mode onlyApplication Visibility and ControlYes, IP Address and User basedcontrolYesIntrusion Prevention System(Checkmark Certified)Yes Yes (Not Certified). Not granularIdentity-Based IntrusionPrevention SystemYes, with Multiple IPS Policy Support Not Identity basedDoS and DDoS Prevention Yes YesInstant Messaging ControlIP Address and User based individualand Group control over Webcam, FileTransfer, Voice and Text ChatCommunicationBlanket controlSecurity - Web Content FilteringCyberoam Shield:82+ URL categories covering millions of websitesBenefitsURL, keyword, File type blockBlocks Malware, Phishing, Pharming URLs, Java Applets, Cookiesand Active XData leakage control via HTTP, HTTPS uploadProvides Schedule-based access controlCustom block messages per categoryIdentity- Based Web ContentFiltering (Checkmark PremiumLevel Certified)Individual user and Group based Not Identity based. Not CertifiedWeb and Content FilteringDatabase StrengthExcellent (82+ Categories)70 categories. uses MicrosoftReputation ServicesDomain Name based HTTPSFilteringYes YesPhishing Protection Yes (Blocks emails and Web traffic) YesPharming Protection Yes NoSpyware Sites Protection Yes No
Product ComparisonFeatures Comparison(Based on Datasheets)CyberoamCR ia and CR NG SeriesForefront Threat ManagementGateway 2010 *Anonymous Proxy Protection Yes NoData Leakage Prevention Yes LimitedEmbedded URL Filtering Yes NoYouTube Education Filter Yes NoSearch Engine Safe SearchEnforcementYes NoSecurity - Web Application FirewallCyberoam Shield:Positive Protection modelUnique "Intuitive Website Flow Detector" technologyBenefitsProtection against SQL Injections, Cross-site Scripting (XSS),Session Hijacking, URL Tampering, Cookie PoisoningOn-Appliance Web ApplicationFirewallYes Does not have WAFWAF ManagementWAF can be configured and managedfrom UTM interfaceDoes not have WAFPositive Protection Model withoutSignaturesYes NoIntuitive Website Flow Detector Yes NoComprehensive business logicprotectionYes NoHTTPS/SSL Inspection andOffloadingYes NoWeb Services Protection Yes NoProtection against Web Frauds Yes NoLogging and Reporting Yes NoSecurity - Anti SpamCyberoam Shield:IP Reputation FiltersRPD (Recurrent Pattern Detection) TechnologySpam Detection Rate – 98%False Positive Rate – 1 in 1 millionBenefitsBlocks 80% spam before downloading to the mail serverZero hour response to email threatsGateway Anti Spam (CheckmarkPremium Level Certified)Yes Yes (Not Certified)IP Reputation Filters Yes YesDomain White-listingYes, to customize Cyberoam emailsecurity shield as and when requiredNo, Allows only IP White-listingIdentity-Based Anti Spam Yes NoLanguage and ContentIndependent Anti Spam EngineYes NoMail Virus Outbreak Detection Yes No
Product ComparisonFeatures Comparison(Based on Datasheets)CyberoamCR ia and CR NG SeriesForefront Threat ManagementGateway 2010 *Gateway Anti Spam ProtocolsProtectedSMTP, POP3, IMAP Only SMTPHTTPS Traffic Scanned formalwareYes NoSelf Service User BasedQuarantine for Spam MailsYes NoSecurity - Anti VirusCyberoam Shield :Number of Anti Virus Signatures – 4 MillionsVirus Catch Rate – 99.5%Signature Update frequency – 30 minutesMalware scanning up to 7 compression levelsScans more than 40 types of compressed filesBenefitsScanning of Web, Email, VPN and IM trafficProtection against Virus, Worm and TrojanProtection against Spyware, Malware and PhishingCustomizable individual user scanningScan and deliver by file sizeBlock content by file typesGateway Anti Virus (CheckmarkCertified)Yes No Gateway Anti VirusIdentity Based Anti Virus Yes NoSelf Service User BasedQuarantine for Virus MailsYes NoGateway Anti Spyware(Checkmark Certified)Yes Does not have Gateway Anti SpywareGateway Anti Virus ProtocolsProtectedHTTP, HTTPS, SMTP, POP3, IMAP,FTPSupports virus scanning for emailsAppliance ManagementCyberoam Shield :Plug n play UTMInteractive customizable GUIMulti-lingual GUIRole based access controlCentralized management and upgrade supportBenefits:Reduced Opex and CapexEase of useAvailable Formats Appliance, Virtual ApplianceSoftware Only, Installs on WindowsServer 2008 SP2 or Windows Server2008 R2, Not a Security HardenedOperating System. Please refer tolimitations listEase of Use Click here for demo Online demo not availableWeb 2.0 GUI Click here for demo Online demo not availableManagement Interface Web and CLI (TELNET, SSH) Only WebAutomated Windows Single SignOnYes YesAuthentication, Authorization,AccountingLocal, Windows PDC, AD, LDAP, RSASecurID and RADIUSClear information not published
Product ComparisonFeatures Comparison(Based on Datasheets)CyberoamCR ia and CR NG SeriesForefront Threat ManagementGateway 2010 *SMS based Authentication Yes NoCentral Management and UpgradeSupportCyberoam Central Console YesSecure Remote Access- Virtual Private NetworkCyberoam Shield:VPN – IPSec, L2TP, PPTP and SSLVPN Connection RedundancyBenefits:Secure and clean VPNConnectivity anytime, anywhereIdentity Based VPN Yes Does not support SSL VPNCheckmark Certified VPN Yes Not CertifiedXAUTH Support For VPNLocal, Windows PDC, AD, LDAP, RSASecurID and RadiusNoVPNC Basic and AES Certified VPNGatewayYes NoVPN Connection Fail-Over Yes NoResource Monitoring and Management – Bandwidth ManagementCyberoam Shield:Application, Web Category and User Identity based BandwidthManagementGuaranteed & Burst-able bandwidth policyApplication & User Identity based Traffic DiscoveryBenefits:Increased productivityMonitoring and controlling of bandwidth usageGranular Bandwidth ManagementIP Address, User, Web Category,Application, Application CategorybasedDoes not support User, Applicationand Web Category based bandwidthmanagementBandwidth (Data Transfer) Quota Yes NoConnectivity – Load Balancing, High Availability and NetworkingCyberoam Shield:Failover - Automated Failover/Failback, Multi-WAN failover3G, 4G Modem failoverWRR based Load balancingIPv6 Ready Gold LogoBenefits:Uninterrupted business connectivityLoad balancing for ‘n’ number of links, based on ports availabilityReady to handle next generation network trafficServer Load Balancing Yes NoMultiple ISP Load BalancingYes, number of links depends onnumber of ports available onapplianceEnterprise edition supports NetworkLoad balancing
Product ComparisonFeatures Comparison(Based on Datasheets)CyberoamCR ia and CR NG SeriesForefront Threat ManagementGateway 2010 *Rule based ISP Gateway Fail-Over Multiple rules and protocol supported NoHigh Availability Active-Passive / Active-ActiveYes. Further Information notpublishedDynamic Routing RIPv1, RIPv2, OSPF, BGP No802.1q VLAN Tagging Yes NoVLAN over WAN Yes No3G, 4G and Wimax (WWAN)SupportYes YesSecurity over WiFi (WLAN) Yes NoVisibility – Logging and ReportingCyberoam Shield:1000+ Reports45+ Compliance ReportsMultiple format support – Graphical and TabularExportable Formats - PDF and MS ExcelMultiple DashboardsReport SchedulingBenefitsComplete visibility of network, resources and usersOn-Appliance ReportingYes, Web Based Report Engine, Noextra costLimitedComplimentary to Compliance HIPAA, GLBA, SOX, PCI, FISMA NoSyslog Support Yes up to 5 syslogs NoExternal ReportingIndigenously Designed Logging andReporting Solution - Cyberoam iViewwhich provides In-depth logging andreporting for multiple devices apartfrom Cyberoam Open Source CyberoamiView Cyberoam iView ApplianceExternal Logging, Logs may be sentto a Microsoft SQL Server located onthe internal networkComprehensive user wise blendedreportingYes Logging onlyInstant Messenger Logging andReportingIP Address and User based individualand Group Logging and Reporting ofWebcam usage, File Transfer, Voiceusage and Text Chat CommunicationNoMulti WAN bandwidth reporting Yes NoHTTP Upload Report Yes NoExtensive Logging and Log Viewer Yes Supports real time log viewData transfer reporting Yes NoApplication Traffic Discovery IP Address and User based NoTransparent Mail activity reportingSends one copy of the email on apreconfigured email address forarchiving and forensic analysispurposeNo.0304-06/12/2012
Product ComparisonCyberoam Certifications and AwardsSource of Informationwww.cyberoam.comhttp://technet.microsoft.com/en-us/forefront/ee807302.aspxhttp://technet.microsoft.com/en-us/library/dd441054.aspxhttp://technet.microsoft.com/en-us/library/ee796231.aspx#rth54ghOn Sept. 12, 2012, Microsoft announced the discontinuation of Forefront Threat Management Gateway(TMG) 2010.
Product ComparisonDisclaimerThis comparison is based on our interpretation of the publicly available information as on date of preparing this comparison. The features / characteristics of thesubject product under comparison, which may have direct impact on the accuracy and / or validity of this comparison, are likely to change without prior notice.The information contained in this comparison is and intended to provide broad consumer understanding and knowledge of factual information of variousproducts. This comparison is merely our opinion / interpretation, which may be subject to further modification / rectification in future in case of receipt of anyfact / information regarding the subject products under comparison. People using information should also research original sources of information and shouldnot rely only upon this comparison while selecting any product. This comparison is not exhaustive and may not be accurate. Cyberoam Technologies Pvt. Ltdmakes no warranty as to the reliability, accuracy, usefulness, or completeness of the comparison. The materials / information in this comparison are provided"as is" and without warranties of any kind either expressed or implied. To the fullest extent permissible pursuant to applicable law, Cyberoam Technologies Pvt.Ltd disclaims all warranties of accuracy or otherwise in respect of the comparison. Cyberoam Technologies Pvt. Ltd does not warrant or make no representationsregarding the use of or the result of the use of the comparison in terms of their correctness, accuracy, reliability, or otherwise. Cyberoam Technologies Pvt. Ltdretains the right to revise these rules / conditions at any time. This document is confidential and intended for private circulation only.