SlideShare a Scribd company logo
1 of 4
Download to read offline
Business networks are in rapid flux today. IT trends like
superfast Internet speeds, device explosion, movement
of critical business applications to Cloud and explosion of
Internet applications are fast setting in, and SOHO /SMBs
will not remain isolated from these trends. The
SOHO/SMB networks are today moving towards Gigabit
network infrastructure and high Internet speeds.
However, lack of security solutions supporting these
trends is resulting in security becoming a bottleneck in
these networks. To cope up, they will either have to
expand their security budgets to buy enterprise-level
security or buy a future-ready security solution.
The Cyberoam NG series offers future-ready security to
SOHO/SMBs and branch offices through its enterprise-
grade security features, gigabit ports and the best
industry throughputs for this segment. The NG series
appliances come with best-in-class hardware, along with
software to match, to offer up to 5 times the average
industry throughputs, making them the “fastest UTM
appliances” for SOHO/ SMB segments.
Cyberoam for SOHO/SMBsNG Series
The “fastest UTM appliances”
for this segment
www.cyberoam.com
Future-Ready Security.
NG SERIES
FUTURE-READY SECURITY
Gigabit Firewall Throughputs
Powerful Hardware
FleXi Ports
Value for Money
All-new firmware- CyberoamOS
Future-Ready
Security
Future-Ready
Security
Powerful Hardware & Superior Quality
The NG series appliances allow nano second security
processing using Gigahertz processors to meet the gigabit
Internet speeds in networks today. Combined with parallel
security processing by its multi-core processors, the
appliances offer high performance. Gigabit Ethernet ports
in NG series makes the networks ready for Gigabit Internet
speeds. A complete overhaul of the appliance design has
resulted into an unmatched performance gain with next-
generation memory, industry-grade robust components
that can survive tough environment conditions, high port
density, and more storage capacity.
FleXi Ports
The FleXi Ports available in NG Series appliances starting
with CR200iNG-XP offer flexible network connectivity with
I/O slots that allow additional Copper/Fiber 1G/10G ports on
the same security appliance. For SMEs who want to shift to
Fiber 1GbE/10GbE connectivity, the FleXi Ports offer
freedom from forced purchase of higher end security
appliances to get desired network interface modules.
Gigabit Firewall Throughputs
The NG series appliances deliver the best in class Firewall and UTM throughputs. The entry-level appliance in the NG series
comes with Gigabit firewall throughput.
TheAll-new Firmware - CyberoamOS
Cyberoam NG series appliances are based on
CyberoamOS – the most intelligent and powerful
Cyberoam firmware till date. CyberoamOS tightly
integrates with the hardware for network and crypto
acceleration to deliver high performance. The
performance is further enhanced with parallel processing
using its multi-core architecture by optimizing workload
distribution across cores, besides offering a lockless
path for packet forwarding. The CyberoamOS extracts
the highest level of performance from a multi-core
platform, along with offering minimum latency and
improved processing speed with use of optimized
Interrupt rates and FastPath technology. The NG series
offers Next-Generation security features to protect
against newly evolving threats.
UTM ThroughputsFirewall Throughputs
NEXT-GENERATION
SECURITY FEATURES IN NG SERIES:
On-appliance Web Application Firewall
FleXi Ports (XP)
Cyberoam Web Application Firewall, available as a subscription on its UTM appliances, protects web
servers and web applications from hackers who exploit vulnerabilities in web applications, and from other
OWASP Top 10 Web application vulnerabilities, without the need for investing in separate WAF appliance.
The FleXi Ports offer flexible network connectivity options and configuration freedom to organizations,
with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.
The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency,
reduced network complexity and reduced OPEX.
Identity-based Controls with Layer 8 Technology
Cyberoam UTM's Layer 8 Technology allows administrators to uniquely identify users, control Internet
activity of these users in the network, and enable policy-setting and reporting by username – adding
speed to security.
First-of-its-kind On-appliance Reporting
Cyberoam offers on-appliance reporting with real-time logs and reports, saving cost of deploying a
dedicated reporting solution. The 1000+ in-depth reports offer real-time visibility into user and network
activities, helping organizations to manage security, display compliance and forensic analysis,
unmatched by any UTM vendor till date.
Advanced Threat Protection
Cyberoam UTM offers best-of-breed security of Intrusion Prevention System, Gateway Anti-Virus/Anti-
Spyware, Gateway Anti-Spam, Web & Content Filtering and Outbound Spam Protection to offer
protection against newly evolving threats.
FUSION Technology-driven SI Firewall
Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and
User Identity-based security. The unique FUSION Technology allows policy creation for multiple security
features through single firewall interface, providing integrated perimeter security as well as blending
security, connectivity and productivity benefits for organizational networks.
Other security features include Multiple Link Management, High Availability, Wi-Fi security (for Wi-Fi
appliances), Instant Messaging controls, Bandwidth Management, Traffic Discovery, and more
Virtual Private Network
Cyberoam VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network
with its Threat Free Tunneling technology.
Advanced Application Controls
With Cyberoam’s Application Visibility & Control feature, applications can be prioritized in organizations
based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility
and control. Cyberoam’s advanced Application Controls classify applications based on their risk level,
characteristics and technology, offering more granular controls. Also, the proactive protection model
eliminates the need for manual intervention by administrators to update policies for new applications.
Support for new Connectivity Technologies, 4G/LTE
Cyberoam makes organizations ready for high speed future over Wireless WAN with support for new
connectivity technologies - 4G /LTE. Easy to deploy with a simple USB modem plug-in into Cyberoam
appliance, organizations can ensure business connectivity with automatic failover to 3G /4G /WiMAX
connection, and VPN connection over 3G/ 4G / WiMax.
Cyberoam Inc.
505 Thornall Street, Suite # 304,
Edison, New Jersey 08837, USA, Tel: 201 -301-2851
India
901, Silicon Tower, Behind Pariseema Building, Off, C.G.Road,
Ahmedabad 380 006, INDIA, Tel: +91-79-66065606
Toll Free Numbers
USA : India :+1-800-686-2360 1-800-301-00013|
APAC/MEA : Europe :+1-877-777-0368 +44-808-120-3958|
Registered Trademark of Cyberoam Technologies Pvt. Ltd.
sales@cyberoam.com | www.cyberoam.com
Product Certifications
CERTIFIED
VPNC
Interop
Basic
AES
Interopwww.check-mark.com
SSL Advanced
Network Extension
SSL Basic
Network Extension
SSL
JavaScript
SSL
Firefox
SSL
Exchange
SSL
Portal
CERTIFIED
VPNC
Cyberoam NG series Appliance Range
SOHO, ROBO
SMB
CR10iNG, CR15iNG, CR25iNG, CR25iNG-6P, CR35iNG
Wi-Fi appliances: CR15wiNG, CR25wiNG, CR25wiNG-6P, CR35wiNG
CR50iNG, CR100iNG, CR200iNG, CR200iNG-XP, CR300iNG, CR300iNG-XP
Future-Ready Security.

More Related Content

What's hot

5G Security Training
5G Security Training5G Security Training
5G Security TrainingTonex
 
Meraki overview sales deck inside sales
Meraki overview sales deck inside salesMeraki overview sales deck inside sales
Meraki overview sales deck inside salesHaffizulla Rahman
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
Fox-Industrial-Skytale-EN
Fox-Industrial-Skytale-ENFox-Industrial-Skytale-EN
Fox-Industrial-Skytale-ENBen Lange
 
5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex TrainingBryan Len
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideGlen Yi
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 

What's hot (13)

5G Security Training
5G Security Training5G Security Training
5G Security Training
 
Meraki overview sales deck inside sales
Meraki overview sales deck inside salesMeraki overview sales deck inside sales
Meraki overview sales deck inside sales
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Fox-Industrial-Skytale-EN
Fox-Industrial-Skytale-ENFox-Industrial-Skytale-EN
Fox-Industrial-Skytale-EN
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 
5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 

Similar to CyberoamNGSeriesUTMBrochure

CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G NetworksPaul Bradley
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlSylvain Maret
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 

Similar to CyberoamNGSeriesUTMBrochure (20)

CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G Networks
 
Samsung_Brochure
Samsung_BrochureSamsung_Brochure
Samsung_Brochure
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
 
Solution
SolutionSolution
Solution
 
Solution
SolutionSolution
Solution
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 

CyberoamNGSeriesUTMBrochure

  • 1. Business networks are in rapid flux today. IT trends like superfast Internet speeds, device explosion, movement of critical business applications to Cloud and explosion of Internet applications are fast setting in, and SOHO /SMBs will not remain isolated from these trends. The SOHO/SMB networks are today moving towards Gigabit network infrastructure and high Internet speeds. However, lack of security solutions supporting these trends is resulting in security becoming a bottleneck in these networks. To cope up, they will either have to expand their security budgets to buy enterprise-level security or buy a future-ready security solution. The Cyberoam NG series offers future-ready security to SOHO/SMBs and branch offices through its enterprise- grade security features, gigabit ports and the best industry throughputs for this segment. The NG series appliances come with best-in-class hardware, along with software to match, to offer up to 5 times the average industry throughputs, making them the “fastest UTM appliances” for SOHO/ SMB segments. Cyberoam for SOHO/SMBsNG Series The “fastest UTM appliances” for this segment www.cyberoam.com Future-Ready Security.
  • 2. NG SERIES FUTURE-READY SECURITY Gigabit Firewall Throughputs Powerful Hardware FleXi Ports Value for Money All-new firmware- CyberoamOS Future-Ready Security Future-Ready Security Powerful Hardware & Superior Quality The NG series appliances allow nano second security processing using Gigahertz processors to meet the gigabit Internet speeds in networks today. Combined with parallel security processing by its multi-core processors, the appliances offer high performance. Gigabit Ethernet ports in NG series makes the networks ready for Gigabit Internet speeds. A complete overhaul of the appliance design has resulted into an unmatched performance gain with next- generation memory, industry-grade robust components that can survive tough environment conditions, high port density, and more storage capacity. FleXi Ports The FleXi Ports available in NG Series appliances starting with CR200iNG-XP offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance. For SMEs who want to shift to Fiber 1GbE/10GbE connectivity, the FleXi Ports offer freedom from forced purchase of higher end security appliances to get desired network interface modules. Gigabit Firewall Throughputs The NG series appliances deliver the best in class Firewall and UTM throughputs. The entry-level appliance in the NG series comes with Gigabit firewall throughput. TheAll-new Firmware - CyberoamOS Cyberoam NG series appliances are based on CyberoamOS – the most intelligent and powerful Cyberoam firmware till date. CyberoamOS tightly integrates with the hardware for network and crypto acceleration to deliver high performance. The performance is further enhanced with parallel processing using its multi-core architecture by optimizing workload distribution across cores, besides offering a lockless path for packet forwarding. The CyberoamOS extracts the highest level of performance from a multi-core platform, along with offering minimum latency and improved processing speed with use of optimized Interrupt rates and FastPath technology. The NG series offers Next-Generation security features to protect against newly evolving threats. UTM ThroughputsFirewall Throughputs
  • 3. NEXT-GENERATION SECURITY FEATURES IN NG SERIES: On-appliance Web Application Firewall FleXi Ports (XP) Cyberoam Web Application Firewall, available as a subscription on its UTM appliances, protects web servers and web applications from hackers who exploit vulnerabilities in web applications, and from other OWASP Top 10 Web application vulnerabilities, without the need for investing in separate WAF appliance. The FleXi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance. The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency, reduced network complexity and reduced OPEX. Identity-based Controls with Layer 8 Technology Cyberoam UTM's Layer 8 Technology allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security. First-of-its-kind On-appliance Reporting Cyberoam offers on-appliance reporting with real-time logs and reports, saving cost of deploying a dedicated reporting solution. The 1000+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any UTM vendor till date. Advanced Threat Protection Cyberoam UTM offers best-of-breed security of Intrusion Prevention System, Gateway Anti-Virus/Anti- Spyware, Gateway Anti-Spam, Web & Content Filtering and Outbound Spam Protection to offer protection against newly evolving threats. FUSION Technology-driven SI Firewall Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and User Identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, providing integrated perimeter security as well as blending security, connectivity and productivity benefits for organizational networks. Other security features include Multiple Link Management, High Availability, Wi-Fi security (for Wi-Fi appliances), Instant Messaging controls, Bandwidth Management, Traffic Discovery, and more Virtual Private Network Cyberoam VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat Free Tunneling technology. Advanced Application Controls With Cyberoam’s Application Visibility & Control feature, applications can be prioritized in organizations based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility and control. Cyberoam’s advanced Application Controls classify applications based on their risk level, characteristics and technology, offering more granular controls. Also, the proactive protection model eliminates the need for manual intervention by administrators to update policies for new applications. Support for new Connectivity Technologies, 4G/LTE Cyberoam makes organizations ready for high speed future over Wireless WAN with support for new connectivity technologies - 4G /LTE. Easy to deploy with a simple USB modem plug-in into Cyberoam appliance, organizations can ensure business connectivity with automatic failover to 3G /4G /WiMAX connection, and VPN connection over 3G/ 4G / WiMax.
  • 4. Cyberoam Inc. 505 Thornall Street, Suite # 304, Edison, New Jersey 08837, USA, Tel: 201 -301-2851 India 901, Silicon Tower, Behind Pariseema Building, Off, C.G.Road, Ahmedabad 380 006, INDIA, Tel: +91-79-66065606 Toll Free Numbers USA : India :+1-800-686-2360 1-800-301-00013| APAC/MEA : Europe :+1-877-777-0368 +44-808-120-3958| Registered Trademark of Cyberoam Technologies Pvt. Ltd. sales@cyberoam.com | www.cyberoam.com Product Certifications CERTIFIED VPNC Interop Basic AES Interopwww.check-mark.com SSL Advanced Network Extension SSL Basic Network Extension SSL JavaScript SSL Firefox SSL Exchange SSL Portal CERTIFIED VPNC Cyberoam NG series Appliance Range SOHO, ROBO SMB CR10iNG, CR15iNG, CR25iNG, CR25iNG-6P, CR35iNG Wi-Fi appliances: CR15wiNG, CR25wiNG, CR25wiNG-6P, CR35wiNG CR50iNG, CR100iNG, CR200iNG, CR200iNG-XP, CR300iNG, CR300iNG-XP Future-Ready Security.