Ruth Victor Home Product Solution Support Contact
  • Product
  • Firewall
  • NAC
  • Email Security
  • Web Security
  • Network Monitoring
  • Bandwidth Management
  • Patch Management
  • Authentication Solution
  • Web Accelerator
  • Antivirus
COMPREHENSIVE INTERNET SECURITY SYSTEM
Cyberoam’s integrated Security Appliances are purpose-built for comprehensive network protection and high performance needs of small, medium and large enterprises. Cyberoam’s Check Mark Level 5 certified, ICSA firewall certified identity-based Internet Security Appliances offer protection against external as well as internal threats.

Cyberoam offers multi-lingual support with Chinese, Hindi and English language GUIs, enhancing user experience in some of the largest and fastest growing markets.

Identity-based Security - Patent Pending Technology
Cyberoam’s unique user identity-based Internet Security Appliances solve today’s need to control individual user behavior to ensure comprehensive threat management. Functioning with Layer 8 technology, Cyberoam gives complete visibility into “Who is doing What” in the network and allows policies to be created at the user level based on work profiles. With the finest level of controls and an unprecedented degree of control, flexibility and ease of management, the Cyberoam Internet Security Appliance is a highly effective UTM solution that reduces capital and operating expenses.

Gigabit Performance
The Cyberoam UTM appliances deliver high performance through the use of multi-core processors optimized through its software architecture. Cyberoam’s architectural flexibility can easily accommodate emerging applications like VoIP through own enhancements and easy third party plug-ins with no architectural changes, keeping organizations in a state of constant threat-readiness in a rapidly evolving threat scenario. Cyberoam appliances balance performance and security by using technologies like multi core processors, regular expressions co processors and hardware based Advanced Cryptography Engine for accelerating key functions of the UTM appliance.

High Availability
Cyberoam’s Active-Active High Availability provides efficient, continuous access to business-critical applications, information, and services. Active-Active HA increases overall network performance by load balancing the network traffic between two Cyberoam appliances. Further it offers auto failover, eliminating the problem of single point failure. The cluster appears to your network to be a single device, adding increased performance without changing your network configuration. Primary appliance acts as the load balancer and load balances all the TCP communications including TCP communications from Proxies but will not load balance VPN traffic.

Segment Key Benefits Cyberoam Appliances
SOHO : Small Office-Home Office
  • Identity-based Unified Threat Management (UTM) features including Stateful Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-spyware, Gateway Anti-spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks.
  • Zero-hour malware protection that does not wait for signature release
  • CR15i
  • CR25i
  • CR15wi
  • CR25wi
  • CR35wi
  • CR25ia
  • CR35ia
  • CR15iNG
  • CR25iNG
  • CR35iNG
  • CR15wiNG
  • CR25wiNG
  • CR35wiNG


  • ROBO : Remote Office- Branch Office
  • Purpose-built UTM Security Appliances providing comprehensive security and high performance
  • Identity-based Unified Threat Management (UTM) security features including Stateful Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks and limited capital, operating expense.
  • Identity-based visibility and control even in dynamic IP environments like Wi-Fi and DHCP, enabling regulatory compliance
  • Dynamic routing, and VLAN, supporting rapid network expansion
  • Active-Active High Availability for business continuity
  • CR50i
  • CR50ia
  • CR100i
  • CR100ia
  • CR200i
  • CR250i
  • CR300i
  • CR50iNG
  • CR100iNG
  • CR200iNG
  • CR300iNG
  • CR200iNG-XP
  • CR300iNG-XP


  • Large Enterprises
  • Identity-based security with visibility into and control over individual user activity, for protection against external and internal threats. Also enables regulatory compliance
  • Purpose-built Security Appliances providing comprehensive security against network and application-level attacks and High performance
  • Multicore architecture delivering Gigabit throughputs
  • Enterprise-grade security with High Availability, dynamic routing and Virtual LAN capability
  • Identity-based Unified Threat Management (UTM) features, including Stateful Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-spyware, Gateway Anti-spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks
  • Encrypted tunnel for secure communication with remote locations
  • Centralized security control over remote offices
  • Centralized logging and reporting for multiple locations
  • CR500i
  • CR1000i
  • CR1500i
  • CR500ia-1F
  • CR500ia-10F
  • CR500ia-RP
  • CR750ia-1F
  • CR750ia-10F
  • CR1000ia-10F
  • CR1500ia-10F


  • Resource Center
    Datasheet
    CR15iNG
    CR15wiNG
    CR25iNG
    CR25wiNG
    CR35iNG
    CR35wiNG
    CR50iNG
    CR100iNG
    CR200iNG
    CR200iNG-XP
    CR300iNG
    CR300iNG-XP
    CR15i
    CR25i
    CR50i
    CR100i
    CR200i
    CR300i
    CR500i
    CR1000i
    CR1500i
    CR15wi
    CR25wi
    CR35wi
    CR25ia
    CR35ia
    CR50ia
    CR100ia
    CR500ia-1F
    CR500ia-10F
    CR500ia-RP
    CR750ia-1F
    CR750ia-10F
    CR1000ia-10F
    CR1500ia-10F
    White Paper
    Managing bandwidth the User based approach
    Managing Corporate Internet Access
    Managing IT resources in Educational Institutes
    UTM Management Solution
    White Paper on Load balancing and failover
    WP AntiSpam
    WP AntiVirus
    WP IDP
    WP Pharming
    WP Phishing
    WP Spyware

     



    cisco    hp   netka  hp cyberome
    Copyright © Ruth Victor Co., Ltd. 2014. All Rights Reserved Design by Ruthvictor