CR10iNG

Quick overview:

Cyberaom CR10iNG Next Generation Firewall Security Security Appliance - 400Mbps Firewall Throughput, 3x GbE Ports

Availability   : In stock

Product no  : CR10iNG

Price             : Contact to Sales

Details

OVERVIEW

Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective. Cyberoam’s Extensible Security Architecture (ESA) and multi-core technology carry the ability to combat future threats for organizations’ security.

Cyberoam’s NG series UTM appliances offer future-ready security with best-in-class hardware, along with software to match, to offer up to 5 times the industry average throughputs, making them the “fastest UTM appliances” for SOHO/ SMB segments. The FleXi Ports (XP) available in NG Series appliances starting with CR200iNG-XP offer organizations the network flexibility and configuration freedom with I/O slots that allow choice of Copper GbE and Fiber 1GbE/10GbE network connectivity.

Powerful Hardware
The NG series appliances come with a powerful hardware consisting of Gigahertz processors for nano second security processing along with Gigabit Ethernet ports and high port density. A complete overhaul of the appliance design has resulted into an unmatched performance gain with next-generation memory and more storage capacity.

FleXi Ports (XP)
The FleXi Ports in NG Series appliances offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing organizations to upgrade to new technologies easily and cost-effectively, making them future-ready. The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency, reduced network complexity and reduced operational costs.

Wi-Fi security
Cyberoam offers security over Wi-Fi with its Wi-Fi range of appliances that combine the features of a router and Cyberoam’s complete set of UTM features, offering reduced TCO to organizations. The appliances offer Layer 8 Identity-based security, allowing administrators to apply identity-based security policies to gain visibility over user activity in the Wi-Fi network. The appliances come with an in-built wireless access point featuring 802.11 n/b/g standards, MIMO technology and up to eight virtual access points.

The all-new Firmware – CyberoamOS
The NG series appliances are based on CyberoamOS– the most intelligent and powerful Cyberoam firmware till date. The new firmware tightly integrates with the hardware for network and crypto acceleration to deliver high performance. The CyberoamOS also extracts the highest level of performance from a multi-core platform, along with offering minimum latency and improved processing speed with use of optimized Interrupt Rates and Fast Path technology. Its next-generation security features offer protection against newly evolving threats.

Details

FEATURES

Advanced Application Controls
Cyberoam’s application visibility and control feature enable prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics, and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by the administrator to update policy for new applications that are being added to the list.

On-appliance Web Application Firewall
The web application firewall available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance.

FleXi Ports (XP)
The Flexi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.

First-of-its-kind On-appliance Reporting
Cyberoam has been the first and only vendor in the industry to offer on application reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display, compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

Identity-based Controls with Layer 8 Technology
Cyberoam’s layer 8 technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

Advanced Threat Protection
Cyberoam NG series offers the best-of-breed security of intrusion prevention system Gateway Antivirus/Gateway antispam antispyware ,Web &content filtering and Outbound spam protection to offer protection against newly evolving threats.

FUSION Technology-driven SI Firewall
Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.

On-appliance VPN
Cyberoam VPN(IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.

Details

BENEFITS

 FEATURES

 BENEFITS

 Human Layer 8 Identity-based Security

  •   • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints.
  •   • User identity-based decision making prevents errors associated with IP address-based policies.
  •   • Simplifies audit requirements with instant user identification.

 FUSION Technology

  •  • Blends Security, Connectivity, Productivity.
  •  • Provides integrated perimeter security.

 Thin Client Support

  • •  Supports SaaS deployments and Cloud environment.

 Centralized Management

  • • Simplified security management. 

 Logging & Reporting

  • • Meets compliance requirements for CIPA, HIPAA, PCI DSS.

 Enterprise-Grade Security

  • • Faster up-times, reduced latency, simplified configuration, supports rapid network growth.
  • • Supports creation of work profile-based groups across distributed locations.
  • • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services.
  • • Supports applications that work on real-time updates like stock updates for Financial institutions.
  • • High-throughput.

Specifications

Benefits

BENEFITS

 FEATURES

 BENEFITS

 Human Layer 8 Identity-based Security

  •   • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints.
  •   • User identity-based decision making prevents errors associated with IP address-based policies.
  •   • Simplifies audit requirements with instant user identification.

 FUSION Technology

  •  • Blends Security, Connectivity, Productivity.
  •  • Provides integrated perimeter security.

 Thin Client Support

  • •  Supports SaaS deployments and Cloud environment.

 Centralized Management

  • • Simplified security management. 

 Logging & Reporting

  • • Meets compliance requirements for CIPA, HIPAA, PCI DSS.

 Enterprise-Grade Security

  • • Faster up-times, reduced latency, simplified configuration, supports rapid network growth.
  • • Supports creation of work profile-based groups across distributed locations.
  • • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services.
  • • Supports applications that work on real-time updates like stock updates for Financial institutions.
  • • High-throughput.
Features

FEATURES

Advanced Application Controls
Cyberoam’s application visibility and control feature enable prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics, and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by the administrator to update policy for new applications that are being added to the list.

On-appliance Web Application Firewall
The web application firewall available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance.

FleXi Ports (XP)
The Flexi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.

First-of-its-kind On-appliance Reporting
Cyberoam has been the first and only vendor in the industry to offer on application reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display, compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

Identity-based Controls with Layer 8 Technology
Cyberoam’s layer 8 technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

Advanced Threat Protection
Cyberoam NG series offers the best-of-breed security of intrusion prevention system Gateway Antivirus/Gateway antispam antispyware ,Web &content filtering and Outbound spam protection to offer protection against newly evolving threats.

FUSION Technology-driven SI Firewall
Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.

On-appliance VPN
Cyberoam VPN(IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.

Documentation

CyberoamCR10iNG

Send inquiry? Yes
Firewall throughput 400
Maximum concurrent sessions 27,500
SSL-VPN Throughput 25
Antivirus Throughput 100
IPSec VPN clients (Maximum) No
IPS Throughput No

Details

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Reviews

Write Your Own Review

You're reviewing: CR10iNG