CR15iNG

More Views

Quick overview:

Cyberoam CR15i NG Security Appliance - 1Gbps Firewall Throughput 3x GbE Ports CR15iNG

Availability   : In stock

Product no  : CR15iNG

Price             : Contact to Sales

Details

OVERVIEW

CYBEROAM NEXT-GENERATION FIREWALLS

The mobilization of the workforce has led to a demand for anytime-anywhere access to network resources. This, along with increasing number of users like customers and partners connecting to an enterprise network from outside is leading to de-parameterization of enterprise networks. Besides, trends like rising in number of network users and devices, application explosion, virtualization, and more are leading to loss of security controls for enterprises over their networks. Cyberoam Next-Generation Firewalls (NGFW) with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security.

Actionable Intelligence & Controls
Cyberoam's Human Layer 8 acts like a standard abstract layer that binds with real Layers 2-7, enabling enterprises to regain lost security controls. By binding User Identity across Layers 2-7, enterprises can put security checks where they want to from L2-L8, along with complete visibility into user and network activities.

CyberoamOS
Cyberoam Next-Generation Firewalls are based on CyberoamOS – an intelligent and powerful firmware that offers next-generation security features include inline application inspection and control, website filtering, HTTPS inspection, Intrusion Prevention System, VPN (IPSec and SSL) and QoS/bandwidth management. Additional security features like Web Application Firewall, Gateway Anti-Virus, Gateway Anti-Spam are also available.

High Performance
Cyberoam offers high performance for enterprises with its powerful hardware appliances and CybeoamOS that has the ability to extract the highest level of performance from a multi-core platform and tightly integrates with the hardware for network and crypto acceleration.

Scalability
Cyberoam's Extensible Security Architecture supports future enhancements like new security features and security updates that can be developed rapidly and deployed with minimum efforts without the need to change the appliance, offering future-ready security to large enterprises. In addition, enterprises can add another appliance in cluster/HA to support more number of users.

Flexibility
The FleXi Ports available in the FleXi Port (XP) security appliances offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing enterprises to upgrade to new technologies easily and cost-effectively, making them future-ready. The FleXi Ports consolidate the number of devices in a network, offering benefits of power efficiency, reduced network complexity and reduced operational costs.

Details

FEATURES

Advanced Application Controls
Cyberoam’s application visibility and control feature enable prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics, and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by the administrator to update policy for new applications that are being added to the list.

On-appliance Web Application Firewall
The web application firewall available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance.

FleXi Ports (XP)
The Flexi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.

First-of-its-kind On-appliance Reporting
Cyberoam has been the first and only vendor in the industry to offer on application reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display, compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

Identity-based Controls with Layer 8 Technology
Cyberoam’s layer 8 technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

Advanced Threat Protection
Cyberoam NG series offers the best-of-breed security of intrusion prevention system Gateway Anti-Virus/Anti-SpywareGateway Anti-SpamWeb & Content Filtering and Outbound Spam Protection to offer protection against newly evolving threats.

FUSION Technology-driven SI Firewall
Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.

On-appliance VPN
Cyberoam VPN(IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.

Details

BENEFITS

 FEATURES

 BENEFITS

 Human Layer 8 Identity-based Security

  •   • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints.
  •   • User identity-based decision making prevents errors associated with IP address-based policies.
  •   • Simplifies audit requirements with instant user identification.

 FUSION Technology

  •  • Blends Security, Connectivity, Productivity.
  •  • Provides integrated perimeter security.

 Thin Client Support

  • •  Supports SaaS deployments and Cloud environment.

 Centralized Management

  • • Simplified security management. 

 Logging & Reporting

  • • Meets compliance requirements for CIPA, HIPAA, PCI DSS.

 Enterprise-Grade Security

  • • Faster up-times, reduced latency, simplified configuration, supports rapid network growth.
  • • Supports creation of work profile-based groups across distributed locations.
  • • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services.
  • • Supports applications that work on real-time updates like stock updates for Financial institutions.
  • • High-throughput.

Specifications

Benefits

BENEFITS

 FEATURES

 BENEFITS

 Human Layer 8 Identity-based Security

  •   • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints.
  •   • User identity-based decision making prevents errors associated with IP address-based policies.
  •   • Simplifies audit requirements with instant user identification.

 FUSION Technology

  •  • Blends Security, Connectivity, Productivity.
  •  • Provides integrated perimeter security.

 Thin Client Support

  • •  Supports SaaS deployments and Cloud environment.

 Centralized Management

  • • Simplified security management. 

 Logging & Reporting

  • • Meets compliance requirements for CIPA, HIPAA, PCI DSS.

 Enterprise-Grade Security

  • • Faster up-times, reduced latency, simplified configuration, supports rapid network growth.
  • • Supports creation of work profile-based groups across distributed locations.
  • • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services.
  • • Supports applications that work on real-time updates like stock updates for Financial institutions.
  • • High-throughput.
Features

FEATURES

Advanced Application Controls
Cyberoam’s application visibility and control feature enable prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics, and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by the administrator to update policy for new applications that are being added to the list.

On-appliance Web Application Firewall
The web application firewall available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance.

FleXi Ports (XP)
The Flexi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.

First-of-its-kind On-appliance Reporting
Cyberoam has been the first and only vendor in the industry to offer on application reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display, compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

Identity-based Controls with Layer 8 Technology
Cyberoam’s layer 8 technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

Advanced Threat Protection
Cyberoam NG series offers the best-of-breed security of intrusion prevention system Gateway Anti-Virus/Anti-SpywareGateway Anti-SpamWeb & Content Filtering and Outbound Spam Protection to offer protection against newly evolving threats.

FUSION Technology-driven SI Firewall
Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.

On-appliance VPN
Cyberoam VPN(IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.

Documentation

CyberoamCR15iNG

Send inquiry? Yes
Firewall throughput No
VPN Throughput No
IPS Throughput No
Antivirus Throughput No
Concurrent connections No
New Connections No
Maximum Licensed users No
No of antennas No
Wireless interface No
Storage No
Ethernet Interfaces No
2 x USB 2.0 1 x COM (RJ45) No
Power Supply No
Display No
Mountage No
Dimensions Width x Depth x Height No
Weight No

Details

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Reviews

Write Your Own Review

You're reviewing: CR15iNG