OK
12
12

Order Summary

3 Products

 1,234

View Cart
MORE
Store Timings
    Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com Cyberoam CR15iNG Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Interfaces Copper GbE Ports 3 Configurable Internal/DMZ/WAN Ports Yes Console Ports (RJ45) 1 USB Ports 2 System Performance* Firewall throughput (UDP) (Mbps) 1, 200 Firewall throughput (TCP) (Mbps) 900 New sessions/second 5, 000 Concurrent sessions 200, 000 IPSec VPN throughput (Mbps) 130 No. of IPSec Tunnels 300 SSL VPN Throughput (Mbps) 50 Anti-Virus throughput (Mbps) 200 IPS throughput (Mbps) 160 UTM throughput (Mbps) 90 Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500 ), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Scan and deliver by file size - Block by file types - Add disclaimer/signature Gateway Anti-Spam - Inbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Redirect spam mails to dedicated email address - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89 ), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - NTP Support - Multi-lingual support: English, Chinese, Hindi, French, Japanese - Cyberoam Central Console/CCMS (Optional) User Authentication - Internal database - AD Integration with support for OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - User/MAC Binding - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Graphical real-time logging and monitoring - Syslog support - Log Viewer - Firewall, IPS, Web filter, Anti Virus, Anti Spam, Authentication, System and Admin Events IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4 - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Hardware Specifications Memory 2GB Storage 4GB Compliance CE FCC Dimensions H x W x D (inches) H x W x D (cms) Weight Power Input Voltage Consumption Total Heat Dissipation (BTU) Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing) Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000 Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk - Control various Commands and Functions Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Schedule-based Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE, L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SM, Multicast Forwarding - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks *Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic.
    Read More
    Details
    Query
    Share
    SEND
    Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com Cyberoam CR 25iNG Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Interfaces Copper GbE Ports 4 Configurable Internal/DMZ/WAN Ports yes Console Ports (RJ45) 1 USB Ports 2 System Performance* Firewall Throughput (UDP) (Mbps) 1, 800 Firewall Throughput (TCP) (Mbps) 1, 200 New sessions/second 6, 000 Concurrent sessions 500, 000 IPSec VPN Throughput (Mbps) 210 No. of IPSec Tunnels 550 SSL VPN Throughput (Mbps) 75 WAF Protected Throughput (Mbps) 100 Anti-Virus Throughput (Mbps) 350 IPS Throughput (Mbps) 240 UTM Throughput (Mbps) 125 Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500 ), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Self Service Quarantine area - Scan and deliver by file size - Block by file types Gateway Anti-Spam - Inbound and Outbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - Self Service Quarantine area - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89 ), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000 Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk - Control various Commands and Functions Web Application Firewall - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN, TAP - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE (with Schedule Management), L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SIM, Multicast Forwarding - Discover mode for PoC Deployments - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - Management over IPv6 - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - Multi-lingual : English, Chinese, Hindi, French, Japanese - Cyberoam Central Console (Optional) User Authentication - Internal database - AD Integration and OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Real-time and historical Monitoring - Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication, System and Admin Events - Forensic Analysis with quick identification of network attacks and other traffic anomalies - Syslog support - 4-eye Authentication On-Appliance Cyberoam-iView Reporting - Integrated Web-based Reporting tool - 1, 200 drilldown reports - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA - Zone based application reports - Historical and Real-time reports - Default Dashboards: Traffic and Security - Username, Host, Email ID specific Monitoring Dashboard - Reports – Application, Internet & Web Usage, Mail Usage, Attacks, Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high risk users and more - Client Types Report including BYOD Client Types - Multi-format reports - tabular, graphical - Export reports in - PDF, Excel, HTML - Email notification of reports - Report customization – (Custom view and custom logo) - Supports 3rd party PSA Solution – ConnectWise IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4 - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Hardware Specifications Memory 2GB Compact Flash 2GB HDD 250GB or higher Compliance CE FCC Dimensions H x W x D (inches) H x W x D (cms) Weight Power Input Voltage Consumption Total Heat Dissipation (BTU) Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing).
    Read More
    Details
    Query
    Share
    SEND
    Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com Cyberoam CR 35iNG Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Interfaces Copper GbE Ports 6 Configurable Internal/DMZ/WAN Ports YES Console Ports (RJ45) 1 USB Ports 2 System Performance* Firewall Throughput (UDP) (Mbps) 3, 700 2, 400 21, 000 750, 000 280 850 100 150 600 650 300 Firewall Throughput (TCP) (Mbps) 2, 400 New sessions/second 21, 000 Concurrent sessions 750, 000 IPSec VPN Throughput (Mbps) 280 No. of IPSec Tunnels 850 SSL VPN Throughput (Mbps) 100 WAF Protected Throughput (Mbps) 150 Anti-Virus Throughput (Mbps) 600 IPS Throughput (Mbps) 650 UTM Throughput (Mbps )300 Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500 ), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Self Service Quarantine area - Scan and deliver by file size - Block by file types Gateway Anti-Spam - Inbound and Outbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - Self Service Quarantine area - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89 ), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000 Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk - Control various Commands and Functions Web Application Firewall - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN, TAP - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE (with Schedule Management), L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SIM, Multicast Forwarding - Discover mode for PoC Deployments - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - Management over IPv6 - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - Multi-lingual : English, Chinese, Hindi, French, Japanese - Cyberoam Central Console (Optional) User Authentication - Internal database - AD Integration and OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Real-time and historical Monitoring - Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication, System and Admin Events - Forensic Analysis with quick identification of network attacks and other traffic anomalies - Syslog support - 4-eye Authentication On-Appliance Cyberoam-iView Reporting - Integrated Web-based Reporting tool - 1, 200 drilldown reports - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA - Zone based application reports - Historical and Real-time reports - Default Dashboards: Traffic and Security - Username, Host, Email ID specific Monitoring Dashboard - Reports – Application, Internet & Web Usage, Mail Usage, Attacks, Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high risk users and more - Client Types Report including BYOD Client Types - Multi-format reports - tabular, graphical - Export reports in - PDF, Excel, HTML - Email notification of reports - Report customization – (Custom view and custom logo) - Supports 3rd party PSA Solution – ConnectWise IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4 - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Hardware Specifications Memory 2GB Compact Flash 2GB HDD 250GB or higher Compliance CE FCC Dimensions H x W x D (inches) H x W x D (cms) Weight Power Input Voltage Consumption Total Heat Dissipation (BTU) Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing).
    Read More
    Details
    Query
    Share
    SEND
    Cyberoam Firewall Sales in Hyderabad Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500+), Custom - IPS Policies: Pre-configured Zone-based multiple Policies, Custom - Filter based selection: Category, Severity, and Platform and Target (Client/Server) - IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Self Service Quarantine area - Scan and deliver by file size - Block by file types Gateway Anti-Spam - Inbound and Outbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - Self Service Quarantine area - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89+), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000+ Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk - Control various Commands and Functions Web Application Firewall - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN, TAP - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE (with Schedule Management), L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SIM, Multicast Forwarding - Discover mode for PoC Deployments - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - Management over IPv6 - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support\ Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - Multi-lingual : English, Chinese, Hindi, French, Japanese - Cyberoam Central Console (Optional) User Authentication - Internal database - AD Integration and OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Real-time and historical Monitoring - Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication, System and Admin Events - Forensic Analysis with quick identification of network attacks and other traffic anomalies - Syslog support - 4-eye Authentication On-Appliance Cyberoam-iView Reporting - Integrated Web-based Reporting tool - 1, 200+ drilldown reports - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA - Zone based application reports - Historical and Real-time reports - Default Dashboards: Traffic and Security - Username, Host, Email ID specific Monitoring Dashboard - Reports – Application, Internet & Web Usage, Mail Usage, Attacks, Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high risk users and more - Client Types Report including BYOD Client Types - Multi-format reports - tabular, graphical - Export reports in - PDF, Excel, HTML - Email notification of reports - Report customization – (Custom view and custom logo) - Supports 3rd party PSA Solution – ConnectWise IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4+ - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Hardware Specifications Memory 2GB Compact Flash 2GB HDD 250GB or higher Compliance CE FCC Dimensions H x W x D (inches) H x W x D (cms) Weight Power Input Voltage Consumption Total Heat Dissipation (BTU) Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing)
    Read More
    Details
    Query
    Share
    SEND
    Cisco 1941 Router: Cisco1941 builds on the best-in-class offering of the existing Cisco 1841 Integrated Services Routers by offering 2 models - Cisco 1941 and Cisco 1941W. In addition to the support of a wide range of wireless and wired connectivity options supported on Cisco 1941 Series, Cisco 1941W offers integration of IEEE 802.11n access point which is backwards compatible with IEEE 802.11a/b/g access points. All Cisco 1900 Series Integrated Services Routers offer embedded hardware encryption acceleration, optional firewall, intrusion prevention, and application services. In addition, the platforms support the industries widest range of wired and wireless connectivity options such as T1/E1, xDSL, 3G, 4G LTE, and GE. Cisco 1941 Integrated Services Router: The Integrated Services Routers Generation 2 (ISR G2) routers provide superior services integration and agility. Designed for scalability, the modular architecture of these platforms enables you to grow and adapt with your business needs. The Cisco 1941 Series offer increased levels of services integration with data, security, wireless, and mobility services enabling greater efficiencies cost savings. High Performance with Integrated Services The Cisco 1900 Series enables deployment in high speed WAN environments with concurrent services enabled up to 25 Mbps Multi-Gigabit Fabric enables high bandwidth module to module communication without compromising routing performance. Designed to address customer business requirements, Cisco 1941 Series with the modular architecture, offers performance range of modular interfaces and services as your network needs grow. Modular interfaces offer increased bandwidth, a diversity of connection options, and network resiliency. The Cisco 1941 Series maximizes investment protection by supporting: ◦ Reuse of a broad array of existing modules supported on the original Integrated Services Routers provides a lower cost of ownership. ◦ Rich set of Cisco IOS Software features carried forward from the original Integrated Services Routers and delivered in the universal image. ◦ Flexibility to grow as your business needs evolve. The Cisco 1941 provides significantly enhanced modular capabilities (refer to Table 2) offering investment protection for customers. Most of the modules available on previous generations of Cisco routers, such as the Cisco 1841 ISR, are supported on the Cisco 1941. Additionally, modules used on the Cisco 1941 can easily be interchanged with other Cisco routers to provide maximum investment protection. Taking advantage of common interface cards across a network greatly reduces the complexity of managing inventory requirements, implementing large network rollouts, and maintaining configurations across a variety of branch-office sizes. TheEHWIC slot replaces the high-speed WAN interface card (HWIC) slot and can natively support HWICs, WAN interface cards (WICs), wireless WAN 3G/4G LTE, voice interface cards (VICs), and voice/WAN interface cards (VWICs). ● Two integrated EHWIC slots are available on the Cisco 1941 for flexible configurations for support of two modules: One double wide HWIC-D or single wide EHWIC/HWIC module and a second single wide E-HIC/HWIC module are supported. ● Each HWIC Slot offers high data throughput capability. ◦ Up to 1.6 Gbps aggregate towards the router processor. ◦ Up to 2 Gbps aggregate to other module slots over MultiGigabit Fabric (MGF). Asingle ISM Slot provides flexibility to integrate intelligent services modules that do not require interface ports. ● ISM replaces the Advanced Integration Module (AIM) slot; existing AIM modules are not supported in the ISM slot. ● Each ISM Slot offers high data throughput capability. ◦ Up to 4 Gbps aggregate towards the router processor. ◦ Up to 2 Gbps aggregate to other module slots over MultiGigabit Fabric (MGF). ● Power to ISM slots can be managed by extensions similar to the Cisco EnergyWise framework, allowing organizations to reduce energy consumption in their network infrastructure. Full EnergyWise support will be available in future software releases. Integrated LAN Switching The Cisco 1941 Integrated Services Router Series will support the EHWIC LAN modules when they become available in future. The Cisco 1941 Series support the existing single wide EtherSwitch HWIC and the double wide HWIC-D modules, which greatly expand the router’s capabilities by integrating industry leading Layer 2 or Layer 3 switching. Application Services As organizations continue to centralize and consolidate their branch IT infrastructure in an effort to reduce cost and complexity in the branch office, they are challenged to provide adequate user experience, ensure continuous service availability, and deliver business-relevant applications when and where they are needed. To address these challenges, the Cisco 1941 Series provides the ability to host Cisco, 3rdparty, and custom applications on Cisco Services Ready Engine (SRE) module that seamlessly integrate into the router. The module has its own processor, network interface, and memory that operate independently of the host router resources, helping to ensure maximum concurrent routing and application performance while reducing physical space requirements, lowering power consumption, and consolidating management. Protocols IPv4, IPv6, static routes, Open Shortest Path First (OSPF), Enhanced IGRP (EIGRP), Border Gateway Protocol (BGP), BGP Router Reflector, Intermediate System-to-Intermediate System (IS-IS), Multicast Internet Group Management Protocol (IGMPv3) Protocol Independent Multicast sparse mode (PIM SM), PIM Source Specific Multicast (SSM), Distance Vector Multicast Routing Protocol (DVMRP), IPSec, Generic Routing Encapsulation (GRE), Bi-Directional Forwarding Detection (BVD), IPv4-to-IPv6 Multicast, MPLS, L2TPv3, 802.1ag, 802.3ah, L2 and L3 VPN. Encapsulations Ethernet, 802.1q VLAN, Point-to-Point Protocol (PPP), Multilink Point-to-Point Protocol (MLPPP), Frame Relay, Multilink Frame Relay (MLFR) (FR.15 and FR.16), High-Level Data Link Control (HDLC), Serial (RS-232, RS-449, X.21, V.35, and EIA-530), Point-to-Point Protocol over Ethernet (PPPoE), and ATM. Networkwide deployment, configuration, monitoring, and troubleshooting : CiscoWorks LAN Management Solution (LMS) is a suite of integrated applications for simplifying day-to-day management of a Cisco end-to-end network, lowering OpEx while increasing network availability. CiscoWorks LMS offers network managers an easy-to-use web-based interface for configuring, administering, and troubleshooting the Cisco integrated services routers, using new instrumentation such as Cisco IOS EEM. ● In addition to supporting basic platform services of the integrated services router, CiscoWorks also provides added-value support for the Cisco Service Ready Engine, enabling the management and distribution of software images to the SRE, thereby reducing the time and complexities associated with image management. Networkwide staging, configuration, and compliance : CiscoWorks Network Compliance Manager (NCM) tracks and regulates configuration and software changes throughout a multivendor network infrastructure. It provides superior visibility into network changes and can track compliance with a broad variety of regulatory, IT, corporate governance, and technology requirements. Security staging, configuration, and monitoring : Cisco Security Manager is a leading enterprise-class application for managing security. It delivers provisioning of firewall, VPN, and intrusion-prevention-system (IPS) services across Cisco routers, security appliances, and switch service modules. The suite also includes the Cisco Security Monitoring, Analysis and Response System (Cisco Security MARS) for monitoring and mitigation
    Read More
    Details
    Query
    Share
    SEND
    Cyberoam Firewall in Hyderabad. Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam ‘s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500+), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Scan and deliver by file size - Block by file types - Add disclaimer/signature Gateway Anti-Spam - Inbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Redirect spam mails to dedicated email address - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89+), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - NTP Support - Multi-lingual support: English, Chinese, Hindi, French, Japanese - Cyberoam Central Console/CCMS (Optional) User Authentication - Internal database - AD Integration with support for OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - User/MAC Binding - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Graphical real-time logging and monitoring - Syslog support - Log Viewer - Firewall, IPS, Web filter, Anti Virus, Anti Spam, Authentication, System and Admin Events IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4+ - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000+ Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, SecureDNP3, Longtalk - Control various Commands and Functions Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Schedule-based Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE, L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SM, Multicast Forwarding - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks *Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic
    Read More
    Details
    Query
    Share
    SEND
    Cyberoam Firewall in Hyderabad. Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam ‘s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500+), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Scan and deliver by file size - Block by file types - Add disclaimer/signature Gateway Anti-Spam - Inbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Redirect spam mails to dedicated email address - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89+), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - NTP Support - Multi-lingual support: English, Chinese, Hindi, French, Japanese - Cyberoam Central Console/CCMS (Optional) User Authentication - Internal database - AD Integration with support for OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - User/MAC Binding - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Graphical real-time logging and monitoring - Syslog support - Log Viewer - Firewall, IPS, Web filter, Anti Virus, Anti Spam, Authentication, System and Admin Events IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4+ - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000+ Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, SecureDNP3, Longtalk - Control various Commands and Functions Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Schedule-based Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE, L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SM, Multicast Forwarding - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks *Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic. Cyberoam Firewalls Cyberoam Firewall sales Cyberoam Firewall sales in Hyderabad Cyberoam Firewalls Cyberoam Firewall Sales Cyberoam Firewall in Hyderabad Cyberoam Firewall Sales in Hyderabad Cyberoam 15ing Cyberoam 15ing in Hyderabad Cyberoam 15ing sales in Hyderabad Cyberoam 25ing Cyberoam 25ing in Hyderabad Cyberoam 25ing sales in Hyderabad Cyberoam 35ing Cyberoam 35ing in Hyderabad Cyberoam 35ing sales in Hyderabad Cyberoam 50ing Cyberoam 50ing in Hyderabad Cyberoam 50ing sales in Hyderabad Cyberoam 100ing Cyberoam100ing ing Hyderabad Cyberoam100ing sales in Hyderabad Cyberoam 200ing Cyberoam200ing in Hyderabad Cyberoam200ing sales in Hyderabad Cyberoam 300ing Cyberoam300ing in Hyderabad Cyberoam300ing sales in Hyderabad Sophos Sophos Sales Sophos in Hyderabad Sophos sales in Hyderabad Sophos Firewalls Sophos Firewalls Sales Sophos Firewalls in Hyderabad Sophos Firewalls sales in Hyderabad Firewall Computer Hardware Dealers Firewall Computer Hardware Dealers-Cyberoam Firewall Computer Hardware Dealers-Sophos. cyberoam firewall dealers in hyderabad cyberoam firewall dealers Sophos firewall dealers in hyderabad Sophos firewall dealers
    Read More
    Details
    Query
    Share
    SEND
    Next Generation Firewall (NGFW) Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com A class of firewalls designed to filter network and Internet traffic based upon the applications or traffic types using specific ports. The application-specific granular security policies provided by Next Generation Firewalls help them detect application-specific attacks, giving them the potential to catch more malicious activity than more traditional firewalls. Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of service (QoS) functionalities, application identification that is agnostic to the TCP/UDP port used, integration with Active Directory for User Identification in order to provide smarter and deeper inspection that is actionable and measurable. In many ways a Next Generation Firewall combines the capabilities of first-generation network firewalls and network intrusion prevention systems (IPS), user identity based security by enforcing role based access control (RBAC) while also offering additional features such as SSL and SSH inspection, reputation-based malware filtering and Active Directory integration support. TECHSMART IT SOLUTIONS Solution works with multiple network security vendors that manufacturer’s enterprise-grade and commercial-grade NGFWs that include Sonicwall, SOPHOS Cyberoam, Cisco, Zyxel, Juniper Networks, and Fortinet (FortiGate) NGFW. Application Control Application Control makes it possible to recognize applications independent from their communication TCP/UDP port values. Having a stateful firewall does not necessarily protect from threats which are hidden inside applications or from threats using the same communication ports as well-known protocols like HTTP. Malicious applications are embedded into known ports such as HTTP that can bypass traditional stateful-inspection firewalls. Modern Application Control solutions also referred to as Next Generation Firewalls are able to recognize more than 1000+ different applications; blocking P2P traffic, identifying Facebook applications or streaming applications like Youtube, providing granular security context and application awareness features. Application Control solutions also increase network visibility, giving your security operations team understanding of the most common used application within your organization. With such visibility and awareness, security risks can be identified where unauthorized applications are being utilized such as BitTorrnet or eMule, whilst enhancing user experience by implementing QoS for certain critical applications. Application Control Solutions can leverage and integrate with User Identity solutions providing the possibility to control the application usage behaviour for specific users or groups. By integration with a User Identity, Application Control feature extends visibility by providing your organization with awareness on individual users or groups that utilize particular set of applications. TECHSMART IT SOLUTIONS Professional Service has a high level expertise in Application Control Solutions, through successful design, delivery and support of key projects. Contact our sales team for more information on Application Control security solutions and how it can help your organization with detailed application, user and content based awareness. Application Traffic Classification Accurate traffic classification is the heart of any firewall, with the result becoming the basis of the security policy. Traditional firewalls classify traffic by port and protocol, which, at one point, was a satisfactory mechanism for securing the perimeter. Today, applications can easily bypass a port-based firewall; hopping ports, using SSL and SSH, sneaking across port 80, or using non-standard ports. App-Control and App-ID a patent-pending traffic classification mechanism that is unique to NGFWs, addresses the traffic classification limitations that plague traditional firewalls by applying multiple classification mechanisms to the traffic stream, as soon as the device sees it, to determine the exact identity of applications traversing the network. Classify traffic based on applications, not ports. App-ID uses multiple identification mechanisms to determine the exact identity of applications traversing the network. The identification mechanisms are applied in the following manner: • Traffic is first classified based on the IP address and port. • Signatures are then applied to the allowed traffic to identify the application based on unique application properties and related transaction characteristics. • If App-ID determines that encryption (SSL or SSH) is in use and a decryption policy is in place, the application is decrypted and application signatures are applied again on the decrypted flow. • Decoders for known protocols are then used to apply additional context-based signatures to detect other applications that may be tunneling inside of the protocol (e.g., Yahoo! Instant Messenger used across HTTP). • For applications that are particularly evasive and cannot be identified through advanced signature and protocol analysis, heuristics or behavioral analysis may be used to determine the identity of the application. As the applications are identified by the successive mechanisms, the policy check determines how to treat the applications and associated functions: block them, or allow them and scan for threats, inspect for unauthorized file transfer and data patterns, or shape using QoS. Always on, always the first action taken across all ports. Classifying traffic with App-ID is always the first action taken when traffic hits the firewall, which means that all App-IDs are always enabled, by default. There is no need to enable a series of signatures to look for an application that is thought to be on the network; App-ID is always classifying all of the traffic, across all ports - not just a subset of the traffic (e.g., HTTP). All App-IDs are looking at all of the traffic passing through the device; business applications, consumer applications, network protocols, and everything in between. App-ID continually monitors the state of the application to determine if the application changes midstream, providing the updated information to the administrator in ACC, applies the appropriate policy and logs the information accordingly. Like all firewalls, next-generation firewalls use positive control, default deny all traffic, then allow only those applications that are within the policy. All else is blocked. All classification mechanisms, all application versions, all OS's. App-ID operates at the services layer, monitoring how the application interacts between the client and the server. This means that App-ID is indifferent to new features, and it is client or server operating system agnostic. The result is that a single App-ID for BitTorrent is going to be roughly equal to the many BitTorrent OS and client signatures that need to be enabled to try and control this application in other offerings. Full visibility and control of custom and internal applications. Internally developed or custom applications can be managed using either an application override or custom App-IDs. An applications override effectively renames the traffic stream to that of the internal application. The other mechanism would be to use the customizable App-IDs based on context-based signatures for HTTP, HTTPs, FTP, IMAP, SMTP, RTSP, Telnet, and unknown TCP /UDP traffic. Organizations can use either of these mechanisms to exert the same level of control over their internal or custom applications that may be applied to SharePoint, Salesforce.com, or FaceBook. Securely Enabling Applications Based on Users & Groups Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and applications mean that IP addresses alone have become ineffective as a mechanism for monitoring and controlling user activity. Next-generation firewalls integrate with the widest range of user repositories on the firewall market, enabling organizations to incorporate user and group information into their security policies. Through User-ID, organizations also get full visibility into user activity on the network as well as user based. Transparent use of users and groups for secure application enablement. User-ID seamlessly integrates with next-generation firewalls with the widest range of enterprise directories on the market; Active Directory, eDirectory, Open LDAP, Citrix Terminal Server, Microsoft Terminal Server, and XenWorks. A network-based User-ID agent communicates with the domain controller, mapping the user information to the firewall, making the policy tie-in completely transparent to the end-user. Integrating users and groups via an explicit, challenge / response mechanism. In cases where user repository information may be ineffective, a captive portal challenge/response mechanism can be used to tie users into the security policy. In addition to an explicit username and password prompt, Captive Portal can also be configured to send a NTLM authentication request to the web browser in order to make the authentication process transparent to the user. Integrate user information from other user repositories. In cases where organizations have a user repository or application that already has knowledge of users and their current IP address, a standards-based XML API can be used to tie the repository to the next-generation firewall. Protect the network from threats, control web surfing and limit file/data transfer. Content-ID combines a real-time threat prevention engine with a comprehensive URL database and elements of application identification to limit unauthorized data and file transfers, detect and block a wide range of threats and control non-work related web surfing. The application visibility and control delivered by App-ID, combined with the content inspection enabled by Content-ID means that IT departments can regain control over application traffic and the related content. NSS-rated IPS The NSS-rated IPS blocks known and unknown vulnerability exploits, buffer overflows, DoS attacks and port scans from compromising and damaging enterprise information resources. IPS mechanisms include: • Protocol decoder-based analysis statefully decodes the protocol and then intelligently applies signatures to detect vulnerability exploits. • Protocol anomaly-based protection detects non-RFC compliant protocol usage such as the use of overlong URI or overlong FTP login. • Stateful pattern matching detects attacks across more than one packet, taking into account elements such as the arrival order and sequence. • Statistical anomaly detection prevents rate-based DoS flooding attacks. • Heuristic-based analysis detects anomalous packet and traffic patterns such as port scans and host sweeps. • Custom vulnerability or spyware phone home signatures that can be used in the either the anti-spyware or vulnerability protection profiles. • Other attack protection capabilities such as blocking invalid or malformed packets, IP defragmentation and TCP reassembly are utilized for protection against evasion and obfuscation methods employed by attackers. Traffic is normalized to eliminate invalid and malformed packets, while TCP reassembly and IP de-fragmentation is performed to ensure the utmost accuracy and protection despite any attack evasion techniques. URL Filtering Complementing the threat prevention and application control capabilities is a fully integrated, URL filtering database consisting of 20 million URLs across 76 categories that enables IT departments to monitor and control employee web surfing activities. The on-box URL database can be augmented to suit the traffic patterns of the local user community with a custom, 1 million URL database. URLs that are not categorized by the local URL database can be pulled into cache from a hosted, 180 million URL database. In addition to database customization, administrators can create custom URL categories to further tailor the URL controls to suit their specific needs. URL filtering visibility and policy controls can be tied to specific users through the transparent integration with enterprise directory services (Active Directory, LDAP, eDirectory) with additional insight provided through customizable reporting and logging. File and Data Filtering Data filtering features enable administrators to implement policies that will reduce the risks associated with the transfer of unauthorized files and data. • File blocking by type: Control the flow of a wide range of file types by looking deep within the payload to identify the file type (as opposed to looking only at the file extension). • Data filtering: Control the transfer of sensitive data patterns such as credit card and social security numbers in application content or attachments. • File transfer function control: Control the file transfer functionality within an individual application, allowing application use yet preventing undesired inbound or outbound file transfer. Network Access Control Network Access Control (NAC) technology is a key driver to secure your corporate wired and wireless networks from unauthorized access. With organizations facing significant challenges on securing their access networks; with users ranging from employees, sub-contractors, semi-trusted 3rd party users, outsourced managed services team to guest users all trying to access corporate resources from managed and unmanaged endpoints through different access medium can be a daunting prospect for your security team. Designing and deploying the right NAC solution to meet your compliance requirements is paramount to ensure a consistent access control model is applied to the different user profiles. By providing dynamic network access based on user profiles and privileges is key to a successful deployment; understanding the key pain points in NAC integration with authentication, auto-remediation services, dynamic VLAN assignment based on endpoint compliance and reputation and designing the right solution is what differentiate TECHSMART IT SOLUTIONS with our competitors. At TECHSMART IT SOLUTIONS we understand through project deployment experiences the dynamics of NAC solutions and can provide the solution that best meets your organizational requirements. By collaborating with your security operations, network operations, service desk and support teams we are able to create a complete NAC workflow that details the exact procedural requirement to deploy NAC across your enterprise network. The NAC solution we offer is based on 802.1x standardized protocol and follows port based authentication and endpoint compliance before providing authorized network access to the user. TECHSMART IT SOLUTIONS Consultants can provide a complete integrated NAC solution that enables your organization to benefit from endpoint profiling, asset discovery, auto-remediation features, integration with IF-MAP supported devices based on the TNC group and guest access provisioning. At TECHSMART IT SOLUTIONS we believe NAC necessitates multiple vendor interoperability and seamless integration with your existing environment to provide a complete end-to-end solution. For more information about NAC design, deployment and solution offering consisting of a multi-vendor solution please contact our sales team. Contact: TECHSMART IT SOLUTIONS - (99491 97311) www.techsmartitsolutions.com mohammad@techsmartitsolutions.com
    Read More
    Details
    Query
    Share
    SEND
    Cyberoam Firewall Sales in Hyderabad Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG series for SOHO offer “the fastest UTMs made for SMBs” to small offices. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches User-Identity to security, which adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than only IP address. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts, offering future-ready security to organizations. Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location-aware and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - DoS and DDoS attack prevention - MAC and IP-MAC filtering - Spoof Prevention Intrusion Prevention System - Signatures: Default (4500+), Custom - IPS Policies: Pre-configured Zone-based multiple Policies, Custom - Filter based selection: Category, Severity, and Platform and Target (Client/Server) - IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels - Customize individual user scanning - Self Service Quarantine area - Scan and deliver by file size - Block by file types Gateway Anti-Spam - Inbound and Outbound Scanning - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - Self Service Quarantine area - IP address Black list/White list - Spam Notification through Digest - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89+), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2, 000+ Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk - Control various Commands and Functions Web Application Firewall - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Granular access control to all the enterprise network resources - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN, TAP - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE (with Schedule Management), L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SIM, Multicast Forwarding - Discover mode for PoC Deployments - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - Management over IPv6 - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks High Availability - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support\ Administration & System Management - Web-based configuration wizard - Role-based Access control - Support of API - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2c) - Multi-lingual : English, Chinese, Hindi, French, Japanese - Cyberoam Central Console (Optional) User Authentication - Internal database - AD Integration and OU-based Security Policies - Automatic Windows/RADIUS Single Sign On - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support** - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging/Monitoring - Real-time and historical Monitoring - Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication, System and Admin Events - Forensic Analysis with quick identification of network attacks and other traffic anomalies - Syslog support - 4-eye Authentication On-Appliance Cyberoam-iView Reporting - Integrated Web-based Reporting tool - 1, 200+ drilldown reports - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA - Zone based application reports - Historical and Real-time reports - Default Dashboards: Traffic and Security - Username, Host, Email ID specific Monitoring Dashboard - Reports – Application, Internet & Web Usage, Mail Usage, Attacks, Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high risk users and more - Client Types Report including BYOD Client Types - Multi-format reports - tabular, graphical - Export reports in - PDF, Excel, HTML - Email notification of reports - Report customization – (Custom view and custom logo) - Supports 3rd party PSA Solution – ConnectWise IPSec VPN Client*** - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4+ - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) Hardware Specifications Memory 2GB Compact Flash 2GB HDD 250GB or higher Compliance CE FCC Dimensions H x W x D (inches) H x W x D (cms) Weight Power Input Voltage Consumption Total Heat Dissipation (BTU) Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing) Contacts: TECHSMART IT SOLUTIONS Hyderabad. Mobile: 9949197311 Email: mohammad@techsmartitsolutions.com Visit us @ www.techsmartitsolutions.com Visit us @ www.techsmartitsolutions.in
    Read More
    Details
    Query
    Share
    SEND
    Next >