NEWS
Cyberoam UTM – CR25i
By VARINDIA - 2010-04-02
The inflow of enormous information, opening of access channels and the prying eyes of Cyber-offenders can be accounted for the need of a robust security management system like Cyberoam CR25i.
The Cyberoam ranges of products provide identity-based integrated security appliances that facilitate real-time protection against mixed threats through their unique user identity-based policies.
The internet fraternity has witnessed spyware, phishing and pharming as emerging issues, but at the same time it has also taken issues like Bandwidth abuse, Legal liabilities and sexual harassment cases with sincere concern. Thus, it becomes critically important for a strong system to protect confidential information from cyber-attackers. The Cyberoam CR25i is equipped with Double layer protection. While the first layer (internal layer) provides content filtering, the second layer (outer layer) provides Firewall, VPN and anti-spam shield.
Cyberoam ensures hardware failure protection for hard disk and processor from power outage, to maximize network uptime and ensure uninterrupted access for users, through its integrated high availability mechanism. The appliance protects corporate, educational and government installations from internal and external security threats, which include familiar issues like virus, worms, Trojans, DoS attacks and also newly discovered issues like spyware, phishing, pharming, and other threats.
Key Features that make Cyberoam a Good Product.
Identity-based Firewall for Application layer protection and flexibility to set policies to suit user requirements.
VPN ensures secure connectivity and access to branch offices and legitimate remote users.
Gateway Anti-Virus provides complete protection of traffic over all protocols, which means real-time security for data transmissions. This is achieved by scanning HTTP, SMTP and POP3 traffic and instantly identifying users in threat situations.
Gateway Anti-Spam makes zero hour protection available in case of virus outbreaks. This feature is enhanced by enabling multi-language and multi-format spam detection algorithms. Also, it is adaptive to the new kinds of threats that might be an issue for the network security.
Intrusion Detection & Prevention (IDP) imparts Real-time Security in dynamic environments like DHCP and specially Wi-Fi. It also offers instant user-identification in case of internal threats and is capable of interrupting malicious data. Cyberoam products apply IDP policies on all users uniformly.
Content Filtering – This feature is exclusive to Cyberoam products and is implemented with great perfection. It prevents direct exposure of network to external threats and saves bandwidth from abuse. Particularly, it prevents downloading of streaming video, games and ads which use a lot of bandwidth and hence compromising on useful data communication. Automated web categorization and CIPA compliance for schools and libraries make Cyberoam a good product for your organization.
Bandwidth Management allows bandwidth congestion protection and prioritizes bandwidth for critical applications.
Multi-Link Manager grants easy-to-manage security over multiple links and optimizes bandwidth congestion for large corporate houses.
On-Appliance Reporting – The Cyberoam comes with a bundled TCO at no additional purchase cost. The TCO makes available instant and complete visibility into patterns of usage, instant identification of victims and attackers in internal network.
Our review finds that the key benefit to users of Cyberoam would be easy to adapt to GUI-based interface, constant monitoring and prevention methodology, the scalability and upgradeability of its products and an extremely reliable and prompt reaction to security threats. The company has already installed its security systems with organizations like LG Elecronics, Oil and Natural Gas Corporation of India (ONGC), IIM–Lucknow, Gujarat University and Scindia School, and many more prominent houses are expected to rely on Cyberoam products for their security needs.
Hardware Specifications
Interfaces
10/100 Ethernet ports- 4
10/100/1000 GBE ports -
Configurable Internal/DMZ/WAN ports -Yes
Console ports (RJ45) -
SFP (Mini GBIC) ports -
COM port -1
USB ports -2
Dimensions
Height -1.97 inches
Width -8.86 inches
Depth-- 8.07 inches
Power
Input Voltage -100-240VAC
Redundant Power Supply -
Environmental
Operating Temperature -5 to 40 °C
Storage Temperature 0 to 70 °C
Relative Humidity (Non-condensing) 5 to 95%
Cooling System (40mm Fan) -1
See What’s Next in Tech With the Fast Forward Newsletter
SECURITY
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.