Notes

Register on our Website to access:

  • Pricelists
  • Support Portal
  • Free Downloads
  • PDF Data Sheets
  • Live Chat
  • and more....
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page
  • Home Page

Signup for our Special Offers

VOIP Service

Access our NEW VOIP Portal &
Sign Up for FREE !!

Downloads

General Catalog for Iraq 
August 2012
Download

Internet Pricing for Iraq
(please contact sales for password) 
Download

Cyberoam’s integrated Security Appliances are purpose-built for comprehensive network protection and high performance needs of small, medium and large enterprises. Cyberoam’s Check Mark Level 5 certified, ICSA firewall certified identity-based Internet Security Appliances offer protection against external as well as internal threats.

 

 

Identity-based Security
Cyberoam’s unique user identity-based
Internet Security Appliances solve today’s need to control individual user behavior to ensure comprehensive threat management. It gives complete visibility into Who is doing What in the network and allows policies to be created at the user level based on work profiles. With the finest level of controls and an unprecedented degree of control, flexibility and ease of management, the Cyberoam Internet Security Appliance is a highly effective UTM solution that reduces capital and operating expenses.

Architecture Flexibility
Cyberoam’s architectural flexibility can easily accommodate emerging applications like VoIP through own enhancements and easy third party plug-ins with no architectural changes, keeping enterprises in a state of constant threat-readiness in a rapidly evolving threat scenario. Cyberoam appliances balance performance and security by using technologies like multi core processors, regular expressions co processors and hardware based Advanced Cryptography Engine for accelerating key functions of the
UTM appliance.

Segment Key Benefits Cyberoam Appliances

SOHO :
Small Office-
Home Office

Identity-based Unified Threat Management (UTM) features including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks.

Zero-hour malware protection that does not wait for signature release

Complete ease of management, eliminating the need for technical resource

CR25i

CR50i

ROBO :
Remote Office- Branch Office

Identity-based Unified Threat Management (UTM) security features including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks.

Encrypted VPN tunnel for secure communication with branch office

Identity-based security with visibility into and control over individual user activity at branches

Zero-hour protection at branch offices with enterprise-wide security policy enforcement

CR25i

CR50i

Small and Medium Enterprises

Purpose-built UTM Security Appliances providing comprehensive security and high performance

Identity-based Unified Threat Management (UTM) security features including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks and limited capital, operating expense.

Identity-based visibility and control even in dynamic IP environments like Wi-Fi and DHCP, enabling regulatory compliance

Dynamic routing, and VLAN, supporting rapid network expansion

High Availability for business continuity

CR100i

 

CR250i

 

CR500i

 

Large Enterprises

Identity-based security with visibility into and control over individual user activity, for protection against external and internal threats. Also enables regulatory compliance

Purpose-built Security Appliances providing comprehensive security against network and application-level attacks and high performance

Multicore architecture delivering high throughput and flexibility for high traffic requirements

Enterprise-grade security with High Availability, dynamic routing and Virtual LAN capability.

Identity-based Unified Threat Management (UTM) features, including Stateful Inspection Firewall, VPN, Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks

Encrypted tunnel for secure communication with remote locations

Centralized security control over remote offices

CR1000i

CR1500i