Cyberoam OS Features


Advanced Application Controls

Cyberoam’s Application Visibility & Control feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.

On-appliance Web Application Firewall

The Web Application Firewall, available as a subscription on Cyberoam NG series UTM appliances, protects web servers and Web applications from hackers and other OWASP Top 10 Web application vulnerabilities, without the need to invest in a separate WAF appliance.

FleXi Ports (XP)

The FleXi Ports offer flexible network connectivity options and configuration freedom to organizations, with flexible I/O slots that allow additional Copper 1G, Fiber 1G/10G ports in the same security appliance.

Support for new Connectivity Technologies, 4G/LTE

Cyberoam makes organizations ready for high speed future over Wireless WAN with support for new connectivity technologies – 4G /LTE. Easy to deploy with a simple USB modem plug-in into Cyberoam appliance, organizations can ensure business connectivity with automatic failover to3G / 4G / WiMAX connection, and VPN connection over 3G / 4G / WiMax.

First-of-its-kind On-appliance Reporting

Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

Identity-based Controls with Layer 8 Technology

Cyberoam’s Layer 8 Technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.

Advanced Threat Protection

Cyberoam NG series offers best-of-breed security of Intrusion Prevention System, GatewayAnti-Virus/Anti-Spyware, Gateway Anti-Spam, Web & Content Filtering and Outbound Spam Protection to offer protection against newly evolving threats.

FUSION Technology-driven SI Firewall

Cyberoam’s hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks.

Virtual Private Network

Cyberoam VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.