///
Solution categories
|
|
 |
Web Application Firewall |
Cyberoam offers Web Application Firewall subscription on its UTM appliances to secure websites and Web-based applications in organizations against attacks such as SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows, and more, including the OWASP Top 10 Web application vulnerabilities. |
 |
|
 |
On-Appliance Reporting |
Cyberoam’s on-appliance reporting delivers Layer 8 Identity-based visibility into user and network activity, offering real-time information regarding who is doing what across central and remote locations. Cyberoam UTM appliances deliver in-depth reporting over the appliance, eliminating the need for an independent reporting solution and minimizing the resultant security investment and operational expense.
|
 |
|
 |
Multiple Link Management |
Cyberoam’s Multiple Link Management supports WAN redundancy and delivers assured WAN availability and reliable connectivity. With Cyberoam’s management of WAN connectivity, organizations have assured access to business applications involved in collaboration, Cloud and SaaS deployments. It optimizes multiple links, delivering ROI and minimizing overload.
|
 |
|
 |
Bandwidth Management |
Cyberoam Bandwidth Management offers Layer 8 Identity-based bandwidth control, preventing congestion, bandwidth abuse and optimizing bandwidth and delivering higher ROI. The solution prioritizes business-critical applications and users with granular Layer 7 and Layer 8 controls, supporting Cloud and SaaS deployments while lowering capital expense involved in bandwidth purchase.
|
 |
|
 |
Instant Messaging Archiving & Controls |
Cyberoam’s IM Archiving and Control limits communication and file transfer over IM, preventing data leakage, phishing, malware, viruses, Trojans, worms, botnets and other malicious attacks. Cyberoam’s Instant Messaging Controls implement Layer 8 Identity-based policies to control access to IM applications like Yahoo Messenger and Windows Live Messenger. It offers granular logs and reports, providing visibility and archiving facility that meet regulatory compliance requirements. |
 |
|
 |
Web Filtering |
Cyberoam’s award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses. |
 |
|
 |
Unified Threat Management (UTM) Firewall |
Cyberoam Unified Threat Management appliances, available as hardware and virtual appliances, offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective. |
 |
|
|
|
|
|