Web Categorization |
![](http://www.cyberoam.com/images/blackarrow.png) |
On-appliance database |
![](http://www.cyberoam.com/images/blackarrow.png) |
Web filter with 82+ Web categories |
![](http://www.cyberoam.com/images/blackarrow.png) |
Custom categories |
![](http://www.cyberoam.com/images/blackarrow.png) |
Automatic updates through WebCat – The Website Categorization Engine |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Lowers response time and reduces privacy concerns |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Comprehensive and company-specific web filtering |
|
|
Web Filtering Options |
![](http://www.cyberoam.com/images/blackarrow.png) |
URL |
![](http://www.cyberoam.com/images/blackarrow.png) |
Keyword |
![](http://www.cyberoam.com/images/blackarrow.png) |
File type |
![](http://www.cyberoam.com/images/blackarrow.png) |
Database |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Comprehensive web filtering & content filtering |
|
|
Web Security |
![](http://www.cyberoam.com/images/blackarrow.png) |
Blocks third-party proxy and tunnelling software |
![](http://www.cyberoam.com/images/blackarrow.png) |
Blocks Google cache pages |
![](http://www.cyberoam.com/images/blackarrow.png) |
Blocks embedded URLs in websites |
![](http://www.cyberoam.com/images/blackarrow.png) |
Enforces ‘safe search’ in search engines |
![](http://www.cyberoam.com/images/blackarrow.png) |
Blocks malware, phishing, pharming URLs |
![](http://www.cyberoam.com/images/blackarrow.png) |
Blocks Java Applets, Cookies, Active X |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results |
|
|
|
|
HTTPS Controls |
![](http://www.cyberoam.com/images/blackarrow.png) |
Visibility into encrypted HTTPS Traffic |
![](http://www.cyberoam.com/images/blackarrow.png) |
Prevents unauthorized file upload and download over HTTP and HTTPS |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Blocks unauthorized, malicious and illegal HTTPS websites |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Data Leakage Prevention with web filtering and content filtering |
![](http://www.cyberoam.com/images/blackarrow.png) |
Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer |
|
|
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Controls legal liability |
|
Regulatory Compliance |
![](http://www.cyberoam.com/images/blackarrow.png) |
Implements Internet Safety Policy |
![](http://www.cyberoam.com/images/blackarrow.png) |
Active member of Internet Watch Foundation (IWF), UK |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Prevents Data Leakage |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Enables CIPA compliance and supports E-Rate Funding |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
HIPAA |
![](http://www.cyberoam.com/images/blackarrow.png) |
PCI DSS |
|
Layer 8 Identity-based Controls |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
High security with high flexibility |
![](http://www.cyberoam.com/images/blackarrow.png) |
Prevents productivity loss |
![](http://www.cyberoam.com/images/blackarrow.png) |
Integrates with a range of existing authentication mechanisms |
|
|
Best-of-breed Replacement |
![](http://www.cyberoam.com/images/blackarrow.png) |
Offers single, per-appliance subscription as opposed to per-user subscription |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Custom messages to user with reason for blocked website |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Category-based bandwidth allocation and prioritization |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Data and bandwidth quota based on web categories and time of the day |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security |
|
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Educates users regarding best practices in web usage |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Ensures bandwidth to business-critical applications |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Prevents productivity loss |
|