Firewall to Layer 8

Firewall security extended to Layer 8

Cyberoam Firewall is available as a Next-Generation Firewall and UTM firewall. It offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.

Cyberoam’s patent pending, Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all features, providing ease of management and high security with flexibility.

Feature Feature Description Benefit
Human Layer 8 Identity-based Security
Firewall with Identity-based policy creation
Access Control Criteria (ACC) – User-Identity, Source & Destination Zone, MAC and IP address, Service
Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
User identity-based decision making prevents errors associated with IP address-based policies
Simplifies audit requirements with instant user identification
FUSION Technology
Policy creation for multiple security features through single interface in firewalls
Firewalls well-integrated with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering,Bandwidth Management, Multiple Link Management
Blends Security, Connectivity, Productivity
Provides integrated perimeter security
Thin Client Support
Thin client authentication with session IDs
Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
Identity-based policies in thin client environment
Supports SaaS deployments and Cloud environment
Enterprise-Grade Security
Firewall with High Availability with stateful failover
Available as Next-Generation Firewalls and UTMs
Multiple Security Zones
Firewall appliance offering Dynamic Routing
VLAN support
Virtual host capability
Multi-casting
Multi-core technology allows high-speed parallel processing
ICSA-certified firewalls
Checkmark Level 5 Certified
Faster up-times, reduced latency, simplified configuration, supports rapid network growth
Supports creation of work profile-based groups across distributed locations
Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
Supports applications that work on real-time updates like stock updates for financial institutions
High throughput
Centralized Management
Centralized Security with CCC
Simplified security management
Logging & Reporting
Layer 8 Identity-based Reporting
Firewall logs
Centralized logging and reporting with Cyberoam iView and CCC
Meets compliance requirements for CIPA, HIPAA, PCI DSS

aa23