Description
Please note this device has reached end of life and does not come with any updates or support from the manufacturer. Supports 100/10 Mps Ethernet connections Model Name/Number Cr 100i Brand Cyberoam Usage/Application Firewall Compact Flash 4GB Copper Gbe Ports 8 Memory 2GB Tcp Firewall Throughput 5,000 Mbps Overview Cyberoam is the only UTM appliance that embeds user identity in firewall rule matching criteria, eliminating IP addresses as intermediate components to identify and control the user. This offers instant visibility and proactive controls over security breaches. Also, this delivers complete security in dynamic IP environments like DHCP and Wi-Fi where the user cannot be identified through IP addresses. The Cyberoam Advantage: -Linking user identity with security -Twin Shield Security -Time-based Policies -Real-time Protection - Intelligent On-Appliance Reporting Cyberoam Firewall/ Router Cyberoam CR100i is an identity-based security appliance that delivers real-time network protection against evolving Internet threats to small and medium enterprises (SMEs) through unique user based policies. Small and medium enterprises with limited security like firewall, anti-virus are exposed to Internet threats. Cyberoam delivers comprehensive protection from malware, virus, spam, phishing, pharming and more. Its unique identity-based security protects users from internal threats that lead to data leakage. Cyberoam features include Stateful Inspection Firewall, VPN (SSL & IPSec), Gateway Anti-Virus and Anti-Spyware, Gateway Anti-Spam, IPS, Content Filtering, Bandwidth Management, Multiple Link Management and can be centrally managed with Cyberoam Central Console. Identity-based Security in UTM Cyberoam attaches the user identity to security, taking enterprises a step ahead of conventional solutions that bind security to IP-addresses. Cyberoam's identity-based security offers full business flexibility while ensuring complete security in any environment, including DHCP and Wi-Fi, by identifying individual users within the network-whether they are victims or attackers.