Internet Security

Skip to Main Content »

Have a Question? Call Us!
Toll Free: 877.449.5102

Welcome to NTSecurity.com

You're currently on:

Cyberoam subscription-500ia-rp 3 Year Security Value Subscription for Cyberoam CR 500ia-RP 7833.80

Anti-Virus & Anti-Spyware

Cyberoam Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and keyloggers.

Cyberoam's Check Mark Level 5 certified gateway anti-virus is tightly integrated with IPS, Web Filtering and Anti-Spam, securing organizations against blended attacks and maintaining high levels of security.

Feature Feature Description Benefit
Broad Security Cover » Malware scan over incoming and outgoing traffic
» Virus, worm, Trojan detection and removal
» Spyware, malware, phishing protection
» Scan and deliver by file size
» Block by file types
» Multiple protocol support: HTTP, HTTPS, FTP, IM, P2P, SMTP, POP3, IMAP, VPN tunnels
» Millions of signatures in database
» Half-hourly signature updates
» White lists and black lists for protection
» Reduces window of vulnerability
» Prevents misuse of the encrypted HTTPS / SSL traffic for malware propagation
» Blocks attachments of executables, media files, password-protected attachments
Zero-Hour Protection » Virus Outbreak Detection (VOD) based on detection of outbreak pattern
» Signature-less protection
» Protects against early-hour vulnerability of massive virus outbreaks
» Eliminates security gaps related to signature update delays
Layer 8 Identity-based Security » Identity-based on-appliance reporting
» Differential policy creation based on user's business need
» Instant identification of source or destination of attack based on user identity, leading to high security
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
Self-Service Virus Quarantine » Quarantine of virus-infected emails through Cyberoam Anti-Spam
» User right to check quarantine mails
» Real-time Email Security
» Prevents mail loss
» Saves IT administrator time
» Meets quarantine requirements of regulatory compliance
Centralized Security » Automated policy updates through CCC
» Centralized logging and reporting with CCC and Cyberoam iView
» High security for remote networks
» Simplifies remote security management
Cost-Effective » Single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security

Web Filtering

Cyberoam's award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Cyberoam's Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

Feature Feature Description Benefit
Web Categorization » On-appliance database
» Web filter with 82+ Web categories
» Custom categories
» Automatic updates through WebCat – The Website Categorization Engine
» Lowers response time and reduces privacy concerns
» Comprehensive and company-specific web filtering
Web Filtering Options » URL
» Keyword
» File type
» Database
» Comprehensive web filtering & content filtering
Web Security » Blocks third-party proxy and tunnelling software
» Blocks Google cache pages
» Blocks embedded URLs in websites
» Enforces ‘safe search’ in search engines
» Blocks malware, phishing, pharming URLs
» Blocks Java Applets, Cookies, Active X
» Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
HTTPS Controls » Visibility into encrypted HTTPS Traffic
» Prevents unauthorized file upload and download over HTTP and HTTPS
» Blocks unauthorized, malicious and illegal HTTPS websites
» Data Leakage Prevention with web filtering and content filtering
» Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
» Controls legal liability
Regulatory Compliance » Implements Internet Safety Policy
» Active member of Internet Watch Foundation (IWF), UK
» Prevents Data Leakage
» Enables CIPA compliance and supports E-Rate Funding
» HIPAA
» PCI DSS
Layer 8 Identity-based Controls » Username, group, work-requirement based policies
» Schedule-based access control
» User authentication through ADS, RADIUS, SSO, local and thin client
» High security with high flexibility
» Prevents productivity loss
» Integrates with a range of existing authentication mechanisms
Best-of-breed Replacement » Offers single, per-appliance subscription as opposed to per-user subscription
» Custom messages to user with reason for blocked website
» Category-based bandwidth allocation and prioritization
» Data and bandwidth quota based on web categories and time of the day
» Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
» Educates users regarding best practices in web usage
» Ensures bandwidth to business-critical applications
» Prevents productivity loss

Intrusion Prevention System

Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

Cyberoam's signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities

Feature Feature Description Benefit
Multiple Protocol Support » HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
» Automatically detects, blocks, drops suspicious traffic
» Security against network, application and human layer attacks
IPS Policy Tuner » Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
» Identity-based alerts
» Role-based access to users and groups
» Minimizes noise related to false positive alerts, traffic latency and improved performance
Signature Updation » Regular updates by the Cyberoam Internet Threat Response Team
» Customized signatures by organizations
» HTTP Proxy signatures
» Protection against latest vulnerabilities
» Zero-hour protection during an outbreak prevents user masking through anonymous proxies
Centralized Security » Centralized custom signature creation and implementation at remote offices with CCC » Zero-hour protection for distributed networks
» Simplified security with lower cost of operations
Logging & Reporting » Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
» Dashboard, Top alerts, attackers and victims with severity of attacks
» Centralized logging reporting with Cyberoam iView and CCC
» Meets compliance requirements for CIPA, HIPAA, PCI DSS
» Meets requirements of forensic analysis
» Rapid corrective action with high security
Cost-Effective » Offers single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security

Basic Support Plan

Cyberoam's Basic Support Plan is designed to provide you best of the services with limited investment. The basic plan offers you 8 hours-a-day 5-days-a-week support along with access to Cyberoam Knowledge Base and Online Case CollectionTool.

Technical Support Services

Remote technical support is provided through

- Phone: 8 x 5 Support (Business days only)
- Email: 8 x 5 Support (Business days only)
- Web: 8 x 5 Support (Business days only)
Response time: First Response - 4 hrs maximum

Online Support Services

- Unlimited access to Knowledge base
24x7 Access to Cyberoam knowledge-base, allowing you access to documentation, product information, manuals, software release notes, etc. Cyberoam Knowledge- base also helps you to research common technical issues at your convenience.

- Restricted access to TACCase collection tool:URL
24x7 Access to our Cyberoam Case Collection Centre, allowing you restricted access to current customer support cases as well as resolved cases.

Software Support Services

- Hot-Fixes and enhancement upgrades 24x7
- Software andOSupgrades 24x7
- Signature and database update 24x7

- Web content filtering
- Intrusion Detection and Prevention
- Anti Virus,Anti-Spyware,Anti-Malware
- Anti Spam Database
- Remote Diagnostics: Under Special Cases, Cyberoam Engineers will perform
remote diagnostic &analysis of your Cyberoam Console.

Warranty and Replacement Services

- Limited 1Year hardware warranty on Cyberoam spares-parts except power supply &fans.
- 10 day return and replacement policy

http://www.ntsecurity.com/3-year-security-value-subscription-for-cyberoam-cr-500ia-rp.html in_stock Yes Products Catalog USD
3 Year Security Value Subscription for Cyberoam CR 500ia-RP

01-SVS-PRC-0500IARP-03 3 Year Security Value Subscription for Cyberoam CR 500ia-RP

$7,833.80


Purchase Orders & Company Checks Accepted.

3 Year Security Value Subscription for Cyberoam CR 500ia-RP

Double click on above image to view full picture

Zoom Out
Zoom In

More Views

Details

Anti-Virus & Anti-Spyware

Cyberoam Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and keyloggers.

Cyberoam's Check Mark Level 5 certified gateway anti-virus is tightly integrated with IPS, Web Filtering and Anti-Spam, securing organizations against blended attacks and maintaining high levels of security.

Feature Feature Description Benefit
Broad Security Cover » Malware scan over incoming and outgoing traffic
» Virus, worm, Trojan detection and removal
» Spyware, malware, phishing protection
» Scan and deliver by file size
» Block by file types
» Multiple protocol support: HTTP, HTTPS, FTP, IM, P2P, SMTP, POP3, IMAP, VPN tunnels
» Millions of signatures in database
» Half-hourly signature updates
» White lists and black lists for protection
» Reduces window of vulnerability
» Prevents misuse of the encrypted HTTPS / SSL traffic for malware propagation
» Blocks attachments of executables, media files, password-protected attachments
Zero-Hour Protection » Virus Outbreak Detection (VOD) based on detection of outbreak pattern
» Signature-less protection
» Protects against early-hour vulnerability of massive virus outbreaks
» Eliminates security gaps related to signature update delays
Layer 8 Identity-based Security » Identity-based on-appliance reporting
» Differential policy creation based on user's business need
» Instant identification of source or destination of attack based on user identity, leading to high security
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
Self-Service Virus Quarantine » Quarantine of virus-infected emails through Cyberoam Anti-Spam
» User right to check quarantine mails
» Real-time Email Security
» Prevents mail loss
» Saves IT administrator time
» Meets quarantine requirements of regulatory compliance
Centralized Security » Automated policy updates through CCC
» Centralized logging and reporting with CCC and Cyberoam iView
» High security for remote networks
» Simplifies remote security management
Cost-Effective » Single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security


Web Filtering

Cyberoam's award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Cyberoam's Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

Feature Feature Description Benefit
Web Categorization » On-appliance database
» Web filter with 82+ Web categories
» Custom categories
» Automatic updates through WebCat – The Website Categorization Engine
» Lowers response time and reduces privacy concerns
» Comprehensive and company-specific web filtering
Web Filtering Options » URL
» Keyword
» File type
» Database
» Comprehensive web filtering & content filtering
Web Security » Blocks third-party proxy and tunnelling software
» Blocks Google cache pages
» Blocks embedded URLs in websites
» Enforces ‘safe search’ in search engines
» Blocks malware, phishing, pharming URLs
» Blocks Java Applets, Cookies, Active X
» Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
HTTPS Controls » Visibility into encrypted HTTPS Traffic
» Prevents unauthorized file upload and download over HTTP and HTTPS
» Blocks unauthorized, malicious and illegal HTTPS websites
» Data Leakage Prevention with web filtering and content filtering
» Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
» Controls legal liability
Regulatory Compliance » Implements Internet Safety Policy
» Active member of Internet Watch Foundation (IWF), UK
» Prevents Data Leakage
» Enables CIPA compliance and supports E-Rate Funding
» HIPAA
» PCI DSS
Layer 8 Identity-based Controls » Username, group, work-requirement based policies
» Schedule-based access control
» User authentication through ADS, RADIUS, SSO, local and thin client
» High security with high flexibility
» Prevents productivity loss
» Integrates with a range of existing authentication mechanisms
Best-of-breed Replacement » Offers single, per-appliance subscription as opposed to per-user subscription
» Custom messages to user with reason for blocked website
» Category-based bandwidth allocation and prioritization
» Data and bandwidth quota based on web categories and time of the day
» Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
» Educates users regarding best practices in web usage
» Ensures bandwidth to business-critical applications
» Prevents productivity loss

Intrusion Prevention System

Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

Cyberoam's signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities

Feature Feature Description Benefit
Multiple Protocol Support » HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
» Automatically detects, blocks, drops suspicious traffic
» Security against network, application and human layer attacks
IPS Policy Tuner » Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
» Identity-based alerts
» Role-based access to users and groups
» Minimizes noise related to false positive alerts, traffic latency and improved performance
Signature Updation » Regular updates by the Cyberoam Internet Threat Response Team
» Customized signatures by organizations
» HTTP Proxy signatures
» Protection against latest vulnerabilities
» Zero-hour protection during an outbreak prevents user masking through anonymous proxies
Centralized Security » Centralized custom signature creation and implementation at remote offices with CCC » Zero-hour protection for distributed networks
» Simplified security with lower cost of operations
Logging & Reporting » Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
» Dashboard, Top alerts, attackers and victims with severity of attacks
» Centralized logging reporting with Cyberoam iView and CCC
» Meets compliance requirements for CIPA, HIPAA, PCI DSS
» Meets requirements of forensic analysis
» Rapid corrective action with high security
Cost-Effective » Offers single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security

Basic Support Plan

Cyberoam's Basic Support Plan is designed to provide you best of the services with limited investment. The basic plan offers you 8 hours-a-day 5-days-a-week support along with access to Cyberoam Knowledge Base and Online Case CollectionTool.

Technical Support Services

Remote technical support is provided through

- Phone: 8 x 5 Support (Business days only)
- Email: 8 x 5 Support (Business days only)
- Web: 8 x 5 Support (Business days only)
Response time: First Response - 4 hrs maximum

Online Support Services

- Unlimited access to Knowledge base
24x7 Access to Cyberoam knowledge-base, allowing you access to documentation, product information, manuals, software release notes, etc. Cyberoam Knowledge- base also helps you to research common technical issues at your convenience.

- Restricted access to TACCase collection tool:URL
24x7 Access to our Cyberoam Case Collection Centre, allowing you restricted access to current customer support cases as well as resolved cases.

Software Support Services

- Hot-Fixes and enhancement upgrades 24x7
- Software andOSupgrades 24x7
- Signature and database update 24x7

- Web content filtering
- Intrusion Detection and Prevention
- Anti Virus,Anti-Spyware,Anti-Malware
- Anti Spam Database
- Remote Diagnostics: Under Special Cases, Cyberoam Engineers will perform
remote diagnostic &analysis of your Cyberoam Console.

Warranty and Replacement Services

- Limited 1Year hardware warranty on Cyberoam spares-parts except power supply &fans.
- 10 day return and replacement policy

Additional Information

Manufacturer Cyberoam
Subscription Service Security Value Subscription
Subscription Length 3 Years
Special Sales Message No
Price $7,833.80

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Additional Product Images: