Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to large enterprises by allowing user identity-based policy controls.
Cyberoam's User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization's security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
Cyberoam's multi-core technology allows parallel processing of all its security features – ensuring security without compromising performance. Its future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
hancements that can be developed rapidly and deployed with minimum efforts.
SecurityNetwork Security » Firewall Content Security » Intrusion Prevention System » Wireless security » Anti-Virus/Anti-Spyware Administrative Security » Anti-Spam » HTTPS/SSL Content Security » Next-Gen UI » View Logging & Reporting | ConnectivityBusiness Continuity » Multiple Link Management Network Availability » High Availability » VPN Future-ready Connectivity » 3G/WiMAX Connectivity » “IPv6 Ready” Gold Logo | ProductivityEmployee Productivity » Content Filtering IT Resource Optimization » Instant Messaging Archiving & Controls » Bandwidth Management Administrator Productivity » Traffic Discovery » Application Layer 7 Management » Next-Gen UI |
Hardware Specifications | |
10/100/1000 GBE Ports | 12 |
Configurable Internal/DMZ/WAN ports | Yes |
Console ports (RJ45/DB9) | 1 |
| SFP(Mini GBIC) Ports | 4 |
USB ports | 2 |
Hardware Bypass Segments | 2* |
System Performance** | |
UTM Throughput (Mbps) | 800 |
Firewall Throughput (UDP) (Mbps) | 7500 |
Firewall Throughput (TCP) (Mbps) | 5500 |
New sessions/second | 50,000 |
Concurrent sessions | 1200,000 |
168-bit 3DES/AES throughput (Mbps) | 900/1200 |
Anti-Virus Throughput (Mbps) | 1250 |
IPS Throughput (Mbps) | 2000 |
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to large enterprises by allowing user identity-based policy controls.
Cyberoam's User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization's security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
Cyberoam's multi-core technology allows parallel processing of all its security features – ensuring security without compromising performance. Its future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
hancements that can be developed rapidly and deployed with minimum efforts.

SecurityNetwork Security » Firewall Content Security » Intrusion Prevention System » Wireless security » Anti-Virus/Anti-Spyware Administrative Security » Anti-Spam » HTTPS/SSL Content Security » Next-Gen UI » View Logging & Reporting | ConnectivityBusiness Continuity » Multiple Link Management Network Availability » High Availability » VPN Future-ready Connectivity » 3G/WiMAX Connectivity » “IPv6 Ready” Gold Logo | ProductivityEmployee Productivity » Content Filtering IT Resource Optimization » Instant Messaging Archiving & Controls » Bandwidth Management Administrator Productivity » Traffic Discovery » Application Layer 7 Management » Next-Gen UI |
Hardware Specifications | |
10/100/1000 GBE Ports | 12 |
Configurable Internal/DMZ/WAN ports | Yes |
Console ports (RJ45/DB9) | 1 |
| SFP(Mini GBIC) Ports | 4 |
USB ports | 2 |
Hardware Bypass Segments | 2* |
System Performance** | |
UTM Throughput (Mbps) | 800 |
Firewall Throughput (UDP) (Mbps) | 7500 |
Firewall Throughput (TCP) (Mbps) | 5500 |
New sessions/second | 50,000 |
Concurrent sessions | 1200,000 |
168-bit 3DES/AES throughput (Mbps) | 900/1200 |
Anti-Virus Throughput (Mbps) | 1250 |
IPS Throughput (Mbps) | 2000 |
| Manufacturer | Cyberoam |
|---|---|
| Designed For | Enterprise Network |
| Device Type | Security Appliance |
| Bundled with | No |
| Form Factor | External |
| Ports Qty | No |
| Condition | New |
| Renewal | No |
| Height (Rack Units) | 1U |
| Width | 17.25 in |
| Depth | 18.30 in |
| Height | 1.77 in |
| Weight | 29.8 lbs |
| RAM Installed (Max) | No |
| Flash Memory Installed (Max) | No |
| Connectivity Technology | Wired |
| Data Transfer Rate | No |
| Data Link Protocol | Ethernet, Fast Ethernet,GB Ethernet |
| Network / Transport Protocol | L2TP, IPSec |
| Routing Protocol | No |
| Remote Management Protocol | No |
| Performance | Firewall throughput (UDP) : 7500 Mbps Firewall Throughput (TCP) : 5500 Mbps IPS throughput: 2000 Mbps 3DES and AES performance : 600 nand 750 Mbps UTM throughput : 800 Mbps |
| Capacity | Concurrent connections :1200,000 Authenticated Users/Nodes: Unlimited New sessions/second: 50,000 |
| Features | Network Security, Content Security, Administrative Security, Business Continuity, Network Availability, Future-ready Connectivity, Employee Productivity, IT Resource Optimization, Administrator Productivity |
| Encryption Algorithm | No |
| Authentication Method | No |
| Compliant Standards | No |
| VoIP Protocols | No |
| Expansion Slots Total (Free) | No |
| Interfaces | 12 x 10/100/1000 GBE Ports, 4 x SFP (Mini GBIC) Ports, 2 x USB Ports |
| Included Accessories | No |
| Pricing Type | No |
| Power Device | Power adapter - external |
| Installed Qty (Power) | 1 |
| Voltage Required | 90-260VAC |
| Power Consumption Operational | 129W |
| Power Provided | No |
| OS Provided | No |
| Software Included | No |
| OS Required | No |
| Min Operating Temperature | 5°C |
| Max Operating Temperature | 40°C |
| Humidity Range Operating | 10 - 90% |
| Part Number | No |
| UPC | No |
| Protection Level | UTM Optional |
| Firewall Type | Wired Firewall |
| Network Interface Speed | 10/100/1000 Mbps |
| VPN Tunnels | No |
| VPN Clients Included | No |
| Product Articles RSS | No |
| Price | $11,999.00 |