Internet Security

Skip to Main Content »

Have a Question? Call Us!
Toll Free: 877.449.5102

Welcome to NTSecurity.com

You're currently on:

Cyberoam subscription-15i 3 Year Renewal - Total Value Subscription Plus for Cyberoam CR 15i 349.60

Anti-Virus & Anti-Spyware

Cyberoam Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and keyloggers.

Cyberoam's Check Mark Level 5 certified gateway anti-virus is tightly integrated with IPS, Web Filtering and Anti-Spam, securing organizations against blended attacks and maintaining high levels of security.

Feature Feature Description Benefit
Broad Security Cover » Malware scan over incoming and outgoing traffic
» Virus, worm, Trojan detection and removal
» Spyware, malware, phishing protection
» Scan and deliver by file size
» Block by file types
» Multiple protocol support: HTTP, HTTPS, FTP, IM, P2P, SMTP, POP3, IMAP, VPN tunnels
» Millions of signatures in database
» Half-hourly signature updates
» White lists and black lists for protection
» Reduces window of vulnerability
» Prevents misuse of the encrypted HTTPS / SSL traffic for malware propagation
» Blocks attachments of executables, media files, password-protected attachments
Zero-Hour Protection » Virus Outbreak Detection (VOD) based on detection of outbreak pattern
» Signature-less protection
» Protects against early-hour vulnerability of massive virus outbreaks
» Eliminates security gaps related to signature update delays
Layer 8 Identity-based Security » Identity-based on-appliance reporting
» Differential policy creation based on user's business need
» Instant identification of source or destination of attack based on user identity, leading to high security
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
Self-Service Virus Quarantine » Quarantine of virus-infected emails through Cyberoam Anti-Spam
» User right to check quarantine mails
» Real-time Email Security
» Prevents mail loss
» Saves IT administrator time
» Meets quarantine requirements of regulatory compliance
Centralized Security » Automated policy updates through CCC
» Centralized logging and reporting with CCC and Cyberoam iView
» High security for remote networks
» Simplifies remote security management
Cost-Effective » Single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security

Cyberoam Anti-Spam

Cyberoam Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more.

Cyberoam's Check Mark Level 5 certified Anti-Spam solution offers 98% protection against zero-hour attacks with .0001% false positive rate, minimizing the threat of business mail loss.

Feature Feature Description Benefit
Spam Filtering » IP reputation-based filtering
» RBL Lists, MIME header check
» Based on message header, size, sender, recipient
» Screens out the 90% spam in incoming mail
» Saves bandwidth
Recurrent Pattern Detection » Automated antispam protection based on distribution pattern
» Extracts and analyzes relevant message patterns
» Signature-less technique
» Detects, blocks emerging spam outbreaks
» Blocks attachment-based spam – PDF, XL, MP3 etc.
» Content agnostic, multi-language, multi-format antispam protection – Blocks foreign language, image spam
» Zero-hour protection with no wait for signature updates
» Narrow window of exposure
» High spam catch rate
Virus Outbreak Detection (VOD) » Signature-less detection from Cyberoam Anti-Virus and Anti-» Spyware » Closes early-hour vulnerability gap of massive virus outbreaks over email
» Protects against the initial peak of attack
» Comprehensive Email Security
Identity-based Security » Layer 8 Identity-based requirement
» Copy and route mail to pre-defined mail addresses
» Data Leakage Prevention
» Granular protection based on user work profile
Email Management » Granular email management with message and attachment size, subject line etc. » Minimizes exposure to threats and legal implications
» Increases productivity
» Lower cost of compliance
» Quick recovery for disaster management
Self-Service Quarantine Area » Quarantines malware-infected mails
» Sends Spam Digest to users
» User right to check quarantine mails
» Meets security and regulatory compliance requirements
» Saves IT administrator time
Email Logging and Reporting » Data archiving
» Extensive Layer 8 Identity-based reporting – Top spam receivers, senders, applications of spam
» Real-time logs and reports
» Options of on-appliance reporting, centralized reporting from CCC and Cyberoam iView
» Meets regulatory compliance, audit, forensic requirements

Web Filtering

Cyberoam's award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Cyberoam's Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

Feature Feature Description Benefit
Web Categorization » On-appliance database
» Web filter with 82+ Web categories
» Custom categories
» Automatic updates through WebCat – The Website Categorization Engine
» Lowers response time and reduces privacy concerns
» Comprehensive and company-specific web filtering
Web Filtering Options » URL
» Keyword
» File type
» Database
» Comprehensive web filtering & content filtering
Web Security » Blocks third-party proxy and tunnelling software
» Blocks Google cache pages
» Blocks embedded URLs in websites
» Enforces ‘safe search’ in search engines
» Blocks malware, phishing, pharming URLs
» Blocks Java Applets, Cookies, Active X
» Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
HTTPS Controls » Visibility into encrypted HTTPS Traffic
» Prevents unauthorized file upload and download over HTTP and HTTPS
» Blocks unauthorized, malicious and illegal HTTPS websites
» Data Leakage Prevention with web filtering and content filtering
» Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
» Controls legal liability
Regulatory Compliance » Implements Internet Safety Policy
» Active member of Internet Watch Foundation (IWF), UK
» Prevents Data Leakage
» Enables CIPA compliance and supports E-Rate Funding
» HIPAA
» PCI DSS
Layer 8 Identity-based Controls » Username, group, work-requirement based policies
» Schedule-based access control
» User authentication through ADS, RADIUS, SSO, local and thin client
» High security with high flexibility
» Prevents productivity loss
» Integrates with a range of existing authentication mechanisms
Best-of-breed Replacement » Offers single, per-appliance subscription as opposed to per-user subscription
» Custom messages to user with reason for blocked website
» Category-based bandwidth allocation and prioritization
» Data and bandwidth quota based on web categories and time of the day
» Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
» Educates users regarding best practices in web usage
» Ensures bandwidth to business-critical applications
» Prevents productivity loss

Intrusion Prevention System

Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

Cyberoam's signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities

Feature Feature Description Benefit
Multiple Protocol Support » HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
» Automatically detects, blocks, drops suspicious traffic
» Security against network, application and human layer attacks
IPS Policy Tuner » Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
» Identity-based alerts
» Role-based access to users and groups
» Minimizes noise related to false positive alerts, traffic latency and improved performance
Signature Updation » Regular updates by the Cyberoam Internet Threat Response Team
» Customized signatures by organizations
» HTTP Proxy signatures
» Protection against latest vulnerabilities
» Zero-hour protection during an outbreak prevents user masking through anonymous proxies
Centralized Security » Centralized custom signature creation and implementation at remote offices with CCC » Zero-hour protection for distributed networks
» Simplified security with lower cost of operations
Logging & Reporting » Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
» Dashboard, Top alerts, attackers and victims with severity of attacks
» Centralized logging reporting with Cyberoam iView and CCC
» Meets compliance requirements for CIPA, HIPAA, PCI DSS
» Meets requirements of forensic analysis
» Rapid corrective action with high security
Cost-Effective » Offers single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security

Premium Support Plan

Your business deserves the best, and we intend to provide the same. Our premium support plan provides a superior personalized support experience that takes care of your network security, while you grow your business. It includes a dedicated account manager, 24 hr. access to support experts, unlimited access to TAC tool, periodic review meetings, on-site support services and more.

Index

» Technical Support Services
» Online Support Services
» Software Support Services
» Security Updates through Email
» Warranty and Replacement Services
» Dedicated account manager
» Review Meetings

Technical Support Services

Remote technical support is provided through

- Phone: 24 x 7 Support
- Email: 24 x 7 Support
- Web: 24 x 7 Support
- Response time: First Response -1 Hour

Online Support Services

- Unlimited access to Knowledge base
24x7 Access to our knowledge-base allowing you access to documentation, product information, manuals, software release notes, etc. Cyberoam Knowledge-base also helps you research common technical issues at your convenience.

- Unlimited access to TACCase collection tool
24x7 Access to our Cyberoam Case Collection Centre allowing you unlimited access to current customer support cases as well as resolved cases

- Onsite Support Services
On-site support is available for Cyberoam products as an additional fee-based service and is provided in cases when both Cyberoam and the customer conclude that the only way to advance a case is through on-site resolution.

Software Support Services

- Hot-Fixes and enhancement upgrades 24x7
- Software andOSupgrades 24x7
- Signature and database update 24x7

- Web content filtering
- Intrusion Detection and Prevention
- Anti Virus,Anti-Spyware,Anti-Malware
- Anti Spam Database

- Remote Diagnostics: Under Special Cases, Cyberoam Engineers will perform remote diagnostic & analysis of your Cyberoam Console.

Security Updates through Email

As our Premium customer, you receive periodic notifications via email onOSUpgrades, bugfixes, features etc. as they are released, keeping you up-to-date on the latest enhancements on Cyberoam.

Warranty and Replacement Services

- Limited 1 Year hardware warranty of Cyberoam spares except power supply& fans.
- 4 day return and replacement policy
- Advance Replacement facility: Advance replacement of faulty appliance with new or refurbished replacement unit, shipped next business day following RMA approval.

Dedicated account manager

As a premium customer you always get personalized expert services from our side. A dedicated account manager is provided to you to understand your particular requirements completely. The person works closely with you as an extension to your team, providing you personalized consultation services.

Review Meetings

Our Senior Network Engineers schedule a six-month review meeting with your organization to analyze how your business has evolved, and how Cyberoam can best address your requirements.

http://www.ntsecurity.com/3-year-renewal-total-value-subscription-plus-for-cyberoam-cr-15i.html in_stock Yes Products Catalog USD
3 Year Renewal - Total Value Subscription Plus for Cyberoam CR 15i

01-TVSP-RNL-0015-03 3 Year Renewal - Total Value Subscription Plus for Cyberoam CR 15i


Finding Lowest
Internet Price...


Purchase Orders & Company Checks Accepted.

3 Year Renewal - Total Value Subscription Plus for Cyberoam CR 15i

Double click on above image to view full picture

Zoom Out
Zoom In

More Views

Details

Anti-Virus & Anti-Spyware

Cyberoam Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and keyloggers.

Cyberoam's Check Mark Level 5 certified gateway anti-virus is tightly integrated with IPS, Web Filtering and Anti-Spam, securing organizations against blended attacks and maintaining high levels of security.

Feature Feature Description Benefit
Broad Security Cover » Malware scan over incoming and outgoing traffic
» Virus, worm, Trojan detection and removal
» Spyware, malware, phishing protection
» Scan and deliver by file size
» Block by file types
» Multiple protocol support: HTTP, HTTPS, FTP, IM, P2P, SMTP, POP3, IMAP, VPN tunnels
» Millions of signatures in database
» Half-hourly signature updates
» White lists and black lists for protection
» Reduces window of vulnerability
» Prevents misuse of the encrypted HTTPS / SSL traffic for malware propagation
» Blocks attachments of executables, media files, password-protected attachments
Zero-Hour Protection » Virus Outbreak Detection (VOD) based on detection of outbreak pattern
» Signature-less protection
» Protects against early-hour vulnerability of massive virus outbreaks
» Eliminates security gaps related to signature update delays
Layer 8 Identity-based Security » Identity-based on-appliance reporting
» Differential policy creation based on user's business need
» Instant identification of source or destination of attack based on user identity, leading to high security
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
Self-Service Virus Quarantine » Quarantine of virus-infected emails through Cyberoam Anti-Spam
» User right to check quarantine mails
» Real-time Email Security
» Prevents mail loss
» Saves IT administrator time
» Meets quarantine requirements of regulatory compliance
Centralized Security » Automated policy updates through CCC
» Centralized logging and reporting with CCC and Cyberoam iView
» High security for remote networks
» Simplifies remote security management
Cost-Effective » Single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security


Cyberoam Anti-Spam

Cyberoam Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more.


Cyberoam's Check Mark Level 5 certified Anti-Spam solution offers 98% protection against zero-hour attacks with .0001% false positive rate, minimizing the threat of business mail loss.

Feature Feature Description Benefit
Spam Filtering » IP reputation-based filtering
» RBL Lists, MIME header check
» Based on message header, size, sender, recipient
» Screens out the 90% spam in incoming mail
» Saves bandwidth
Recurrent Pattern Detection » Automated antispam protection based on distribution pattern
» Extracts and analyzes relevant message patterns
» Signature-less technique
» Detects, blocks emerging spam outbreaks
» Blocks attachment-based spam – PDF, XL, MP3 etc.
» Content agnostic, multi-language, multi-format antispam protection – Blocks foreign language, image spam
» Zero-hour protection with no wait for signature updates
» Narrow window of exposure
» High spam catch rate
Virus Outbreak Detection (VOD) » Signature-less detection from Cyberoam Anti-Virus and Anti-» Spyware » Closes early-hour vulnerability gap of massive virus outbreaks over email
» Protects against the initial peak of attack
» Comprehensive Email Security
Identity-based Security » Layer 8 Identity-based requirement
» Copy and route mail to pre-defined mail addresses
» Data Leakage Prevention
» Granular protection based on user work profile
Email Management » Granular email management with message and attachment size, subject line etc. » Minimizes exposure to threats and legal implications
» Increases productivity
» Lower cost of compliance
» Quick recovery for disaster management
Self-Service Quarantine Area » Quarantines malware-infected mails
» Sends Spam Digest to users
» User right to check quarantine mails
» Meets security and regulatory compliance requirements
» Saves IT administrator time
Email Logging and Reporting » Data archiving
» Extensive Layer 8 Identity-based reporting – Top spam receivers, senders, applications of spam
» Real-time logs and reports
» Options of on-appliance reporting, centralized reporting from CCC and Cyberoam iView
» Meets regulatory compliance, audit, forensic requirements

Web Filtering

Cyberoam's award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Cyberoam's Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

Feature Feature Description Benefit
Web Categorization » On-appliance database
» Web filter with 82+ Web categories
» Custom categories
» Automatic updates through WebCat – The Website Categorization Engine
» Lowers response time and reduces privacy concerns
» Comprehensive and company-specific web filtering
Web Filtering Options » URL
» Keyword
» File type
» Database
» Comprehensive web filtering & content filtering
Web Security » Blocks third-party proxy and tunnelling software
» Blocks Google cache pages
» Blocks embedded URLs in websites
» Enforces ‘safe search’ in search engines
» Blocks malware, phishing, pharming URLs
» Blocks Java Applets, Cookies, Active X
» Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering
» Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
HTTPS Controls » Visibility into encrypted HTTPS Traffic
» Prevents unauthorized file upload and download over HTTP and HTTPS
» Blocks unauthorized, malicious and illegal HTTPS websites
» Data Leakage Prevention with web filtering and content filtering
» Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
» Controls legal liability
Regulatory Compliance » Implements Internet Safety Policy
» Active member of Internet Watch Foundation (IWF), UK
» Prevents Data Leakage
» Enables CIPA compliance and supports E-Rate Funding
» HIPAA
» PCI DSS
Layer 8 Identity-based Controls » Username, group, work-requirement based policies
» Schedule-based access control
» User authentication through ADS, RADIUS, SSO, local and thin client
» High security with high flexibility
» Prevents productivity loss
» Integrates with a range of existing authentication mechanisms
Best-of-breed Replacement » Offers single, per-appliance subscription as opposed to per-user subscription
» Custom messages to user with reason for blocked website
» Category-based bandwidth allocation and prioritization
» Data and bandwidth quota based on web categories and time of the day
» Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
» Educates users regarding best practices in web usage
» Ensures bandwidth to business-critical applications
» Prevents productivity loss

Intrusion Prevention System

Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

Cyberoam's signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities

Feature Feature Description Benefit
Multiple Protocol Support » HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
» Automatically detects, blocks, drops suspicious traffic
» Security against network, application and human layer attacks
IPS Policy Tuner » Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
» Identity-based alerts
» Role-based access to users and groups
» Minimizes noise related to false positive alerts, traffic latency and improved performance
Signature Updation » Regular updates by the Cyberoam Internet Threat Response Team
» Customized signatures by organizations
» HTTP Proxy signatures
» Protection against latest vulnerabilities
» Zero-hour protection during an outbreak prevents user masking through anonymous proxies
Centralized Security » Centralized custom signature creation and implementation at remote offices with CCC » Zero-hour protection for distributed networks
» Simplified security with lower cost of operations
Logging & Reporting » Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
» Dashboard, Top alerts, attackers and victims with severity of attacks
» Centralized logging reporting with Cyberoam iView and CCC
» Meets compliance requirements for CIPA, HIPAA, PCI DSS
» Meets requirements of forensic analysis
» Rapid corrective action with high security
Cost-Effective » Offers single, per-appliance subscription as opposed to per-user subscription » Comprehensive yet cost-effective security

Premium Support Plan

Your business deserves the best, and we intend to provide the same. Our premium support plan provides a superior personalized support experience that takes care of your network security, while you grow your business. It includes a dedicated account manager, 24 hr. access to support experts, unlimited access to TAC tool, periodic review meetings, on-site support services and more.

Index

» Technical Support Services
» Online Support Services
» Software Support Services
» Security Updates through Email
» Warranty and Replacement Services
» Dedicated account manager
» Review Meetings

Technical Support Services

Remote technical support is provided through

- Phone: 24 x 7 Support
- Email: 24 x 7 Support
- Web: 24 x 7 Support
- Response time: First Response -1 Hour

Online Support Services

- Unlimited access to Knowledge base
24x7 Access to our knowledge-base allowing you access to documentation, product information, manuals, software release notes, etc. Cyberoam Knowledge-base also helps you research common technical issues at your convenience.

- Unlimited access to TACCase collection tool
24x7 Access to our Cyberoam Case Collection Centre allowing you unlimited access to current customer support cases as well as resolved cases

- Onsite Support Services
On-site support is available for Cyberoam products as an additional fee-based service and is provided in cases when both Cyberoam and the customer conclude that the only way to advance a case is through on-site resolution.

Software Support Services

- Hot-Fixes and enhancement upgrades 24x7
- Software andOSupgrades 24x7
- Signature and database update 24x7

- Web content filtering
- Intrusion Detection and Prevention
- Anti Virus,Anti-Spyware,Anti-Malware
- Anti Spam Database

- Remote Diagnostics: Under Special Cases, Cyberoam Engineers will perform remote diagnostic & analysis of your Cyberoam Console.

Security Updates through Email

As our Premium customer, you receive periodic notifications via email onOSUpgrades, bugfixes, features etc. as they are released, keeping you up-to-date on the latest enhancements on Cyberoam.

Warranty and Replacement Services

- Limited 1 Year hardware warranty of Cyberoam spares except power supply& fans.
- 4 day return and replacement policy
- Advance Replacement facility: Advance replacement of faulty appliance with new or refurbished replacement unit, shipped next business day following RMA approval.

Dedicated account manager

As a premium customer you always get personalized expert services from our side. A dedicated account manager is provided to you to understand your particular requirements completely. The person works closely with you as an extension to your team, providing you personalized consultation services.

Review Meetings

Our Senior Network Engineers schedule a six-month review meeting with your organization to analyze how your business has evolved, and how Cyberoam can best address your requirements.

Additional Information

Manufacturer Cyberoam
Subscription Service Total Value Subscription Plus
Subscription Length 3 year Renewal
Special Sales Message No
Price $368.00

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Additional Product Images: