Cyberoam Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and keyloggers.
Cyberoam's Check Mark Level 5 certified gateway anti-virus is tightly integrated with IPS, Web Filtering and Anti-Spam, securing organizations against blended attacks and maintaining high levels of security.
| Feature | Feature Description | Benefit |
|---|---|---|
| Broad Security Cover | » Malware scan over incoming and outgoing traffic » Virus, worm, Trojan detection and removal » Spyware, malware, phishing protection » Scan and deliver by file size » Block by file types » Multiple protocol support: HTTP, HTTPS, FTP, IM, P2P, SMTP, POP3, IMAP, VPN tunnels » Millions of signatures in database » Half-hourly signature updates » White lists and black lists for protection | » Reduces window of vulnerability » Prevents misuse of the encrypted HTTPS / SSL traffic for malware propagation » Blocks attachments of executables, media files, password-protected attachments |
| Zero-Hour Protection | » Virus Outbreak Detection (VOD) based on detection of outbreak pattern » Signature-less protection | » Protects against early-hour vulnerability of massive virus outbreaks » Eliminates security gaps related to signature update delays |
| Layer 8 Identity-based Security | » Identity-based on-appliance reporting » Differential policy creation based on user's business need | » Instant identification of source or destination of attack based on user identity, leading to high security » Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results |
| Self-Service Virus Quarantine | » Quarantine of virus-infected emails through Cyberoam Anti-Spam » User right to check quarantine mails | » Real-time Email Security » Prevents mail loss » Saves IT administrator time » Meets quarantine requirements of regulatory compliance |
| Centralized Security | » Automated policy updates through CCC » Centralized logging and reporting with CCC and Cyberoam iView | » High security for remote networks » Simplifies remote security management |
| Cost-Effective | » Single, per-appliance subscription as opposed to per-user subscription | » Comprehensive yet cost-effective security |
Cyberoam Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more.
Cyberoam's Check Mark Level 5 certified Anti-Spam solution offers 98% protection against zero-hour attacks with .0001% false positive rate, minimizing the threat of business mail loss.
| Feature | Feature Description | Benefit |
|---|---|---|
| Spam Filtering | » IP reputation-based filtering » RBL Lists, MIME header check » Based on message header, size, sender, recipient | » Screens out the 90% spam in incoming mail » Saves bandwidth |
| Recurrent Pattern Detection | » Automated antispam protection based on distribution pattern » Extracts and analyzes relevant message patterns » Signature-less technique » Detects, blocks emerging spam outbreaks » Blocks attachment-based spam – PDF, XL, MP3 etc. » Content agnostic, multi-language, multi-format antispam protection – Blocks foreign language, image spam | » Zero-hour protection with no wait for signature updates » Narrow window of exposure » High spam catch rate |
| Virus Outbreak Detection (VOD) | » Signature-less detection from Cyberoam Anti-Virus and Anti-» Spyware | » Closes early-hour vulnerability gap of massive virus outbreaks over email » Protects against the initial peak of attack » Comprehensive Email Security |
| Identity-based Security | » Layer 8 Identity-based requirement » Copy and route mail to pre-defined mail addresses | » Data Leakage Prevention » Granular protection based on user work profile |
| Email Management | » Granular email management with message and attachment size, subject line etc. | » Minimizes exposure to threats and legal implications » Increases productivity » Lower cost of compliance » Quick recovery for disaster management |
| Self-Service Quarantine Area | » Quarantines malware-infected mails » Sends Spam Digest to users » User right to check quarantine mails | » Meets security and regulatory compliance requirements » Saves IT administrator time |
| Email Logging and Reporting | » Data archiving » Extensive Layer 8 Identity-based reporting – Top spam receivers, senders, applications of spam » Real-time logs and reports » Options of on-appliance reporting, centralized reporting from CCC and Cyberoam iView | » Meets regulatory compliance, audit, forensic requirements |
Cyberoam's Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.
| Feature | Feature Description | Benefit |
|---|---|---|
| Web Categorization | » On-appliance database » Web filter with 82+ Web categories » Custom categories » Automatic updates through WebCat – The Website Categorization Engine | » Lowers response time and reduces privacy concerns » Comprehensive and company-specific web filtering |
| Web Filtering Options | » URL » Keyword » File type » Database | » Comprehensive web filtering & content filtering |
| Web Security | » Blocks third-party proxy and tunnelling software » Blocks Google cache pages » Blocks embedded URLs in websites » Enforces ‘safe search’ in search engines » Blocks malware, phishing, pharming URLs » Blocks Java Applets, Cookies, Active X | » Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering » Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results |
| HTTPS Controls | » Visibility into encrypted HTTPS Traffic » Prevents unauthorized file upload and download over HTTP and HTTPS » Blocks unauthorized, malicious and illegal HTTPS websites | » Data Leakage Prevention with web filtering and content filtering » Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer » Controls legal liability |
| Regulatory Compliance | » Implements Internet Safety Policy » Active member of Internet Watch Foundation (IWF), UK » Prevents Data Leakage | » Enables CIPA compliance and supports E-Rate Funding » HIPAA » PCI DSS |
| Layer 8 Identity-based Controls | » Username, group, work-requirement based policies » Schedule-based access control » User authentication through ADS, RADIUS, SSO, local and thin client | » High security with high flexibility » Prevents productivity loss » Integrates with a range of existing authentication mechanisms |
| Best-of-breed Replacement | » Offers single, per-appliance subscription as opposed to per-user subscription » Custom messages to user with reason for blocked website » Category-based bandwidth allocation and prioritization » Data and bandwidth quota based on web categories and time of the day | » Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security » Educates users regarding best practices in web usage » Ensures bandwidth to business-critical applications » Prevents productivity loss |
Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.
Cyberoam's signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities
| Feature | Feature Description | Benefit |
|---|---|---|
| Multiple Protocol Support | » HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support » Automatically detects, blocks, drops suspicious traffic | » Security against network, application and human layer attacks |
| IPS Policy Tuner | » Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile » Identity-based alerts | » Role-based access to users and groups » Minimizes noise related to false positive alerts, traffic latency and improved performance |
| Signature Updation | » Regular updates by the Cyberoam Internet Threat Response Team » Customized signatures by organizations » HTTP Proxy signatures | » Protection against latest vulnerabilities » Zero-hour protection during an outbreak prevents user masking through anonymous proxies |
| Centralized Security | » Centralized custom signature creation and implementation at remote offices with CCC | » Zero-hour protection for distributed networks » Simplified security with lower cost of operations |
| Logging & Reporting | » Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity » Dashboard, Top alerts, attackers and victims with severity of attacks » Centralized logging reporting with Cyberoam iView and CCC | » Meets compliance requirements for CIPA, HIPAA, PCI DSS » Meets requirements of forensic analysis » Rapid corrective action with high security |
| Cost-Effective | » Offers single, per-appliance subscription as opposed to per-user subscription | » Comprehensive yet cost-effective security |
Cyberoam's Basic Support Plan is designed to provide you best of the services with limited investment. The basic plan offers you 8 hours-a-day 5-days-a-week support along with access to Cyberoam Knowledge Base and Online Case CollectionTool.
Remote technical support is provided through
- Unlimited access to Knowledge base
24x7 Access to Cyberoam knowledge-base, allowing you access to documentation, product information, manuals, software release notes, etc. Cyberoam Knowledge- base also helps you to research common technical issues at your convenience.
- Restricted access to TACCase collection tool:URL
24x7 Access to our Cyberoam Case Collection Centre, allowing you restricted access to current customer support cases as well as resolved cases.
- Hot-Fixes and enhancement upgrades 24x7
- Software andOSupgrades 24x7
- Signature and database update 24x7
- Limited 1Year hardware warranty on Cyberoam spares-parts except power supply &fans.
- 10 day return and replacement policy
Cyberoam Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant Messaging security against malware, including viruses, worms, spyware, backdoors, Trojans and keyloggers.
Cyberoam's Check Mark Level 5 certified gateway anti-virus is tightly integrated with IPS, Web Filtering and Anti-Spam, securing organizations against blended attacks and maintaining high levels of security.
| Feature | Feature Description | Benefit |
|---|---|---|
| Broad Security Cover | » Malware scan over incoming and outgoing traffic » Virus, worm, Trojan detection and removal » Spyware, malware, phishing protection » Scan and deliver by file size » Block by file types » Multiple protocol support: HTTP, HTTPS, FTP, IM, P2P, SMTP, POP3, IMAP, VPN tunnels » Millions of signatures in database » Half-hourly signature updates » White lists and black lists for protection | » Reduces window of vulnerability » Prevents misuse of the encrypted HTTPS / SSL traffic for malware propagation » Blocks attachments of executables, media files, password-protected attachments |
| Zero-Hour Protection | » Virus Outbreak Detection (VOD) based on detection of outbreak pattern » Signature-less protection | » Protects against early-hour vulnerability of massive virus outbreaks » Eliminates security gaps related to signature update delays |
| Layer 8 Identity-based Security | » Identity-based on-appliance reporting » Differential policy creation based on user's business need | » Instant identification of source or destination of attack based on user identity, leading to high security » Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results |
| Self-Service Virus Quarantine | » Quarantine of virus-infected emails through Cyberoam Anti-Spam » User right to check quarantine mails | » Real-time Email Security » Prevents mail loss » Saves IT administrator time » Meets quarantine requirements of regulatory compliance |
| Centralized Security | » Automated policy updates through CCC » Centralized logging and reporting with CCC and Cyberoam iView | » High security for remote networks » Simplifies remote security management |
| Cost-Effective | » Single, per-appliance subscription as opposed to per-user subscription | » Comprehensive yet cost-effective security |
Cyberoam Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more.
Cyberoam's Check Mark Level 5 certified Anti-Spam solution offers 98% protection against zero-hour attacks with .0001% false positive rate, minimizing the threat of business mail loss.
| Feature | Feature Description | Benefit |
|---|---|---|
| Spam Filtering | » IP reputation-based filtering » RBL Lists, MIME header check » Based on message header, size, sender, recipient | » Screens out the 90% spam in incoming mail » Saves bandwidth |
| Recurrent Pattern Detection | » Automated antispam protection based on distribution pattern » Extracts and analyzes relevant message patterns » Signature-less technique » Detects, blocks emerging spam outbreaks » Blocks attachment-based spam – PDF, XL, MP3 etc. » Content agnostic, multi-language, multi-format antispam protection – Blocks foreign language, image spam | » Zero-hour protection with no wait for signature updates » Narrow window of exposure » High spam catch rate |
| Virus Outbreak Detection (VOD) | » Signature-less detection from Cyberoam Anti-Virus and Anti-» Spyware | » Closes early-hour vulnerability gap of massive virus outbreaks over email » Protects against the initial peak of attack » Comprehensive Email Security |
| Identity-based Security | » Layer 8 Identity-based requirement » Copy and route mail to pre-defined mail addresses | » Data Leakage Prevention » Granular protection based on user work profile |
| Email Management | » Granular email management with message and attachment size, subject line etc. | » Minimizes exposure to threats and legal implications » Increases productivity » Lower cost of compliance » Quick recovery for disaster management |
| Self-Service Quarantine Area | » Quarantines malware-infected mails » Sends Spam Digest to users » User right to check quarantine mails | » Meets security and regulatory compliance requirements » Saves IT administrator time |
| Email Logging and Reporting | » Data archiving » Extensive Layer 8 Identity-based reporting – Top spam receivers, senders, applications of spam » Real-time logs and reports » Options of on-appliance reporting, centralized reporting from CCC and Cyberoam iView | » Meets regulatory compliance, audit, forensic requirements |
Cyberoam's Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.
| Feature | Feature Description | Benefit |
|---|---|---|
| Web Categorization | » On-appliance database » Web filter with 82+ Web categories » Custom categories » Automatic updates through WebCat – The Website Categorization Engine | » Lowers response time and reduces privacy concerns » Comprehensive and company-specific web filtering |
| Web Filtering Options | » URL » Keyword » File type » Database | » Comprehensive web filtering & content filtering |
| Web Security | » Blocks third-party proxy and tunnelling software » Blocks Google cache pages » Blocks embedded URLs in websites » Enforces ‘safe search’ in search engines » Blocks malware, phishing, pharming URLs » Blocks Java Applets, Cookies, Active X | » Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering » Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results |
| HTTPS Controls | » Visibility into encrypted HTTPS Traffic » Prevents unauthorized file upload and download over HTTP and HTTPS » Blocks unauthorized, malicious and illegal HTTPS websites | » Data Leakage Prevention with web filtering and content filtering » Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer » Controls legal liability |
| Regulatory Compliance | » Implements Internet Safety Policy » Active member of Internet Watch Foundation (IWF), UK » Prevents Data Leakage | » Enables CIPA compliance and supports E-Rate Funding » HIPAA » PCI DSS |
| Layer 8 Identity-based Controls | » Username, group, work-requirement based policies » Schedule-based access control » User authentication through ADS, RADIUS, SSO, local and thin client | » High security with high flexibility » Prevents productivity loss » Integrates with a range of existing authentication mechanisms |
| Best-of-breed Replacement | » Offers single, per-appliance subscription as opposed to per-user subscription » Custom messages to user with reason for blocked website » Category-based bandwidth allocation and prioritization » Data and bandwidth quota based on web categories and time of the day | » Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security » Educates users regarding best practices in web usage » Ensures bandwidth to business-critical applications » Prevents productivity loss |
Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.
Cyberoam's signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities
| Feature | Feature Description | Benefit |
|---|---|---|
| Multiple Protocol Support | » HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support » Automatically detects, blocks, drops suspicious traffic | » Security against network, application and human layer attacks |
| IPS Policy Tuner | » Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile » Identity-based alerts | » Role-based access to users and groups » Minimizes noise related to false positive alerts, traffic latency and improved performance |
| Signature Updation | » Regular updates by the Cyberoam Internet Threat Response Team » Customized signatures by organizations » HTTP Proxy signatures | » Protection against latest vulnerabilities » Zero-hour protection during an outbreak prevents user masking through anonymous proxies |
| Centralized Security | » Centralized custom signature creation and implementation at remote offices with CCC | » Zero-hour protection for distributed networks » Simplified security with lower cost of operations |
| Logging & Reporting | » Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity » Dashboard, Top alerts, attackers and victims with severity of attacks » Centralized logging reporting with Cyberoam iView and CCC | » Meets compliance requirements for CIPA, HIPAA, PCI DSS » Meets requirements of forensic analysis » Rapid corrective action with high security |
| Cost-Effective | » Offers single, per-appliance subscription as opposed to per-user subscription | » Comprehensive yet cost-effective security |
Cyberoam's Basic Support Plan is designed to provide you best of the services with limited investment. The basic plan offers you 8 hours-a-day 5-days-a-week support along with access to Cyberoam Knowledge Base and Online Case CollectionTool.
Remote technical support is provided through
- Unlimited access to Knowledge base
24x7 Access to Cyberoam knowledge-base, allowing you access to documentation, product information, manuals, software release notes, etc. Cyberoam Knowledge- base also helps you to research common technical issues at your convenience.
- Restricted access to TACCase collection tool:URL
24x7 Access to our Cyberoam Case Collection Centre, allowing you restricted access to current customer support cases as well as resolved cases.
- Hot-Fixes and enhancement upgrades 24x7
- Software andOSupgrades 24x7
- Signature and database update 24x7
- Limited 1Year hardware warranty on Cyberoam spares-parts except power supply &fans.
- 10 day return and replacement policy
| Manufacturer | Cyberoam |
|---|---|
| Subscription Service | Total Value Subscription |
| Subscription Length | 3 year Renewal |
| Special Sales Message | No |
| Price | $4,751.00 |