Comments
Transcript
Cogli l`attimo e prendi la giusta decisione
www.cyberoam.com Cogli l’attimo e prendi la giusta decisione prima che la tua rete aziendale finisca sotto assedio Scegli la sicurezza di nuova generazione progettata per le reti aziendali del futuro Fenomeni come BYOD, de-perimetrazione delle reti aziendali, aumento del numero di utenti e dei dispositivi che accedono alla rete, esplosione delle applicazioni e virtualizzazione possono essere un vantaggio o una minaccia per il tuo business e causare la perdita di controllo sulla sicurezza della rete aziendale. I firewall next generation di Cyberoam offrono protezione certificata EAL4+, strumenti e controlli di intelligence attivabili e funzionalità di sicurezza di nuova generazione per garantire protezione Layer 8 basata sull'identità dell'utente, visibilità e controllo sulle applicazioni, IPS, VPN, onappliance reporting e molto altro ancora. Inoltre, grazie a performance cinque volte superiori rispetto allo standard di mercato, un'architettura di sicurezza estensibile e alta affidabilità dei sistemi, Cyberoam consente ai CIO aziendali di affrontare con serenità questo cambio generazionale mantenendo il pieno controllo sui propri network. 4 Cyberoam Product Line : Network security appliances (Next-Generation Firewalls/UTMs) Centralized Management (Hardware & Virtual) Centralized Reporting Distributore Ufficiale per l'Italia: HORUS INFORMATICA Srl Via Enzo Ferrari, 21/B 20010 Arluno - Milano - Italy www.horus.it © Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Ufficio Commerciale [email protected] Tel: 02/33510135 Fax: 02/33510199 Supporto Tecnico Pre vendita [email protected] Post vendita [email protected] Ufficio Marketing [email protected] Fax: 02/33510838 Soluzioni Cyberoam per la Network Security Con una presenza capillare in oltre 125 paesi, Cyberoam Technologies, azienda di Sophos, è il fornitore globale delle pluripremiate soluzioni per la sicurezza IT. Con la sua gamma completa di prodotti accreditati sul mercato con standard e certificazioni globali, Cyberoam offre soluzioni affidabili che rispondono alle principali esigenze di network security, gestione e reporting centralizzato della sicurezza delle aziende di qualsiasi dimensione. Grazie a caratteristiche innovative e uniche sul mercato le soluzioni Cyberoam sono oggi la scelta vincente di migliaia di aziende che affidano a Cyberoam la protezione ed il controllo dei propri network. Portfolio soluzioni Cyberoam: Network Security Appliance firewall di nuova generazione per la protezione da minacce attuali e future dei network fisici e virtuali. Gestione centralizzata della sicurezza Console per la gestione e il controllo centralizzato dei dispositivi UTM all’interno di network distribuiti ed estesi Reporting centralizzato Logging e reporting centralizzato per la visibilità in tempo reale delle attività all’interno del network aziendale Training & Supporto Rapida risoluzione dei problemi grazie a supporto cliente e piani di training che offrono gli skill necessari ad implementare e gestire in modo efficace le soluzioni Cyberoam L8 USER L7 Application L6 Presentation ASCII, EBCDIC, ICA L5 Session L4 Transport L3 Network L2 Data Link L1 Physical L2TP, PPTP TCP, UDP 192.168.1.1 00-17-BB-8C-E3-E7 TECNOLOGIA LAYER 8 DI CYBEROAM La tecnologia identity-based di Cyberoam estende le funzionalità di security al Layer 8, lo human layer del modello OSI. L’ecosistema IT può essere suddiviso in 7 livelli definiti livelli OSI: il punto d’incontro tra persone e tecnologia è conosciuto come Layer 8 e Cyberoam garantisce sicurezza a questo livello ponendosi al livello più vicino all’intelligenza umana. Questo consente alle aziende di identificare gli utenti in modo univoco, controllare le loro attività all’interno della rete e attivare policy e reporting in base allo username, anche in ambienti di IP dinamici come DHCP e Wi-Fi. La tecnologia Layer 8 di Cyberoam aggiunge velocità alla sicurezza della rete aziendale offrendo immediata visibilità dell’origine degli attacchi e permette il monitoraggio proattivo degli incidenti. Grazie a questa tecnologia le aziende sono in grado di gestire la sicurezza, proteggere i dati, effettuare analisi e garantire la conformità alle normative. La Tecnologia Layer 8 di Cyberoam considera l’identità dell’utente come l’8° livello del modello OSI I firewall di nuova generazione di Cyberoam garantiscono la sicurezza dal Layer 2 al Layer 8 grazie alle policy identity based NETWORK SECURITY Grazie a molteplici funzionalità di sicurezza integrate in una singola appliance Cyberoam offre una sicurezza di rete completa. Le appliance Cyberoam proteggono le reti da malware, vulnerabilità di applicazioni web, problematiche BYOD, perdita di dati su siti Web e applicazioni, attacchi misti sofisticati, spam, spyware e altre minacce esterne in continua evoluzione. Grazie alla disponibilità sia della versione hardware che virtuale, Cyberoam protegge sia network fisici che virtuali. Funzionalità di sicurezza di nuova generazione della serie Cyberoam NGFW: . Stateful Inspection Firewall . Application Visibility&Control . Web Application Firewall . VPN (SSL VPN&IPSec) . Intrusion Prevention System . Anti-Virus&Anti-Spyware . Anti-Spam . Outbound Spam Protection . Web Filtering . Bandwidth Management . 3G / 4G / WiMAX Connectivity * . IM Archiving&Controls . Multiple Link Management . On-Appliance Reporting . IPv6 Ready . Wi-Fi Appliances * . FleXi Ports* *Funzionalità non disponibili nelle appliance virtuali FATTORI CHIAVE: • Presenza capillare in oltre 125 paesi • Leader nel settore per R&D • Primo vendor di network security dotato di Global Customer Support Service certificato ISO 20000:2011 • Standard e certificazioni globali, come EAL4+, CheckMark UTM Level 5 Certification, ICSA Labs, IPv6 Gold logo, membro del Virtual Private Network Consortium • Riconosciuto come ‘Network - Security Innovator’ da SC Magazine • Riconosciuto come “Visionary” all’interno del Magic Quadrant per SMB Multi-function Firewalls di Gartner Cyberoam serie NG - Next Generation Firewall (NGFW) Le appliance Cyberoam NG Series NGFW offrono ad aziende di qualsiasi dimensione, protezione dalle minacce attuali e future. Grazie a funzionalità di sicurezza di nuova generazione i network aziendali sono protetti dalle minacce derivanti dai nuovi trend IT emergenti come l’aumento del numero dei dispositivi e delle applicazioni che accedono alla rete, l’ampia diffusione delle applicazioni web. Firewall Throughput Gigabit, anche per Branch Office Grazie a valori difirewall throughput Gigabit disponibili sin dalle appliance entry-level le aziende possono godere di performance eccezionali anche per le loro sedi remote. Security Appliance con opzioni di connettività flessibili Le appliance Cyberoam fleXi Port NGFW, disponibili come parte della serie NG, garantiscono alle aziende la flessibilità di rete e la libertà di configurazione grazie a slot I/O che permettono di scegliere tra connettività di rete CopperGbE e Fiber 1GbE/10GbE Firmware Intelligente OS Perfettamente integrato con hardware per accelerazione criptografica e di rete il sistema operativo di Cyberoam estrae i massimi livelli diperformance graze alla sua piattaforma multi-core ed garantisci i più bassi valori di latenza. Unito alle funzionalità di sicurezza di nuova generazione offre la migliore protezione dalle nuove minacce in continua evoluzione Extensible Security Architecture (ESA) L’architettura di sicurezza “Extensible” di Cyberoam aiuta le aziende a contrastare le minacce sconosciute del futuro grazie alla capacità di prolungare la vita e le performance delle sue appliance NGFW così da supportare le nuove funzionalità e le migliorie che verranno implementate a livello di sicurezza Future-Ready Security. Serie Hardware Appliance Cyberoam NGFW: Serie CRNG 15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG, 100iNG, 200iNG, 300iNG, 500iNG-XP, 750iNG-XP, 1000iNG-XP, 1500iNG-XP, 2500iNG, 2500iNG-XP Caratteristiche principali Tecnologia Layer 8 • Tutti i moduli di sicurezza integrati nelle appliance Cyberoam NGFW si basano sulla tecnologia Layer 8 per garantire controlli basati sull’identità dell’utente attraverso le fasi di user authentication, service authorization e reporting (AAA) • Strumenti Avanzati di logging e reporting identity based • Controllo della navigazione utenti identity based anche in ambienti Remote Desktop e Citrix UTQ User Threat Quotient • Cyberoam è l’unica soluzione di sicurezza UTM/NGFW in grado di identificare i fattori di rischio attraverso l’analisi comportamentale degli utenti della rete e fornire un completo controllo dei rischi per intraprendere in maniera automatica le contromisure necessarie in caso di attacco Wireless Guest User Authentication via SMS gateway • Automazione dei processi di gestione utenti ospiti delle retei WiFi è così possibile coprire le esigenze del mercato hospitality 4 Eye authentication • Grazie a questa caratteristica Cyberoam è l’unica soluzione di sicurezza UTM/NGFW veramente compliant con le normative sulla privacy Sicurezza delle reti WiFi • Possibilità di estendere le funzionalità di sicurezza alle reti WiFi esistenti grazie all’integrazione con i wireless controller per l’autenticazione utenti via Radius Single Sign On (RSSO) o via API Funzionalità di multi link management e local Load Balancer • Gestione automatica del Failover/Failback della linea • Gestione di multi connessioni Wan • Supporto connessioni 3G/4G su porta USB e WiMax • Supporto routing dinamico: RIP v1& v2, OSPF, BGP, Multicast • Funzionalità di Local Load Balancer basate su WRR Security Appliance virtuali Progettate per rispondere alle esigenze di sicurezza delle aziende in ambienti virtuali come data center virtuali, ambienti ‘Security in a box’ ed ‘Office in a box’, le soluzioni Cyberoam offrono una soluzione di network security adatta ai principali scenari di virtualizzazione: • Protezione dei data center virtuali senza la necessità di implementare soluzioni di sicurezza hardware dedicate • Sicurezza Layer 8 e controllo degli accessi basati sull’utente fondamentali in ambienti “Offi ce-in-a-Box” e BYOD • Supporto piattaforme VMware, Microsoft Hyper-V, KVM e Citrix XenServer con la possibilità di passare facilmente a configurazioni di sicurezza “chiavi in mano” per MSSP/aziende. I moduli di licenza permettono di assegnare il numero di vCPU per l’appliance Cyberoam NGWF virtuale in base all’esigenza dell’azienda. Tale flessibilità, unitamente alla compatibilità con diverse piattaforme virtuali e alla possibilità di aggiornarla facilmente a modelli virtuali UTM superiori, garantisce alle aziende pieno controllo delle infrastrutture di rete. Grazie alla scansione del traffico in ambienti virtuali e alle funzionalità di sicurezza integrata su un’unica appliance virtuale, Cyberoam virtual UTM protegge le reti virtuali da attacchi su console di gestione hypervisor, hypervisor & Guest OS, applicazioni web virtualizzate e server, e permette alle aziende di proteggere le reti Zero Trust Networks. Cyberoam offre una soluzione di sicurezza completamente virtuale in combinazione con la Virtual Cyberoam Central Console per la gestione centralizzata della sicurezza, e al software Cyberoam iView per il logging e il reporting. Application Visibility & Control • Gestione della priorità delle applicazioni in base alla combinazione di più criteri tra cui utente, orario, tipo di applicazione e banda • QoS (Quality of Service) sulla navigazione • Controlli granulari delle applicazioni attraverso classificazione basata su livello di rischio, caratteristiche, tecnologia • Modello di protezione proattivo che evita la necessità di interventi manuali per l’aggiornamento delle policy con le nuove applicazioni Web Application Firewall (WAF) • Protezione avanzata delle applicazioni web (ecommerce, intranet, webmail aziendali) grazie alla nuovissima tecnicologia WAF VPN • Accessi remoti sicuri grazie a IPSec VPN, LT2P, PPTP e SSL VPN • Tecnologia Threat-free Tunneling per la scansione del traffico di malware e tentativi di intrusione Linea di appliance virtuali Cyberoam NGFW: CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C Advanced Threat Protection • Grazie alla protezione contro le nuove minacce in evoluzione garantita dai moduli Intrusion Prevention, Gateway Anti-Virus/Anti- Spyware, Gateway Anti-Spam e Web & Content Filtering, Cyberoam offre il massimo della sicurezza al livello delle migliori soluzioni best-of-breed Outbound Spam Protection • Protezione da incidenti di outbound spam ricorrenti con una significativa riduzione del consumo di banda e ottimizzazione delle performance della rete • Tecnologia Recurrent Pattern Detection (RPD) per classificazione in tempo reale e rapida identificazione e blocco dello spam Le aziende ed i MSSP possono gestire centralmente la sicurezza di tutte le sedi e client remoti che utilizzando le appliance Cyberoam UTM e NGWF attraverso lo strumento di managemnt CyberoamCentral Console (CCC), disponibile sia in versione hardware che virtuale. Centralized Security Management across Branch Offices • Attivazione centrale di policy, security subscription e aggiornamenti di firmware/signature con gestione delle modifiche per uniformare policy e garantire protezione da minacce zero hour • Possibilità di raggruppare le appliance per client, area geografica, modello appliance, versione firmware, tipo azienda o tipo di licenza • Creazione di policy template da riutilizzare per la configurazione delle security policy di nuove sedi o di nuovi clienti • possibilità di impostare diversi livelli di amministazione in base al ruolo e prevenire l’abuso di privilegi amministrativi • Notifiche di alert come reminder per la scadenza di licenze, minacce che superano una determinata soglia di punteggio, cambiamenti distato di connessione delle appliance o della VPN • Ottimizzazione dei tool di Professional Services Automation (PSA) esistenti, monitoring dell’infrastruttura IT e dei sistemi di ticketing • Business Continuity - High Availability (HA) Active-Passive • Roll-back configuration - Change Control & Logging: gestione centralizzata e controllo dei change per mantenere la revision history dei cambiamenti effettuati sugli appliance gestiti ed effettuare il Roll-back delle configurazioni modificate • L’integrazione con Cyberoam iView consente l’auto-provisioning delle appliance e la sincronizzazione automatica degli amministratori CCC in Cyberoam iView Linea di appliance CCC: • Hardware CCC NM Appliances - CCC15NM, CCC50NM, CCC100NM, CCC200NM, CCC500NM • Hardware CCC Appliances - CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000 • Virtual CCC Appliances - CCCV15, CCCV50, CCCV100, CCCV200, CCCV500 Le aziende possono avere in tempo reale la visibilità completa delle attività utente e di rete grazie alle funzionalità di logging e reporting centralizzato offerte da Cyberoam iView Centralized Visibility across Networks • Oltre 1200 report a supporto della gestione della sicurezza, della conformità alle normative e delle analisi forensi • Log, report ed alert su molteplici dispositivi, protocolli e location forniscono informazioni sull’attività degli utenti e della rete così da poter identificare eventuali violazioni alla sicurezza ed intraprendere velocemente le opportune contromisure minimizzando downtime della rete • Report che rispondono alle normative vigenti come HIPAA, PCI DSS, GLBA, SOX e report drill-down riducono notevolmente i costi per garantire la conformità • Supporto per analisi legali; le aziende sono in grado di ricostruire la sequenza degli eventi che si sono verificati nel momento di della violazione ed estrarre lo storico degli eventi relativi alla rete, riducendo i costi necessari a indagare sull’accaduto e ridurre il downtime della rete • Compatibilità con un’ampia gamma di dispositivi inclusi Proxy Firewall, applicazioni customizzate e qualsiasi dispositivo compatibile con Syslog. Le aziende possono raccogliere log e report provenienti da molteplici dispositivi Cyberoam iView Appliance Range: • Hardware appliances - CR-iVU25NR, CR-iVU100NR, CR-iVU200NR •Software Techsheet – Cyberoam Product Range Tech Sheet Techsheet – Cyberoam Product Range Techsheet – Cyberoam Product Range Tech Sheet Tech Sheet Techsheet – Cyberoam Product Range Tech Sheet Techsheet – Cyberoam Product Range Tech Sheet Cyberoam offre Next-Generation a network SOHO, SMEs along ed Enterprise di nuova generazione performance attraverso la sua linea and di appliance Next-Generation Cyberoam offers security with high sicurezza performance to SOHO, SMEs anddalle Enterprise networkseccezionali with its Next-Generation Firewalls UTM appliances. CyberoamFirewall ed UTM. Cyberoam non si limita a fornire una soluzione completa di network security, ma semplifica la gestione della sicurezza per aziende con più sedi attraverso la console di moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution, management Cyberoam Central security Consolealong (CCC), e la soluzione di logging & reporting centralizzato Cyberoam iView. L’intera linea di Firewalls prodotti and Cyberoam è disponibile sia in versione Cyberoam offers Next-Generation with high performance to SOHO, SMEsThese and Enterprise networks with its Next-Generation UTM appliances. Cyberoam Cyberoamche Central Console (CCC), and its centralized visibility solution, Cyberoam iView. future-ready security solutions are available for both physical and virtual networks. harware virtuale. moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution, Cyberoam offers Next-Generation security along with high performance to SOHO, SMEs and Enterprise networks with its Next-Generation Firewalls and UTM appliances. Cyberoam Cyberoam Central Console (CCC), and its centralized visibility solution, Cyberoam iView. These future-ready security solutions are available for both physical and virtual networks. Cyberoam Products Portfolio moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution, Cyberoam Central Console (CCC), and its centralized solution, Cyberoam future-ready security solutions are available for both physical and virtual networks. offers Next-Generation security along withvisibility high performance to SOHO,iView. SMEsThese and Enterprise networks with its Next-Generation Firewalls and UTM appliances. Cyberoam Cyberoam Products Portfolio moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution, Cyberoam Products Portfolio Cyberoam Central offers Next-Generation security along withvisibility high performance to SOHO,iView. SMEsThese and Enterprise networks with its Next-Generation Firewalls and UTM appliances. Cyberoam Console (CCC), and its centralized solution, Cyberoam future-ready security solutions are available for both physical and virtual networks. moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution, Cyberoam Products Portfolio Cyberoam Central Console (CCC), and its centralized visibility solution, Cyberoam iView. These future-ready security solutions are available for both physical and virtual networks. CR NG series UTMs CR NG series NGFWs Virtual Security Appliances Cyberoam Central Console (CCC) CR iView (Logging & Reporting) CyberoamCRNetwork Security Appliances NG series UTMs CR NG series NGFWs Virtual Security Appliances Cyberoam Central Console (CCC) CR iView (Logging & Reporting) Cyberoam Products Portfolio CyberoamOS Cyberoam Network Security CR NGOperating series UTMs - The Security-Hardened System AppliancesBandwidth Management On-Appliance Cyberoam - iView Reporting2 TM Cyberoam CR NG- series NGFWs Virtualbased Security Appliances Cyberoam Central Console (CCC) CRtool iView (Logging & Reporting) VIEW Application and User Identity Bandwidth Management - Integrated Web-based Reporting - Category-based Bandwidth restriction - 1,200+ drill-down reports 2 Bandwidth Management On-Appliance Cyberoam - iView Reporting CyberoamOS Cyberoam - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA Extensible Security Architecture VIEW - The Security-Hardened System Application and User Identity based Bandwidth Management - Integrated Web-based Reporting Agility to prolongCR the NG lifeOperating and performance of its NGFW appliances Historical and Real-time reportCRtool series UTMs CR NGNetworking series NGFWs Virtual Security Appliances Cyberoam Central Console (CCC) iView (Logging & Reporting) -- Category-based Bandwidth restriction - 1,200+ 2 - Supports newer enterprise security features and enhancements Supportsdrill-down 3rd party reports PSA Solution - ConnectWise Automated Failover/Failback, Multi-WAN CyberoamOS Bandwidth Management On-Appliance Cyberoam - iView Reporting Cyberoam - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA Extensible Security Architecture WRR based and LoadUser balancing VIEW -- The Security-Hardened System -- Application Identity based Bandwidth Management -- Integrated Web-based Reporting Agility to prolong the NG lifeOperating and performance Historical and Real-time reportCRtool Stateful Inspection Firewall Logging and Monitoring -- series Dynamic Routing: RIPVirtual v1& v2, OSPF, BGPAppliances , Multicast Forwarding CR series UTMs of its NGFW appliancesCR NGNetworking NGFWs Security Cyberoam Central Console (CCC) iView (Logging & Reporting) Category-based Bandwidth restriction - Supports 1,200+ drill-down reports - Supports newer enterprise security features and enhancements 3rd party PSA Solution ConnectWise Layer 8 (User - Identity) Firewall - Automated Failover/Failback, Multi-WAN Graphical real-time historical Monitoring 2 -- Compliance reports and - HIPAA, GLBA, SOX, PCI, FISMA Extensible Security - Multiple Security Zones Architecture Bandwidth Management On-Appliance Cyberoam - iView Reporting CyberoamOS -Wireless WRR based Load balancing Log Viewerand - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Cyberoam WAN -Stateful Agility toControl prolong the life(ACC) and performance of Source its NGFW appliances -- Historical Real-time report Networking Inspection Firewall Access Criteria : User-Identity, and VIEW -- The Security-Hardened Operating System Logging and Monitoring Dynamic Routing: RIP v1& v2,based OSPF, BGP, Multicast Forwarding - Application and User Identity Bandwidth Management -- Integrated Web-based Reporting tool Authentication, System and Admin Events USB port 3G/4G and WiMax Support Supports newer enterprise security features and enhancements Supports 3rd party PSA Solution - ConnectWise Automated Failover/Failback, Multi-WAN Zone, MAC and IP address, Service - Destination Layer 8 (User - Identity) Firewall Graphicaldrill-down real-time reports and historical Monitoring -- Category-based Bandwidth restriction - 1,200+ - Primary link 2 -Bandwidth WRR basedWAN Load balancing - Multiple Security Zones Architecture Log Viewer IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Compliance reports HIPAA, GLBA, SOX, PCI, FISMA Extensible Security Management On-Appliance Cyberoam iView Reporting CyberoamOS Wireless WAN Cyberoam Gateway Anti-Virus & Anti-Spyware WAN Backup link Stateful Inspection Firewall Logging and Monitoring - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding Access Control Criteria : User-Identity, and Prevention System VIEW --Intrusion Agility prolong the life(ACC) and performance its NGFW appliances Authentication, System Admin -- Historical and Real-time report The Security-Hardened Operating System of Source -Networking Application User Identity Bandwidth Management Integrated Web-based Reporting toolEvents - USB port and 3G/4G and WiMaxbased Support Scans HTTP , HTTPS, FTP ,and SMTP , POP3, IMAP, IM, VPN Tunnels - Destination Layer 8to(User - Identity) Firewall - Graphical real-time and historical Monitoring Zone, MAC and IP Custom address, Service Signatures: Default (4500+), 3 -- Supports newer enterprise security features and enhancements Supports 3rd party PSA Solution ConnectWise Category-based Bandwidth restriction 1,200+ drill-down reports Primary WAN link Automated Failover/Failback, Multi-WAN Self Viewer Service- Quarantine areaWAF, Anti-Virus, Anti-Spam, Multiple Security ZonesCustom -- Log IPS, Web filter, Virtual Private Network -Extensible IPS Policies: Multiple, Wireless WAN - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA Security Architecture Gateway Anti-Virus & Anti-Spyware - WAN Backup - WRR based Loadlink balancing -Intrusion Control Criteria (ACC) : User-Identity, Source and Authentication, System and Admin Events - IPSec, ,3G/4G PPTP and WiMax Support Prevention System - Access User-based policy creation - USB L2TP port Inspection -Stateful Agility to prolong the lifeFirewall and of its NGFW appliances -Gateway Historical and Real-time Logging and Monitoring Scans HTTP , HTTPS, FTP, report SMTP, POP3, IMAP, IM, VPN Tunnels -Networking Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding Zone, MAC and IPperformance address, Service Anti-Spam Encryption 3DES, DES, AES, Twofish, Blowfish, Serpent SCADA-aware IPS with pre-defined category for ICS and SCADA -- Destination Signatures: Default (4500+), Custom 3 Primary WAN link Layer 8 (User - Identity) Firewall Supports newer enterprise security features and enhancements -- Supports 3rd party Scanning PSA Solution -Monitoring ConnectWise Self Service Quarantine area Graphical real-time and historical Automated Failover/Failback, Multi-WAN Inbound/Outbound Virtual Private Network signatures IPS Policies: Multiple, - Authentication: key, Digital certificates Gateway & Anti-Spyware - WAN Backup Preshared link --Intrusion Multiple Security ZonesCustom - Log ViewerAnti-Virus - IPS, Web filter, WAF,header Anti-Virus, Anti-Spam, -Wireless WAN Prevention System Real-time Blacklist (RBL), MIME check - WRR IPSec,based L2TP ,Load PPTPbalancing -- User-based policy creation --Logging Scans HTTP , HTTPS, FTP,and SMTP , POP3, IMAP , IM, VPN Tunnels Access Control Criteria (ACC) :Custom User-Identity, Source and 4 Stateful Inspection Firewall Authentication, System Admin Events and Monitoring # Dynamic Routing: RIP v1& v2, OSPF, BGP , Multicast Forwarding --Web Signatures: Default (4500+), Gateway Anti-Spam 3 USB port 3G/4G and WiMax Support Self Service Service Quarantine Quarantine area area -IPSec Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent SCADA-aware IPS MAC with pre-defined category for ICS and SCADA Filtering -- Self VPN Client Zone, and IP address, Service - Destination Layer 8 (User - Identity) Firewall Private Networkkey, Digital certificates Policies: Multiple, Custom - Graphical real-time Scanning and historical Monitoring Inbound/Outbound - Primary WAN Preshared link signatures -Virtual Authentication: -- IPS On-Cloud Web Categorization Inter-operability with major IPSec VPN Gateways Multiple Security Zones --Wireless IPSec, , PPTP policyDefault(89+), creation -Certification Log ViewerAnti-Virus - IPS, Web filter, WAF,header Anti-Virus, Anti-Spam, Gateway & Anti-Spyware Real-time Blacklist (RBL), MIME check - WANL2TP Backup link WAN - User-based Web Categories: Custom -- Supported platforms: Windows 2000, WinXP 32/64-bit, Prevention System 4 Gateway Anti-Spam -Intrusion Access Control Criteria (ACC) : User-Identity, Source and SCADA # Encryption 3DES, and DES, AES, Twofish, SerpentWindows SCADA-aware IPS withHTTP pre-defined category for ICS and Authentication, System Admin Events Self Service area -- Common Scans HTTP , Quarantine HTTPS, FTP,and SMTP , POP3, IMAP, IM, VPN Tunnels - USB32-bit, port- 3G/4G WiMax Support Blowfish, Web Filtering -- Destination Protocols supported: Criteria - EAL4+ IPSec VPN Client 2003 Windows 2008 32/64-bit, Windows Vista 3 2/64Signatures: DefaultMAC (4500+), 3 Zone, and, HTTPS IP Custom address, Service -- Inbound/Outbound Scanning signatures Authentication: Preshared key, Digital certificates Self Quarantine area - Primary WAN link On-Cloud Web Categorization ICSAService Firewall - Corporate Virtual Private Network - Inter-operability with major IPSecWindows VPN Gateways -- IPS Policies: Multiple, Custom bit, Windows 7 RC1 32/64-bit, 8 RC1 32/64-bit --Gateway Real-time Blacklist (RBL), Anti-Spyware MIME header check Anti-Virus - WANL2TP Backup link # Windows 2000, WinXP 32/64-bit, Windows -Application Web Categories: Default(89+), Custom Certification 4 Filtering Checkmark Level 5&area Certification Supported platforms: - IPSec, , PPTP -Web User-based policy creation -- Self Service UTM Quarantine Intrusion Prevention System Filtering IPSec VPN- 3DES, Client Protocols supported: HTTP , HTTPS -- Common Scans HTTP , HTTPS, FTPinteroperability , SMTP, POP3, IMAP, IM, VPN Tunnels Gateway Anti-Spam Criteria EAL4+ Layer 7 (Applications) & Layer 8 (User Identity) Visibility VPNC Basic and AES 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 3 2/64Encryption DES, AES, Twofish, Blowfish, Serpent --- SCADA-aware IPS with pre-defined category for ICS and SCADA Signatures: Default (4500+), Custom SSL VPN 3 Web Categorization Inter-operability with major IPSec VPN Gateways Self Service Quarantine area ICSA Firewall Corporate Inbound/Outbound Scanning -- On-Cloud Control over 2,000+ Applications, classified in 21 Categories - IPv6 Ready Gold Logo signatures bit, Windows 7 Preshared RC1 32/64-bit, Windows 8 RC1 32/64-bit -- Authentication: key, Digital certificates Virtual Private Network IPS Policies: Multiple, Custom Custom & UDP Tunneling Categories: Default(89+), Certification - TCP Supported platforms: Windows 2000, WinXP 32/64-bit, Windows Application Filtering -- Web Filter based policy selection: Category, Risk Level, Characteristics and CheckmarkBlacklist UTM Level 5 Certification - Real-time (RBL), MIME header check -- IPSec, L2TP, PPTP User-based creation Authentication - Active Directory, LDAP, RADIUS, Cyberoam Protocols supported: HTTP , HTTPS 4 -Gateway Common Criteria EAL4+ # 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 3 2/64Technology --Web Layer 7 (Applications) & Layer 8 (User Identity) Visibility VPNCService - Basic and AES interoperability - Self Quarantine area Anti-Spam FilteringIPS with pre-defined category for ICS and SCADA Virtual Appliance advantages -IPSec Encryption SCADA-aware SSL VPN VPN- 3DES, ClientDES, AES, Twofish, Blowfish, Serpent (Local) -Cyberoam ICSA FirewallGold - Corporate bit, Windows 7 RC1 32/64-bit, Windows 8 RC1 32/64-bit Securing SCADA Networks Control over 2,000+ Applications, classified in 21 Categories IPv6 Ready Logo -- Inbound/Outbound Scanning --Application On-Cloud Web Categorization signatures -- Authentication: Preshared key, certificates Supported Virtualization TCP & UDP Application Tunneling Inter-operability with major IPSec VPN Gateways TCP-based Access -Digital HTTP , HTTPS, RDP, TELNET, SSH Filtering - Checkmark UTM Level 5 Platforms: CertificationVMware, Microsoft Hyper-V, SCADA/ICS Signature-based Filtering for Protocols -- Filter based selection: Category, Risk Level, Characteristics and - Real-time Blacklist (RBL), MIME header check Categories: Default(89+), Custom Certification KVM and Citrix XenServer Authentication Active Directory, LDAP , RADIUS, Cyberoam Supported platforms: Windows 2000, WinXP 32/64-bit, Windows - Web Layer 7 (Applications) & Layer 8 (User Identity) Visibility - VPNC - Basic and AES interoperability 4 - Modbus, DNP3, IEC, Bacnet Technology # SSL VPN -Web Protocols supported: HTTP , HTTPSetc -- Common Self Service Quarantine area “Security-in-a-Box”, Cyberoam Virtual Appliance advantages and “Office-in-aCriteria - EAL4+ Filtering Protects virtual (Local) 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 3 2/64IPSec VPN Client Control over 2,000+ Applications, - IPv6 Ready Golddata-centers, Logo Administration and System Management - Control various Commands andclassified Functionsin 21 Categories -- Securing SCADA Networks - TCP-based TCP & UDP Application Tunneling Supported Virtualization - ICSA Firewall - CorporatePlatforms: VMware, Microsoft Hyper-V, - On-Cloud Web Categorization Box” set-ups Access - Windows HTTP , HTTPS, RDP , TELNET, SSH bit, Windows 7 RC1 8 RC1 32/64-bit Filter based selection: Category, Risk Level, and -- Web-based Inter-operability with 32/64-bit, major IPSec VPN Gateways configuration wizard - SCADA/ICS Signature-based Filtering forCharacteristics Protocols Authentication Active Directory, LDAP , RADIUS, Cyberoam Application Filtering KVM and Citrix XenServer - Checkmark UTM Level 5 Certification - Web Categories: Default(89+), Certification Scans traffic within virtual networks, protecting hypervisor 1 Custom Technology -- Command Supportedline platforms: Windows 2000,Telnet) WinXP 32/64-bit, Windows - Modbus, DNP3, IEC, Bacnet etc interface (Serial, SSH, Cyberoam Virtual Appliance advantages and “Office-in-aApplication Firewall (Local) Layer 7 (Applications) & Layer 8 (User - Identity) Visibility Protects virtual data-centers, “Security-in-a-Box”, VPNC - Basic and interoperability -Web Protocols supported: HTTP , HTTPS - Common Criteria -AES EAL4+ management console, hypervisor & Guest OS, securing zero trust Securing SCADA Networks 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 3 2/64Administration System Management SSL VPN - Control various Commands and Functions (v1, v2, v3) and Access - Supported Virtualization Positive Protection model -- SNMP TCP-based Application - HTTP, HTTPS, RDP, TELNET, SSH - Control over 2,000+ Applications, classified in 21 Categories Box” set-ups IPv6 Ready Logo Platforms: VMware, Microsoft Hyper-V, - ICSA FirewallGold - Corporate networks - SCADA/ICS Signature-based Filtering for Protocols bit, Windows 7 RC1 32/64-bit, Windows 8 RC1 32/64-bit Web-based configuration wizard TCP & UDP Tunneling KVM and Citrix XenServer Unique "Intuitive Website Flow Detector" technology - Filter based selection: Category, Risk Characteristics and Scans traffic within virtual networks, protecting hypervisor Application Filtering 1 - Modbus, DNP3, IEC, Bacnet etc Level, Checkmark UTM Level 5 Certification Command line interface (Serial, SSH, Telnet) -User Authentication - Active Directory, LDAP , RADIUS, Cyberoam Web Application Firewall - Protects virtualconsole, data-centers, “Security-in-a-Box”, and “Office-in-aAuthentication -- Protection against Cross-site Scripting (XSS), Technology management hypervisor &advantages Guest OS, securing zero trust Layer 7 (Applications) &Injections, Layer 8and (User - Identity) Visibility - Control variousSQL Commands Functions - VPNC - Basic and AES interoperability Cyberoam Virtual Appliance -Administration SNMP (v1, v2, v3) and System Management (Local) SSL VPN Sessionover Hijacking, URL Tampering, classified Cookie Poisoning etc Positive Protection model Box” set-ups Internal database Securing SCADA Networks -- Web-based configuration wizard- HTTP, HTTPS, RDP, TELNET, SSH networks -- Control 2,000+ Applications, in 21 Categories - IPv6 ReadyVirtualization Gold Logo Platforms: VMware, Microsoft Hyper-V, Supported TCP-based Access -- TCP & UDP Application Tunneling -- Unique "Intuitive Website Flow Detector" technology Scans traffic within virtual networks, protecting hypervisor AD Integration with support for OU-based Security Policies SCADA/ICS Signature-based Filtering for Protocols 1 FilterApplication based selection: Category, Risk Level, Characteristics and - Command line interface (Serial, SSH, Telnet) KVM and Citrix XenServer Web Firewall 1,2,3,4 * -User Authentication - Active Directory, LDAP, RADIUS, Cyberoam Authentication -High Protection against SQL Injections, Cross-site Scripting (XSS), management & Guest OS, securing zero trust - Modbus, DNP3, IEC, Bacnet etc Available in all console, the Modelshypervisor except CR15iNG & CR15wiNG Automatic Windows Availability Technology -- SNMP (v1, v2, v3) Single Sign On - Protects virtual data-centers, “Security-in-a-Box”, - Positive Protection model Cyberoam Virtual Appliance advantages and “Office-in-a* Session Hijacking, URL Tampering, Poisoning etc Administration and System Management -(Local) Internal - Control various Commands andCookie Functions networks External database LDAP/DAPS/RADIUS database Integration Not supported in CR15iNG & WiFi series of appliances -- Securing SCADA Networks Active-Active andWebsite Active-Passive Box” set-ups Unique "Intuitive Flow Detector" technology -Additional Supported Virtualization Platforms: VMware, Microsoft Hyper-V, # - Web-based TCP-based Application Access HTTP, HTTPS, RDP, Policies TELNET, SSH AD Integration with support for-OU-based Security configuration wizard Purchase Required SCADA/ICS Signature-based Filtering for Protocols -- Stateful Failover Authentication 1,2,3,4 Protection against *SQL Injections, Cross-site Scripting (XSS), - Scans traffic virtual networks, protecting hypervisor 1 KVM and Citrix XenServer Available in allwithin the Models except CR15iNG & CR15wiNG Automatic Windows Single SignSSH, On Telnet) -User Command line interface (Serial, High Availability - Modbus, DNP3, IEC, Bacnet etcCookie Poisoning etc Web Application Firewall Session Hijacking, URL Tampering, * -Administration Internal database management console, Guest OS, securing zero trust -Not Protects virtual data-centers, “Security-in-a-Box”, and “Office-in-aExternal LDAP/DAPS/RADIUS database Integration - SNMP (v1, v2, v3) and System supported in CR15iNG &hypervisor WiFi series of&appliances Management - Control various Commands and Functions Active-Active and Active-Passive - Positive Protection model - AD Integration with support for OU-based Security Policies networks # Box” set-ups Additional Purchase Required - Web-based configuration wizard - Unique Flow Detector" technology Stateful"Intuitive Failover Website 1,2,3,4 * Available in all the Models except CR15iNG & CR15wiNG Automatic Windows Single Sign On - Scans traffic within virtual networks, protecting hypervisor Availability 1 -User Command line interface (Serial, SSH, Telnet) Authentication -High Protection against SQL Injections, Cross-site Scripting (XSS), * Web Application Firewall - VPN - External LDAP/DAPS/RADIUS database Integration Not supported in CR15iNG WiFi series of&appliances Centralized logging Remote Management management console,&Communication hypervisor Guest OS, securing zero trust -Centralized Active-Active and Active-Passive Session Protection Hijacking, URL Tampering, Cookie Poisoning etc - SNMP v2, v3) Internal(v1, database # - Positive model Additional networksPurchase Required- Secure Encryption - User, User Groups and Guest Users -Configure Stateful Failover Audit and System log and Manage AD Integration with support for OU-based Security Policies - Unique "Intuitive Website Flow Detector" technology 1,2,3,4 * Available in all the Models- except & CR15wiNG - Automatic Windows Single Sign On MutualCR15iNG Authentication Individual Appliances Authentication -High Protection against SQL Injections, Cross-site Scripting (XSS), Availability - and VPN more... User Centralized logging Centralized Remote Management Communication * - External LDAP/DAPS/RADIUS database Integration Not supported in CR15iNG &- WiFi series of appliances Session Hijacking, URL Tampering, Cookie Poisoning etc- User, User Groups Internal database - Active-Active and Active-Passive HTTP , HTTPS, Syslog & Secure Syslog Appliance Groups Distribution Service and Guest Users # -Upgrade Audit andPolicies System log - Secure Encryption Configure and Manage Additional Purchase Required AD Integration with support for OU-based Security - Stateful Failover Configuration Management -Centralized Security Upgrades 1,2,3,4 * - and VPN more... - Automatic MutualCR15iNG Authentication -High Individual Appliances logging Centralized Remote Management Available in all the Models-Communication except & CR15wiNG Windows Single Sign On Availability -- Template-based configuration Policy Enforcement * Management - AV, and IPS & Application User, User Groups and Guest Users - External LDAP/DAPS/RADIUS database Integration -- WiFi HTTP , HTTPS, Syslog & Secure Syslog Not supported in CR15iNG &System series of appliances -Global Appliance Groups Upgrade Distribution Service - Audit System log Signatures Secure Encryption and Manage -Configure Active-Active and Active-Passive # Configuration Synchronization Firewall Web Based User Interface - Web Filtering Categories Additional Purchase Required Configuration Management --- Stateful and more... -- Mutual Authentication IndividualFailover Appliances - Security Upgrades -- Backup and Restore -Centralized Network configuration Command Line Interface - CyberoamOS Firmware Updates VPN Template-based configuration Global Policy Enforcement Centralized logging Remote Management Communication System Management -- HTTP , HTTPS, Syslog & Secure Syslog - Appliance Groups - AV, IPS & Application Signatures Upgrade Distribution Service -- Web Filter User, User Groups and Guest Users -Configuration Configuration Synchronization Firewall -- Security Audit System log - Secure Encryption Configure and Manage Management Web Based User Interface - Weband Filtering Categories Upgrades - Application Filter Appliance Monitoring & Alerts more... Compliance Backup and Restore Network configuration -System Mutual Authentication -Global Individual Appliances --- and Template-based configuration Command Line Interface -Administration CyberoamOS Firmware Updates Policy Enforcement Management - AV, IPS & Application Signatures VPN Centralized logging Centralized Remote Management Communication -- QoS -- Dashboard forSynchronization Appliance Group, Individual - Role-based Granular control over CE, FCC, UL,User RoHS Web Policy Filter Groups HTTP ,Based HTTPS, Syslog & Secure Syslog Appliance - Firewall Upgrade Distribution Service --- Web Interface - Weband Filtering Categories - Configuration User, User Groups and Guest Users - Audit System log Secure Encryption Configure and Manage -- IPS Appliance ApplianceUpgrades andFirmware Appliance Groups Filter Configuration Management Appliance & Alerts - and Backup andMonitoring Restore - Application Network configuration -Administration Security Compliance -- Command Line Interface CyberoamOS Updates more... Mutual Authentication - Individual Appliances Anti Virus, Anti Spam Appliance Monitor Graph Health Monitoring: CCC, Managed - Web QoS Policy Template-based configuration Policy Enforcement -Global Filter - Dashboard for Appliance Group, Individual System Management - AV, IPS & Granular Application Signatures - Role-based control over -- CE, UL, RoHS HTTPFCC, , HTTPS, Syslog & Secure Syslog - Appliance GroupsFirewall Web Application Upgrade Distribution Service Email Alerts Synchronization Appliances -- IPS --Appliance Configuration Firewall Application Filter Appliance -Compliance Web Based User Interface - Web Filtering CategoriesGroups Monitoring & Alerts Appliance and Appliance Administration Configuration Management - Anti LogsVirus, & Reports - Security Upgrades Anti Spam Backup and Restore - Network configuration QoS Policy Appliance Monitor Graph Group, Individual - CE, Command Line Interface CyberoamOS Firmware Updates Dashboard for Appliance -- Health Monitoring: CCC, Managed Role-based Granular control over FCC, UL, RoHS -- Template-based configuration Global Policy Enforcement System Management - AV, IPS & Application Signatures Application Firewall - Web IPS Filter - Email Alerts * Appliance Appliancesand Appliance Groups Appliance - Configuration Synchronization - Firewall - Web Based User Interface - Web Filtering Categories Logs & Reports - Application Filter Anti Virus, Anti Spam Appliance Monitoring & Alerts Appliance Monitor Graph Administration Compliance -- Health Monitoring: CCC,Updates Managed -- Backup and Restore - Network configuration - Command Line Interface CyberoamOS Firmware - QoS Web Policy Application Firewall - Dashboard Email Alertsfor Appliance Group, Individual - Role-based - CE, FCC, UL, RoHS Appliances Granular control over * - Web Filter - User and Group based Reports Logs Administration Operating Environment - IPS Logs & Reports Appliance Appliance and Appliance Groups - Application Filter Appliance Monitoring & Alerts Internet Usage Reports Data Transfer, Administration Compliance Real-time/Archived logs - Web based Management Console - Hardened Linux OS - Anti Virus, Anti Spam - Appliance Monitor Graph Health Monitoring: CCC, Managed -- QoS Policy (Backup/restore) Surfing Time, Client Type * Dashboard for Appliance Group, Individual Log storage Role-based administration Granular control over - CE, FCC, UL, RoHS - Web Application Firewall - Email Alerts User and Group based Reports Logs Administration Operating Environment Appliances -- IPS - Security Reports - Firewall, Attacks, Spam, Appliance Audit logs Categories Mail, User, Device, Multiple Dashboards Resource, Device, Appliance and Appliance Groups Logs & Reports Network and Security - Internet Usage Reports - Data Transfer, --- Real-time/Archived logs - Web based Management Console -Supported Hardened Linux OS Virus, Blocked Attempts, WAF Anti Virus, Anti Spam Application, Views, Data, Archive, Report User, Host, Email Address - Surfing Appliance Monitor Graph Health Monitoring: CCC, Managed Time, Client Type Devices Environment -- Log (Backup/restore) - Role-based administration User and Group based Reports -- Remote Access Reports Logs Administration Operating Webstorage Application Firewall - Device Grouping - Device type & models * Email Alerts Appliances Security Reports Firewall, Attacks, Spam, Custom/Proprietary UTMs - Real-time/Archived Audit logs Categories - Mail, User, Device, Multiple Dashboards - Resource, - Internet Usage Reports - Data Exportable formats - PDF, ExcelTransfer, Supported Network andincluding Security logs -- Web based Management ConsoleDevice, -- Hardened Linux OS devices -Reports Logs & Reports Virus, Blocked Attempts, WAF - Proxy Firewalls, Access Gateway Views, Data, Archive, Report User, Host, Email Address Time, Client TypeReport - Surfing Email Alerts/automated Scheduling -- Application, Log storage (Backup/restore) -Supported Role-based administration Devices Web- Device Browsers 1,200+ drilldown Reports -- Remote Access Reports Smart Wireless Router Device Grouping type & models Security Reports Firewall, Attacks, Spam, * Audit logs Categories Mail, User, Multiple Dashboards - Resource, - User and Group based Reports Logs Administration Operating Environment -Supported Custom/Proprietary devices UTMs -- Microsoft Internet Explorer 8.0+ Device, -- Compliance Reports - -HIPAA, SOX,Device, FISMA, Network andincluding Security - Exportable formats - PDF,WAF Excel - Endpoint Security Solution Reports Virus, Blocked Host, Email Address - Internet Usage Attempts, Reports - Data Transfer, Proxy Firewalls, Gateway - Application, Real-time/Archived logs Archive, Report - User, Web based Management Hardened Linux Access OSdevices Mozilla Firefox 3.0+ (BestConsole view) GLBA, PCI Views, Data, *- Email Alerts/automated Report Scheduling Devices -- Syslog-compatible available asClient Software Supported Web- Device Browsers 1,200+ drilldown Reports -Also Remote Access Reports Device Grouping type & models Surfing Time, Type -- Smart Wireless Router -- Log storage (Backup/restore) -- Role-based administration Custom/Proprietary devices including UTMs -Administration Internet Explorer 8.0+ Device, -Logs Reports - -HIPAA, SOX,Device, FISMA, Exportable formats - PDF, Excel -- User andReports Group based Reports Operating Environment Security - Firewall, Attacks, Spam, Reports -Supported Security Solution - Compliance Audit logs Categories Mail, User, - Microsoft Multiple Dashboards - Resource, Network and Security - Endpoint Proxy Firewalls, Access Gateway www.cyberoam.com I [email protected]*- Internet -Supported Mozilla Firefox 3.0+ (BestConsole view) GLBA, PCI Email Alerts/automated Scheduling Usage Attempts, Reports -Report Data Transfer, -- Application, Real-time/Archived logs Archive, - User, Web based Management -- Hardened Linux OSdevices Virus, Blocked Web Browsers Syslog-compatible 1,200+ drilldown Views,Reports Data, Report Host, Email Address Also available as Software WAF Smart Wireless Router Devices Surfing Time, Client Type -- Log storage (Backup/restore) Role-based administration Remote Access Reports Microsoft Internet- Explorer 8.0+ Compliance Reports - HIPAA, SOX, FISMA, - Device Grouping Device type & models Endpoint Security Solution - Custom/Proprietary devices including UTMs -- Security Reports - Firewall, Attacks, Spam, -Reports Audit User, Device, -- Multiple Dashboards - Resource, Exportable formats - PDF, Excel Mozilla Firefox 3.0+ (Best view) Device, GLBA,logs PCI Categories - Mail, * www.cyberoam.com I [email protected] Supported Network and Security Syslog-compatible devices available as Software -- Proxy Firewalls, Access Gateway Virus, Blocked Attempts,Report WAF Scheduling Views,Reports Data, Archive, Report User, Host, Email -Also Email Alerts/automated Supported WebAddress Browsers - Application, 1,200+ drilldown Devices - Smart Wireless Router - Remote Access Reports Device Grouping Device type & models Microsoft Internet Explorer 8.0+ - Compliance Reports - HIPAA, SOX, FISMA, Custom/Proprietary devices www.cyberoam.com [email protected] I - Endpoint Security Solution including UTMs - Exportable formats - PDF, Excel Reports - Mozilla Firefox 3.0+ (Best view) GLBA, PCI * -- Proxy Firewalls, Access Gateway Syslog-compatible devices -Also Email Alerts/automated available as Software Report Scheduling Supported Web Browsers - 1,200+ drilldown Reports - Smart Wireless Router - Microsoft Internet Explorer 8.0+ - Compliance Reports - HIPAA, SOX, FISMA, Endpoint Security Solution www.cyberoam.com I [email protected]* - Mozilla Firefox 3.0+ (Best view) GLBA, PCI - Syslog-compatible devices Also available as Software Cyberoam Network Security Appliances TM TM Cyberoam Network Security Appliances Cyberoam Network Security Appliances TM TM Centralized Security Management with Cyberoam Central Console (CCC) Centralized Security Management with Cyberoam Central Console (CCC) Centralized Security Management with Cyberoam Central Console (CCC) Centralized Security Management with Cyberoam Central Console (CCC) Centralized Security Management with Cyberoam Central Console (CCC) Centralized Visibility across Networks with Cyberoam iView Centralized Visibility across Networks with Cyberoam iView Centralized Visibility across Networks with Cyberoam iView Centralized Visibility across Networks with Cyberoam iView Centralized Visibility across Networks with Cyberoam iView www.cyberoam.com I [email protected] Cyberoam NG series UTM Appliances Techsheet Cyberoam NG series UTM Appliances Specifications Cyberoam Interfaces 15iNG 25iNG/6P NG series UTM Appliances 35iNG 15wiNG Techsheet 25wiNG/6P 35wiNG Techsheet 25wiNG/6P 35wiNG 4/6 6 Specifications 15iNG 25iNG/6P 15wiNG Copper GbE Ports 3 4/6 3 6 Console Ports (RJ45) 1 1 1 1 1 1 Interfaces USB Ports 2 2 2 2 2 2 Copper GbE Ports * Techsheet 3 4/6 4/6 3 6 Specifications 15iNG 25iNG/6P 15wiNG 25wiNG/6P 6 Hardware Bypass Segments* -35wiNG Console Ports (RJ45) 1 1 1 1 1 1 Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Yes Interfaces USB Ports 2 2 2 2 2 2 ** * Copper GbE PortsSegments Hardware Bypass -3 -4/6 -4/6 -3 -6 System Performance -6 Specifications 15iNG 25iNG/6P 15wiNG 25wiNG/6P 35wiNG ConsoleThroughput PortsInternal/DMZ/WAN (RJ45)(UDP) (Mbps) Configurable Ports 1 1 Yes 1 Yes 1 Yes 1 Yes Yes Firewall 1 Yes 2,300 1,000 1,500 1,500 1,000 2,300 USB Ports 2 2 2 2 2 Firewall Throughput (TCP) **(Mbps) 2 2,000 750 1,000 1,000 750 2,000 * Interfaces System Performance Hardware Bypass Segments New sessions/second 12,000 3,500 5,000 5,000 3,500 12,000 Copper GbE Ports Firewall Throughput (UDP) (Mbps) 3 4/6 4/6 3 6 6 2,300 1,000 1,500 1,500 1,000 2,300 Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Yes Concurrent sessions 350,000 60,000 150,000 150,000 60,000 350,000 Console Ports (RJ45)(TCP) (Mbps) 1 1 1 1 1 Firewall Throughput 1 2,000 750 1,000 1,000 750 2,000 IPSec VPN Throughput (Mbps) ** 210 110 250 250 110 210 USB PortsPerformance System 2 2 2 2 2 New sessions/second 2 12,000 3,500 5,000 5,000 3,500 12,000 No. of IPSec Tunnels 150 50 100 100 50 150 ** Hardware Bypass Segments Firewall Throughput (UDP) (Mbps) -60,000 -150,000 -1,000 Concurrent sessions -350,000 2,300 1,000 1,500 1,500 2,300 150,000 60,000 350,000 SSL VPN Throughput (Mbps) 100 50 75 75 50 100 Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes FirewallVPN Throughput (TCP) (Mbps) IPSec Throughput (Mbps) Yes 2,000 750 1,000 1,000 750 2,000 250 110 210 210 110 250 WAF Protected Throughput (Mbps) 150 -NA100 100 -NA150 New sessions/second 12,000 3,500 5,000 5,000 3,500 12,000 ** SSL VPN Throughput (Mbps) 100 50 75 75 50 100 Anti-Virus Throughput (Mbps) System Performance 525 180 300 300 180 525 Concurrent sessions 350,000 60,000 150,000 150,000 60,000 350,000 WAF Protected Throughput (Mbps) 150 -NA100 100 -NA150 IPS Throughput (Mbps) Firewall Throughput (UDP) (Mbps) 350 140 200 200 140 350 2,300 1,000 1,500 1,500 1,000 2,300 IPSec VPN Throughput (Mbps) 250 110 210 210 110 250 Anti-Virus Throughput (Mbps) 525 180 300 300 180 525 UTM Throughput (Mbps) Firewall Throughput (TCP) (Mbps) 210 80 110 110 80 210 2,000 750 1,000 1,000 750 2,000 No. of IPSec Tunnels 150 50 100 100 50 150 IPS ThroughputUsers/Nodes (Mbps) 350 140 200 200 140 350 Authenticated New sessions/second Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited 12,000 3,500 5,000 5,000 3,500 12,000 SSL VPN Throughput (Mbps) 100 50 75 75 50 100 UTM Throughput (Mbps) 210 80 110 110 80 210 Concurrent sessions 350,000 60,000 150,000 150,000 60,000 350,000 WAF Protected Throughput 150 -NA100 100 -NA150 Built-in Wireless LAN (Mbps) (Only for wiNG series) Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited IPSec VPN Throughput (Mbps) 250 110 210 210 110 250 Anti-VirusStandards Throughput (Mbps) 525 180 300 300 WPA2, 802.11i , TKIP 180 802.11 a/b/g/n (WEP, WPA, 525 IEEE , AES, PSK) Wireless No. of IPSec Tunnels 150 50 100 100 50 150 IPS Throughput (Mbps) 350 140 200 200 140 350 Detachable 3x3 MIMO Antenna SSL VPN Throughput (Mbps) Built-in Wireless LAN (Only for wiNG series) 100 50 75 75 50 100 UTM Throughput (Mbps) 210 80 110 110 80 to 8 bssid 210 Up Access Points Throughput WAF Protected (Mbps) IEEE 802.11 a/b/g/n (WEP, WPA, WPA2, 802.11i , TKIP , AES, PSK) Wireless Standards 150 -NA100 100 -NA150 Authenticated Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited 11n HT40 : +15dBm, 11b CCK: +15dBm, 11g OFDM:+15dBm Transmit PowerUsers/Nodes (EIRP) Anti-Virus Detachable 3x3 MIMO 525 180 300 300 180 525 Antenna Throughput (Mbps) -68dBm at 300Mbps, -70dBm at 54Mbps, -88dBm at 6Mbps Receiver Sensitivity Built-in Wireless LAN (Only for wiNG series) IPS Throughput (Mbps) 350 140 200 200 140 350 Up to 8 bssid Access Points 2.412 GHz - 2.472 GHz Frequency Range(Mbps) IEEE 802.11 a/b/g/n (WEP , WPA, WPA2, 802.11i , TKIP , AES, PSK) UTM Throughput Wireless Standards 210 80 110 110 80 210 11n HT40 : +15dBm, 11b CCK: +15dBm, 11g OFDM:+15dBm Transmit Power (EIRP) 5.200 GHz - 3x3 5.825 GHz Authenticated Users/Nodes Detachable MIMO Antenna Unlimited Unlimited Unlimited Unlimited Unlimited -68dBm at 300Mbps, -70dBm at 54Mbps, -88dBm atUnlimited 6Mbps Receiver Sensitivity Number of Selectable Channels USA 11 channels, Up to(FCC) 8 bssid Access Points 2.412 GHz -- 2.472 GHz EU (ETSI) / Japan (TELEC) - 13 channels Frequency Range Built-in Wireless LAN (Only for wiNG series) Data RatePower (EIRP) 802.11n: up to 450Mbps, 1, 2, 5,5,11g 11Mbps, 11n HT40 : -+15dBm, 11b,802.11b: CCK: OFDM:+15dBm Transmit 5.200 GHz 5.825 GHz IEEE 802.11 a/b/g/n (WEP WPA, +15dBm, WPA2, 802.11i , TKIP, AES, PSK) Wireless Standards 802.11g: 9,11 12, 18, -70dBm 24, 36, 48, 54Mbps -68dBm at6,300Mbps, at 54Mbps, -88dBm at 6Mbps Receiver of Sensitivity Number Selectable Channels USA (FCC) channels, EU (ETSI) / Japan (TELEC) - 13 channels Dimensions Detachable 3x3 MIMO Antenna 2.412 GHz 2.472 GHz 802.11b: 1, 2, 5,5, 11Mbps, Frequency Range Data 802.11n: up- to 450Mbps, H x WRate x Points D (inches) 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 68xbssid 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 Up to Access 5.200 GHz - 5.825 GHz 802.11g: 9, 12, 18, 24, 48,x+15dBm, 54Mbps 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 xHT40 15.36,:x +15dBm, 23.2 4.4 15.3 x 23.2 4.4 x 15.3 x 23.2 H x W x DPower (cms)(EIRP) 11n 11b36, CCK: 11g OFDM:+15dBm Transmit Dimensions Number of Selectable Channels USA (FCC) - 11 channels, EU (ETSI) / Japan (TELEC) - 13 channels Appliance Weight 1.5 kg, 3.307 lbs 2.3 kg, 5.07 lbs 2.3 kg, 5.07 lbs 1.5 kg, 3.307 lbs 2.3atkg, 5.07 lbs-88dBm at2.3 kg, 5.07 lbs -68dBm at 300Mbps, -70dBm 54Mbps, 6Mbps Receiver Sensitivity H x WRate x D (inches) 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x1,9.1 1.7 x 6 x 9.1 Data 802.11n: up to 450Mbps, 802.11b: 2, 5,5, 11Mbps, 2.412 GHz - 2.472 GHz Frequency Range 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 H x W x D (cms) Power 802.11g: 6,-9,5.825 12, 18, 24, 36, 48, 54Mbps 5.200 GHz GHz Dimensions Appliance Weight 1.5 kg, 3.307 lbs 2.3 kg, 5.07 lbs 2.3 kg, 5.07 lbs 1.5 kg, 3.307 lbs 2.3 kg, 5.07 lbs 2.3 kg, 5.07 lbs Input Voltage 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC Number of Selectable Channels USA (FCC) 11 channels, EU (ETSI) / Japan (TELEC) 13 H x W x D (inches) 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6channels x 9.1 Consumption 47.8W 13.2W 33.5W 33.5W 13.2W 47.8W Power Data Rate 802.11n: up to 450Mbps, 802.11b: 1, 2, 5,5, 11Mbps, 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 H x W x D (cms) Total Heat Dissipation (BTU) 163x 15.3 x 23.2 45 114 114 45 163 Input Voltage 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC Appliance Weight 802.11g: 6, 9,lbs 12, 18, 24, 36,2.3 48,kg, 54Mbps 1.5 kg, 3.307 lbs 2.3 kg, 5.07 lbs 2.3 kg, 5.07 lbs 1.5 kg, 3.307 5.07 lbs 2.3 kg, 5.07 lbs Dimensions Consumption 47.8W 13.2W 33.5W 33.5W 13.2W 47.8W H x W x D (inches) 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x 6 x 9.1 1.7 x Power Total Heat Dissipation (BTU) 163 6 x 9.1 45 114 114 45 163 Specifications 100iNG 200iNG/XP 300iNG/XP 50iNG 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 4.4 x 15.3 x 23.2 H x WVoltage x D (cms) Input 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC Appliance Weight 1.5 kg, 3.307 lbs 2.3 kg, 5.07 lbs 2.3 kg, 5.07 lbs 1.5 kg, 3.307 lbs 2.3 kg, 5.07 lbs 2.3 kg, 5.07 lbs Consumption Interfaces 47.8W 13.2W 33.5W 33.5W 13.2W 47.8W Specifications 100iNG 200iNG/XP 300iNG/XP 50iNG Total Heat Dissipation (BTU) Copper GbE Ports 163 45 / 6 114 114 163/ 6 10 10 845 8 Power Number of Slots for FleXi Ports Module 1 1 Interfaces *** Input Voltage *** 100-240VAC 100-240VAC 100-240VAC 100-240VAC 100-240VAC FleXi Ports Module (For XP Appliances) 100-240VAC Copper GbE Ports 8 / /86/ 4 8 / 8 / 4 10 10 / 6 8 8 Consumption 47.8W 13.2W 33.5W 33.5W 13.2W 47.8W Specifications 100iNG 200iNG/XP 300iNG/XP 50iNG (GbE Copper/GbE Fiber/10GbE Fiber) Number ofDissipation Slots for FleXi Ports Module 145 1163 -45 -114 163 114 Total Heat (BTU) Console Ports (RJ45) 1 1 1 1 *** Interfaces FleXi Ports Module (For XP Appliances) USB Ports 2 2 2 2 8/8/4 8 / 8 / 4 (GbE Copper/GbE Copper GbE PortsFiber/10GbE** Fiber) 10 / 6 10 / 6 8 8 Hardware Bypass Segments 2 2 2 2 Specifications 100iNG 200iNG/XP 300iNG/XP 50iNG Console Ports (RJ45) Number of Slots for FleXi Ports Module 1 1 1 1 Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes *** USB FleXi Ports Ports Module (For XP Appliances) 2 2 2 2 8/8/4 8 / 8 / 4 Interfaces ** * (GbE Copper/GbE Hardware BypassFiber/10GbE Segments Fiber) System Performance 2 2 2 2 Copper GbE Ports 10 /6 10 /6 8 8 ConsoleThroughput PortsInternal/DMZ/WAN (RJ45)(UDP) (Mbps) Configurable Ports Firewall 1 1 Yes 1 Yes 1 3,250 Yes Yes 12,000 10,000 4,500 Number of Slots for FleXi Ports Module 1 1 -2 -2 USB Ports 2 2 Firewall Throughput*** (Mbps) 3,000 9,500 8,000 3,500 ***(TCP) ** System Performance * FleXi PortsBypass ModuleSegments (For XP Appliances) 2 Hardware 2 2 New sessions/second 85,000 70,000 45,000 8 /8/4 8 /8/4 -30,000 -2 (GbE Copper/GbE Fiber/10GbE Fiber) Firewall Throughput (UDP) (Mbps) 3,250 12,000 10,000 4,500 Configurablesessions Internal/DMZ/WAN Ports Yes Yes Yes Yes 1,000,000 2,000,000 Concurrent 1,500,000 1,250,000 Console Ports (RJ45) Firewall Throughput (TCP) (Mbps) 3,000 9,500 8,000 3,500 1 1 1 1 IPSec VPN Throughput (Mbps) ** 400 1,200 800 450 System USB PortsPerformance New sessions/second 30,000 85,000 70,000 45,000 2 2 2 2 No. of IPSec Tunnels 200 400 300 250 ** Firewall Throughput (UDP) (Mbps) Concurrent sessions 3,250 12,000 10,000 4,500 Hardware Bypass Segments 1,000,000 2,000,000 1,500,000 1,250,000 2 2 2 2 SSL VPN Throughput (Mbps) 300 500 450 400 FirewallVPN Throughput (TCP) (Mbps) IPSec Throughput (Mbps) 3,000 9,500 8,000 3,500 Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes 400 1,200 800 450 WAF Protected Throughput (Mbps) 450 1,250 1,000 700 Newofsessions/second No. IPSec Tunnels 30,000 85,000 70,000 45,000 200 400 300 250 ** Anti-Virus Throughput (Mbps) System Performance 1,000 2,600 2,200 1,400 Concurrent sessions (Mbps) SSL VPN Throughput 1,000,000 2,000,000 1,500,000 1,250,000 300 500 450 400 IPS Throughput (Mbps) Firewall Throughput (UDP) (Mbps) 750 2,400 2,000 1,200 3,250 12,000 10,000 4,500 IPSecProtected VPN Throughput (Mbps) WAF Throughput (Mbps) 400 1,200 800 450 450 1,250 1,000 700 UTM Throughput (Mbps) Firewall Throughput (TCP) (Mbps) 550 1,500 1,200 750 3,000 9,500 8,000 3,500 SSL VPN Throughput Anti-Virus Throughput (Mbps) (Mbps) 300 500 450 400 1,000 2,600 2,200 1,400 Authenticated Users/Nodes New sessions/second Unlimited Unlimited Unlimited Unlimited 30,000 85,000 70,000 45,000 WAFThroughput Protected Throughput (Mbps) IPS (Mbps) 450 1,250 1,000 700 750 2,400 2,000 1,200 Concurrent sessions 1,000,000 2,000,000 1,500,000 1,250,000 Dimensions Anti-Virus Throughput (Mbps) UTM Throughput (Mbps) 1,000 2,600 2,200 1,400 550 1,500 1,200 750 IPSec VPN Throughput (Mbps) 400 1,200 800 450 H x D (inches) 1.7 1.7 x 14.6 x 17.3 1.7 x 17.3 x 11.85 1.7 x 17.3 x 11.85 IPSx W Throughput (Mbps) Authenticated Users/Nodes 750x 14.6 x 17.3 2,400 2,000 1,200 Unlimited Unlimited Unlimited Unlimited No. of IPSec Tunnels 200 400 300 250 UTM 4.4 X 37.2 X 44 4.4 X 37.2 X 44 4.4 x 43.9 x 30.1 4.4 x 43.9 x 30.1 H x WThroughput x D (cms) (Mbps) 550 1,500 1,200 750 Dimensions SSL VPN Throughput (Mbps) 300 500 450 400 Authenticated Users/Nodes Appliance Weight 5 kg, 11.02 lbs 5 kg, 11.02 lbs 5.1 kg, 11.24 lbs 5.1 kg, 11.24 lbs Unlimited Unlimited Unlimited Unlimited H x WProtected x D (inches) 1.7 x 14.6 x 17.3 1.7 x 14.6 x 17.3 1.7 x 17.3 x 11.85 1.7 x 17.3 x 11.85 WAF Throughput (Mbps) 450 1,250 1,000 700 4.4 X 37.2 X 44 4.4 X 37.2 X 44 4.4 x 43.9 x 30.1 4.4 x 43.9 x 30.1 H x W x D Throughput (cms) Anti-Virus (Mbps) Power 1,000 2,600 2,200 1,400 Dimensions Appliance Weight 5 kg, 11.02 lbs 5 kg, 11.02 lbs 5.1 kg, 11.24 lbs 5.1 kg, 11.24 lbs IPS Throughput (Mbps) Input Voltage 750 2,400 2,000 1,200 100-240VAC 100-240VAC 100-240VAC 100-240VAC H x WThroughput x D (inches)(Mbps) 1.7 1.7 1.7 x 17.3 x 11.85 1.7 x 17.3 x 11.85 UTM 99Wx 14.6 x 17.3 137W 137W 99Wx 14.6 x 17.3 Consumption 550 1,500 1,200 750 Power 4.4 4.4 4.4 4.4 H x WHeat x D (cms) Authenticated Users/Nodes 338X 37.2 X 44 467x 43.9 x 30.1 467x 43.9 x 30.1 338X 37.2 X 44 Total Dissipation (BTU) Unlimited Unlimited Unlimited Unlimited Input Voltage 100-240VAC 100-240VAC 100-240VAC 100-240VAC Appliance Weight 5 kg, 11.02 lbs 5 kg, 11.02 lbs 5.1 kg, 11.24 lbs 5.1 kg, 11.24 lbs Dimensions Consumption 99W 137W 137W 99W 1.7 x 14.6 x 17.3 1.7 x 14.6 x 17.3 1.7 x 17.3 x 11.85 1.7 x 17.3 x 11.85 10% to 90% Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) H x W x D (inches) Power Total Heat Dissipation (BTU) 338 467 467 338 ** If xEnabled, will bypass traffic only in case of4.4 Power failure. X 37.2 X 44 4.4 X 37.2 X 44 4.4 x 43.9 x 30.1 4.4 x 43.9 x 30.1 H WVoltage x D (cms) Input 100-240VAC 100-240VAC 100-240VAC 100-240VAC ** ** Appliance Consumption Antivirus, Weight IPS and UTM performance is measured based on HTTP traffic as per RFC guidelines. Actual performance may depending on the real network traffic environments. 99W 137W 137W 99W 5 kg, 11.02 5 kg, 11.02 lbs3511-25 5.1 kg, 11.24 lbs Humidity 5.1 kg,vary 11.24 lbs Environmental Conditions: Operating Temperature 0 lbs °C to 40 °C, Storage Temperature °C to 75 °C, Relative (Non condensing) 10% to 90% *** *** Heat Dissipation 338 at a time. 467 467 338 Ports Module can be used Additional Purchase (BTU) required, only single FleXi *Total If Enabled, will bypass traffic only in case of Power failure. Power ** Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance100-240VAC may vary depending on the real network traffic environments. Input Voltage 100-240VAC 100-240VAC 100-240VAC *** Environmental Conditions: Operating Temperature °C to 40can °C,be Storage -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90% Additional Purchase required, only single FleXi used a time. Consumption 99WatTemperature 137W 137W 99W Ports0Module * If Enabled, will bypass(BTU) traffic only in case of338 Power failure. Total Heat Dissipation 338 467 467 ** Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. *** Additional Purchase required, only single FleXi Ports Module can be used at a time. Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90% ** If Enabled, will bypass traffic only in case of Power failure. ** ** Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. *** *** Additional Purchase required, only single FleXi Ports Module can be used at a time. 35iNG Cyberoam NG series UTM Appliances 35iNG 35iNG NA NA NA NA Cyberoam NG series Next-Generation Firewalls Cyberoam NG series Next-Generation Firewalls Specifications 750iNG-XP 500iNG-XP Firewalls Cyberoam NG series Next-Generation Interfaces Specifications Copper GbE Ports Specifications Number of Slots for FleXi Ports Module * Interfaces Port options per FleXi Ports Module Copper GbE PortsFiber/10GbE Fiber) (GbE Copper/GbE Interfaces NumberGbE of Slots for FleXi Ports Module Console Ports (RJ45) Copper Ports * Specifications Port options per FleXi Ports Module USB Ports Number of Slots for FleXi Ports Module 500iNG-XP 8 750iNG-XP 8 750iNG-XP 500iNG-XP Cyberoam NG series Next-Generation Firewalls 2 2 Cyberoam NG series Next-Generation Firewalls 8/8/4 8/8/4 Techsheet 1000iNG-XP 1000iNG-XP 10 1000iNG-XP 4 1500iNG-XP 1500iNG-XP 10 1500iNG-XP 4 Techsheet 2500iNG-XP Techsheet 2500iNG-XP 10 2500iNG-XP Techsheet 4 Techsheet 8/8/4 8 8 8 10/ 8 / 4 10/ 8 / 4 10 8 2 4 4 4 2 1 1 1 1 1 8 10 10 10 8 750iNG-XP 1000iNG-XP 1500iNG-XP 2500iNG-XP 500iNG-XP 2 2 2 2 4 4 4 2 8 / 8 / 4 8 / 8 / 4 8 / 8 / 4 8/8/4 8 / 8 / 4 ** Fiber)* (GbE Copper/GbE Fiber/10GbE Specifications 750iNG-XP 1000iNG-XP 1500iNG-XP 2500iNG-XP 500iNG-XP Hardware Bypass Segments 2 2 Port options per FleXi Ports Module 8 / 8 / 4 8 / 8 / 4 8 / 8 / 4 8 8 / 8 / 4 Console Ports (RJ45) 1 1 1 1/8/4 1 Interfaces Configurable Internal/DMZ/WAN Ports (GbE Copper/GbE Fiber/10GbE Fiber) Yes Yes Yes Yes Yes USB Ports 2 2 2 2 2 Copper GbE Console PortsPorts (RJ45) 8 10 10 10 8 1 1 1 1 1 *** Interfaces ** System Performance Hardware 2 -4 -4 -4 2 Number ofBypass Slots forSegments FleXi Ports Module USB Ports 2 2 2 2 2 Copper GbE Ports 8 10 10 10 8 Firewall Throughput (UDP) (Mbps) * ** 18,000 60,000 32,000 27,500 22,000 Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Port options per FleXi Ports Module Hardware Bypass Segments 2 -4 -4 -4 2 Number of Slots for FleXi Ports Module 2 2 8/8/4 8 /8/4 8/8/4 8 /8/4 8 /8/4 Firewall Throughput (TCP) *** (Mbps) 16,000 36,000 26,000 22,500 18,000 * (GbEoptions Copper/GbE Fiber/10GbE Fiber) Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Port per FleXi Ports Module System Performance New sessions/second 100,000 300,000 265,000 240,000 140,000 8 /8/4 8 /8/4 8 8 /8/4 8 /8/4 Console Ports (RJ45) 1 1 1/8/4 1 1 *** (GbE Copper/GbE Fiber/10GbE Fiber) Firewall Throughput (UDP) (Mbps) 18,000 60,000 32,000 27,500 22,000 System Performance Concurrent sessions 2,500,000 10,000,000 7,500,000 5,500,000 3,000,000 USB Ports 2 2 2 2 2 Console Ports (RJ45)(TCP) (Mbps) 1 1 1 1 1 Firewall Throughput 16,000 36,000 26,000 22,500 18,000 ** IPSec VPN Throughput (Mbps) Firewall Throughput (UDP) (Mbps) 18,000 32,000 22,000 1,500 9,000 4,500 3,000 2,250 Hardware 2 -27,500 -60,000 2 USB Ports Bypass Segments 2 2 2 2 2 New sessions/second 100,000 300,000 265,000 240,000 140,000 No. of IPSec Tunnels Firewall Throughput (TCP) (Mbps) 16,000 36,000 26,000 22,500 18,000 1,000 5,000 4,000 3,000 1,500 ** Configurable Internal/DMZ/WAN Ports Yes Yes Hardware Bypass Segments 2 -Yes -Yes -Yes 2 Concurrent sessions 2,500,000 10,000,000 7,500,000 5,500,000 3,000,000 SSL VPN Throughput (Mbps) New sessions/second 100,000 300,000 265,000 240,000 140,000 650 1,450 1,050 850 750 *** Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes IPSec VPNPerformance Throughput (Mbps) 1,500 9,000 4,500 3,000 2,250 System WAF Protected Throughput (Mbps) Concurrent sessions 2,500,000 10,000,000 7,500,000 5,500,000 3,000,000 1,500 2,600 2,300 2,000 1,750 *** SSL VPN Throughput (Mbps) Firewall Throughput (UDP) (Mbps) 650 1,450 1,050 850 750 18,000 60,000 32,000 27,500 22,000 Anti-Virus Throughput (Mbps) IPSec VPN Throughput (Mbps) System Performance 1,500 9,000 4,500 3,000 2,250 3,500 6,500 5,000 4,500 4,000 WAFThroughput Throughput (Mbps) Firewall Throughput (TCP) (Mbps) 1,500 2,600 2,300 2,000 1,750 16,000 36,000 26,000 22,500 18,000 IPS (Mbps) No. ofProtected IPSec Tunnels Firewall Throughput (UDP) (Mbps) 1,000 5,000 4,000 3,000 1,500 4,500 16,000 12,500 10,500 6,500 18,000 60,000 32,000 27,500 22,000 **** Anti-Virus Throughput (Mbps) New sessions/second 3,500 6,500 5,000 4,500 4,000 100,000 300,000 265,000 240,000 140,000 NGFW Throughput (Mbps) SSL VPN Throughput (Mbps) Firewall Throughput (TCP) (Mbps) 650 1,450 1,050 850 750 3,250 8,000 6,000 5,000 3,600 16,000 36,000 26,000 22,500 18,000 ***** IPS Throughput (Mbps) Concurrent sessions 4,500 16,000 12,500 10,500 6,500 2,500,000 Fully Protected Throughput 10,000,000 7,500,000 5,500,000 WAF (Mbps) 3,000,000 New sessions/second 1,500 2,600 2,300 2,000 1,750 1,650 5,500 3,600 3,000 1,800 100,000 300,000 265,000 240,000 140,000 **** NGFWVPN Throughput (Mbps) IPSec Throughput (Mbps) 3,250 8,000 6,000 5,000 3,600 Authenticated Users/Nodes 1,500 9,000 Anti-Virus Throughput (Mbps) 4,500 3,000 2,250 Concurrent sessions 3,500 6,500 5,000 4,500 Unlimited 4,000 Unlimited Unlimited Unlimited Unlimited 2,500,000 10,000,000 7,500,000 5,500,000 3,000,000 ***** FullyThroughput Throughput No. ofProtected IPSecThroughput Tunnels 1,650 5,500 3,600 1,800 IPS (Mbps) (Mbps) 1,000 5,000 4,000 3,000 1,500 IPSec VPN 4,500 16,000 12,500 10,500 6,500 1,500 9,000 4,500 3,000 2,250 **** Authenticated Users/Nodes Dimensions SSL VPN Throughput (Mbps) Unlimited Unlimited Unlimited Unlimited Unlimited NGFW Throughput (Mbps) 650 1,450 1,050 850 750 No. of IPSec Tunnels 3,250 8,000 6,000 5,000 3,600 1,000 5,000 4,000 3,000 1,500 ***** WAF (Mbps) H xW x DThroughput (inches) Fully Protected Throughput 1,500 2,600x 17.52 x 23.23 2,300 2,000x 17.52 x 23.23 1,750 1.7 x 17.44 x 18.75 1.7 x 17.44 x 18.75 3.54 3.54 x 17.52 x 23.23 3.54 SSL VPN (Mbps) 1,650 5,500 3,600 3,000 1,800 650 1,450 1,050 850 750 Anti-Virus (Mbps) 9 x 44.5 x 59 9 x 44.5 x 59 4.4 X 44.3 X 47.62 4.4 X 44.3 X 47.62 9 x 44.5 x 59 Authenticated Users/Nodes 3,500 6,500 5,000 4,500 4,000 H x WProtected x D Throughput (cms) WAF Throughput (Mbps) Unlimited Unlimited Unlimited Unlimited Unlimited 1,500 2,600 2,300 2,000 1,750 Dimensions IPS Throughput (Mbps) 10,50041.8lbs 6,500 4,500 16,000 12,500 Appliance Weight 19 kg, 41.8 lbs 19 kg, 41.8 lbs Anti-Virus Throughput (Mbps) 5.1 kg, 11.24 lbs 19kg, 5.1 kg, 11.24 lbs 3,500 6,500 5,000 4,500 4,000 H x W xThroughput D (inches) (Mbps)**** 1.7 x 17.44 x 18.75 1.7 x 17.44 x 18.75 3.54 3.54 x 17.52 x 23.23 3.54 Dimensions NGFW 3,250 8,000x 17.52 x 23.23 6,000 5,000x 17.52 x 23.23 3,600 IPS Throughput (Mbps) 4,500 16,000 12,500 10,500 6,500 ***** 9 x 44.5 x 59 9 x 44.5 x 59 x 23.23 4.4 X 44.3 X 47.62 4.4 X 44.3 X 47.62 9 x 44.5 x 59 **** H x W x D (cms) Fully Protected Throughput H x W xThroughput D (inches) (Mbps) 1,650 5,500 3,600 3,000x 17.52 x 23.23 1,800 1.7 x 17.44 x 18.75 1.7 x 17.44 x 18.75 3.54 3.54 x 17.52 x 23.23 3.54 x 17.52 Power NGFW 3,250 8,000 6,000 5,000 3,600 Appliance Weight 19 19 5.1 kg,44.3 11.24 lbs 19kg, 41.8lbs 5.1 kg,44.3 11.24 lbs Authenticated Users/Nodes 9 x kg, 44.541.8 x 59lbs 9 x kg, 44.541.8 x 59lbs 4.4 X X 47.62 4.4 X X 47.62 9 x 44.5 x 59 Unlimited Unlimited Unlimited Unlimited Unlimited H x WProtected x D (cms) Input Voltage Fully Throughput***** 100-240 VAC 100-240 VAC 90-260 VAC 90-260 VAC 90-260 VAC 1,650 5,500 3,600 3,000 1,800 Appliance Weight Consumption Authenticated Users/Nodes 208kg, W 11.24 lbs 19 19 258 W41.8lbs 258kg, W 41.8 lbs 258kg, W 41.8 lbs 208kg, W 11.24 lbs 5.1 19kg, 5.1 Unlimited Unlimited Unlimited Unlimited Unlimited Power Dimensions Total Heat Dissipation (BTU) 345 881 881 881 345 Input Voltage 100-240 VAC 100-240 VAC 90-260 VAC 90-260 VAC 90-260 VAC x 23.23 H x W x D (inches) 1.7 x 17.44 x 18.75 3.54 x 17.52 x 23.23 3.54 x 17.52 x 23.23 3.54 x 17.52 Dimensions Redundant Power Supply Power -1.7 x 17.44 x 18.75 Yes Yes Yes Yes Consumption 208xXW17.44 258 W 258 W 258 W 208xXW17.44 990-260 x 44.5 x 59 x 23.23 990-260 x 44.5 x 59 x 23.23 4.4 44.3VAC Xx47.62 4.4 44.3VAC Xx47.62 990-260 x 44.5 x 59 x 23.23 (cms) H x WVoltage x D (inches) Input 100-240 1.7 18.75 100-240 VAC VAC VAC 1.7 18.75 3.54 x 17.52 3.54 x 17.52 3.54 x 17.52 Total Heat Dissipation (BTU) 345X 881 881 881 345X Appliance Weight 19 19 5.1 kg, 11.24 lbs 19kg, 5.1 kg, 11.24 lbs 9 x kg, 44.5 x 59lbs 9 x kg, 44.5 x 59lbs 4.4 X 47.62 4.4 X 47.62 9 x 44.5 x 59 Consumption 208 W44.3 258 W41.8lbs 258 W 41.8 258 W 41.8 208 W44.3 H x W x D (cms) Redundant PowerConditions: Supply Environmental Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Humidity (Non condensing) 10% to 90% Yes -345kg, Yes Yes Yes Total Heat Dissipation (BTU) Operating 881Relative 881kg, 41.8 lbs 881kg, 41.8 lbs 345kg, 11.24 lbs Appliance Weight 19 19 5.1 19kg, 41.8lbs 5.1 11.24 lbs * ** Additional Purchase required. If Enabled, will bypass traffic only in case of Power failure. Power Redundant Power Supply Yes Yes Yes Yes *** Antivirus, IPS and Fully Protected Throughput performance on HTTP RFC 3511 performance may vary depending on the real Input Voltage 100-240 VACis measured based 100-240 VAC traffic as per90-260 VACguidelines. Actual 90-260 VAC 10% 90-260 VAC Power Environmental Conditions: **** Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) to 90% ***** network traffic environments. **NGFW throughput is W measured with Firewall, IPS Filtering features turned on. Fully Protected Throughput is measured with 208 258 W VAC 258 W 258 W 208 and W Web *Consumption Input Voltage 100-240 VAConly 100-240 VAC & Application90-260 90-260 VAC 90-260 VAC Additional Purchase required.Operating If Enabled, will bypass traffic in Storage case of Power failure. Environmental Conditions: Temperature 0 °C to 40 °C, Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90% Total HeatIPS, Dissipation (BTU) 345 W features turned on. 208 Firewall, Web & Application Filtering and Anti-Virus 881 W 881 W 881 W 345 W *** Consumption 208 258 258 258 * Antivirus, IPS and Fully Protected ** Throughput performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real Additional Purchase required. If Enabled, will bypass failure. Redundant Power Supply -345 traffic only in case of Power Yes Yes Yes Yes Total Heat Dissipation (BTU) **** 881 881 881 345 ***** *** network traffic environments. NGFW throughput is measured Firewall, IPS on andHTTP Web traffic & Application Filtering turned on. performance Fully Protected is measured with Antivirus, IPS and Fully Protected Throughput performance is with measured based as per RFC 3511features guidelines. Actual may Throughput vary depending on the real Redundant Power Supply Yes Yes***** Yes Yes **** Firewall, traffic IPS, Web & ApplicationNGFW Filtering and Anti-Virus features turned on. IPS and Web & Application Filtering features turned on. Fully Protected Throughput is measured with network environments. throughput is measured with Firewall, Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90% Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on. * ** Additional Purchase required.Operating If Enabled, will bypass0traffic in Storage case of Power failure.-25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90% Environmental Conditions: Temperature °C to only 40 °C, Temperature **** ** Antivirus, Purchase IPS and Fully Protected Throughput performance is measured based onfailure. HTTP traffic as perCRiV-4C RFC 3511 guidelines. Actual performance may vary depending on the real Additional required. If Enabled, will bypass traffic only in case of Power CRiV-1C CRiV-2C CRiV-8C CRiV-12C **** ***** *** network traffic NGFW throughput is measured Firewall, IPS on andHTTP Web traffic & Application Filtering turned on. performance Fully Protected is measured with Antivirus, IPSenvironments. and Fully Protected Throughput performance is with measured based as per RFC 3511features guidelines. Actual may Throughput vary depending on the real **** Firewall, traffic IPS,Specifications Web & Application Filtering and Anti-Virus features turned on. IPS and Web & Application Filtering features turned on. *****Fully Protected Throughput is measured with network environments. NGFW throughput is measured with Firewall, Technical Cyberoam Virtual Security Appliances Cyberoam Virtual Security Appliances Cyberoam Virtual Security Appliances CRiV-1C CRiV-8C CRiV-12C CRiV-4C Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on. CRiV-2C VMware ESX/ESXi 4.0/4.1/5.0, VMware Workstation 7.0/8.0/9.0, VMware Player 4.0/5.0, Microsoft Hyper-V 2008/2012, KVM, Citrix XenServer Hypervisor Support Cyberoam Virtual SecurityCRiV-1C Appliances /1 Cyberoam Virtual Security1Appliances vCPU Support (Min / Max) Technical Specifications # CRiV-2C CRiV-4C CRiV-8C CRiV-12C 1/2 1/4 1/8 1 / 12 Technical Specifications Network Interface Support (Min / Max ) Hypervisor Support 3 /VMware 10 Workstation 7.0/8.0/9.0, VMware Player 4.0/5.0, KVM, Citrix XenServer 3 / 10 3 / 10 3 / 10 Microsoft Hyper-V 2008/2012, 3VMware / 10 ESX/ESXi 4.0/4.1/5.0, Hypervisor Support Memory Support (Min / Max) vCPU Support (Min / Max) 1 GB VMware 4.0/4.1/5.0, VMware Player 4.0/5.0, Hyper-V 2008/2012, KVM, Citrix XenServer 1 GB 1 GB 1 GB 4 GB 1 GB GB /VMware 2 / 4 GBWorkstation 7.0/8.0/9.0, / 1 / 4 ESX/ESXi / 12 / 4 GB / 4 / 4 GB / 8 /Microsoft CRiV-1C CRiV-2C CRiV-8C CRiV-12C CRiV-4C vCPU Support (Min / Max) (Min / Max#) Network Interface Support 1 3/1 10 CRiV-1C System Performance* Technical Specifications Network Interface Support (Min / Max#) Memory Support (Min / Max) Firewall Throughput (UDP) (Mbps) Technical Specifications Hypervisor Support Memory Support (Min / Max) System Performance* Firewall Throughput (TCP) (Mbps) Hypervisor Support vCPU Support (Min / Max) System Performance* Firewall Throughput (Mbps) New sessions/second vCPU Support (Min /(UDP) Max) (Min Network Interface Support / Max#) Firewall (UDP) (Mbps) (TCP) (Mbps) Concurrent sessions Network Interface Support (Min / Max#) MemoryThroughput Support (Min / Max) 3 10 1 /2 CRiV-2C 1 3/4 10 CRiV-4C 1 /8 3 10 CRiV-8C 1 / 12 3 10 CRiV-12C 1 /GB 3 10 / 4 GB 3 10 / 4 GB 3 10 / 4 GB 3 10 / 4 GB 3 10 / 4 GB 1 /GB 1 /GB 1 /GB 1 /GB 3,500 4,000 3,000 1,500 4,000 VMware 4.0/4.1/5.0, VMware VMware Player 4.0/5.0, Hyper-V 2008/2012, KVM, Citrix XenServer 1 GB / 4 GBWorkstation 7.0/8.0/9.0, 1 GB / 4 GB 1 GB / 4 GB 1 GB /Microsoft 4 GB 1 GB / 4 ESX/ESXi GB ESX/ESXi 4.0/4.1/5.0, Workstation 7.0/8.0/9.0, VMware Player 4.0/5.0, KVM, Citrix XenServer 4,000 3,500 3,000 2,500 1,200 1 /VMware 2 1VMware /1 1 / 12 1/4 1 / 8 Microsoft Hyper-V 2008/2012, 60,000 50,000 40,000 4,000 3,500 4,000 30,000 3,000 1,500 25,000 1 /2 1 /1 1 / 12 1 /4 1 /8 3 10 3 10 3 10 3 10 3 10 1,500 230,000 1,200 3 /GB 10 / 4 GB 1 1,200 25,000 200 1 GB / 4 GB 3,000 3 /GB 10 / 4 GB 525,000 2,500 1 Firewall Throughput (TCP) (Mbps) New sessions/second IPSec VPN Throughput Memory Support (Min / (Mbps) Max) 1 GB / 4 GB 2,500 250 30,000 3,500 1,200,000 3,000 3 /GB 10 / 4 GB 1 3,000 1 GB / 4 GB 300 40,000 4,000 1,500,000 3,500 3 /GB 10 / 4 GB 1 3,500 350 1 GB / 4 GB 50,000 4,000 1,750,000 3 10 / 4 GB 1 /GB 4,000 400 1 GB / 4 GB 60,000 System Performance* New Concurrent sessions No. ofsessions/second IPSec Tunnels System Performance* Firewall Throughput (Mbps) Concurrent sessions(UDP) IPSecVPN VPN Throughput (Mbps) SSL Throughput (Mbps) 25,000 230,000 200 1,500 230,000 200 300 30,000 525,000 1,000 3,000 525,000 400 250 40,000 1,200,000 1,500 3,500 1,200,000 550 300 50,000 1,500,000 2,000 4,000 1,500,000 550 350 60,000 1,750,000 2,500 4,000 1,750,000 750 400 Firewall Throughput (UDP) (Mbps) Firewall Throughput (TCP) (Mbps) IPSec VPN Throughput (Mbps) No. ofProtected IPSec Tunnels WAF Throughput (Mbps) Firewall Throughput (Mbps) Newof sessions/second No. IPSec Tunnels(TCP) SSL VPN Throughput (Mbps) Anti-Virus Throughput (Mbps) New sessions/second Concurrent sessions SSL VPN Throughput (Mbps) WAFThroughput Protected Throughput (Mbps) IPS (Mbps) 1,500 1,200 200 300 1,200 25,000 200 300 900 3,000 2,500 250 500 1,000 2,500 30,000 1,000 1,500 400 3,500 3,000 300 800 1,500 3,000 40,000 1,500 2,000 550 4,000 3,500 350 1,400 2,000 3,500 50,000 2,000 2,200 550 4,000 400 1,550 2,500 4,000 60,000 2,500 2,450 750 25,000 230,000 300 450 230,000 200 300 900 250 30,000 525,000 400 750 500 525,000 250 500 450 1,500 40,000 1,200,000 550 1,200 800 1,200,000 300 800 1,000 2,000 50,000 1,500,000 550 1,800 1,400 1,500,000 350 1,400 2,200 60,000 1,750,000 750 1,900 1,550 1,750,000 400 1,550 2,450 200 900 450 Unlimited 200 300 450 250 250 1,000 1,500 Unlimited 750 1,000 400 750 450 300 1,500 2,000 Unlimited 1,200 1,500 550 1,200 1,000 350 2,000 2,200 Unlimited 1,800 2,000 550 1,800 1,400 400 2,500 2,450 Unlimited 1,900 2,500 750 1,900 1,550 Concurrent sessions (Mbps) ** IPSec VPNThroughput Throughput (Mbps) WAF (Mbps) Anti-Virus Fully Protected Throughput (Mbps) IPSec VPN Throughput (Mbps) No. of IPSec Tunnels Anti-Virus Throughput (Mbps) IPS Throughput (Mbps) Authenticated Users/Nodes ** No. of IPSec Tunnels SSL VPN Throughput (Mbps) IPS (Mbps) FullyThroughput Protected Throughput (Mbps) ** SSL VPN Throughput (Mbps) 750 550 550 400 300 WAF Protected Throughput (Mbps) 800 500 Fully Protected Throughput (Mbps) 1,550 1,400 Authenticated Users/Nodes 1,000 450 250 Unlimited Unlimited Unlimited Unlimited Unlimited Actual performance may vary depending on the 300 real network traffic environments. Performance values given above were observed1,400 using server with Intel Xeon1,550 E5645 (2.4 GHz) and WAF Protected Throughput (Mbps) 800 Anti-Virus Throughput (Mbps) 2,450 2,200 2,000 1,500 900ESXi 5.0 (Update 1) with 4500 Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited E1000E Ethernet Drivers, running VMware version GB vRAM assigned to CR Virtual Security Appliance. # Anti-Virus Throughput (Mbps) 2,450 2,200 2,000 TheThroughput Number depends on the Hypervisor you are900 using. 1,500 IPS (Mbps) 1,900 1,800 1,200 750 450 *Antivirus, IPS and Fully Throughput measured based onPerformance HTTP traffic values as per given RFC 3511 Actualusing performance mayIntel varyXeon depending realand Actual performance may Protected vary depending on theperformance real network is traffic environments. aboveguidelines. were observed server with E5645 on (2.4the GHz) ** IPS Throughput (Mbps) ** 1,900 1,200 750 450 Fully Protected Throughput (Mbps) 1,550 1,400 1,000 250ESXi 5.0 network traffic environments. FullyVMware Protected Throughput is measured IPS, assigned Web & Application Filtering andAppliance. Anti-Virus1,800 features turned on. E1000E Ethernet Drivers, running version (Update 1)with withFirewall, 4450 GB vRAM to CR Virtual Security ** Actual performance may vary depending on the real network traffic environments. Performance values given above were observed using server with Intel Xeon E5645 (2.4 GHz) and # Fully Throughput (Mbps) 1,550 1,400 1,000 The Protected Number depends on the Hypervisor you are250 using. 450 Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited E1000E Ethernet Drivers, running VMware version ESXi 5.0 (Update 1) with 4Unlimited GB vRAM assigned to CR Virtual Security Appliance. *Antivirus, IPS and Fully Protected Throughput performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real # Authenticated Users/Nodes The Number depends on the **Hypervisor you areUnlimited using. Unlimited Unlimited Unlimited Unlimited network traffic environments. Fully Protected Throughput is measured with Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on. *Antivirus, IPS and Fully Protected Throughput performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. **Fully Protected Throughput is measured with Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on. Actual performance may vary depending on the real network traffic environments. Performance values given above were observed using server with Intel Xeon E5645 (2.4 GHz) and E1000E Ethernet Drivers, running VMware 5.0 (Update 1) with 4 GB Performance vRAM assigned to CR Virtual Security Actual performance may vary depending onversion the realESXi network traffic environments. values given above were Appliance. observed using server with Intel Xeon E5645 (2.4 GHz) and # The Number depends on running the Hypervisor you are using. E1000E Ethernet Drivers, VMware version ESXi 5.0 (Update 1) with 4 GB vRAM assigned to CR Virtual Security Appliance. # *Antivirus, IPS and Fully Protected Throughput performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real The Number depends on the **Hypervisor you are using. network traffic FullyThroughput Protected Throughput is measured with Firewall, IPS, Web Application Filtering and Anti-Virus turned on.vary depending on the real *Antivirus, IPS environments. and Fully Protected performance is measured based on HTTP traffic&as per RFC 3511 guidelines. Actual features performance may network traffic environments. **Fully Protected Throughput is measured with Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on. 3 HORUS INFORMATICA VALUE ADDED DISTRIBUTOR Un team di esperti in networking, sicurezza di rete e virtualizzazione al servizio delle imprese italiane. Le necessità del mercato L’Azienda Indipendentemente dai contesti e dai settori industriali in cui si trovano a operare, oggi per le aziende la tecnologia informatica Sul mercato della distribuzione di information technology dal 1997, Horus Informatica si propone come il naturale alleato e Internet sono elementi abilitanti di importanza fondamentale per la buona gestione del business. Si tratta però di risorse da maneggiare con estrema cura perché al ruolo cruciale dell’hi- delle società italiane nella loro inarrestabile marcia verso l’innovazione. tech e del networking nelle attività di un’impresa moderna fa da contraltare la crescente complessità degli ambienti distribuiti. Grazie a una rete di oltre 100 partner più rivenditori, system integrator e dealer in grado di coprire l’intero territorio nazionale, Horus Informatica garantisce non soltanto la progettazione di applicazioni su misura scelte fra prodotti Temi come quello della mobility, con la possibilità di accedere ai dati aziendali da postazioni remote e con strumenti portatili; e della security, ovvero la necessità di amministrare i flussi di dati in modo affidabile e protetto, assumono un peso sempre più rilevante. Il successo nella scelta delle soluzioni da adottare, e di conseguenza la riuscita in un mercato quanto mai competitivo, è perciò spesso una questione di dettagli. Per curarli inmaniera efficiente e, soprattutto, vincente, le aziende non hanno più bisogno di semplici fornitori di hardware e software, ma di partner in grado di seguirli passo dopo passo nella realizzazione di strategie in linea con le loro esigenze, con un’offerta composta sì di prodotti di qualità, ma soprattutto di consulenza a 360°. best of breed, ma segue anche i servizi di assistenza pre o post vendita e di formazione dei clienti, erogata sul posto da personale qualificato e certificato. Il Supporto al cliente Su tutte queste soluzioni Horus Informatica è in grado di intervenire presso i clienti direttamente o attraverso i suoi partner di canale assicurando un’accurata analisi delle infrastrutture prima della vendita e successivamente il design, la progettazione e l’implementazione dei prodotti. A corredo di tutte queste operazioni, Horus Informatica si presenta in qualità di referente unico della clientela anche per quel che riguarda l’assistenza post-vendita e il training. E in virtù dello studio accurato delle reali necessità dei suoi interlocutori, può proporre architetture chiavi in mano personalizzate, che rispettano non soltanto le necessità tecnologiche delle aziende, ma anche i loro budget di spesa. 4 HORUS INFORMATICA L’OFFERTA VALUE ADDED DISTRIBUTOR Horus Informatica scommette oggi principalmente su cinque brand di cui è distributore ufficiale a valore aggiunto per il mercato italiano Cyberoam, con le soluzioni: Citrix XenDesktop®, Citrix XenApp™, e Citrix VDI-in-a-Box™, soluzioni per le quali NComputing ha ottenuto la certificazione HDX Ready. Cyberoam Unified Threat Management, un pacchetto completo e flessibile per la gestione identity-based e la reportistica degli strumenti di sicurezza e anti-intrusione presenti sulle reti aziendali accessibili anche in mobilità; Cyberoam Central Console (CCC): hardware e virtual appliance per la gestione e il controllo centralizzato dei dispositivi UTM all’interno di network distribuiti ed estesi. Consente di potenziare le policy di sicurezza aziendali volte a rafforzare il livello di protezione degli uffici periferici o gestiti da remoto. Cyberoam iView, soluzione per logging e reporting che aiuta le aziende a monitorare le reti attraverso dispositivi multipli in modo da garantire elevati livelli di sicurezza e riservatezza dei dati nella totale conformità alle normative vigenti. Array Networks, con le soluzioni: Array Networks APV, una gamma di controller tesi a migliorare l’efficienza, la sicurezza e la disponibilità delle applicazioni basate sul Web; Array Networks AG, una nuova famiglia di controller che garantiscono la sicurezza perimetrale delle informazioni sensibili per le aziende e la estendono via via a tutte le applicazioni client e ai singoli utenti; Array Networks DesktopDirect, applicazione enterprise di protezione dei dati critici che è oggi progettata per servire al meglio le esigenze degli utenti mobile ed è compatibile anche con dispositivi come iPad e iPhone di Apple. Array Networks WANVelocity, è un WAN Optimization Controller che ha come punto di forza le performance; è in grado di ottimizzare le connessioni WAN utilizzando tecnologia proprietaria. NComputing, con le soluzioni: vSpace Server, il cuore dell’offerta di NComputing è rappresentato dal software vSpace Server che permette alle imprese di ottimizzare le operazioni di abilitazione dei virtual desktop assicurando l’accesso simultaneo a un solo sistema operativo da parte di una molteplicità di utilizzatori; Dispositivi di accesso, a basso costo e basso consumo, piccoli e duraturi, i dispositivi di accesso alla desktop virtualization della gamma NComputing si connettono da un lato alle periferiche degli utenti come il mouse, la tastiera o il monitor; dall’altra a un server centralizzato raggiungibile direttamente o via Ethernet che ospita ogni desktop virtuale e le applicazioni necessarie. Disponibili nelle gamme L-Series, M-Series, X-Series Thin client N-Series di NComputing per Citrix HDX: La linea di prodotti altamente innovativi dedicata agli ambienti vSpace Client, software innovativo che estende i benefici della desktop virtualization a qualsiasi PC o laptop trasformandolo in un performante client virtuale e consente di offrire accessi sicuri in qualsiasi momento e luogo al desktop aziendale o a determinate applicazioni sul server host centrale alimentato da software vSpace Server Cellopoint Cellopoint UTM, è una soluzione unica nel suo genere. E’ il primo sistema UTM per la posta elettronica. Esiste sia nella versione virtuale, fisica e software. Il sistema proprietario Cello Operating System consente di avere in un unico apparato la protezione da spam e virus, la possibilità di tracciare e prevenire la fuga di informazioni (Audit e Data Loss Prevention), l’archiviazione delle email e la loro cifratura per comunicare in maniera sicura. 24Online Billing & Bandwidth Management - Reti WIFI Soluzione esaustiva per il controllo degli accessi, l’ottimizzazione e l’amministrazione della banda nelle infrastrutture di rete WIFI. Professional service & skill I nostri servizi di delivery, messi a punto per i partner ed il mercato, hanno l’obiettivo di finalizzare l’implementazione e la personalizzazione delle soluzioni proposte e si riferiscono al raggiungimento degli obiettivi del progetto: - analisi iniziale del progetto e definizione obiettivi - implementazione ed ottimizzazione della configurazione / training on the job - verifica delle funzionalità ambiente e del raggiungimento obiettivi / go live - supporto post go-live Offriamo una competenza specifica per individuare le linee guida di definizione dei progetti e perseguire risultati legati all’affidabilità ed efficacia dell’infrastruttura e quindi ottimizzazione delle risorse e budget. Un team di specialisti dedicato alla progettazione di infrastrutture informatiche complesse con le capacità di progettazione di soluzioni per l’integrazione di sistemi ed apparati in ambiente multi-vendor, di gestione di problematiche relative alle architetture, alla sicurezza ed all’alta disponibilità, ed esperienza nell’analisi di performance di sistemi e reti finalizzata al capacity management di infrastrutture IT. DAL 1997 ABBIAMO LA TESTA TRA LE NUVOLE Innovazione è sempre stata la parola chiave alla base delle nostre scelte. Abbiamo portato il cloud nelle aziende ben prima che divenisse un tema caldo del mercato e che operatori e vendor ne iniziassero a parlare. E’ dal 1997 che i nostri clienti possono godere di soluzioni tecnologicamente all’avanguardia che consentono a centinaia di utenti di gestire il proprio business in modo sicuro, efficace e professionale senza dover effettuare onerosi investimenti in risorse o competenze. HORUSHORUS INFORMATICA HORUS INFORMATICA HORUS INFORMATICA Srl INFORMATICA Ufficio Srl Srl Ufficio Commerciale Srl Ufficio Commerciale Ufficio Commerciale Supporto Commerciale Supporto Tecnico Supporto Tecnico Supporto Ufficio Tecnico Ufficio Marketing Tecnico Ufficio Marketing Ufficio Marketing Marketing Via Enzo ViaFerrari, Enzo ViaFerrari, 21/B Enzo ViaFerrari, Enzo 21/B Ferrari, 21/B [email protected] 21/B [email protected] [email protected] [email protected] Pre vendita Pre vendita Pre vendita [email protected] vendita [email protected] [email protected] [email protected] 20010 Arluno 20010 20010 Arluno - Milano 20010 Arluno - Milano - Italy Arluno - Milano - Italy Tel: - Milano 02/33510135 - Italy Tel:-02/33510135 Italy Tel: 02/33510135 Tel: 02/33510135 [email protected] [email protected] [email protected] [email protected] Fax: 02/33510838 Fax: 02/33510838 Fax: 02/33510838 Fax: 02/33510838 www.horus.it www.horus.it www.horus.it www.horus.it Fax: 02/33510199 Fax: 02/33510199 Fax: 02/33510199 Fax: 02/33510199 Post vendita Post vendita Post vendita Post vendita [email protected] [email protected] [email protected] [email protected]