• Home

Firewall security extended to Layer 8


Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam UTM Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.

Cyberoam’s patent pending, Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all the UTM features, providing ease of management and high security with flexibility.

FeatureFeature DescriptionBenefit
Human Layer 8 Identity-based Security
  • Identity-based policy creation
  • Access Control Criteria (ACC) - User-Identity, Source & Destination Zone, MAC and IP address, Service
  • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
  • User identity-based decision making prevents errors associated with IP address-based policies
  • Simplifies audit requirements with instant user identification
FUSION Technology
  • Blends Security, Connectivity, Productivity
  • Provides integrated perimeter security
Thin Client Support
  • Thin client authentication with session IDs
  • Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
  • Identity-based policies in thin client environment
  • Supports SaaS deployments and Cloud environment
Enterprise-Grade Security
  • High Availability with stateful failover
  • Multiple Security Zones
  • Dynamic Routing
  • VLAN support
  • Virtual host capability
  • Multi-casting
  • Multi-core technology allows high-speed parallel processing
  • ICSA-certified Firewall
  • Checkmark Level 5 Certified
  • Faster up-times, reduced latency, simplified configuration, supports rapid network growth
  • Supports creation of work profile-based groups across distributed locations
  • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
  • Supports applications that work on real-time updates like stock updates for financial institutions
  • High throughput
Logging & Reporting
  • Layer 8 Identity-based Reporting
  • Firewall logs
  • Centralized logging and reporting with Cyberoam iView and CCC
  • Meets compliance requirements for CIPA, HIPAA, PCI DSS
Official Distributor of Official distributor of Cyberoam and Euphoria PBX Official distributor of Cyberoam and Euphoria PBX
    • Location

      21A Thor Circle, Thornton
      Cape Town, South Africa

      Mon – Fri: 8AM – 5PM

      Follow us