• Home
  • Cyberoam Features
  • Web Filtering

Complete Visibility & Control over HTTP & HTTPSWeb Filtering

Cyberoam’s award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Cyberoam’s Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web coverage coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

FeatureFeature DescriptionBenefit
Web Categorization
  • Block outbound spam
  • Detect locally generated outbound spam
  • Detect outbound spam that is a part of a global outbreak
  • Real time spam detection and blocking
  • Low false positive rate
  • No more blacklisting of IP addresses
  • Reduced helpdesk and anti-abuse IT team calls – reduced costs of providing service
  • Protect your client’s IT networks from spam
  • Identify real time spam outbreaks – locate the spammer
  • Protect corporate reputation
Web Filtering Options
  • URL
  • Keyword
  • File type
  • Database
  • Comprehensive web filtering & content filtering
Web Security
  • Blocks third-party proxy and tunnelling software
  • Closes early-hour vulnerability gap of massive virus outbreaks over email
  • Protects against the initial peak of attack
  • Blocks Google cache pages
  • Blocks embedded URLs in websites
  • Enforces ‘safe search’ in search engines
  • Blocks malware, phishing, pharming URLs
  • Blocks Java Applets, Cookies, Active X
HTTPS Controls
  • Visibility into encrypted HTTPS Traffic
  • Prevents unauthorized file upload and download over HTTP and HTTPS
  • Blocks unauthorized, malicious and illegal HTTPS websites
  • Data Leakage Prevention
  • Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
  • Controls legal liability
Regulatory Compliance
  • Implements Internet Safety Policy
  • Active member of Internet Watch Foundation (IWF), UK
  • Prevents Data Leakage
  • Enables CIPA compliance and supports E-Rate Funding
Layer 8 Identity-based Controls
  • Username, group, work-requirement based policies
  • Schedule-based access control
  • User authentication through ADS, RADIUS, SSO, local and thin client
  • High security with high flexibility
  • Prevents productivity loss
  • Integrates with a range of existing authentication mechanisms
Best-of-breed Replacement
  • Offers single, per-appliance subscription as opposed to per-user subscription
  • Custom messages to user with reason for blocked website
  • Category-based bandwidth allocation and prioritization
  • Data and bandwidth quota based on web categories and time of the day
  • Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
  • Educates users regarding best practices in web usage
  • Ensures bandwidth to business-critical applications
  • Prevents productivity loss
Official Distributor of Official distributor of Cyberoam and Euphoria PBX Official distributor of Cyberoam and Euphoria PBX
    • Location

      21A Thor Circle, Thornton
      Cape Town, South Africa

      Mon – Fri: 8AM – 5PM

      Follow us