Network Security

Firewall security extended to Layer 8L8firewall

Cyberoam Firewall is available as a Next-Generation Firewall and UTM firewall. It offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.

Cyberoam’s Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all features, providing ease of management and high security with flexibility.

Feature Feature Description Benefit
Human Layer 8 Identity-based Security
  • Firewall with Identity-based policy creation
  • Access Control Criteria (ACC) – User-Identity, Source & Destination Zone, MAC and IP address, Service
  • Secures dynamic IP environments like Wi-Fi and instances where users share the endpoints
  • User identity-based decision making prevents errors associated with IP address-based policies
  • Simplifies audit requirements with instant user identification
FUSION Technology
  • Blends Security, Connectivity, Productivity
  • Provides integrated perimeter security
Thin Client Support
  • Thin client authentication with session IDs
  • Supports Citrix –XenApp server, Microsoft Windows Server (Microsoft TSE)
  • Identity-based policies in thin client environment
  • Supports SaaS deployments and Cloud environment
Enterprise-Grade Security
  • Firewall with High Availability with stateful failover
  • Available as Next-Generation Firewalls and UTMs
  • Multiple Security Zones
  • Firewall appliance offering Dynamic Routing
  • VLAN support
  • Virtual host capability
  • Multi-casting
  • Multi-core technology allows high-speed parallel processing
  • ICSA-certified firewalls
  • Checkmark Level 5 Certified
  • Faster up-times, reduced latency, simplified configuration, supports rapid network growth
  • Supports creation of work profile-based groups across distributed locations
  • Enables secure hosting of servers inside LAN and DMZ, efficient use of limited public address pool to host services
  • Supports applications that work on real-time updates like stock updates for financial institutions
  • High throughput
Centralized Management
  • Centralized Security with CCC
  • Simplified security management
Logging & Reporting
  • Layer 8 Identity-based Reporting
  • Firewall logs
  • Centralized logging and reporting with Cyberoam iView and CCC
  • Meets compliance requirements for CIPA, HIPAA, PCI DSS
  • Cigent
  • Netreo
  • Viettel Cyber Security
  • Arista
  • Antaira
  • StarWind
  • A10Networks
  • Unitrends
  • Ecessa
  • Infortrend
  • Netka System
  • Sophos
  • Axway
  • AlienVault


  • Yahoo!

  • Skype