Business Intelligence
Now Reading
Cyberoam
0
Review

Cyberoam

Overview
Synopsis

Cyberoam delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match. Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution.

Category

Unified Security Management Software

Features

• Identity-based Controls with Layer 8 Technology
• Multiple Link Management
• Protection against SQL Injections, Cross-site Scripting (XSS)
• Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication,System and Admin Events
• Report customization: Custom view and custom logo
• Flexible port configuration

License

Proprietary

Pricing

Subscription

Free Trial

Available

Users Size

Small (<50 employees), Medium (50 to 1000 employees), Enterprise (>1001 employees)

Company

Cyberoam

What is best?

• Multiple Link Management
• Protection against SQL Injections, Cross-site Scripting (XSS)
• Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication,System and Admin Events
• Report customization: Custom view and custom logo
• Flexible port configuration

What are the benefits?

• User identity-based decision making prevents errors associated with IP address-based policies
• Supports creation of work profile-based groups across distributed locations
• Flexibility and Adaptability: Gives users the ability to possess flexible solutions to help cope with today's complex networking environments
• Virtual host capability: Enables secure hosting of services inside the LAN and DMZ

PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
7.6
8.7
Features & Functionality
7.5
9.2
Advanced Features
7.4
8.7
Integration
7.5
8.4
Performance
7.6
8.6
Customer Support
7.4
8.0
Implementation
8.4
Renew & Recommend
8.4
Bottom Line

Cyberoam offers multiple security features that provide robust security to IT systems and proactive remediation of security incidents.

7.5
Editor Rating
8.6
Aggregated User Rating
1 rating
You have rated this

Cyberoam delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match. Cyberoam has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution.

The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any network security vendor till date.

Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps. Cyberoam’s Application Visibility & Control feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.

Cyberoam's hardware firewall offers stateful and deep packet inspection for network, application and User Identity-based security. The unique FUSION Technology allows policy creation for multiple security features through single firewall interface, providing integrated perimeter security as well as blending security, connectivity and productivity benefits for organizational networks.

Cyberoam VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat Free Tunneling technology. Cyberoam’s Extensible Security Architecture (ESA) and multi-core technology carry the ability to combat future threats for organizations’ security. Cyberoam offers advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance requirements.

You may like to read: Top Unified Security Management Software

Filter reviews
User Ratings





User Company size



User role





User industry





Ease of use
Features & Functionality
Advanced Features
Integration
Performance
Customer Support
Implementation
Renew & Recommend

What's your reaction?
Love It
0%
Very Good
0%
INTERESTED
0%
COOL
0%
NOT BAD
0%
WHAT !
0%
HATE IT
0%