Hi, I am Arya!

Hello, I'm Admin of Cyber Hub and this is our new Cyber Sites, Foliocard.
It is extremely easy to configure and use. Designed to show your Web design or web development portfolios.
No complex stuff. Your logo, your articles & your social links. Easy stuff!

 
Security against blended threats & data leakage over emailsEmail Security
Cyberoam offers comprehensive Email Security, preventing sophisticated forms of zero-hour threats and blended attacks involving spam, botnets, phishing, spyware and more.
With industry leading Gateway Anti-Spam and Gateway Anti-Virus and Anti-Spyware solutions, Cyberoam protects organizations against data, compliance, productivity and financial risks. Cyberoam Gateway Anti-Spam offers 99% accuracy and a less than .0001% false positive rate, eliminating the risk of critical business mail loss.

Key Highlights

Making Best-of-Breed Solutions Redundant – Cyberoam offers comprehensive email security, covering all email protocols – SMTP, POP3 and IMAP – and eliminating the need for investment in expensive best-of-breed email security solutions. Cyberoam simplifies email management by re-routing or copying incoming email messages containing specific keywords about a project, workgroup or topic to the manager or other specified authorities.
Real-time Spam Detection – Recurrent Pattern Detection (RPD)-based Anti-Spam technology from Cyberoam offers real-time spam protection against zero-day spam attacks that carry the highest threat level during the initial few hours.
Outbound Spam Protection – Cyberoam’s Outbound Spam Protection solution protects service providers from recurring incidents of outbound spam in their networks thus avoiding consequences of outbound spam like higher cost of providing service, wastage of operations / IT time, blacklisting of IP addresses, inability to meet SLAs and more, by protecting their server reputation. Read More
Prevents Email Data Leakage – Cyberoam blocks email attachments based on Layer 8 identity-based policies with pre-specified file extensions, eg., .XLS, .EXE, .JPEG to prevent leakage of critical business, financial or design data. Mails of departing employees can be forwarded to business and security managers to prevent potential data leakage.
Email Quarantine – Cyberoam quarantines suspicious spam or virus-laden emails, notifying users through the daily Spam Digest for potential retrieval.
Compliance and Reporting – Cyberoam’s on-appliance reporting allows real-time visibility into email traffic with reports that include top mail users, hosts, applications, senders and recipients, in addition to simplifying audit requests through mail archival. The centralized logging and reporting requirements are met by CCC appliances and Cyberoam iView.
Saves Bandwidth Costs – 85% of unwanted emails are blocked at the Gateway by Cyberoam, significantly reducing bandwidth consumption and optimizing network performance.

Email Security

 
Security against web-based threats and data leakageWeb Content Security
Cyberoam offers a wide security cover against web-based threats, including the entry of malware, phishing, pharming, intrusions and unauthorized data uploads.
Cyberoam’s Check Mark Level 5 certified security features deliver comprehensive network and data security while offering web protection, maintaining employee productivity, meeting regulatory compliance and preventing data leakage.

Key Highlights

Wide Security Cover from Web Threats – Cyberoam’s Gateway Anti-Virus & Anti-Spyware scans web, Instant Messaging, HTTPS and FTP traffic, delivering web security against emerging malware.
Cyberoam IPS detects, blocks or drops intrusion attempts by detecting anomalous traffic.
Cyberoam Web Filtering detects and blocks third-party proxy and tunneling software, Google cache pages, embedded URLs and ‘safe search’ over search engines to prevent harmful websites from appearing in search results.
Data Leakage Prevention – Cyberoam Web Filtering blocks file uploads over HTTP, HTTPS and FTP while Instant Messagingand Application Visibility & Control block file transfers over IM and P2P applications, ensuring data leakage prevention and meeting HIPAA, CIPA, PCI DSS compliance requirements.
Layer 8 Identity-based Controls – Cyberoam Web Filtering’s Layer 8 Identity-based surfing policies based on user, group, work function, web category and duration or time of the day deliver high flexibility and web security and content security.
Coupled with Bandwidth Management which ensures bandwidth availability and data transfer limit based on duration and schedule of access for specific web categories, Cyberoam limits rather than blocks non-productive sites.
Layer 8 Identity-based Reporting – Cyberoam’s on-appliance reporting offers visibility into user and system activity, allowing organizations to take instant and preventive action to meet compliance requirements, enhance web content security and productivity. Based on the Layer 8 Identity-based visibility from Cyberoam reporting, organizations can create policies to prevent illegal download of copyright material, unproductive surfing, high bandwidth-consuming downloads and network attacks. The centralized logging and reporting requirements of enterprises are met by CCC appliances and Cyberoam iView

Web & Content Security

 
Comprehensive Security from Layer 2 to Layer 8Network Security
Cyberoam network security appliances, available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. Cyberoam ensures high levels of network security, network connectivity, continuous availability and secure remote access with controlled network access to road warriors, telecommuters, partners, customers.
With granular controls and advanced networking features, Cyberoam network security appliances(UTMs and Next Generation Firewalls) offer enterprise-class security and high flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakage.

Key Highlights

Shift from Firewall to UTM/NGFW security – The Cyberoam firewall is tightly integrated with features like Application Visibility & Control, VPN (IPSec & SSL VPN), Intrusion Prevention System, Web Filtering, Bandwidth Management, Anti-Virus & Anti-Spyware, Anti-Spam, and Multiple Link Management to provide unified security.
Layer 1 to Human Layer 8 Firewall – The Cyberoam Firewall implements policies based on the Physical Layer 1 to Application Layer 7 and Human Layer 8 with User Identity in addition to source, destination zone, IP address and application. It enables organizations to control access to network resources based on the user identity, work profile and application access requirement of external users like customers and partners, internal LAN users and employees outside the perimeter like road warriors, telecommuters. It also offers user identity-based security in dynamic Wi-Fi, DHCP and shared endpoint environments.
VPN – Cyberoam offers VPNC-certified IPSec and SSL VPN over its network security appliances, ensuring easy-to-manage secure remote access with high business flexibility while lowering the capital and operating expense involved in deploying dedicated VPN appliances.
IPS – Cyberoam offers advanced Intrusion Prevention System (IPS) carrying thousands of signatures applicable with human and application layer policies to automatically detect and block intrusions, IM and P2P exploits, backdoor attacks and other malware. Cyberoam’s IPS carries HTTP proxy signatures and custom signature capability, offering customized protection to meet the unique security requirements of each organization.
Advanced Network Security – Cyberoam offers advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance requirements through the following capabilities –
  • High Availability with stateful failover
  • Dynamic routing
  • Multiple VLAN zones to create work-profile based groups across distributed locations
  • Virtual host capability, enabling secure hosting of services inside the LAN and DMZ
  • Centralized management and logging-reporting

Network Security

 
Cyberoam network security appliances offer next generation security features and deliver future-ready security to highly complex enterprise networks. Cyberoam simplifies management and controls thereby minimizing security investment for enterprises. Cyberoam’s unique Layer 8 identity-based security gives enterprises complete visibility and control over user activity.

Key Highlights

Protection for Corporate office, data centers and branch offices – Cyberoam offers a wide range of network security appliances, which are available as both Next Generation Firewalls and UTM appliances, to protect corporate office, data centers and branch offices. These security solutions are available for both physical and virtual networks.
Layer 8 Identity-based policies – Cyberoam’s Human Layer 8 acts like a standard abstract layer that binds with real Layers 2-7 offering actionable intelligence and controls to Enterprises. Cyberoam’s pioneer Layer 8 Technology allows identity and role-based network access along with visibility into who is doing what.
Next Generation Firewall security – Cyberoam NGFW offer robust network security to Enterprises, with Next Generation security features like Stateful Inspection firewall, Application Visibility & Control, Intrusion Prevention System, Web Filtering, VPN, and on-appliance Reporting. Based on the need, Enterprises can avail additional security features like like Web Application Firewall, Gateway Anti-Virus Anti-Spam and more.
Secure Remote Access – Enterprises get the assurance of secure remote access with IPSec, L2TP, PPTP and SSL VPN, over Cyberoam’s security appliances.
Business Continuity – Cyberoam helps enterprises with business continuity with its features like High Availability, Multiple Link Management with automated load balancing and Layer 8 policy-based routing.
Extensible Security Architecture & Multi-core Technology – Cyberoam’s Extensible Security Architecture works with Multi-core technology, to offer advanced networking, by accelerating parallel processing of multiple security features, ensuring that security is not achieved at the cost of performance.
IPv6 Ready – Cyberoam is IPv6 Ready Gold certified, assuring enterprises of a smooth transition to IPv6 with Cyberoam’s ability to identify and process IPv6 traffic.
Wi-Fi Security – Cyberoam offers security over Wi-Fi with its Wi-Fi range of appliances that combine the features of a router and Cyberoam’s complete set of network security features. The appliances offer Layer 8 Identity-based security and come with an in-built wireless access point featuring 802.11 n/b/g standards, MIMO technology and up to eight virtual access points.
Centralized Management and Reporting – For Enterprises with multiple branch offices, Cyberoam allows centralized management of security policies with Cyberoam Central Console and visibility into user & network activities with Cyberoam iView.

Large Enterprises

 
Cyberoam delivers cost-effective and comprehensive network security solution, offering enterprise-class security appliances to Small & Medium Enterprises (SMEs). SMEs can function with assured Security-Connectivity-Productivity with Cyberoam features integrated over a single appliance, eliminating the need to invest in multiple network security solutions.

Key Highlights

Layer 8 Identity-based policies – Cyberoam’s Layer 8 technology allows identity and role-based network access along with visibility into who is doing what.
Comprehensive network security – Cyberoam integrates multiple security features like Stateful Inspection firewall, Intrusion Prevention System, Application Visibility & Control, Web Filtering, Anti-Virus/Anti-Spyware, Anti-Spam, on-appliance Reporting, Web Application Firewall and more, on a single platform, to offer robust network security.
Secure Remote Access – With Cyberoam’s network security appliances, SMEs get assured secure remote access with IPSec, L2TP, PPTP and SSL VPN.
WAN Connectivity and Availability – Cyberoam delivers assured WAN availability and reliable connectivity with features like Bandwidth Management and Multiple Link Management. Cyberoam also supports wireless WAN technologies like 3G/4G/WiMax, offering WAN redundancy.
Extensible Security Architecture & Multicore Technology – Cyberoam’s Extensible Security Architecture works with Multicore technology, to offer advanced networking by accelerating parallel processing of multiple security features in Cyberoam, ensuring that security is not achieved at the cost of performance.
FleXi Ports – The FleXi Ports available in NG series (XP) security appliances offer flexible network connectivity with I/O slots that allow additional Copper/Fiber 1G/10G ports on the same security appliance, allowing organizations to upgrade to new technologies easily and cost-effectively, making them future-ready.
Wi-Fi Security – Cyberoam offers security over Wi-Fi with its Wi-Fi range of appliances that combine the features of a router and Cyberoam’s complete set of network security features. The appliances also offer Layer 8 Identity-based security and come with an in-built wireless access point featuring 802.11 n/b/g standards, MIMO technology and up to eight virtual access points.

Small & Medium Enterprises

Cyberoam delivers unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive network protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming, intrusions, risky applications and harmful websites. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. In addition to these organizations can also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.

Key Highlights

High Performance Network Security Appliances – Cyberoam appliances are the fastest UTM appliances for the SOHO, ROBO segment and offer Gigabit Firewall throughput with its entry-level model for small offices and branch offices.
Layer 8 Identity-based policies – Cyberoam’s Layer 8 policies allow identity and role-based network access along with complete visibility into who is doing what.
Comprehensive network security – Cyberoam integrates multiple security features like Stateful Inspection firewall, Intrusion Prevention System, Application Visibility & Control, Web Filtering, Anti-Virus/Anti-Spyware, Anti-Spam, on-appliance Reporting, Web Application Firewall and more, on a single platform, to offer robust network security.
Secure Remote Access – With Cyberoam’s network security appliances, small offices and branch offices get assured secure remote access with IPSec, L2TP, PPTP and SSL VPN.
Wi-Fi Security – Cyberoam offers security over Wi-Fi with its Wi-Fi range of appliances that combine the features of a router and Cyberoam’s complete set of network security features. These appliances offer Layer 8 Identity-based security and come with an in-built wireless access point featuring 802.11 n/b/g standards, MIMO technology and up to eight virtual access points.
Wireless WAN Connectivity – Cyberoam offers WAN connectivity to remote offices by supporting wireless technologies like 3G/4G/WiMax. Cyberoam also delivers assured WAN availability and reliable connectivity with features like Bandwidth Management and Multiple Link Management.
Centralized Management and Reporting – For organizations with multiple branch offices, Cyberoam allows centralized management of security policies with Cyberoam Central Console and visibility into every user & network activities with Cyberoam iView.

SOHO ROBO