× All the transactions performed on 2.0 is available here. To access Market click "Home".

utm cr25ing cyberoam (cyberoam)(25 ing)

` 96,786.00

  • MRP: `109999.00

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network securityappliances that include UTM security features and performance required for future networks. The NGseries for SOHO offer the fastest UTMs made for SMBs to small offices. The best-in-class hardwarealong with software to match, enables the NG series to offer unmatched throughput speeds,compared to any other UTM appliance in this market segment. This assures support for future ITtrends in organizations like high-speed Internet and rising number of devices in organizations offering future-ready security for small office networks.With Cyberoam NG series, businesses get assured Security, Connectivity andProductivity. The Layer 8 Technology treats User-Identity as the 8th Layer or theHUMAN layer in the protocol stack. It attaches User-Identity to security, whichadds speed to an organizations security by offering instant visibility into thesource of attacks by username rather than.

  • Availability: 57 In Stock
  • Min. Qty. Per Consignee: 1
  • Web Application Security - cross site-scripting(XSS), Full reverse proxy, buffer overflow, HTTP parameter manipulation,IP Geolocation, IP blacklistwhitelist, URL blacklistwhitelist,command injection, SQL injection or any other as applicable please specify all
  • Concurrent Connection (Max.) - 500,000 Numbers
  • HTTP Connections/Sec (Max.) - Must Declare Numbers
  • Request Latency - sub-ms
  • Attack Protection - Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks, parameter tampering
Other Specifications Download Specification
Deployment Modes Bridge mode, transparent proxy mode, router mode, reverse proxy and passivepromiscuous mode or any other mode
Web Application Security cross site-scripting(XSS), Full reverse proxy, buffer overflow, HTTP parameter manipulation,IP Geolocation, IP blacklistwhitelist, URL blacklistwhitelist,command injection, SQL injection or any other as applicable please specify all
Concurrent Connection (Max.) 500,000 Numbers
HTTP Connections/Sec (Max.) Must Declare Numbers
System Throughput (Maximum) 125 Gbps
Request Latency sub-ms
Network Interface Ports 4 x GE
Bypass Ports For Fail Safe Yes
Attack Protection Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks, parameter tampering
Detect And Prevent Attackers From Finding Hidden Directories Features Available
Processor intel dual-core xenon
Storage 2 GB
Authentication And Authorization LDAP/RADIUS/local user DB, Client certificate, Single-sign-on, RSA SecureID, SMS Passcode, SSL client certificate support
Integrated Scanner Yes
Logging, Reporting And Monitoring System log, Web firewall log, access log, audit log, traffic and SLA monitoring and reporting, CPU usage,SNMP and Email logging and monitoring, memory usage, disk usage, HTTP Concurrent connections
Input-Output Port usb
Power Supply Single
Power Consumption 33.5 Watt
Operating Temperature Range 0 to 40 ° Degree C
Storage Temperature Range -25 to 75 ° Degree C
Operating Humidity (RH) 10 to 90 %
Compliance Certificates FCC/CE/UL
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. Available
Name Of The Lab As Per OEM
Address Of The Lab As Per OEM
Test Report No. And Date As Per OEM
Test Report To Be Furnished To The Buyer On Demand Yes
Dimensions (H X W X D) 4.4 x 15.3 x 23.2 cm x cm x cm
Weight 2.3 Kg
Warranty 1 Year

Price Dekho Price Dekho Price List in india