× All the transactions performed on 2.0 is available here. To access Market click "Home".

subscription of cyberoam 35 ing with 3 yrs (cyberoam)(cyberoam cr 35 ing subscription)

` 62,899.00

  • MRP: `72499.00

SUBSCRIPTION OF CYBEROAM 35 ING WITH 3 YRS ONLY Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network securityappliances that include UTM security features and performance required for future networks. The NGseries for SOHO offer the fastest UTMs made for SMBs to small offices. The best-in-class hardwarealong with software to match, enables the NG series to offer unmatched throughput speeds,compared to any other UTM appliance in this market segment. This assures support for future ITtrends in organizations like high-speed Internet and rising number of devices in organizations offering future-ready security for small office networks.With Cyberoam NG series, businesses get assured Security, Connectivity andProductivity. The Layer 8 Technology treats User-Identity as the 8th Layer or theHUMAN layer in the protocol stack. It attaches User-Identity to security, whichadds speed to an organizations security by offering instant visibility into thesource of..

  • Availability: 50 In Stock
  • Min. Qty. Per Consignee: 1
  • Web Application Security - Full reverse proxy, buffer overflow, HTTP parameter manipulation,IP Geolocation, IP blacklistwhitelist, URL blacklistwhitelist,command injection, SQL injection
  • Concurrent Connection (Max.) - 750,000 Numbers
  • HTTP Connections/Sec (Max.) - 21,000 Numbers
  • Request Latency - sub-ms
  • Attack Protection - Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks, parameter tampering
Other Specifications Download Specification
Deployment Modes Bridge mode, transparent proxy mode, router mode, reverse proxy and passivepromiscuous mode or any other mode)
Web Application Security Full reverse proxy, buffer overflow, HTTP parameter manipulation,IP Geolocation, IP blacklistwhitelist, URL blacklistwhitelist,command injection, SQL injection
Concurrent Connection (Max.) 750,000 Numbers
HTTP Connections/Sec (Max.) 21,000 Numbers
System Throughput (Maximum) 3700 MBPS Gbps
Request Latency sub-ms
Network Interface Ports 7
Bypass Ports For Fail Safe Yes
Attack Protection Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks, parameter tampering
Detect And Prevent Attackers From Finding Hidden Directories Features Available
Processor dual-core xenon processor
Storage 250 GB GB
Authentication And Authorization SSL client certificate
Integrated Scanner Yes
Logging, Reporting And Monitoring System log, Web firewall log, access log, audit log, traffic and SLA monitoring and reporting, CPU usage,SNMP and Email logging and monitoring, memory usage, disk usage, HTTP Concurrent connections number
Input-Output Port USB
Power Supply Single
Power Consumption 47.8 Watt
Operating Temperature Range 0 TO 40 Degree C
Storage Temperature Range -25 T0 75 Degree C
Operating Humidity (RH) 10 T0 90 %
Compliance Certificates FCC/CE/UL
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. Available
Name Of The Lab NA
Address Of The Lab NA
Test Report No. And Date NA
Test Report To Be Furnished To The Buyer On Demand Yes
Dimensions (H X W X D) 4.4 x 15.3 x 23.2 cm x cm x cm
Weight 2.3 kg, 5.07 lbs Kg
Warranty 3 Year

Price Dekho Price Dekho Price List in india