× All the transactions performed on 2.0 is available here. To access Market click "Home".

utm firewall (cyberoam)(cyberoam15 ing)

` 32,800.00

  • MRP: `39999.00

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network securityappliances that include UTM security features and performance required for future networks. The NGseries for SOHO offer the fastest UTMs made for SMBs to small offices. The best-in-class hardwarealong with software to match, enables the NG series to offer unmatched throughput speeds,compared to any other UTM appliance in this market segment. This assures support for future ITtrends in organizations like high-speed Internet and rising number of devices in organizations offering future-ready security for small office networks.With Cyberoam NG series, businesses get assured Security, Connectivity andProductivity. The Layer 8 Technology treats User-Identity as the 8th Layer or theHUMAN layer in the protocol stack. It attaches User-Identity to security, whichadds speed to an organizations security by offering instant visibility into thesource of attacks..

  • Availability: 100 In Stock
  • Min. Qty. Per Consignee: 1
  • Web Application Security - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers
  • Concurrent Connection (Max.) - 200,000 Numbers
  • HTTP Connections/Sec (Max.) - 45000 Numbers
  • Request Latency - sub-ms
  • Attack Protection - Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks,
Other Specifications Download Specification
Deployment Modes Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support
Web Application Security Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers
Concurrent Connection (Max.) 200,000 Numbers
HTTP Connections/Sec (Max.) 45000 Numbers
System Throughput (Maximum) 1,200 Gbps
Request Latency sub-ms
Network Interface Ports 8
Bypass Ports For Fail Safe Yes
Attack Protection Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks,
Detect And Prevent Attackers From Finding Hidden Directories Features Available
Processor intel dual-core xenon processor
Storage NA GB
Authentication And Authorization LDAP/RADIUS
Integrated Scanner Yes
Logging, Reporting And Monitoring System log, Web firewall log, access log, audit log, traffic and SLA monitoring and reporting, CPU usage,SNMP and Email logging and monitoring, memory usage, disk usage, HTTP Concurrent connections
Input-Output Port USB, VGA
Power Supply Single
Power Consumption 13.2 Watt
Operating Temperature Range 0 to 40 Degree C
Storage Temperature Range -25 to 75 Degree C
Operating Humidity (RH) 10 to 90 %
Compliance Certificates FCC/CE/UL
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. Available
Name Of The Lab NA
Address Of The Lab NA
Test Report No. And Date NA
Test Report To Be Furnished To The Buyer On Demand NA
Dimensions (H X W X D) 4.4 x 15.3 x 23.2 cm x cm x cm
Weight 1.5 Kg
Warranty 1 Year

Price Dekho Price Dekho Price List in india