× All the transactions performed on 2.0 is available here. To access Market click "Home".

web application firewall (cyberoam)(cr1000ing-xp)

` 620,300.00

  • MRP: `755500.00

The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This,along with increasing number of users like customers and partners connecting to an enterprise networkfrom outside, and trends like rise in number of network users and devices, application explosion,virtualization, and more are leading to loss of security controls for enterprises over their networks.Cyberoam Next-Generation Firewalls NGFW with Layer 8 Identity-based technology offeractionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security. Cyberoams Human Layer 8 acts like a standard abstractlayer that binds with real Layers 2-7, enabling organizations to regain lost security controls..

  • Availability: 2 In Stock
  • Min. Qty. Per Consignee: 1
  • Web Application Security - Positive Protection model, Unique Ïntuitive Website flow detector, technology, Protection against SQL Injections, Cross site scripting (xss), Session Hijacking, URL tempering, Cookies poisoning etc.
  • Concurrent Connection (Max.) - 240000 Numbers
  • HTTP Connections/Sec (Max.) - 2 Numbers
  • Request Latency - sub-ms
  • Attack Protection - Positive Protection model, Unique Ïntuitive Website flow detector, technology, Protection against SQL Injections, Cross site scripting (xss), Session Hijacking, URL tempering, Cookies poisoning etc.
Other Specifications Download Specification
Deployment Modes Product can be deployed in any of Bridge mode, transparent proxy mode, router mode, reverse proxy and passive promiscuous mode
Web Application Security Positive Protection model, Unique Ïntuitive Website flow detector, technology, Protection against SQL Injections, Cross site scripting (xss), Session Hijacking, URL tempering, Cookies poisoning etc.
Concurrent Connection (Max.) 240000 Numbers
HTTP Connections/Sec (Max.) 2 Numbers
System Throughput (Maximum) 120000 Gbps
Request Latency sub-ms
Network Interface Ports 42x GEBase-t
Bypass Ports For Fail Safe Yes
Attack Protection Positive Protection model, Unique Ïntuitive Website flow detector, technology, Protection against SQL Injections, Cross site scripting (xss), Session Hijacking, URL tempering, Cookies poisoning etc.
Detect And Prevent Attackers From Finding Hidden Directories Features Available
Processor Intel quad core xeon processor
Storage 250 GB
Authentication And Authorization Internal Data base, AD Integration and OU based Security Policies, Automatic Windows/Radious Single sign on, External LDAP/LDAPS RADIOUS Database integration, thin client support, sms authentication,Layer 8 Identity over IPV6, SECURE AUTHENTICATION, Client less users, Authentication using Captive Portal
Integrated Scanner Yes
Logging, Reporting And Monitoring Real time and historical monitoring, Log viewer-IPS Web filter, WAF, Anti virus, Anti spam, Authentication, system and admin events, Forensic Analysiswith quick identification of network, attacks and other traffic anamalies, syslog support, 4 eye authentication, Integrated web based REPORTING TOOL
Input-Output Port 2 usb
Power Supply Single
Power Consumption 258 Watt
Operating Temperature Range 0- 40 Degree C
Storage Temperature Range -25 - 75 Degree C
Operating Humidity (RH) 10-90 %
Compliance Certificates CE,FCC
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. Available
Name Of The Lab ICSA
Address Of The Lab CALIFORNIA USA
Test Report No. And Date NIL
Test Report To Be Furnished To The Buyer On Demand Yes
Dimensions (H X W X D) 3.54X17.52X23.23 cm x cm x cm
Weight 19 Kg
Warranty 3 Year

Price Dekho Price Dekho Price List in india