× All the transactions performed on 2.0 is available here. To access Market click "Home".

25ing with 3 yrs tvsp (sophos technologies pvt ltd)(25ing with 3 yrs tvsp)

` 112,390.00

  • MRP: `124878.00

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network securityappliances that include UTM security features along with performance required for future networks. TheNG series for SMEs are the fastest UTMs made for this segment. The best-in-class hardware alongwith software to match, enables the NG series to offer unmatched throughput speeds, comparedto any other UTM appliance in this market segment. This assures support for future IT trends inorganizations like high-speed Internet and rising number of devices in organizations offering future-ready security to SMEs..

  • Availability: 10 In Stock
  • Min. Qty. Per Consignee: 1
  • Web Application Security - Positive Protection model - Unique Intuitive Website Flow Detector technology - Protection against SQL Injections, Crosssite Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers
  • Concurrent Connection (Max.) - 500000 Numbers
  • HTTP Connections/Sec (Max.) - 6000 Numbers
  • Request Latency - sub-ms
  • Attack Protection - Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks
Other Specifications Download Specification
Deployment Modes Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support
Web Application Security Positive Protection model - Unique Intuitive Website Flow Detector technology - Protection against SQL Injections, Crosssite Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers
Concurrent Connection (Max.) 500000 Numbers
HTTP Connections/Sec (Max.) 6000 Numbers
System Throughput (Maximum) 1800 Gbps
Request Latency sub-ms
Network Interface Ports 4
Bypass Ports For Fail Safe Yes
Attack Protection Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks
Detect And Prevent Attackers From Finding Hidden Directories Features Available
Processor Multi Core Processor
Storage 250 GB
Authentication And Authorization LDAP/RADIUS
Integrated Scanner Yes
Logging, Reporting And Monitoring Integrated Web-based Reporting tool
Input-Output Port Copper GbE Ports, USB
Power Supply Single
Power Consumption 100 - 240 Watt
Operating Temperature Range 0 to 40 Degree C
Storage Temperature Range -25 to 75 Degree C
Operating Humidity (RH) 10 to 90 %
Compliance Certificates FCC/CE, EAL4+, ICSA Firewall - CorporateGlobal Support Excellence - ITIL compliance (ISO 20000), IPV 6 Logo Ready
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. Available
Name Of The Lab Common Criteria - EAL4+
Address Of The Lab Available on Request
Test Report No. And Date Available on Request
Test Report To Be Furnished To The Buyer On Demand Yes
Dimensions (H X W X D) 1.7 x 14.6 x 17.3 cm x cm x cm
Weight 2.3 Kg
Warranty 3 Year

Price Dekho Price Dekho Price List in india