The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This, along with increasing number of users like customers and partners connecting to an enterprise network from outside, is leading to de-perimeterization of enterprise networks. Besides, trends like rise in number of network users and devices, application explosion, virtualization, and more are leading to loss of security controls for enterprises over their networks.

Cyberoam Next-Generation Firewalls (NGFW) with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security.




(t) 02/310 3230
*free 15 day test period for hardware appliances and 30 for a virtual machine.

Cyberoam Next-Generation Firewalls are based on CyberoamOS – an intelligent and powerful firmware that offers next-generation security features that include inline application inspection and control, website filtering, HTTPS inspection, Intrusion Prevention System, VPN (IPSec and SSL) and QoS/bandwidth management. Additional security features like Web Application Firewall, Gateway Anti-Virus, Gateway Anti-Spam are also available with a gradual subscription model.

Advanced Network Security – Cyberoam offers advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance.

VPN Cyberoam offers certified IPSec and SSL VPN over its network security appliances, ensuring easy-to-manage secure remote access with high business flexibility while lowering the capital and operating expenses involved in deploying VPN appliances.

Anti-virus functionality as a perimeter defense ability making sure that every host inside the network is protected from latest viruses or malware from the World Wide Web.

Web and Content Filtering
Web and content filtering for every user giving the ability to log the activity of every host in the inside network, have undesirable sites to be blocked, give priority to certain office crucial applications, or have a automatic time-based policy in order to automatically open the blocked sites at a certain time like after work hours or office brakes.

Application Filtering
Application filtering in order to block undesired applications on a protocol level, even if the user is using some other ports then the standard 80 or 443.

Anti-Spam (Inbound/Outbound) protection for every host, making the user spam free and much more productive, having more time to focus on primary work tasks without the distraction of unwanted spam mails. This protection works in both directions, inbound-for every host that sends spam from inside the network and outbound for every spam that is received from the outside network.

On-appliance reporting with granular reports giving in detail real-time vital information for every host like visited web-sites, mail traffic, opened ports and used applications, blocked attacks and blocked malware and virus attempts with the possibility to be exported in trending formats like pdf, xls or html.

EN - IPv6 Ready
IPv6 Ready and compliant with the global trends of IPv6 migration.

Wireless Security
Wireless security regarding the type of equpemant behind the router.

Support for 3G/4G/WiMax
Support for 3G/4G/WiMax devices giving the ability to spread the Internet access from a USB mobile stick in any remote location.

MLM Active directory integration giving capabilities in colaboration with active directory and real-time synchronization with the existing AD server.

IM archiving and control
IM archiving and control for every chat clients like yahoo and msn messenger giving the ability to log and record the conversations between employees.

Bandwidth mgt/QoS
Bandwidth management and quality of service for the internet traffic giving the ability to prioritize the business critical applications and lower the priority for certain sites like social engineering.

Web Application Firewall with the ability to protect every server that is accessible from the outside network with a special signature that protects the host.

For more info contact us at:

Copyright © KABTEL Co., Ltd. 2001-2018. All rights reserved.