Sistemas agrarios niveis de desenvolvimento
Comprehensive Network Security with Wi-Fi Access Point for Small and Remote Offices
Cyberoam CR35wi
Unified Threat Management
CR 35wi
1000Mbps 1000Mbps 1000Mbps 1000Mbps
VPNC
CERTIFIED
SSL Portal SSL Exchange
VPNC
CERTIFIED
Basic
SSL Firefox SSL JavaScript SSL Basic Network Extension SSL Advanced Network Extension
ACT
ACT
ACT
ACT POWER HDD
Interop
AES
www.check-mark.com
LAN/A WAN/B DMZ/C D
Interop
Gartner positions Cyberoam UTM as a “Visionary” in Magic Quadrant for SMB Multifunction Firewalls
CR35wi offers high performance security over WLAN to Small Office-Home Office (SOHO) and Remote Office Branch Office (ROBO) users. It supports 802.11n/b/g wireless standards. Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs. Cyberoam's Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow identity-based security policies in dynamic IP environment. Insecure WLANs are easily susceptible to unauthorized intrusion by outsiders and malware attacks. Cyberoam extends its set of security features over wired networks Firewall, VPN, Anti-Virus/AntiSpyware, Intrusion Prevention System, Content Filtering, Bandwidth Management and Multiple Link Management over WLAN, securing organizations from threats of data leakage and malware attacks.
User Identity-based Security Policy Controls
L8 L7 L6 L5 L4 L3 L2 L1 USER Application Presentation ASCII, EBCDIC, ICA Session Transport Network Data Link Physical
L2TP, PPTP TCP, UDP 192.168.1.1
00-17-BB-8C-E3-E7
Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack
Cyberoam UTM offers security across Layer 2-Layer 8 using