Introduction

Cyberoam Firewall is available as a Next-Generation Firewall and UTM firewall. It offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam’s Layer 8 Human Identity-based firewall appliance enables work-profile based policies and a single interface for policy creation across all features, providing ease of management and high security with flexibility. Cyberoam Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.

Cyberoam offers advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance requirements through the following capabilities:

  • High Availability with stateful failover
  • Dynamic routing
  • Multiple VLAN zones to create work-profile based groups across distributed locations
  • Virtual host capability, enabling secure hosting of services inside the LAN and DMZ
  • Centralized management and logging-reporting

These capabilities enable administrators to uninterrupted firewall operations are imperative to keep hackers and harmful viruses at bay. Any issue in the configuration, state, or resource usage of the firewall can bring its operations to a halt, leaving your network and all mission-critical applications operating within defenceless against malicious viruses and unscrupulous users! It is hence important that the performance of the firewall is monitored 24x7. This is where eG Enterprise helps administrators.