Cyberoam, a provider of identity-based unified threat management solutions, Dec. 14 announced an extension to its Accelerator Series appliances, the CR25ia and CR35ia, aimed at small to medium-size businesses.
The CR25ia and CR35ia offer features including stateful inspection firewall, VPN (SSL VPN and IPSec), gateway antivirus and anti-spyware, gateway anti-spam, IPS, content filtering, bandwidth management and multiple link management.
These appliances can be centrally managed through the Cyberoam Central Console. The company said the CR25ia and CR35ia appliances have been designed to withstand the increasingly performance-intensive security requirements at branch offices and small offices at a price point that stays within security budgets. With a claimed 2 to 4.5 times greater firewall throughput than that of comparable products, and 1.5 to 2 times the IPS, anti-virus and UTM throughput values, Cyberoam argues its Accelerator Series can handle the entire spectrum of existing and emerging threats.
“Cyberoam addresses the three issues of price, performance and security expectations of our customers with the CR25ia and CR35ia, meeting the requirements of both small and medium offices as well as branch office segments,” said the company’s vice president of product management, Abhilash Sonwane. “We are happy to introduce this enhancement to our line of Accelerator Series appliances, offering best-in-class UTM throughputs even when the appliances are fully loaded; that is, when all the security features are running.”
Cyberoam UTM delivers bandwidth management and multiple link management over a single platform. The Cyberoam solution portfolio includes Cyberoam iView, an open-source logging and reporting solution, and the Cyberoam Endpoint Data Protection suite to protect data and manage assets over endpoints in organizations.
“The inability to meet high throughput requirements when all the security features function slows down the network and lowers security levels,” Sonwane said. “With this launch, we are delivering on our promise of comprehensive UTM security at the right price-performance value.”
In November, the company announced an Endpoint Data Protection suite to secure corporate data and manage IT assets. The suite consists of four modules: Data Protection and Encryption, Device Management, Application Control, and Asset Management. With its policy-driven data protection and asset management, the suite delivers Identity and group-based policy control as well as activity logging to provide comprehensive control and visibility of data transfer over removable devices; applications; chat applications such as Skype, MSN and more; network sharing; and printers.