Skip to main content
Tel: 0330 400 5465

Cyberoam delivers comprehensive Application Security against, malware, intrusions, data leakage and attempts to exploit web application vulnerabilities. It controls unauthorised application usage while supporting business-critical applications, secure collaboration, Cloud and SaaS adoption.

Application Visibility & Control

Cyberoam’s Layer 7 capabilities identify and control applications which use standard Port 80, 443, non-standard ports, port hopping or tunnel through encrypted SSL traffic. The feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Applications can be classified based on their risk level, characteristics and technology, offering more granular controls. Cyberoam implements application-based Bandwidth Management, accelerating critical applications while blocking malware-laden sites through Web Filtering. Organizations can group applications as per their requirements into business-critical, entertainment, communication, collaboration and control access through Firewall policies.

Applications QoS

Cyberoam allows the creation of Firewall rules based on Application-User-Time-Bandwidth, ensuring assured bandwidth for business-critical applications and minimizing the peaks and troughs of bandwidth consumption.

Web Application Firewall

Cyberoam offers on-appliance WAF to protect websites and Web applications against exploitation of Web application vulnerabilities like SQL Injection, cross-site scripting, and other OWASP attacks.

Instant Messaging Controls

Cyberoam scans, logs and controls access to Instant Messaging applications like Yahoo Messenger and Windows Live Messenger. Organizations can implement Layer 8 Identity-based controls by username or IM address over:

  • Access to IM applications
  • Audio-video chat
  • Conversations based on keywords
  • File transfer

Data Leakage Prevention

Cyberoam’s Application Visibility & Control can block file transfer over webmails like Gmail and Yahoo, file sharing via P2P applications in addition to the above IM controls, preventing data leakage and helping organizations meet the requirements of regulatory compliance.

Application Security

Cyberoam Firewall blocks games and tunneling software that result in malware entry. Cyberoam scans FTP and encrypted HTTPS / SSL traffic in addition to guarding against web application vulnerabilities which are exploited to launch backdoor, zero-hour attacks. It blocks anomalous traffic through its extensive and constantly updated database of IPS signatures.

Interested in Cyberoam? Call us know and see how we can help.

Related Content

09 Oct
General

Cyberoam Achieves 5 Stars for the CR3iNG in PC Pro Magazine

02 May
General

8 Reasons to Try CSGs Multi-layered Cyber Security Offering

18 Dec
General

Can't decide between a tablet or a laptop? There is another option