Call a Specialist Today! 888-785-4405

Cyberoam Intrusion Prevention System
Protects against network and application-level attacks


Maximum security against emerging threats

Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

Cyberoam’s signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities.

Feature Feature Description Benefit
Multiple Protocol Support
  • HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
  • Automatically detects, blocks, drops suspicious traffic
  • Security against network, application and human layer attacks
IPS Policy Tuner
  • Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
  • Identity-based alerts
  • Role-based access to users and groups
  • Minimizes noise related to false positive alerts, traffic latency and improved performance
Signature Updation
  • Regular updates by the Cyberoam Internet Threat Response Team
  • Customized signatures by organizations
  • HTTP Proxy signatures
  • Protection against latest vulnerabilities
  • Zero-hour protection during an outbreak prevents user masking through anonymous proxies
Centralized Security
  • Centralized custom signature creation and implementation at remote offices with CCC
  • Zero-hour protection for distributed networks
  • Simplified security with lower cost of operations
Logging & Reporting
  • Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
  • Dashboard, Top alerts, attackers and victims with severity of attacks
  • Centralized logging reporting with Cyberoam iView and CCC
  • Meets compliance requirements for CIPA, HIPAA, PCI DSS
  • Meets requirements of forensic analysis
  • Rapid corrective action with high security
Cost-Effective
  • Offers single, per-appliance subscription as opposed to per-user subscription
  • Comprehensive yet cost-effective security