Call a Specialist Today! 800-886-5369

Cyberoam Virtual UTM
Get virtual security that sales on-demand for satisfied customers and reduced cost.

Virtualization is taking organizations beyond the boundaries of their physical network infrastructure, empowering them to leverage their resources better and more flexibly, while quickly responding to the changing needs of their business. While higher efficiencies and lower total cost are few benefits of virtualization, security in virtual environments is an issue that organizations are struggling with, in the wake of virtualization!

Cyberoam Virtual UTM Appliances

Get complete control of your security infrastructure with Cyberoam virtual UTM appliances that offer industry-leading network security for your virtualized environments. Cyberoam virtual UTMs give you the flexibility to deploy a mix of physical and virtual appliances in your network, which can be managed centrally.

With the ability to scan all traffic in the virtual environment, Cyberoam virtual UTM protects virtual networks from attacks on hypervisor management console, hypervisor & Guest OS, virtualized web-facing applications and servers and allows organizations to secure Zero Trust Networks with its comprehensive security features in virtualized form.

Get a complete virtual security solution with Cyberoam virtual UTM, virtual Cyberoam Central Console and Cyberoam iView – Logging & Reporting software.

If you are an MSSP, reduce your operational and capital expenditure, and serve your customers better and at reduced costs, by having elastic network infrastructure utilization with virtualization.

If you are an SMB with virtual infrastructure, you can now extend your existing infrastructure to include security for your network without the need to add hardware security appliances, thus saving cost and time.

Cyberoam Virtual UTM Appliances

Cyberoam Virtual UTM

Cyberoam CRiV-1C

Support for maximum 1 Virtual CPU Core

Cyberoam Virtual UTM

Cyberoam CRiV-2C

Support for maximum 2 Virtual CPU Cores

Cyberoam Virtual UTM

Cyberoam CRiV-4C

Support for maximum 4 Virtual CPU Cores

Cyberoam Virtual UTM

Cyberoam CRiV-8C

Support for maximum 8 Virtual CPU Cores

Cyberoam Virtual UTM

Cyberoam CRiV-12C

Support for maximum 12 Virtual CPU Cores

 

Technical Specifications
  CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12C
Hypervisor Support Vmware ESx/ESxi 4.0/4.1/5.0, VMware Workstation 7.0/8.0/9.0, VMware Player 4.0/5.0, Microsoft Hyper-V 2008/2012
vCPU Support (Min / Max) 1 / 1 1 / 2 1 / 4 1 / 8 1 / 12
Network Interface Support (Min / Max) 3 / 10 3 / 10 3 / 10 3 / 10 3 / 10
Memory Support (Min / Max) 1 GB / 4 GB 1 GB / 4 GB 1 GB / 4 GB 1 GB / 4 GB 1 GB / 4 GB
System Performance*
  CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12C
Firewall Throughput (UDP) (Mbps) 1,500 3,000 3,500 4,000 4,000
Firewall Throughput (TCP) (Mbps) 1,200 2,500 3,000 3,500 4,000
New sessions/second 25,000 30,000 40,000 50,000 60,000
Concurrent sessions 230,000 525,000 1,200,000 1,500,000 1,750,000
IPSec VPN Throughput (Mbps) 200 250 300 350 400
No. of IPSec Tunnels 200 1,000 1,500 2,000 2,500
SSL VPN Throughput (Mbps) 300 400 550 550 750
WAF Protected Throughput (Mbps) 300 500 800 1,400 1,550
Anti-Virus Throughput (Mbps) 900 1,500 2,000 2,200 2,450
IPS Throughput (Mbps) 450 750 1,200 1,800 1,900
UTM Throughput (Mbps) 250 450 1,000 1,400 1,550
Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.