Cyberoam Virtual UTM
Get virtual security that sales on-demand for satisfied customers and reduced cost.
Virtualization is taking organizations beyond the boundaries of their physical network infrastructure, empowering them to leverage their resources better and more flexibly, while quickly responding to the changing needs of their business. While higher efficiencies and lower total cost are few benefits of virtualization, security in virtual environments is an issue that organizations are struggling with, in the wake of virtualization!
Cyberoam Virtual UTM Appliances
Get complete control of your security infrastructure with Cyberoam virtual UTM appliances that offer industry-leading network security for your virtualized environments. Cyberoam virtual UTMs give you the flexibility to deploy a mix of physical and virtual appliances in your network, which can be managed centrally.
With the ability to scan all traffic in the virtual environment, Cyberoam virtual UTM protects virtual networks from attacks on hypervisor management console, hypervisor & Guest OS, virtualized web-facing applications and servers and allows organizations to secure Zero Trust Networks with its comprehensive security features in virtualized form.
Get a complete virtual security solution with Cyberoam virtual UTM, virtual Cyberoam Central Console and Cyberoam iView – Logging & Reporting software.
If you are an MSSP, reduce your operational and capital expenditure, and serve your customers better and at reduced costs, by having elastic network infrastructure utilization with virtualization.
If you are an SMB with virtual infrastructure, you can now extend your existing infrastructure to include security for your network without the need to add hardware security appliances, thus saving cost and time.
Support for maximum 1 Virtual CPU Core
Support for maximum 2 Virtual CPU Cores
Support for maximum 4 Virtual CPU Cores
|Hypervisor Support||Vmware ESx/ESxi 4.0/4.1/5.0, VMware Workstation 7.0/8.0/9.0, VMware Player 4.0/5.0, Microsoft Hyper-V 2008/2012|
|vCPU Support (Min / Max)||1 / 1||1 / 2||1 / 4||1 / 8||1 / 12|
|Network Interface Support (Min / Max)||3 / 10||3 / 10||3 / 10||3 / 10||3 / 10|
|Memory Support (Min / Max)||1 GB / 4 GB||1 GB / 4 GB||1 GB / 4 GB||1 GB / 4 GB||1 GB / 4 GB|
|Firewall Throughput (UDP) (Mbps)||1,500||3,000||3,500||4,000||4,000|
|Firewall Throughput (TCP) (Mbps)||1,200||2,500||3,000||3,500||4,000|
|IPSec VPN Throughput (Mbps)||200||250||300||350||400|
|No. of IPSec Tunnels||200||1,000||1,500||2,000||2,500|
|SSL VPN Throughput (Mbps)||300||400||550||550||750|
|WAF Protected Throughput (Mbps)||300||500||800||1,400||1,550|
|Anti-Virus Throughput (Mbps)||900||1,500||2,000||2,200||2,450|
|IPS Throughput (Mbps)||450||750||1,200||1,800||1,900|
|UTM Throughput (Mbps)||250||450||1,000||1,400||1,550|
|* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.|