Website Design | Web Design | Custom Website Design | Website Application Development | Web Development | Software Development


Intrusion Prevention System    Maximum security against emerging threats
Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

Cyberoam’s signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities.

Back to Home
Feature Feature Description Benefit
Multiple Protocol Support
HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
Automatically detects, blocks, drops suspicious traffic
Security against network, application and human layer attacks
IPS Policy Tuner
Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
Identity-based alerts
Role-based access to users and groups
Minimizes noise related to false positive alerts, traffic latency and improved performance
Signature Updation
Regular updates by the Cyberoam Internet Threat Response Team
Customized signatures by organizations
HTTP Proxy signatures
Protection against latest vulnerabilities
Zero-hour protection during an outbreak prevents user masking through anonymous proxies
Centralized Security
Centralized custom signature creation and implementation at remote offices with CCC
Zero-hour protection for distributed networks
Simplified security with lower cost of operations
Logging & Reporting
Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
Dashboard, Top alerts, attackers and victims with severity of attacks
Centralized logging reporting with Cyberoam iView and CCC
Meets compliance requirements for CIPA, HIPAA, PCI DSS
Meets requirements of forensic analysis
Rapid corrective action with high security
Offers single, per-appliance subscription as opposed to per-user subscription
Comprehensive yet cost-effective security