Cyberoam Technologies CR2500iNG
March 01, 2013
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Identity-based security controls.
- Weaknesses: None that we found.
- Verdict: A good choice if you can handle the price tag.
The CR2500iNG unified threat management appliance from Cyberoam offers a multitude of security and threat prevention features for the network perimeter. This appliance features a stateful inspection firewall, intrusion prevention system, full gateway anti-malware suite, anti-spam, web content management, SSL VPN, web application firewall and controls for instant messaging applications, among many other security and reporting features. This appliance also offers identity-based controls integrated across all the appliance functions allowing for granular security controls based on user authentication and role.
We found deployment and configuration of this solution to be easy and straightforward. The initial deployment was done by simply connecting the appliance to the network and browsing to the default IP address with a web browser on a machine connected to the same network. When we accessed the web-based interface for the first time, we were taken through a brief setup wizard that helped us not only set up the basic appliance configuration, but also allowed us to put a base security policy in place. After the initial setup was complete, we were able to manage and finetune our configuration using the intuitive web-based management GUI.
This tool offers quite a lot of deployment and policy flexibility. The appliance itself can be deployed in either gateway or bridge mode. Gateway mode allows the appliance to replace an existing firewall, router and perimeter security device, while bridge mode allows for keeping the existing devices and adding additional security using the Cyberoam appliance.
Documentation included a short quick-start guide that provided a few simple steps to get the appliance up and running with a basic configuration, as well as a full user guide and several other supplemental configuration guides. The user guide featured full explanation of the product features and functions while illustrating configuration and use of the product through many screen shots and configuration examples. We found all documentation to be well-organized and easy-to-follow.
Cyberoam provides customers with access to an online knowledge base, technical documentation, a support portal and Cyberoam Security Center, as part of the initial purchase. Basic or Premium support covering eight-hours-a-day/five-days-a-week or 24/7 phone, email and web chat, firmware upgrades, hardware warranty and RMA fulfillment are available at an additional cost per annual agreement.
At a price just under $20,000 for just the appliance and a total cost up to around $35,428 for the appliance and a year of subscriptions to the various services provided by the appliance, this product comes with quite the price tag. However, we do find that this product does offer a very reasonable value for the money despite its high cost. The Cyberoam UTM appliance offers much more than just a perimeter security device, it offers a high level of granular security controls that can keep the network environment safe from many possible threats.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- DetoxCrypto ransomware imitates Malwarebytes software
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- Yahoo faces congressional action and class action lawsuits following historic data breach
- Case study: Hawaiian Telcom says aloha to AlienVault security management
- Pippa Middleton's iCloud account hacked
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks
- IoT assault, connected devices increasingly used for DDoS attacks