Engineering innovation. Enabling businessTechnology

Layer 8 Technology

Cyberoam’s Layer 8 Technology treats user identity the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.

The Layer 8 technology penetrates through each and every security module of Cyberoam security appliances. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement – joiner, leaver, rise in hierarchy etc.

Read More


Cyberoam’s intelligent and powerful firmware – comes with Next-Generation security features like Layer 8 Identity-based security, Application visibility & controls, Web Application Firewall, Intrusion Prevention System, Website filtering, VPN (IPSec and SSL), Gateway Anti-Virus, Anti-Spam (Inbound/Outbound), bandwidth management, and more, to protect networks against newly evolving threats. Integrated seamlessly with the hardware for network and crypto acceleration, CyberoamOS extracts the highest level of performance from a multi-core platform and with minimum latency. CyberoamOS simplifies security with ease-of-management features that allow policy creation for multiple security features through single firewall page along with a Web 2.0-based GUI that offers easy navigation, an intuitive interface and reduces frequency and severity of errors while using the GUI.

Extensible Security Architecture (ESA)

The threat landscape has been evolving continuously and organizations are today under attack from new and more sophisticated threats. New threats ask for additional security solutions, security feature enhancements and technology, demanding a more complex security system in organizations that may bring down its performance.

Cyberoam’s Extensible Security Architecture (ESA), used on its network security appliances (Next-Generation Firewalls/UTMs), is built on an extensible platform which can organically grow with future security needs of an organization. This means the network security solutions rapidly adapt to mitigate newly-evolving threats from sources such as Web 2.0, VoIP, streaming media, IM, P2P etc. without degrading system performance. Cyberoam’s extensible architecture works in tandem with its Multi-core technology that accelerates parallel processing of multiple security features in Cyberoam security appliances to ensure security is not achieved at the cost of performance.

Read More

FUSION Technology

Cyberoam’s unique FUSION Technology allows policy creation for multiple security features through single firewall interface, blending security, connectivity and productivity benefits for networks. The FUSION technology integrates the Cyberoam firewall with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management, and other Cyberoam features, ensuring integrated perimeter security to organizations.

Cyberoam Threat Research Labs (CTRL)

Cyberoam Threat Research Labs (CTRL) identifies security threats and protects Cyberoam customers against various vulnerabilities such as malware attacks by publishing security upgrades and research reports. Such reports help Cyberoam customers remain protected with detailed guidance and malware threat prevention advice using appropriate configuration of parameters on Cyberoam appliances. CTRL goes beyond finding emerging potential threats and aims at providing insightful investigation into how advanced threats are engineered and imagined around today’s internet usage and apps. During the last year, CTRL had researched over 138 vulnerabilities and released suitable signatures protection for extending appropriate security protection to customers.