Outstanding and must have product for efficient and effective network security.
Cyberoam is the only identity-based UTM solution. It offers a well-coordinated protection through tightly integrated security solutions over a single interface.Most UTMs only offer IP-address based security. Cyberoam is the only UTM solution that offers user identity-based security, protecting enterprises from unpredictable, insider threats.Functioning with Layer 8 technology, Cyberoam gives complete visibility into “Who is doing What” in the network and allows policies to be created at the user level based on work profiles.
Considering Active High Availability, load balancing, failover mechanism, bandwidth management capabilities and other features, it is worth buying.
Room for Improvement:
Policy configuration and implementation is a bit lengthy process.
Nothing else of any significance that we found but yes, it is a bit pricey.
After implementing Cyberoam UTM in our data-center. We tested it by initiating various kind of DDOS attacks. Cyberoam identified every attack, notified us about it and prevented the network from any kind of damage and disturbance. It controls bandwidth to a great extent by use of policy for single user to groups.
Easy deployment, good hardware specification, classy reporting tools, no user count restrictions etc. A features-packed and powerful UTM appliance at the higher end of the price spectrum, but worth it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Nov 14 2012