Cyberoam CR750ia review
Can Cyberoam’s latest UTM appliance keep your users under control with its identity based security approach? Read this exclusive review of the CR750ia to find out.
Cyberoam’s identity based security sets it apart from the competition as it’s more sophisticated and allows far greater levels of control over user’s Internet activity to be maintained. It’s good value, easy to deploy and the new iView reporting tool provides impressive levels of detail for all activities.
Indian company Cyberoam has been making a big play for the UK security appliance market over the past couple of years and a key feature of all its appliances is identity base security. This isn't new as most established network security vendors allow policies to be applied to users and groups rather than just systems or IP addresses. However, Cyberoam aims to go further by offering far greater levels of control over what your users can do.
In this exclusive review we look at the CR750ia which was supplied to us by E92Plus and is aimed at mid-sized businesses and enterprises. This 1U rack appliance is endowed with a good hardware specification including dual hot-plug power supplies and any of its fourteen Gigabit ports can be configured for LAN, WAN or DMZ duties as required.
The CR750ia provides the full gamut of security services which starts with an SPI firewall and support for IPsec VPNs. To these you can add a choice selection of features including anti-virus, anti-spam, IPS, SSL VPNs and filtering for web content and applications.
The appliance supports both routed and transparent bridge modes and we opted for the latter which only took a few minutes to deploy in the lab. The web interface begins with a wizard and after providing IP addresses for the LAN and WAN ports we could start the appliance in passive mode or apply one of two default security policies to all traffic.
Cyberoam has redesigned the main web interface which now opens with a new dashboard view. This clearly shows all detected threats such as viruses, spyware and DoS attacks, details about the appliance and the status of subscriptions. The previous interface focused on web activity and users' surfing patterns and wasn't as useful.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Dave is an IT consultant and freelance journalist specialising in hands-on reviews of computer networking products covering all market sectors from small businesses to enterprises. Founder of Binary Testing Ltd – the UK’s premier independent network testing laboratory - Dave has over 45 years of experience in the IT industry.
Dave has produced many thousands of in-depth business networking product reviews from his lab which have been reproduced globally. Writing for ITPro and its sister title, PC Pro, he covers all areas of business IT infrastructure, including servers, storage, network security, data protection, cloud, infrastructure and services.
-
CISPE claims European Commission gave Broadcom a ‘blank cheque to raise prices, lock-in, and squeeze customers’ with VMware dealNews Cloud providers have issued a formal response to the General Court of the European Union after the Commission defended its approval of the deal
By Emma Woollacott Published
-
Nutanix wants to help customers shore up cloud sovereigntyNews New automation tools and infrastructure management capabilities look to tackle single-vendor dependency and shore up sovereignty requirements
By Ross Kelly Published
-
The NCSC touts honeypots and ‘cyber deception’ tactics as the key to combating hackers — but they could ‘lead to a false sense of security’News Trials to test the real-world effectiveness of cyber deception solutions have produced positive results so far
By Emma Woollacott Published
