Cyberoam CR750ia review
Can Cyberoam’s latest UTM appliance keep your users under control with its identity based security approach? Read this exclusive review of the CR750ia to find out.
Cyberoam’s identity based security sets it apart from the competition as it’s more sophisticated and allows far greater levels of control over user’s Internet activity to be maintained. It’s good value, easy to deploy and the new iView reporting tool provides impressive levels of detail for all activities.
Cyberoam groups users into three distinct types, each with different logon requirements. Clients authenticating to an external directory server will be automatically logged in to the appliance whereas a Normal user logs on to the appliance via the locally installed Corporate Client.
We successfully tested the client on our Windows 7 systems and configured it to log in automatically in the background. Clientless users are not required to authenticate with the appliance but these can't have surfing and data transfer quotas or Internet access time restrictions applied to them.
Controls for users and groups are a cut above the rest as we could apply web filtering, Internet access and bandwidth usage policies. You can enforce data transfer limitations on uploads and downloads and have different limits for daily, weekly, monthly and yearly usage.
For security at the interface level, any of the appliance's ports can be grouped into zones and have general firewall rules applied to them. Rules define source and destination zones, selected services, blocking or allowing actions to specific traffic types and time schedules.
If you started with the appliance in the passive monitoring mode, remember to activate the various security services for each rule otherwise your policies won't do anything. You can enable virus scanning for selected protocols within each rule, turn on anti-spam and IM controls and add additional policies for IPS and bandwidth restrictions.
Web filtering policy rules support HTTP and HTTPS as standard and a useful feature is the ability to assign different actions to a category. You could, for example, block HTTP access to certain web sites but allow secure HTTPS connections.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Dave is an IT consultant and freelance journalist specialising in hands-on reviews of computer networking products covering all market sectors from small businesses to enterprises. Founder of Binary Testing Ltd – the UK’s premier independent network testing laboratory - Dave has over 45 years of experience in the IT industry.
Dave has produced many thousands of in-depth business networking product reviews from his lab which have been reproduced globally. Writing for ITPro and its sister title, PC Pro, he covers all areas of business IT infrastructure, including servers, storage, network security, data protection, cloud, infrastructure and services.
-
North Korean hackers are duping freelance developers with fake interviews to steal cryptocurrency and deliver malware — Sophos warns the 'Nickel Alley' group is using LinkedIn, Upwork, and Fiverr to target victimsNews A fake interview process uses coding tests and repo downloads to deliver malware
By Emma Woollacott Published
-
Liz Kendall: The UK is in prime position to become a global leader in AI — but greater tech industry support is needed to avoid falling behindNews Tech secretary Liz Kendall has pledged greater investment in the chip and semiconductor technologies that underpin AI
By Emma Woollacott Published
-
AI is coming to Ubuntu: Canonical exec teases future AI features and agentic workflow capabilities for version 26.10 — but on a ‘strictly opt-in basis’News A range of new AI features are coming to Ubuntu over the next year, according to maintainers, but only providing they’re of “sufficient maturity and quality”.
By Ross Kelly Published
