IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Cyberoam CR750ia review

Can Cyberoam’s latest UTM appliance keep your users under control with its identity based security approach? Read this exclusive review of the CR750ia to find out.

Cyberoam groups users into three distinct types, each with different logon requirements. Clients authenticating to an external directory server will be automatically logged in to the appliance whereas a Normal user logs on to the appliance via the locally installed Corporate Client.

We successfully tested the client on our Windows 7 systems and configured it to log in automatically in the background. Clientless users are not required to authenticate with the appliance but these can't have surfing and data transfer quotas or Internet access time restrictions applied to them.

Controls for users and groups are a cut above the rest as we could apply web filtering, Internet access and bandwidth usage policies. You can enforce data transfer limitations on uploads and downloads and have different limits for daily, weekly, monthly and yearly usage.

For security at the interface level, any of the appliance's ports can be grouped into zones and have general firewall rules applied to them. Rules define source and destination zones, selected services, blocking or allowing actions to specific traffic types and time schedules.

If you started with the appliance in the passive monitoring mode, remember to activate the various security services for each rule otherwise your policies won't do anything. You can enable virus scanning for selected protocols within each rule, turn on anti-spam and IM controls and add additional policies for IPS and bandwidth restrictions.

Web filtering policy rules support HTTP and HTTPS as standard and a useful feature is the ability to assign different actions to a category. You could, for example, block HTTP access to certain web sites but allow secure HTTPS connections.

Featured Resources

ZTNA vs on-premises VPN

How ZTNA wins the network security game

Free Download

The global use of collaboration solutions in hybrid working environments

How companies manage security risks

Free Download

How to build a cyber-resilient business ready to innovate and thrive

Outperform your peers in your successful business outcomes

Free Download

Accelerating your IT transformation

How Cloudflare is innovating for CIOs to start 2023

Watch now

Most Popular

Tech pioneers call for six-month pause of "out-of-control" AI development
artificial intelligence (AI)

Tech pioneers call for six-month pause of "out-of-control" AI development

29 Mar 2023
Getting the best value from your remote support software
Advertisement Feature

Getting the best value from your remote support software

13 Mar 2023
3CX CEO confirms supply chain malware attack
malware

3CX CEO confirms supply chain malware attack

30 Mar 2023