Cyberoam launches CR15i UTM appliance

June 2009 Information Security

Cyberoam has launched the CR15i, an all-inclusive security appliance that specifically caters to the business requirements of small offices. The vision behind this product was to achieve an easy-to-use, affordable UTM solution that leaves no gaps in fulfilling the security requirements of offices up to 25 users.

Small offices implementing limited security like a firewall and anti-virus leave themselves exposed to the high volume and range of external and internal threats. Cyberoam’s CR15i identity-based network security appliances deliver comprehensive protection from blended threats that include malware, viruses, spam, phishing, and pharming attacks.

According to Abhilash Sonwane, VP, product management at Cyberoam “Although small offices face the same types of threats that enterprises face, they limit themselves to just desktop security or just a gateway firewall. Given their small size, one does not really expect them to spend a lot of money on individual security appliances for each feature. What they require is a comprehensive, easy-to-use and very affordable solution. This is the business vacuum we have overcome with CR15i.”

Cyberoam CR15i fulfills this objective of value-for-money with the most complete collection of necessary security features in a single box – stateful inspection firewall, VPN, gateway antivirus and anti-spyware, gateway anti-spam, IPS and Web content filtering. Of significance is the fact that these features are available at no extra per user charges. Furthermore, Cyberoam provides bandwidth management and multilink manager with built-in load-balancing and auto-failover, at no extra cost making it a total bandwidth management solution while providing total security to small offices.

CR15i also furnishes daily user identity-based management reports indicating spam, virus, intrusion and other threat activities, network usage trends and traffic patterns in the network with the user identity. Its bandwidth management feature prevents bandwidth choking by dedicating committed bandwidth to key users in the organisation, and preventing heavy bandwidth applications through content filtering.

CR15i can also be used by branch offices of large organisations for easy-to-manage remote office security that remains at par with that of the central office.

Cyberoam invites channel partners to form new partnerships with it and benefit from carrying the small office security solution that is CR15i. Cyberoam offer comprehensive partner benefits programme that includes training, support, incentives and strong margins.

www.cyberoam.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.