Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.


  • 08 December, 2009 16:11

<p>Introduction of new model 35ia; High throughput enhancements with 25ia to bring price-performance-security value to small &amp; medium businesses, branch offices</p>
<p>(Woburn, MA, USA. December 8, 2009) Cyberoam, the leading provider of identity-based Unified Threat Management solutions, today announced an extension to its “Accelerator Series” appliances, CR25ia and CR35ia. These appliances meet the price-performance-security requirements of small and medium businesses and branch offices.</p>
<p>Small organizations are as much at risk from evolving virus, worms, malware and other attacks as large organizations. With organizations moving beyond email to larger Internet business requirements, the Web has begun to play an increasingly critical role in their everyday functions. This is evident from the rise in the number of applications like SaaS, Web 2.0 and many bandwidth-hungry applications that organizations need for their business enhancement and to meet changing user practices. Hence, there is growing demand among organizations for security solutions that can ensure network connectivity and the resultant business continuity.</p>
<p>Yet, many organizations are also sensitive to the huge price tags that are attached to high performance. In case of branch offices, organizations are constrained by the need for high performance security solutions at a price point that keeps their security budget manageable.</p>
<p>Says Abhilash Sonwane, Vice-President, Product Management, Cyberoam, “Cyberoam addresses the three issues of price, performance and security expectations of our customers with the CR25ia and CR35ia, meeting the requirements of both small &amp; medium office as well as branch office segments. We are happy to introduce this enhancement to our line of “Accelerator Series” appliances, offering best-in-class UTM throughputs even when the appliances are fully loaded, that is, when all the security features are running.” He adds, “The inability to meet high throughput requirements when all the security features function, slows down the network and lowers security levels. With this launch, we are delivering on our promise of comprehensive UTM security at the right price-performance value.”</p>
<p>The CR25ia and CR35ia appliances have been designed to withstand the increasingly performance-intensive security requirements at branch offices and small offices at a price point that stays within security budgets. With 2 to 4.5 times greater firewall throughput than that of comparable products, and 1.5 to 2 times the IPS, anti-virus and UTM throughput values, Cyberoam Accelerator Series can handle the entire spectrum of existing and emerging threats, meeting its promise of comprehensive security.</p>
<p>Cyberoam CR25ia and CR35ia deliver comprehensive protection with the full feature list, including Stateful Inspection Firewall, VPN (SSL VPN &amp; IPSec), Gateway Anti-Virus and Anti-Spyware, Gateway Anti-Spam, IPS, Content Filtering, Bandwidth Management, Multiple Link Management. These appliances can be centrally managed through the Cyberoam Central Console. Their unique identity-based security protects organizations from internal threats that lead to data leakage.</p>
<p>Cyberoam is the only identity-based security appliance that enables organizations to see who is doing what in the network. Certified by ICSA, CheckMark and VPNC, Cyberoam has its presence in 55 countries and is the recipient of 5 star rating from SC Magazine thrice in a row for its award-winning range of Identity-based UTM appliances.</p>
<p>About Cyberoam</p>
<p>Cyberoam Identity-based UTM appliances offer comprehensive protection against existing and emerging Internet threats, including viruses, worms, Trojans, spyware, phishing, pharming and more. Cyberoam UTM delivers the complete range of security features such as stateful inspection firewall, VPN, gateway anti-virus, gateway anti-malware, gateway anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link management over a single platform. The Cyberoam solution portfolio includes Cyberoam iView, an open-source logging and reporting solution, and Cyberoam Endpoint Data Protection suite to protect data and manage assets over endpoints in organizations. Cyberoam is certified with CheckMark UTM Level 5 Certification, ICSA Labs, and is a member of the Virtual Private Network Consortium. Cyberoam was positioned as a “Visionary” in the Magic Quadrant for SMB Multi-function Firewalls by Gartner. Cyberoam has also continuously received SC Magazine’s 5 Star Rating. Cyberoam has offices in Woburn, MA and India. For more information, please visit</p>
<p>About Elitecore Technologies</p>
<p>Elitecore Technologies Limited is the global provider of Cyberoam UTM appliances. Elitecore’s other divisions include CRESTEL Convergent Billing Solution that meets the voice, data, video billing and customer care requirements of Tier-1 service providers and 24online Billing and Bandwidth Management Solution for hotels, hotspots and Internet service providers. Elitecore has a strong R&amp;D base and support center in India. It has sustained a healthy growth rate of over 75 % since inception. For more information, please visit</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place