True Broadband Networks  
  Home Broadband Services About Us FAQ Contact Us  

Network Security

True Broadband Networks
is a National Distributor of the Cyberoam Comprehensive Internet Security System

The Cyberoam solution delivers a comprehensive security portfolio that meets both the network and endpoint protection requirements of organizations. With Unified Threat Management (UTM) appliances, Endpoint Data Protection and Cyberoam iView, Cyberoam delivers complete visibility and control over user activity.

The Cyberoam solution offers multi-lingual support with Chinese, Hindi and English language GUIs, enhancing user experience in some of the largest and fastest growing markets

  Unified Threat Management
Cyberoam’s CheckMark Level-5 certified, ICSA firewall-certified UTM appliances are purpose-built for comprehensive network protection. They meet the high performance needs of small, medium and large enterprises with appliances ranging from CR15i to CR1500i.

Cyberoam Identity-based UTM appliances protect organizations against user-targeted external and internal threats through tightly integrated solutions over a single platform: Stateful Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Antivirus and Anti-Spyware, Gateway Anti-spam, Intrusion Prevention System (IPS), Content & Application Filtering, Bandwidth Management, Multiple Link Management and On-Appliance Reporting.

High Availability
Active-Active High Availability provides efficient, continuous access to business-critical applications, information, and services. It increases overall network performance by load balancing the network traffic between two clustered Cyberoam security appliances. With auto failover, it eliminates the problem of single point of failure.

Gigabit performances
The Cyberoam Internet Security appliances, particularly the Accelerator Series deliver gigabit throughput through the use of multi-core processors optimized through its software architecture.
Segment Internet Security Appliances Key Highlights
SOHO: Small Office & ROBO: Remote Office- Branch Office - CR15i
- CR25i
- CR25ia
- CR35ia
- Full range of Cyberoam Internet Security Appliance features for the requirements of small office / remote office.
- Zero hour signature-less malware protection.
- Encrypted VPN tunnel for secure remote communication with branch office, road warriors, telecommuters, customers, partners.
- No need for technical resource .
Small and Medium Enterprises - CR50ia
- CR100ia
- CR200i
- CR300i
- Active-Active High Availability for business continuity
- Dynamic routing and VLAN supporting rapid network expansion
- Controls in dynamic IP environments Wi-Fi and DHCP
- Multicore architecture delivering Gigabit throughputs
Large Enterprises - CR500i
- CR1000i
- CR1500i
- Enterprise-grade security appliances with High Availability, dynamic routing and VLAN capability
- Powerful, high performance security appliances for up to 1500 users with gigabit throughputs
- Centralized security control over remote offices
Cyberoam Central Console (CCC) - CCC 15
- CCC 50
- CCC 100
- CCC 200
- Enables MSSPs and large enterprises to centrally manage distributed deployments
  Endpoint Data Protection
Cyberoam Endpoint Data Protection delivers enhanced security to organizations with policy-driven data protection and asset management over the endpoint. With a full set of modules including data protection and encryption, device management, application control and asset management, it prevents data loss and supports organization-wide efforts towards security, employee productivity and efficiency in management of IT assets.
Available in appliance and software form, Cyberoam iView is a logging and reporting solution that offers visibility into activity within the organization for high levels of security, data confidentiality and regulatory compliance. It provides an organization-wide security picture on a single dashboard through centralized reporting of multiple devices across geographical locations. It also achieves compliance reporting for PCI-DSS, HIPAA, GLBA and SOX and performs forensic analysis to study security breaches through logs and reports.
For more information about our company please click the link below to Download our free Corporate brochure.
  Click here to Download the Company Brochure
Click below to see the coverage map, and find out if our company network gets near your house/office.
  Click here to See Our Coverage Map
Click below to read all the questions to your doubts regarding to our company and the network service.
  Click here to Read the Answers to the Most Frecuently Asked Questions
Click below to read our Privacy Policy before you buy any service from our Company.
  Click here to Read Our Privacy Policy
TRUE BROADBAND NETWORKS 2010 - All Rights Reserved. Privacy Policy | Terms & Conditions | Contact Us