Cyberoam CR1500i review

Cyberoam’s latest UTM appliance brings its unique identity based security to bear on the enterprise. In this exclusive review we find out if the Cyberoam CR1500i hits the target.

Price
£6,410

EXCLUSIVE: Cyberoam isn't a name that comes immediately to mind when considering UTM appliances but this division of the India-based EliteCore Technologies is keen as mustard to change this perception. It's been muscling into the UK market for the past year with a particular focus on the small and medium-sized business (SMB) market but in this review we take a closer look at the CR1500i which represents the very pinnacle of its product range.

Advertisement - Article continues below

As a UTM appliance, the CR1500i ticks a lot of boxes. It offers firewalling and IPsec VPNs as standard and to these you can add options including anti-virus, anti-spam, IPS, filtering for web content and applications plus SSL VPNs.

A key feature is Cyberoam's identity based UTM security which allows you to tie policies to users rather than systems. This isn't a new concept by any means but Cyberoam goes one step beyond the majority as it can apply a wider range of controls within its firewall rules to specific users and groups.

The appliance offers a reasonable specification and you have plenty of port permutations to play with as all twelve are the Gigabit variety with two of them accepting SFPs for fibre connections. For all ports you can choose individually between LAN, WAN or DMZ duties and you can deploy the appliance in routed or transparent bridge modes although the latter doesn't support Cyberoam's optional SSL VPNs.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Installation in the lab was a smooth process and we opted for transparent mode where we dropped the appliance behind our existing firewall. The main web interface is a tidy affair and on first contact you're greeted by a wizard which helps set up the bridged or transparent modes. You can also start off in passive mode or apply a default security policy to all traffic.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020