Cyberoam CR1500i review

Cyberoam’s latest UTM appliance brings its unique identity based security to bear on the enterprise. In this exclusive review we find out if the Cyberoam CR1500i hits the target.

Identity based security requires Active Directory, NT domain, RADIUS or LDAP servers or the appliance's own database. You can also identify systems by their IP addresses, create IP address pools and link specific systems to users so they are only allowed to log in from an assigned address or a pool.

Advertisement - Article continues below

Three types of user are supported where a normal user must logon to the appliance, requiring a small client utility to be installed locally. Clientless users don't need the utility and don't have to log on to the appliance but for these you can't apply surfing and data transfer quotas or internet access time restrictions. The SSO user type is merely a normal user that is automatically logged in to the appliance when they have authenticated with an external directory server.

User and group controls are very extensive as each one can have their own web filtering, internet access and bandwidth usage policies. Data transfer limitations on uploads and downloads can also be applied and there are even options for daily, weekly, monthly or yearly limits.

Firewall rules offer advanced options where you can select additional policies for IPS, web filtering and bandwidth restrictions. For each rule you can also activate virus scanning on HTTP, POP3, IMAP, SMTP and FTP traffic.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

You can apply a global anti-spam policy and underneath this add custom policies for separate users and groups. For each policy there are a set of advanced options where you limit attachment sizes and decide what to do based on each message's spam score. Dependent on the score, you can quarantine, drop or reject SMTP messages or tag the subject line whilst for POP3 you can accept a suspect message or tag it.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now

Most Popular

Visit/mobile/5g/355712/nokia-5g-speed-record
5G

Nokia breaks 5G record with speeds nearing 5Gbps

20 May 2020
Visit/cloud/cloud-computing/355742/microsoft-launches-public-cloud-service-for-health-care
cloud computing

Microsoft launches public cloud service for health care

21 May 2020
Visit/software/video-conferencing/355596/house-of-commons-to-ditch-zoom
video conferencing

House of Commons to ditch Zoom in favour of British alternative

11 May 2020