Home / / Cyberoam launches virtual UTM range

Cyberoam launches virtual UTM range

Virtual Unified Threat Management appliances to protect diverse virtual environments

Cyberoam launches virtual UTM range
Cyberoam's new UTM range is designed to protect virtual environments.

Cyberoam has launched a new range of virtual Unified Threat Management (UTM) appliances for VMWare and Hyper-V platforms.

The new UTM range is intended to allow end user organisations and managed security service providers (MSSPs) to protect diverse environments with both physical and virtual resources on different platforms.

The virtual UTM offers MSSPs a complete control of their security infrastructure with its support for multiple virtualization platforms like VMWare and Hyper-V. The UTM range comes with simple licensing policy, model upgrades and subscription upgrades, to address MSSPs' challenge of scaling-up network infrastructure to meet customer needs. With the launch of virtual UTM for comprehensive network security in virtualized environments, MSSPs can now offer a total virtual security solution to customers with virtual Cyberoam Central Console for centralized security management, and Cyberoam iView software for logging and reporting.

Cyberoam virtual UTM appliances secure Office-in-a-Box and BYOD networks that need to support multiple devices across a range of operating systems and geographies, brought in by employees to access the network resources. These devices, specifically employees' personal devices, lack security increasing the risk of security threats in virtualized networks. User-based access controls become critical in this environment.

Cyberoam's Layer 8 Identity-based security policies over user authentication, service authorization and reporting (AAA) offer security and control over users accessing the network resources.

Cyberoam virtual UTMs secure virtual data centres that are constantly under pressure for generating more computing power out of existing server infrastructure. While virtualization of data centres offers greater efficiencies and reduced infrastructure complexities, management costs, power and cooling costs, virtual data centres are forced to rely on hardware security appliances to secure their networks. Cyberoam's security in virtualized form eliminates the need for dedicated hardware security and offers multiple security features integrated on a single virtual appliance.

Abhilash Sonwane, senior VP, Product Management, Cyberoam, commented: "Cyberoam virtual UTMs offer security to virtual data centres; Layer 8 identity-based security to ‘Office-in-a-Box' set-ups; and support for multiple virtualization platforms with easy scalability; to ‘Security-in-a-Box' set-ups for MSSPs/ enterprises. The licensing model gives flexibility to allot the number of vCPUs for Cyberoam virtual UTM as required by organizations. This, along with Cyberoam's support for multiple virtual platforms and simple upgrade to higher virtual UTM models, offers full control of security infrastructure to organizations."

With the ability to scan all traffic in the virtual environment and integrated security features on one virtual appliance, Cyberoam virtual UTM protects virtual networks from attacks on hypervisor management console, hypervisor & Guest OS, virtualized web-facing applications and servers and allows organizations to secure Zero Trust Networks. The virtual UTMs consolidate multiple security features like firewall, VPN, Anti-Spam, Anti-Virus, IPS, WAF, Web & Application Filtering, Bandwidth Management, and more, in a single virtual appliance that make virtual environments as secure as the physical infrastructure.

Cyberoam offers a complete virtual security solution to organizations with Cyberoam's virtual UTM, virtual Cyberoam Central Console and Cyberoam iView - Logging & Reporting software. It supports multiple virtual platforms that include ESX /ESXi, Workstation and Player platforms of VMware along with the Hyper-V platform.

Follow us to get the most comprehensive IT Security news delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.