Cyberoam CR 250i
July 01, 2007
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Protection not only for the perimeter via firewall and IPS, but also from many types of malware
- Weaknesses: Most policies have to be configured manually
- Verdict: A strong product with a good feature set, but needs default policies set to "all not explicitly allowed is denied"
Cyberoam's CR 250i protects on many levels. It can be deployed as a gateway using NAT, or in bridged mode to protect the network transparently. This device provides a firewall, IDS/IPS, anti-virus both at the gateway and email, anti-spam, anti-spyware, web content filtering and protection from phishing and pharming. It can also be set up as a VPN.
All these features come together in one simple-to-manage web console. This console is well-organised and intuitive to navigate. The front-end console comprises a dashboard packed with many useful monitors and statistics. Although several monitors appear on the dashboard, it is well-organised, so finding information is easy. Deployment of this product is guided by an intuitive wizard, so that getting the product up and running is quick and easy.
We found this product to be quite flexible and very powerful. The only problem we saw during testing was that, out of the box, it appears to rely on its firewall, because most of the IDP (intrusion detection and protection) policies are set to detect only by default.
This means we had to go in and reset a lot of them, with the consequent danger of missing something. Security wisdom dictates a policy of everything not explicitly allowed is denied. This product does not seem to follow that best practice by default. However, one of this appliance's interesting features is its ability to create rules based on individual identities, as well as embedded authentication using LDAP, ADS and Radius.
The documentation includes a small quick-start guide and several other guides on a CD in PDF format. The quick-start guide explains deployment options and guides the user through the set-up wizard.
The other guides are divded into specific pieces and functions of the device. This really helps with finding detailed information on specific problems or configurations. All of the documentation is easy to read and contains many screenshots.
The vendor website provides a small support area, which includes a knowledge base and demos, as well as many resources such as product guides. Technical support can also be contacted by email, phone or online chat.
With a base price of just over £2,000, this appliance provides a lot of functionality at a fairly affordable cost. Available in various sizes for different enterprises, it represents good value for almost any environment.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry