Layout Reset
Layout
  • Fullwidth

    Fullwidth

  • Boxed

    Boxed

Basic Color
Patterns
  • pattern 1
  • pattern 2
  • pattern 3
  • pattern 4
  • pattern 5
  • pattern 6
  • pattern 7
  • pattern 8
  • pattern 9
  • pattern 10
  • pattern 11
  • pattern 12
  • pattern 13
  • pattern 14
  • pattern 15
  • pattern 16
  • pattern 17
  • pattern 18
  • pattern 19
  • pattern 20
  • pattern 21
  • pattern 22
  • pattern 23
  • pattern 24
  • pattern 25
  • pattern 26
  • pattern 27
  • pattern 28
  • pattern 29
  • pattern 30
Green Mode
  • First Color

  • Second Color

  • Third Color

  • Fourth Color

First Font
Second Font
Third Font
Fourth Font
Cyberoam cr25ing Big image
55,000 51,000

Cyberoam CR25iNG

3 ดาวครึ่ง
  • Availability:In Stock
  • Product Code:Cyberoam CR25iNG
  • Brand:Cyberoam

Cyberoam cr25ing
Cyberoam UTM Firewall- Identity-based Controls with Layer 8 Technology 
Anti-Virus & Anti-Spyware 
3G / 4G / WiMAX Connectivity 
VPN 
Anti-Spam 
IM Archiving & Controls 
Intrusion Prevention System 
Application Visibility & ControlIPv6 Ready 
Bandwidth Management 
Web Filtering 
On-Appliance Reporting 
Multiple Link Management 
RJ45 1 ,Copper GbE 4, USB 2 

Cyberoam CR25ING

cr25ing is the Next-Generation Unified Threat Management appliance with Wi-Fi access points that offer “the fastest UTMs made for SMBs” to small offices with high performance security over WLAN. cr25ing appliances come with 3x3 MIMO technology that greatly enhances wireless range and performance . It supports 802.11a/b/g/n wireless standards. Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.

The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.

Cyberoam's Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow Identity-based security policies in dynamic IP environment.