CIOTechOutlook >> Magazine >> December - 2014 issue

Cyberoam Technologies: Improving Network Control and Monitoring for Administrators

By

Network security has evolved following advancements in Cloud, Virtualization and BYOD. It has become a highly specialized job which demands extensive expertise in all these technologies, and a good understanding of the security pain points associated with each one of them. With the targeted attacks relying on the human element, users today pose the biggest risk and IT security administrators struggle to achieve desirable control and visibility into users’ activities. Cyberoam Technologies, headquartered in Ahmedabad, has developed Layer 8 technology to address this concern. Unlike most other security solutions which function on traditional seven-layer OSI network protocol stack, Cyberoam has an eighth layer of user identity in its appliances. This enables easy identification of users in a network, improving network control and monitoring for administrators.

With Layer 8 based logging and reporting, enterprises can easily identify attackers or victims in case of an attack, control users’ network behavior via identity-based policies and finally create meaningful reports on usage, problems, intrusion and so on. Cyberoam's Application Visibility & Control feature enables prioritization of applications based on User Identity, time and bandwidth, allowing greater flexibility and providing L2-L8 visibility and control in the real sense. The user-based controls enhance workplace productivity as one can set policies that prevent wastage of network bandwidth during work hours. Apart from improving management, the ability to set policies and generate reports based on username improves security in a network manifold.

Evolved Unified Threat Management

Cyberoam was one of the first organizations to come up with the concept of an evolved Unified Threat Management system. The company today offers user identity-based network security in its Next Generation Firewalls and Unified Threat Management appliances, allowing visibility and granular control into access of business networks. Cyberoam Unified Threat Management appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. The company has the fastest UTM appliances in its range for SMBs.

What sets Cyberoam apart from the other players of this segment is the multitude of benefits across its product range, like easy and intuitive interface, simplified policy management and a higher compatibility with solutions from other vendors. “Layer 8 technology is our major differentiator. Our industry leading coverage of key applications, comprehensive web content filtering and a plug-n-play IPS provide unmatched advantage to our customers. We are also industry’s first security vendor to provide on-appliance WAF and on-appliance logging and reporting,” adds Patel. In addition, the company brings EAL4+ certified security on its UTMs’ and NGFWs’ commendable throughputs and lets customers choose security subscriptions as per their needs, and in turn enrich their experience with unmatched pre-sales and post-sales support.

Today, Cloud and Virtualization have altered the definition of ‘office space’ and organizations are striving to achieve much higher levels of collaboration. This has changed the way data is stored and accessed via applications and users. Needless to say, much of all this is still in developmental or transition phase. Keeping this transition in mind, Cyberoam aims at supporting customers during this transformation, and in the process becoming a leader in the network security domain.

Certified VPN solution

Growing and expanding businesses need to collaborate effectively and securely with branch offices, road warriors and telecommuters anywhere and over any device while opening corporate extranets and more to partners and customers. A VPNC-certified VPN solution arms such organizations with a reliable, cost-effective and high-security remote networking. Moreover, vendors like Cyberoam provide such enterprise customers with the option of both SSL and IPSec VPN solutions together with award-winning, Identity-based UTM appliances, enabling organizations to enable secure remote access while ensuring much higher business flexibility compared to a dedicated VPN appliance. In addition, VPNC-certified Cyberoam VPNs can also communicate with most third-party VPNs, delivering business ease to large customers.

Reducing Risks Associated with Internet Use

Symbiosis Institute of Management Studies (SIMS) has a Wi-Fi network giving the students anytime, anywhere connectivity. However, problems arose, like non-academic surfing by students related to gaming, shopping, instant messaging and sending mails. Also, the use of virus affected laptops and led to a high rate of network broadcasting, choking bandwidth heavily. Due to the enormous strain on the bandwidth the Internet availability to critical users was severely affected.
Cyberoam came into the picture to identify that the presence of virus within the network was leading to loss of bandwidth.
"SIMS could now identify the virus infected machines. Post removal of these machines from the network, the bandwidth got free of flooding and users could see the change in the quality of bandwidth instantly" says Hemal Patel, CEO, Cyberoam Technologies & SVP Sophos.

CXO Insights

Combining Consumer Understanding and Brand...

By Shweta Jangir, Senior Project Director, Market Xcel Data Matrix

Technology Transformation Challenges In The...

By Bhasker Rao, Director – Technology Infrastructure, Deutsche Bank Group

Facebook