UTM Cyberoam Solution

Cyberoam's identity-based security solutions can secure your every move at work, at home and while you travel - from the network gateway to the endpoints. It binds security with your identity and works as your private security guard, even when you are away from work or at home. Its endpoint security protects your sensitive data by securing your endpoints, storage devices and controlling applications

Cyberoam Unified Threat Management appliances offer comprehensive security to small, medium and large enterprises through multiple security features integrated over a single platform. It is the first UTM that embeds user identity in the firewall rule matching criteria, offering instant visibility and proactive controls over security breaches and eliminating dependence on IP Addresses.

Cyberoam's unique Layer 8 technology treats USER as the 8th layer in the network stack. Also known as the Human layer, it penetrates through each of Cyberoam's security modules, allowing organizations to create user identity- based security policies. This offers them complete visibility and control over user activities, showing who is doing what anywhere in the network and enables them to take network security decisions based on usernames and not just IP addresses.

Cyberoam's identity-based security offers a high degree of granularity, making policy-setting an efficient process down to the user level that can be extended to any combination of group, job function or application. The IP- independent nature of Cyberoam allows users to carry their own access rights and policies anywhere in the network, even in dynamic IP environments like DHCP and Wi-Fi. Parallel processing of multiple security features, therefore allowing effective management of dynamic, content-based threats such as Web 2.0 applications, Voice over IP, streaming media, IM and P2P.

Cyberoam UTM's Extensible Security Architecture (ESA) is built on an extensible platform that can organically grow with future security needs of the organization. Such an approach has the agility to prolong the life and performance of the legacy UTM appliance by supporting future f eature enhancements, f or which the development can be done very rapidly and with minimum deployment effort.

Identifies and controls users through identification, policy-setting and reporting by username Offers security even in dynamic IP environments like DHCP and Wi-Fi, Allows binding of user identity with IP address, MAC Id, Session Id to prevent unauthorized network access. Allows real-time threat control through identity-based reporting on usage and threat patterns of individual users. Facilitates regulatory compliance for HIPAA, PCI-DSS, GLBA, CIPA, etc. with on-appliance reporting of "who" is accessing "what", shortening audit and reporting cycles.

Cyberoam UTM Features Assure Security, Connectivity and Productivity

Cyberoam UTM offers security without compromising on connectivity and productivity. It offers a combination of best-of-breed assembly of solutions over a single interface, resulting in a complete, dependable shield that network threats find extremely difficult to penetrate.