Home Products Solutions Contact Us Resources
e-NETSource Global Sourcing Solutions
Home
Products
Solutions
Contact Us
Resources
Cambium Networks
Cyberoam
Emerson Network Power
Ericsson
HUAWEI
Mitel
Netcomm Wireless
Proxim Wireless
Robustel
Siklu
ZyXEL
 
e-NETSource
SOURCING SOLUTIONS








Cyberoam-Banner







PRODUCT RESOURCES


Cyberoam EDP Datasheet






Cyberoam Tech & Datasheets


Cyberoam Portfolio


QUICK LINKS


SOHO / ROBO Appliances


SME Appliances


Enterprise Appliances






















Cyberoam Videos










The Deadly Insider


This entertaining animated film depicts an anthropomorphic portrayal of various Cyberoam UTM features that work together as part of a real-world team to deal with the bad guys in cyber-security: viruses, worms, spam, intrusions, indiscriminate downloads and insider threats.

In part 2 of the film, you will be introduced to an organization called Natex Corp where a wily insider is attempting to leak sensitive data from within the organization, across to an outsider. Will he succeed in his dirty game? Will Team Cyberoam find out about his intentions and stop data from going out of Natex Corp?
















Implementing Layer 8 Security

In this presentation, you will learn about Cyberoam’s unique identity-based security mechanism using “Layer 8 technology” which is based on the premise that the individual user is the weakest link in an organization’s security landscape.

To overcome threats coming from the user, organizations must have full visibility and control over who is doing what in the network. Cyberoam’s Identity-based advantage runs across each of its features and gives information on each user’s activities within the network. This visibility helps organizations remain secure from internal as well as external threats.
















Product Demo - Identity-Based UTM


Learn through this video about how Cyberoam Identity-based UTM secures the user – the weakest link in any organization’s security chain, with Cyberoam’s Layer 8 Technology.

The video moves on to the product demo explaining the ease with which Cyberoam UTM’s various security modules can be configured.



 












Cyberoam

Endpoint Data Protection



Cyberoam-Endpoint-Data-Protection-Software-Suite


















Secure corporate data over endpoints   

Cyberoam Endpoint Data Protection controls the risk of data leakage posed by large segments of corporate data residing on endpoints, usage of endpoints outside the network by road warriors and unrestricted use of removable storage devices, applications, network sharing and printing.

Cyberoam offers Layer-8 Identity based controls over endpoints, controlling access to these media in addition to activity over the endpoints while providing extensive logs and shadow copies.

Thus, it prevents data leakage, ensuring that organizations meet the requirements of regulatory compliance like HIPAA, CIPA, GLBA. It also prevents malware entry and enhances employee productivity and efficiency in IT asset management.



Data Protection and Encryption                      

Protect sensitive data even in lost or stolen flash drives.

Cyberoam’s endpoint Data Protection & Encryption module controls data loss with encryption and decryption over removable devices, document control, in addition to control over removable devices, applications, network sharing and printing.

Layer 8 identity-based policies prevent data leakage through endpoints within the network or when carried by road warriors, helping organizations comply with regulatory requirements like HIPAA, PCI DSS, GLBA.

These controls prevent leakage of critical product, financial, sales, marketing, employee or corporate data, minimizing financial and legal liability or loss of stakeholder confidence.


Cyberoam-EDP-Screen-Shot-Email




























EDP Software Screen Shot - Email



Key Highlights

Document Controls
  • Cyberoam controls the creation, modification, copy and deletion of documents
  • Shadow copies can be created during these activities, preventing data loss
Removable Device Controls
  • Access Control of Removable Devices – Cyberoam supports the creation of black list and white list of USB-based devices, ensuring compulsory usage of encrypted devices through Layer 8 policies with identity, group, department, hierarchy-based allocation in addition to read-write controls over the devices
  • Encryption – Cyberoam ensures compulsory encryption and decryption of file or removable device at the time of file transfer, preventing data leakage in case of lost USB devices
  • File Transfer Controls – Cyberoam controls file transfer over fixed and removable devices based on the user role, file name and extension
  • Shadow Copies of files are stored during file transfer over removable media, eliminating the threat of data loss and assisting in forensics
Email Controls
  • Cyberoam controls file transfer over email based on the sender or recipient’s identity or group-based work profiles, subject and attachment name, extension and size
  • Shadow copies can be created on the basis of the sender, recipient names and attachment size
Instant Messenger Controls
  • Cyberoam controls file transfer through Skype, MSN, Yahoo, Google Talk and other popular instant messengers based on file name, extension and size
  • Shadow copies are created of files uploaded and downloaded over IMs
  • Logs are archived for chat conversation as well as file upload and download
Printer Control
  • Cyberoam controls access to printers and file printing over local, network, shared and virtual printers based on printer name, file name and extension combined with Layer 8 Identity-based policies
  • Recorded image of the printed file is stored, ensuring quick audits and forensics
Network Sharing
  • Cyberoam Endpoint Data Protection allows or disallows network sharing based on Layer 8 Identity-based policies, minimizing incidents of data leakage
Logging-Reporting-Alerts
  • Cyberoam creates logs and reports related to access, usage, modification, transfer and deletion of files
  • It can send customizable alerts to administrators for prompt action and a message to end users, ensuring user education regarding best practices


Device Management

Stop use of unauthorized devices.

Cyberoam’s endpoint Device Management controls the use of removable media like USB devices, other storage devices like CDs/DVDs, communication devices like Blue Tooth, network devices and more.

Cyberoam applies Layer 8 identity-based policies based on type of media whether the user is within or outside the network, preventing data leakage in the event of lost or stolen devices.


Cyberoam-EDP-Screen-Shot-Application-Statistics


























EDP Software Screen Shot - Applicaton Statstics



Key Highlights

Access Control over Removable Devices – Cyberoam endpoint Device Management allows or blocks access to the following removable devices based on white lists and blacklists of devices –
  • USB and other Storage Devices – Pen drives, hard disks, CDs/DVDs, tapes, PDAs, smart phones and more
  • Communication Devices – Wi-Fi, Bluetooth adapters, etc.
  • Network Devices – Wireless or Virtual LAN adapters
  • Dial-up Connections
Layer 8 Identity-Based Policies – Cyberoam supports the creation of Layer 8 identity-based policies with the following rules –
  • Individual users and groups based on work profile and hierarchy
  • Time of the day
  • Expiry time for temporary policies
Logging-Reporting-Alerts – Cyberoam endpoint Device Management supports immediate action and policy updation, offers complete audit trail and aids forensic analysis through –
  • Comprehensive, archived logs related to access of removable media inside and outside the network
  • Administrator alerts and warning messages to users


Application Control

Allow only authorized applications

Cyberoam’s endpoint Application Control regulates access to applications like email, IM, P2P, FTP, gaming, preventing data leakage and malware entry while enhancing employee productivity.

Cyberoam’s Layer 8 controls over individual users and groups offer granular controls and visibility, supporting organizational efforts to meet regulatory compliance requirements of HIPAA, PCI DSS, GLBA.


Cyberoam-EDP-Screen-Shot-Application-Policy



























EDP Software Screen Shot - Application Policy



Key Highlights

Application Classes – Cyberoam’s endpoint Application Control allows or blocks access to applications whether the endpoint is within or outside the network based on –

  • White lists and blacklists of application classes which include–
    • Browsing, IM, P2P
    • Corporate applications like ERP, CRM, Email, FTP
    • Entertainment, games
    • Custom classes relevant to the organization
  • Layer 8 Identity-based policies for users and groups based on work profile, department, hierarchy
  • Time of the day
  • Expiry time for temporary policies

Endpoint application control based on application classes allows administrators to minimize data leakage and malware incidence while enhancing employee productivity.

Logging-Reporting-Alerts

  • Cyberoam endpoint Application Control logs application access by users with time of access, system, user and application name, enabling managers to assess employee work pattern
  • It also provides customized alerts to administrators and warning messages to users in case of unauthorized access to applications


Asset Management

Efficiently manage IT infrastructure

Cyberoam's endpoint Asset Management for Windows offers centralized and automated hardware and software asset management, including inventory, patch and update management.

It streamlines IT infrastructure management, prevents the deployment of illegal and unauthorized applications by users, lowering malware incidence, legal liability and operational costs.

Through agent installation over Windows endpoints, Asset Management discovers the hardware and software components, minimizes the complexity involved in manual Asset Management of hundreds and thousands of endpoints at distributed locations, lowers the need for technical resources and ensures higher accuracy.


Cyberoam-EDP-Screen-Shot-Vulnerability



























EDP Software Screen Shot - Vulnerabilty


  
Key Highlights

Asset Types – Cyberoam endpoint Asset Management provides automated inventory tracking of the following hardware and software asset types, in addition to providing information regarding license renewal dates, asset location, configuration, version tracking and historical information –

  • Hardware Assets – CPU, memory, network adapter, disks, motherboard, integrated peripherals like sound card, keyboard, modem
  • Software Assets – Operating system, anti-virus, applications, Microsoft patches
  • Custom Assets – Printers, switches, routers.
Cyberoam also provides automatic collection of endpoint information related to hardware configuration and list of installed applications in addition to preventing download of illegal applications.

Patch Management – Cyberoam provides information regarding systems vulnerable to malware attacks while providing automated and centralized Windows patch management with –

  • Periodic checks for Windows patches
  • Auto patch download, distribution and centralized installation by nodes

It prevents malware attacks and helps organizations meet security compliance requirements.

Remote Deployment Support

  • Cyberoam can perform remote installation of new Microsoft Software Installation-based applications, eliminating the need for physical presence of the endpoint
  • It creates pre-specified packages and performs bulk deployment of these applications remotely
Reporting
  • Cyberoam’s endpoint Asset Management module provides in-depth reporting of hardware and software assets which can be exported to CSV, XLS or HTML formats
  • These reports are helpful in audit, forensics and compliance requirements

Product Reviews








Overall Rating
5 stars out of 6

Features & Design
6 stars out of 6

Value for Money
4 stars out of 6

Ease of Use
5 stars out of 6

Verdict: Cyberoam takes endpoint control to the next level with a remarkable range of security features

Full Review: click here or Logo.









Features
Review-Ratings-SC-5-Stars

Ease of Use
Review-Ratings-SC-5-Stars

Performance
Review-Ratings-SC-5-Stars

Documentation
Review-Ratings-SC-5-Stars

Support
Review-Ratings-SC-5-Stars

Value for Money
Review-Ratings-SC-5-Stars

Overall Rating

Review-Ratings-SC-5-Stars

For: Easy to use with a lot of features.
Against: None that we found.
Verdict: For its ease of use and strong feature set, we make this one our Recommended product this month.

Full Review
: click here or Logo.



Cyberoam-Banner-Awards-Certifications






Home | Products | Solutions | Contact Us | Resources
Site Map