Cyberoam's Layer 8 Technology
Security built around the user's identity
Current corporate policies surrounding network
security often neglect the most critical and weak security component:
the human element. An organization's overall security is only as strong
as its weakest link – the user.
In order to address the concerns of gaining visibility and
controls on user activity in the network, Cyberoam UTM’s Layer 8
technology has been derived out of the need for a more robust network
security system which can include a user's human identity as part of the
firewall rule matching criteria.
By definition, Cyberoam UTM’s Layer 8 Technology treats user
identity the 8th layer or the “human layer” in the network protocol
stack. This allows administrators to uniquely identify users, control
Internet activity of these users in the network, and enable
policy-setting and reporting by username.
- Identification of attackers/victims with username
- Instant visibility for administrators into source of attacks
- Controlling who is doing what in the network
- Allowing creation of identity-based policies
- Reporting to track identity-based usage, problems, intrusions and so forth.
Integrated security over single Cyberoam UTM –
The Layer 8 technology penetrates through each and every security
module of Cyberoam UTM. All security features can be centrally
configured and managed from a single firewall page with complete ease.
Layer 8 binds these security features to create a single, consolidated
security unit and enables the administrator to change security policies
dynamically while accounting for user movement - joiner, leaver, rise in
Adding Speed to security –
Due to the lack of granular identity features, IT teams often waste
time in knowing source of attacks and attackers in case of a security
incident. Since Layer 8 offers instant visibility into source of attacks
while identifying victims/attackers by username, which allows proactive
remediation of security incidents. Thus adds speed to security.
Security in Wi-Fi environments
– Cyberoam secures organizations in dynamic Wi-Fi environments where
it’s not easy to trace users by IP addresses alone. It offers strong
user authentication, Internet access controls and reports with
identity-based approach and offers separate Guest and Employee network
Boosting productivity –
Cyberoam’s content and application filtering feature manages
indiscriminate Internet surfing by users through custom policy setting
for users and groups, thereby setting access limitations based on time
duration and predefined blocked sites across 82+ categories.
Cyberoam UTM also has a user, time and role-based bandwidth
management approach which prevents users from consuming huge amounts of
bandwidth for non-productive surfing and downloads. Instant Messaging
Controls allow administrators to control who can chat with whom over
text chat, webcam, file transfer.
Cyberoam iView logging and reporting
– Cyberoam’s Layer 8 identity-based reporting, Cyberoam iView,
pinpoints precise network activity for each and every user. Its
dashboard shows all network attacks on a single screen with third level
drill-down reports (1000+ reports) for investigating the attacks, and
the users behind them.
Regulatory Compliance –
Through Layer 8 identification and controls, Cyberoam UTM appliances
enable enterprises to comply with regulatory compliance norms such as
HIPAA, CIPA, PCI-DSS, GLBA, etc.