Home Products Solutions Contact Us Resources
e-NETSource Global Sourcing Solutions
Home
Products
Solutions
Contact Us
Resources
Cambium Networks
Cyberoam
Emerson Network Power
Ericsson
HUAWEI
Mitel
Netcomm Wireless
Proxim Wireless
Robustel
Siklu
ZyXEL
 
e-NETSource
SOURCING SOLUTIONS








PRODUCT RESOURCES

Cyberoam Portfolio






 












Cyberoam's Layer 8 Technology



Security built around the user's identity

Current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. An organization's overall security is only as strong as its weakest link – the user.







In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology has been derived out of the need for a more robust network security system which can include a user's human identity as part of the firewall rule matching criteria.

By definition, Cyberoam UTM’s Layer 8 Technology treats user identity the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.


Benefits

  • Identification of attackers/victims with username
  • Instant visibility for administrators into source of attacks
  • Controlling who is doing what in the network
  • Allowing creation of identity-based policies
  • Reporting to track identity-based usage, problems, intrusions and so forth.
Integrated security over single Cyberoam UTM – The Layer 8 technology penetrates through each and every security module of Cyberoam UTM. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement - joiner, leaver, rise in hierarchy etc.

Adding Speed to security – Due to the lack of granular identity features, IT teams often waste time in knowing source of attacks and attackers in case of a security incident. Since Layer 8 offers instant visibility into source of attacks while identifying victims/attackers by username, which allows proactive remediation of security incidents. Thus adds speed to security.

Security in Wi-Fi environments – Cyberoam secures organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Guest and Employee network access.

Boosting productivity – Cyberoam’s content and application filtering feature manages indiscriminate Internet surfing by users through custom policy setting for users and groups, thereby setting access limitations based on time duration and predefined blocked sites across 82+ categories.

Cyberoam UTM also has a user, time and role-based bandwidth management approach which prevents users from consuming huge amounts of bandwidth for non-productive surfing and downloads. Instant Messaging Controls allow administrators to control who can chat with whom over text chat, webcam, file transfer.

Cyberoam iView logging and reporting – Cyberoam’s Layer 8 identity-based reporting, Cyberoam iView, pinpoints precise network activity for each and every user. Its dashboard shows all network attacks on a single screen with third level drill-down reports (1000+ reports) for investigating the attacks, and the users behind them.

Regulatory Compliance – Through Layer 8 identification and controls, Cyberoam UTM appliances enable enterprises to comply with regulatory compliance norms such as HIPAA, CIPA, PCI-DSS, GLBA, etc.


Cyberoam-Banner-Awards-Certifications



Home | Products | Solutions | Contact Us | Resources
Site Map