Advertisment

Cyberoam lets you build security around the user’s identity

In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology

author-image
Sanghamitra Kar
New Update
ID

BANGALORE, INDIA: In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology over its network security appliances (UTM appliances and Next Generation Firewalls) has been derived out of the need for a more robust network security system which can include a user’s human identity as part of the firewall rule matching criteria.

Advertisment

By definition, Cyberoam Layer 8 Technology over its network security appliances treat user identity the 8th layer or the "human layer" in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.

Benefits

 Identification of attackers/victims with username

 Instant visibility for administrators into source of attacks

 Controlling who is doing what in the network

 Allowing creation of identity-based policies

 Reporting to track identity-based usage, problems, intrusions and so forth.

Advertisment

Integrated security over single Cyberoam network security appliances (UTM, NGFW)

– The Layer 8 technology penetrates through each and every security module of Cyberoam security appliances. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement – joiner, leaver, rise in hierarchy etc.

Security in Wi-Fi environments – Cyberoam secures organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Guest and Employee network access.

tech-news security wi-fi networking