BANGALORE, INDIA: In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology over its network security appliances (UTM appliances and Next Generation Firewalls) has been derived out of the need for a more robust network security system which can include a user’s human identity as part of the firewall rule matching criteria.
By definition, Cyberoam Layer 8 Technology over its network security appliances treat user identity the 8th layer or the "human layer" in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.
Benefits
Identification of attackers/victims with username
Instant visibility for administrators into source of attacks
Controlling who is doing what in the network
Allowing creation of identity-based policies
Reporting to track identity-based usage, problems, intrusions and so forth.
Integrated security over single Cyberoam network security appliances (UTM, NGFW)
– The Layer 8 technology penetrates through each and every security module of Cyberoam security appliances. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement – joiner, leaver, rise in hierarchy etc.
Security in Wi-Fi environments – Cyberoam secures organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Guest and Employee network access.