Cyberoam Layer 8 Technology

Security built around the user’s identityLayer 8 Technology

Current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. An organization’s overall security is only as strong as its weakest link – the user.

In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology over its network security appliances (UTM appliances and Next Generation Firewalls) has been derived out of the need for a more robust network security system which can include a user’s human identity as part of the firewall rule matching criteria.

By definition, Cyberoam Layer 8 Technology over its network security appliances treat user identity the 8th layer or the "human layer" in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.

Benefits

  • Identification of attackers/victims with username
  • Instant visibility for administrators into source of attacks
  • Controlling who is doing what in the network
  • Allowing creation of identity-based policies
  • Reporting to track identity-based usage, problems, intrusions and so forth.

Integrated security over single Cyberoam network security appliances (UTM, NGFW) – The Layer 8 technology penetrates through each and every security module of Cyberoam security appliances. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement – joiner, leaver, rise in hierarchy etc.

Adding Speed to security – Due to the lack of granular identity features, IT teams often waste time in knowing source of attacks and attackers in case of a security incident. Since Layer 8 offers instant visibility into source of attacks while identifying victims/attackers by username, which allows proactive remediation of security incidents. Thus adds speed to security.

Security in Wi-Fi environments – Cyberoam secures organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Guest and Employee network access.

Boosting productivity – Cyberoam’s content and application filtering feature manages indiscriminate Internet surfing by users through custom policy setting for users and groups, thereby setting access limitations based on time duration and predefined blocked sites across 82+ categories.

Cyberoam network security appliances also offer a user, time and role-based bandwidth management approach which prevents users from consuming huge amounts of bandwidth for non-productive surfing and downloads. Instant Messaging Controls allow administrators to control who can chat with whom over text chat, webcam, file transfer.

Cyberoam iView logging and reporting – Cyberoam’s Layer 8 identity-based reporting, Cyberoam iView, pinpoints precise network activity for each and every user. Its dashboard shows all network attacks on a single screen with third level drill-down reports (1200+ reports) for investigating the attacks, and the users behind them.

Regulatory Compliance – Through Layer 8 identification and controls, Cyberoam network security appliances enable enterprises to comply with regulatory compliance norms such as HIPAA, CIPA, PCI-DSS, GLBA, etc.