Thursday 6 August 2015

Cyberoam - the next gen firewall


There are a lot of changes going on within the Cyber world and many shifts related to how applications are used and transported.

Whilst this change is an advantage from a useability perspective, it also changes how information security is handled which to some extent is a nightmare, even for security experts.

Firewalls are an essential part of network security, but most are very limited. Traditional firewalls can close unneeded ports, apply routing rules to packets and fend off denial-of-service attacks. But they can’t look inside packets to detect malware, identify hacker activity or help you manage what end users are doing on the Internet.

This has led to the rise of “Next-Generation Firewalls”. These provide multiple network security technologies in one package, combining the features of traditional firewalls, gateway anti-malware products, intrusion prevention systems and content filtering packages. All of these security technologies can be installed, configured, deployed and managed as a unit, greatly reducing administrative costs.

Cyberoam is Myriad IT's preferred nextGen firewall. It is tightly integrated with features like Application Visibility & Control, VPN (IPSec & SSL VPN), Intrusion Prevention System, Web Filtering, Bandwidth Management, Anti-Virus & Anti-Spyware, Anti-Spam, and Multiple Link Management to provide unified security.
Layer 1 to Human Layer 8 Firewall 

Firewall security extended to layer 8
The Cyberoam Firewall implements policies based on the Physical Layer 1 to Application Layer 7 and Human Layer 8 with User Identity in addition to source, destination zone, IP address and application. It enables organisations to control access to network resources based on the user identity, work profile and application access requirement of external users like customers and partners, internal LAN users and employees outside the perimeter like road warriors, telecommuters.

It also offers user identity-based security in dynamic Wi-Fi, DHCP and shared endpoint environments.


Intrusion Prevention System

Cyberoam offers advanced Intrusion Prevention System (IPS) carrying thousands of signatureswith human and application layer policies to automatically detect and block intrusions, IM and P2P exploits, backdoor attacks and other malware. Cyberoam’s IPS carries HTTP proxy signatures and custom signature capability, offering customized protection to meet the unique security requirements of each organization.

Application Visibility & Control

With an industry-leading coverage of 2000+ applications, Cyberoam's Application Visibility & Control feature enables prioritisation of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.

First-of-its-kind On-appliance Reporting


Cyberoam is the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organisations to manage security, display compliance and forensic analysis.

Cyberoam reports are unmatched by any network security vendor to date and include dynamic and animated reports, in-line graphs, and country map.

Web Filtering

Cyberoam's award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 89+ categories. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Web Application Firewall
Cyberoam offers an on-appliance Web Application Firewall subscription to secure websites and Web-based applications in organizations against attacks such as SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows, and more, including the OWASP Top 10 Web application vulnerabilities.



Dean Leong - Myriad IT Infrastructure Services Practice Lead

Contact us to learn more about how Cyberoam could be of benefit to your business


2 comments: