Cyberoam Layer 8 Technology

October 17, 2011

Cyberoam Layer 8 Technology

This the only layer 8 based UTM in the market at present, it allows you to see the ‘user’ on a network instead of just an IP address, giving IT managers instant visibility & proactive controls over security breaches as they no longer have to decipher which IP address belongs to who. By implementing Layer 8 security in their networks, administrators can gain real – time visibility into the online activity of users while creating security policies based on usernames.

Cyberoam’s Layer 8 Concept was developed out of the need for a more robust network security system capable of considering user’s identity as part of the firewall rule matching criteria. It treats user identity as the 8th Layer or the HUMAN layer in the network protocol stack, thus, attaching user identity to security while authenticating, authorising & auditing the network.

Layer 8 allows the administrator to create a permanent profile for the user which makes all future authentication possible based on identity based decision parameters such as username, IP address, MAC address & session ID. The profile is specific to the user & does not change regardless of what machine they operate from in the organisation.

Cyberoam UTM delivers the complete range of security features such as stateful inspection firewall, VPN, gateway anti-virus, gateway anti-malware, gateway anti-spam, and intrusion prevention system, content filtering in addition to bandwidth management and multiple link management over a single platform