At Petrel were proud to introduce CYBEROAM Firewall Technology

crappliancestack

Petrel Computers are Cyberoam GOLD Certified partners.

Cyberoam offers comprehensive network, web content, application and email security while providing secure remote access and data leakage prevention.

Cyberoam’s centralized management enables organizations to implement high levels of security with visibility across global locations.

Cyberoam allows you to see exactly what your employees are doing to maintain the highest level of productivity. With Layer 8 Identity-based policies, Cyberoam offers strong protection while retaining business flexibility based on work profiles. By providing comprehensive security over a single appliance, it minimizes capital and operational expense and simplifies security implementation.

Cyberoams Legendary Layer 8 Technology

Current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. An organization's overall security is only as strong as its weakest link – the user.In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology has been derived out of the need for a more robust network security system which can include a user's human identity as part of the firewall rule matching criteria.

By definition, Cyberoam UTM’s Layer 8 Technology treats user identity the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.

Benefits: 

Identification of attackers/victims with username

  • Instant visibility for administrators into source of attacks
  • Controlling who is doing what in the network
  • Allowing creation of identity-based policies
  • Reporting to track identity-based usage, problems, intrusions and so forth.

 

Integrated security over single Cyberoam UTM – The Layer 8 technology penetrates through each and every security module of Cyberoam UTM. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement - joiner, leaver, rise in hierarchy etc.

Adding Speed to security – Due to the lack of granular identity features, IT teams often waste time in knowing source of attacks and attackers in case of a security incident. Since Layer 8 offers instant visibility into source of attacks while identifying victims/attackers by username, which allows proactive remediation of security incidents. Thus adds speed to security. 

Security in Wi-Fi environments– Cyberoam secures organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Guest and Employee network access. 

Boosting productivity– Cyberoam’s content and application filtering feature manages indiscriminate Internet surfing by users through custom policy setting  for users and groups, thereby setting access limitations based on time duration and predefined blocked sites across 82+ categories. Cyberoam UTM also has a user, time and role-based bandwidth management approach which prevents users from consuming huge amounts of bandwidth for non-productive surfing and downloads. Instant Messaging Controls allow administrators to control who can chat with whom over text chat, webcam, file transfer. 

Cyberoam iView logging and reporting– Cyberoam’s Layer 8 identity-based reporting, Cyberoam iView, pinpoints precise network activity for each and every user. Its dashboard shows all network attacks on a single screen with third level drill-down reports (1000+ reports) for investigating the attacks, and the users behind them. 

banner-cyberoam

Members Online

We have 5 guests and no members online

Alerts and Notifications

Subscribe and keep up to date product info and updates