Cyberoam delivers comprehensive Application Security against, malware, intrusions, data leakage and attempts to exploit web application vulnerabilities. It controls unauthorised application usage while supporting business-critical applications, secure collaboration, Cloud and SaaS adoption.
Application Visibility & Control
Cyberoam’s Layer 7 capabilities identify and control applications which use standard Port 80, 443, non-standard ports, port hopping or tunnel through encrypted SSL traffic. The feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Applications can be classified based on their risk level, characteristics and technology, offering more granular controls. Cyberoam implements application-based Bandwidth Management, accelerating critical applications while blocking malware-laden sites through Web Filtering. Organizations can group applications as per their requirements into business-critical, entertainment, communication, collaboration and control access through Firewall policies.
Cyberoam allows the creation of Firewall rules based on Application-User-Time-Bandwidth, ensuring assured bandwidth for business-critical applications and minimizing the peaks and troughs of bandwidth consumption.
Web Application Firewall
Cyberoam offers on-appliance WAF to protect websites and Web applications against exploitation of Web application vulnerabilities like SQL Injection, cross-site scripting, and other OWASP attacks.
Instant Messaging Controls
Cyberoam scans, logs and controls access to Instant Messaging applications like Yahoo Messenger and Windows Live Messenger. Organizations can implement Layer 8 Identity-based controls by username or IM address over:
- Access to IM applications
- Audio-video chat
- Conversations based on keywords
- File transfer
Data Leakage Prevention
Cyberoam’s Application Visibility & Control can block file transfer over webmails like Gmail and Yahoo, file sharing via P2P applications in addition to the above IM controls, preventing data leakage and helping organizations meet the requirements of regulatory compliance.
Cyberoam Firewall blocks games and tunneling software that result in malware entry. Cyberoam scans FTP and encrypted HTTPS / SSL traffic in addition to guarding against web application vulnerabilities which are exploited to launch backdoor, zero-hour attacks. It blocks anomalous traffic through its extensive and constantly updated database of IPS signatures.
Interested in Cyberoam? Call us know and see how we can help.