||This article has multiple issues. Please help improve it or discuss these issues on the talk page.
|Founders||Hemal Patel, Ben Casado|
|Key people||CEO: Hemal Patel|
|Investors||The Carlyle Group|
|Products||Cyberoam Unified Threat Management for network security, Cyberoam Central Console for centralized security management, Cyberoam iView for centralized visibility, Cyberoam NetGenie for homes and small offices|
|Employees||450+ (Q1 2013)|
Cyberoam is a network security company based in New Jersey, United States, founded by Hemal Patel and Ben Casado, in 1999 as a part of Elitecore Technologies Pvt. Ltd. Cyberoam is into network security and offers solutions and integrated security appliances, under the banner of Unified Threat Management.
Cyberoam has sales offices located in various locations at regions including North America, EMEA and APAC. It has its customer support and development centers in India and has 450+ employees across the globe. It has a channel-centric approach for its sales and has a global network of 4500+ partners. It offers periodic training programs to its customers and partners.
Cyberoam’s product range offers solutions for network security (Cyberoam UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized logging and reporting (iView appliance and open source software), endpoint data protection (Cyberoam Endpoint Data Protection appliances).
Cyberoam UTM appliances include multiple features like Firewall – VPN (SSL VPN & IPSec), Gateway Anti-Virus, Anti-Spyware & Anti-Spam, Intrusion Prevention System (IPS), Content & Application Filtering, Web Application Firewall, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover, over a single platform.
Cyberoam's application control options like Instant Messaging (IM) Archiving & Control offer control over chat, file transfer and audio-video over IMs; managing http upload by blocking attachments over emails and stopping file transfers over P2P.
Cyberoam UTM’s on-appliance reporting gives details on every type of attack, vector, attacker details,victim details and also graphically represents the general security trends in organization. Cyberoam solutions aid the compliance regulatory needs of organizations.
Identity based Security- Layer 8 Technology
Cyberoam's Layer 8 Technology also known as Identity based Security, adds an 8th Layer (HUMAN layer) in the network protocol stack, thereby considering user’s identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing & auditing (AAA), the network allowing a network administrator to see and control the ‘user’ on a network instead of just an IP address. This enables the administrators to identify users, control Internet activity of users in the network, set user based policies and reporting by username.
Cyberoam Security Training Academy
In order to propagate knowledge on Identity-based technology among upcoming IT and networking students, Cyberoam has tied up with NESCOT (North East Surrey College of Technology) -its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which includes basic-level course namely 'CCNSP' (Cyberoam Certified Security Professional) and advanced-level course namely 'CCNSE' (Cyberoam Certified Security Expert).
Cyberoam addresses the industry-prevalent security flaw in HTTPs scan
A Tor Project researcher and a Google software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default. This made it possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device - or, indeed, to extract the key from the device and import it into other DPI deep packet inspection devices, and use those for interception.
Although Cyberoam was singled out in this case, as the whole industry uses the same methodology of shipping a default CA certificate with appliances that are capable of performing SSL traffic inspection, Cyberoam fixed the hole in network security appliances inspecting the HTTPS traffic by releasing an OTA on an immediate basis that put the Cyberoam appliances at a greater security level than the rest of the industry that does HTTPS deep scan.
Cyberoam issued an over-the-air (OTA) update for its unified threat management (UTM) appliances in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks. After the hotfix was applied, each individual appliance was required to have its unique CA certificate.
|This article has not been added to any categories. Please help out by adding categories to it so that it can be listed with similar articles. (May 2013)|