Cyberoam Technologies, a Sophos subsidiary,[1] is a global network security appliances provider, with presence in more than 125 countries.

Company typePrivate
IndustryNetwork security, Computer Security, antivirus, computer software
FounderHemal Patel
Ben Casado
HeadquartersAhmedabad, (India)
ProductsFirewall, Unified Threat Management for network security, Cyberoam Central Console for centralized security management, Cyberoam iView for centralized visibility, Cyberoam NetGenie for secure homes and small offices
Number of employees
550+ (Q3 2014)

Business field edit

The company offers user identity-based network security in its firewalls and Unified Threat Management appliances, allowing visibility and granular control of users' activities in business networks.[2] For SOHO, SMB and large enterprise networks, this ensures security built around the user for protection against APTs, insider threats, malware, hackers, and other sophisticated network attacks.

Cyberoam has sales offices in North America, EMEA and APAC. The company has customer support and development centers in India with 550+ employees around the globe. It has a channel-centric approach for its sales[3] with a global network of 4500+ partners. The company also conducts training programs for its customers and partners.

Product overview edit

Cyberoam's product range offers network security (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView), and Cyberoam NetGenie for home and small office networks.

Cyberoam network security appliances include multiple features like a Firewall – VPN (SSL VPN and IPSec), Gateway Anti-Virus, Anti-Spyware and Anti-Spam, Intrusion Prevention System (IPS), Content and Application Filtering, Web Application Firewall, Application Visibility and Control, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover,[4] over a single platform.

Identity based security – Layer-8 technology edit

Cyberoam's Layer 8 Technology[5] also known as Identity based Security, adds an 8th Layer[6] (HUMAN layer) in the network protocol stack, thereby considering user's identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing and auditing (AAA) the network, allowing a network administrator to see and control a "user" in a network instead of an IP address.[7] This enables administrators to identify users, control their Internet activity, set user-based policies and allows reporting by username.

Cyberoam security training academy edit

Cyberoam has affiliations with NESCOT (North East Surrey College of Technology) – its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which include an entry-level class named 'CCNSP' (Cyberoam Certified Security Professional)[8] and an advanced-level course named 'CCNSE' (Cyberoam Certified Security Expert).[9]

Security flaw in HTTPS traffic inspection edit

A Tor Project researcher and a Google software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default.[10] This made it possible to intercept traffic from any owner of a Cyberoam device using another Cyberoam device – or even to extract the key from the device and import it into other DPI devices, and use those for interception.[11]

In response, Cyberoam issued an over-the-air update for its unified threat management (UTM) appliances[12] in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks.[13] After the hotfix was applied,[14] each individual appliance was required to have a unique CA certificate.

References edit

  1. ^ Sophos Acquires Cyberoam Technologies - Cyberoam Press Release, 10 Feb 2014
  2. ^ UTM Reviews - By Peter Stephenson, SC Magazine, 1 December 2011
  3. ^ Cyberoam to increase partner base by 25% before March 2012 Archived 2015-04-02 at the Wayback Machine - By ChannelWorld Bureau, 22 Feb 2012
  4. ^ Cyberoam CR1000ia-Product Review - By Peter Stephenson, SC Magazine, 5 Jan 2012
  5. ^ Cyberoam Layer 8 Technology Archived 2014-01-16 at the Wayback Machine - MintmTEC
  6. ^ Cyberoam Layer 8 Technology Archived 2014-01-15 at the Wayback Machine - ESDS Forums, 29 December 2011
  7. ^ Cyberoam UTM Appliance Family Archived 2013-05-31 at the Wayback Machine - ICSA Labs, 2011
  8. ^ Cyberoam Certified Network & Security Professional (CCNSP) Archived 2014-09-21 at the Wayback Machine - CourseKing, Nescot
  9. ^ Cyberoam CCNSE training Archived 2016-10-23 at the Wayback Machine - VCW Security
  10. ^ TOR project uncovers flaw in mass-surveillance appliance - By Cory Doctorow, Boing Boing, 3 July 2012
  11. ^ Cyberoam deep packet inspection and certificates - By Nathan Willis, LWN, 11 July 2012
  12. ^ Cyberoam updates UTM certs to avoid traffic snooping - By Darren Pauli, SC Magazine Australia, 11 July 2012
  13. ^ Cyberoam’s Proactive Steps in HTTPS Deep Scan Inspection Archived 2013-05-07 at the Wayback Machine - Cyberoam Blog, 9 July 2012
  14. ^ Cyberoam Fixes SSL Snooping Hole in Network Security Appliances - By Lucian Constantin, IDG News Service, 9 Jul 2012