Cyberoam Technologies, a Sophos subsidiary,[1] is a global network security appliances provider, with presence in more than 125 countries.

IndustryNetwork security, Computer Security, antivirus, computer software
FounderHemal Patel
Ben Casado
HeadquartersAhmedabad, (India)
ProductsFirewall, Unified Threat Management for network security, Cyberoam Central Console for centralized security management, Cyberoam iView for centralized visibility, Cyberoam NetGenie for secure homes and small offices
Number of employees
550+ (Q3 2014)

Business fieldEdit

The company offers User Identity-based network security in its Firewalls and Unified Threat Management appliances, allowing visibility and granular control into users' activities in business networks.[2] For SOHO, SMB and large enterprise networks, this ensures security built around the network user for protection against APTs, insider threats, malware, hacker, and other sophisticated network attacks.

Cyberoam has sales offices in North America, EMEA and APAC. The company has its customer support and development centers in India and has 550+ employees across the globe. It has a channel-centric approach for its sales[3] with a global network of 4500+ partners. The company also conducts training programs for its customers and partners.

Product overviewEdit

Cyberoam’s product range offers network security (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam NetGenie for home and small office networks.

Cyberoam network security appliances include multiple features like Firewall – VPN (SSL VPN and IPSec), Gateway Anti-Virus, Anti-Spyware and Anti-Spam, Intrusion Prevention System (IPS), Content and Application Filtering, Web Application Firewall, Application Visibility and Control, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover,[4] over a single platform.

Identity based security – Layer-8 technologyEdit

Cyberoam's Layer 8 Technology[5] also known as Identity based Security, adds an 8th Layer[6] (HUMAN layer) in the network protocol stack, thereby considering user’s identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing and auditing (AAA), the network allowing a network administrator to see and control the ‘user’ on a network instead of just an IP address.[7] This enables the administrators to identify users, control Internet activity of users in the network, set user based policies and reporting by username.

Cyberoam security training academyEdit

Cyberoam has tied up with NESCOT (North East Surrey College of Technology) – its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which includes basic-level course namely 'CCNSP' (Cyberoam Certified Security Professional)[8] and advanced-level course namely 'CCNSE' (Cyberoam Certified Security Expert).[9]

Security flaw in HTTPS traffic inspectionEdit

A Tor Project researcher and a Google software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default.[10]

This made it possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device – or, indeed, to extract the key from the device and import it into other DPI deep packet inspection devices, and use those for interception.[11]

Cyberoam issued an over-the-air (OTA) update for its unified threat management (UTM) appliances[12] in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks.[13] After the hotfix was applied,[14] each individual appliance was required to have its unique CA certificate.


  1. ^ Sophos Acquires Cyberoam Technologies - Cyberoam Press Release, 10 Feb 2014
  2. ^ UTM Reviews - By Peter Stephenson, SC Magazine, 1 December 2011
  3. ^ Cyberoam to increase partner base by 25% before March 2012 - By ChannelWorld Bureau, 22 Feb 2012
  4. ^ Cyberoam CR1000ia-Product Review - By Peter Stephenson, SC Magazine, 5 Jan 2012
  5. ^ Cyberoam Layer 8 Technology - MintmTEC
  6. ^ Cyberoam Layer 8 Technology Archived 2014-01-15 at the Wayback Machine - ESDS Forums, 29 December 2011
  7. ^ Cyberoam UTM Appliance Family Archived 2013-05-31 at the Wayback Machine - ICSA Labs, 2011
  8. ^ Cyberoam Certified Network & Security Professional (CCNSP) Archived 2014-09-21 at the Wayback Machine - CourseKing, Nescot
  9. ^ Cyberoam CCNSE training - VCW Security
  10. ^ TOR project uncovers flaw in mass-surveillance appliance - By Cory Doctorow, Boing Boing, 3 July 2012
  11. ^ Cyberoam deep packet inspection and certificates - By Nathan Willis, LWN, 11 July 2012
  12. ^ Cyberoam updates UTM certs to avoid traffic snooping - By Darren Pauli, SC Magazine Australia, 11 July 2012
  13. ^ Cyberoam’s Proactive Steps in HTTPS Deep Scan Inspection Archived 2013-05-07 at the Wayback Machine - Cyberoam Blog, 9 July 2012
  14. ^ Cyberoam Fixes SSL Snooping Hole in Network Security Appliances - By Lucian Constantin, IDG News Service, 9 Jul 2012