Cyberoam
   HOME

TheInfoList



OR:

Cyberoam Technologies, a Sophos subsidiary, is a global
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
appliances provider, with presence in more than 125 countries.


Business Field

The company offers User Identity-based network security in its Firewalls/ Unified Threat Management appliances, allowing visibility and granular control into users' activities in business networks. For
SOHO Soho is an area of the City of Westminster, part of the West End of London. Originally a fashionable district for the aristocracy, it has been one of the main entertainment districts in the capital since the 19th century. The area was develo ...
, SMB and large
enterprise Enterprise (or the archaic spelling Enterprize) may refer to: Business and economics Brands and enterprises * Enterprise GP Holdings, an energy holding company * Enterprise plc, a UK civil engineering and maintenance company * Enterpris ...
networks, this ensures security built around the network user for protection against APTs, insider threats, malware,
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
, and other sophisticated network attacks. Cyberoam has sales offices in North America,
EMEA EMEA is a shorthand designation meaning Europe, the Middle East and Africa. The acronym is used by institutions and governments, as well as in marketing and business when referring to this region: it is a shorthand way of referencing the two ...
and
APAC Apac is a town in Apac District in the Northern Region of Uganda. It is the 'chief town' of the district and the district headquarters are located there. The district is named after the town. Location Apac is located approximately , by road ...
. The company has its
customer support Customer support is a range of services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, troubleshooting, maintenance, upgrading, and disposal of a product. Reg ...
and development centers in
India India, officially the Republic of India (Hindi: ), is a country in South Asia. It is the seventh-largest country by area, the second-most populous country, and the most populous democracy in the world. Bounded by the Indian Ocean on the so ...
and has 550+ employees across the globe. It has a channel-centric approach for its sales with a global network of 4500+ partners. The company also conducts training programs for its customers and partners.


Product Overview

Cyberoam’s product range offers network security (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam
NetGenie NetGenie is a wireless router that offers security and protection against internet and network threats. It is a part of the Cyberoam's product portfolio and was launched in 2011. Product Range Considering the product range, NetGenie offers ...
for home and small office networks. Cyberoam network security appliances include multiple features like Firewall –
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
(SSL VPN & IPSec), Gateway
Anti-Virus Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
,
Anti-Spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their priva ...
&
Anti-Spam Various anti-spam techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) as opposed to ...
,
Intrusion Prevention System An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
(IPS), Content & Application Filtering,
Web Application Firewall A web application firewall (WAF) is a specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service. By inspecting HTTP traffic, it can prevent attacks exploiting a web application's known v ...
, Application Visibility & Control,
Bandwidth Management Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link,https://www.internetsociety.org/wp-content/uploads/2017/08/BWro ...
, Multiple Link Management for Load Balancing and Gateway Failover, over a single platform.


Identity based Security- Layer 8 Technology

Cyberoam's Layer 8 Technology also known as Identity based Security, adds an 8th Layer (HUMAN layer) in the network protocol stack, thereby considering user’s identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing & auditing (AAA), the network allowing a
network administrator A network administrator is a person designated in an organization whose responsibility includes maintaining computer infrastructures with emphasis on local area networks (LANs) up to wide area networks (WANs). Responsibilities may vary between org ...
to see and control the ‘user’ on a network instead of just an
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
. This enables the administrators to identify users, control Internet activity of users in the network, set user based policies and reporting by
username A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), accoun ...
.


Cyberoam Security Training Academy

Cyberoam has tied up with NESCOT (North East Surrey College of Technology) -its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which includes basic-level course namely 'CCNSP' (Cyberoam Certified Security Professional) and advanced-level course namely 'CCNSE' (Cyberoam Certified Security Expert).


Security flaw in HTTPS traffic inspection

A
Tor Project Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
researcher and a
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default. This made it possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device - or, indeed, to extract the key from the device and import it into other DPI
deep packet inspection Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is oft ...
devices, and use those for interception. Cyberoam issued an over-the-air (OTA) update for its unified threat management (UTM) appliances in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks. After the hotfix was applied,Cyberoam Fixes SSL Snooping Hole in Network Security Appliances
- By Lucian Constantin, IDG News Service, 9 Jul 2012 each individual appliance was required to have its unique CA certificate.


References


Cyberoaks - Official Website
Computer security companies Networking hardware companies Software companies established in 1999 1999 establishments in Gujarat