Cyberoam Threat Research Labs
   HOME

TheInfoList



OR:

Cyberoam Technologies, a
Sophos Sophos Group plc is a British based security software and hardware company. Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management. Sophos is primarily ...
subsidiary, is a global network security appliances provider, with presence in more than 125 countries.


Business Field

The company offers User Identity-based network security in its Firewalls/ Unified Threat Management appliances, allowing visibility and granular control into users' activities in
business networks A business network is a complex network of companies, working together to accomplish certain objectives. These objectives, which are strategic and operational, are adopted by business networks based on their role in the market. There are two categ ...
. For SOHO, SMB and large enterprise networks, this ensures security built around the network user for protection against APTs, insider threats,
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
, hacker, and other sophisticated network attacks. Cyberoam has sales offices in
North America North America is a continent in the Northern Hemisphere and almost entirely within the Western Hemisphere. It is bordered to the north by the Arctic Ocean, to the east by the Atlantic Ocean, to the southeast by South America and the Car ...
, EMEA and
APAC Apac is a town in Apac District in the Northern Region of Uganda. It is the 'chief town' of the district and the district headquarters are located there. The district is named after the town. Location Apac is located approximately , by road ...
. The company has its customer support and development centers in India and has 550+ employees across the globe. It has a channel-centric approach for its sales with a global network of 4500+ partners. The company also conducts training programs for its customers and partners.


Product Overview

Cyberoam’s product range offers network security (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam
NetGenie NetGenie is a wireless router that offers security and protection against internet and network threats. It is a part of the Cyberoam's product portfolio and was launched in 2011. Product Range Considering the product range, NetGenie offers ...
for home and small office networks. Cyberoam network security appliances include multiple features like Firewall – VPN (SSL VPN & IPSec), Gateway Anti-Virus, Anti-Spyware & Anti-Spam, Intrusion Prevention System (IPS), Content & Application Filtering, Web Application Firewall, Application Visibility & Control, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover, over a single platform.


Identity based Security- Layer 8 Technology

Cyberoam's Layer 8 Technology also known as
Identity based Security Identity-based security is a type of security that focuses on access to digital information or services based on the authenticated identity of an individual. It ensures that the users of these digital services are entitled to what they receive. T ...
, adds an 8th Layer (HUMAN layer) in the
network protocol stack The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the ''suite'' is the definition of the communication proto ...
, thereby considering user’s identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing & auditing (AAA), the network allowing a network administrator to see and control the ‘user’ on a network instead of just an IP address. This enables the administrators to identify users, control Internet activity of users in the network, set user based policies and reporting by username.


Cyberoam Security Training Academy

Cyberoam has tied up with NESCOT (North East Surrey College of Technology) -its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which includes basic-level course namely 'CCNSP' (Cyberoam Certified Security Professional) and advanced-level course namely 'CCNSE' (Cyberoam Certified Security Expert).


Security flaw in HTTPS traffic inspection

A Tor Project researcher and a Google software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default. This made it possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device - or, indeed, to extract the key from the device and import it into other DPI deep packet inspection devices, and use those for interception. Cyberoam issued an over-the-air (OTA) update for its unified threat management (UTM) appliances in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks. After the hotfix was applied,Cyberoam Fixes SSL Snooping Hole in Network Security Appliances
- By Lucian Constantin, IDG News Service, 9 Jul 2012 each individual appliance was required to have its unique CA certificate.


References


Cyberoaks - Official Website
Computer security companies Networking hardware companies Software companies established in 1999 1999 establishments in Gujarat