Cyberoam UTM- Identity-based Security

“Current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. An organization's overall security is only as strong as its weakest link – the user.”

In order to have a thorough understanding and control secure access to data and systems within your organisation it is vitally important to be able to identify and authenticate users prior to them having network access. Traditionally this would be achieved by IP Address and provides little assurance of the true identity of the user other than to recognise their PC, or in some cases simply the network on which their PC resides. Firewalls and UTM appliances which require you to authenticate prior to connectivity come some way toward controlling access, but often fall short when there is a need to apply user specific security policies or to trace a user’s activity in the network. Cyberoam have addressed all of these issues by adopting user identity as being the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.


  • Identification of attackers/victims with username
  • Instant visibility for administrators into source of attacks
  • Controlling who is doing what in the network
  • Allowing creation of identity-based policies
  • Reporting to track identity-based usage, problems, intrusions and so forth

Cyberoam UTM appliances are feature rich and provide a unified solution to network security, connectivity and user productivity. The layer 8 technology penetrates through each security module thereby providing user-based controls across all features.


  • Firewall
  • Intrusion Prevention System
  • Wireless Security
  • Anti-Virus / Anti-Spyware
  • Anti-Spam
  • HTTPS/SSL Content Security
  • Next-Gen UI
  • iView Logging and Reporting


  • Multiple Link Management
  • High Availability
  • VPN
  • 3G/WiMAX Connectivity
  • IPv6 Ready


  • Content Filtering
  • Instant Messaging Archiving & Controls
  • Bandwidth Management
  • Traffic discovery
  • Application Layer 7 Management

Cyberoam iView logging and reporting – Cyberoam’s Layer 8 identity-based reporting, Cyberoam iView, pinpoints precise network activity for each and every user. Its dashboard shows all network attacks on a single screen with third level drill-down reports (1000+ reports) for investigating the attacks, and the users behind them.

Regulatory Compliance – Through Layer 8 identification and controls, Cyberoam UTM appliances enable enterprises to comply with regulatory compliance norms such as HIPAA, CIPA, PCI-DSS, GLBA, etc.

Network UTM Innovator - Cyberoam has been chosen as the Network UTM Innovator in the perimeter security category for the special year-end issue of SC Magazine. Cyberoam successfully met all the requirements of what the magazine was looking for in an Innovator, “a company that takes the business of security as seriously as the technology of security.”

Cookie Policy