Cyberoam promotes identity-based security software

23.12.2008
The traditional approach of deploying just firewalls and anti-virus solutions is no longer sufficient in protecting the corporate network and, thus, enterprises need multiple security solutions to combat blended network threats.

Kunal Popat, Cyberoam's manager for business development, said that network threats are becoming increasingly sophisticated as attackers launch targeted attacks using blended forms. A combination of external threats like viruses, worms, spyware, Trojans, phishing, pharming and cross-site scripting haunt enterprise networks today.

On the data front, enterprise users pose the single largest threat to enterprise security as they have easy access to sensitive corporate information, applications and resources on the network and may compromise security out of ignorance or malicious intent.

"This is why an identity-based security solution that offers information on user identity and activity within the network is crucial for enterprises," Popat said, adding Cyberoam's patent pending identiy-based UTM offers IT security with business flexibility.

Cyberoam seeks to be the number one UTM player in the market as it offers to secure enterprises with its UTM appliance range. Popat announced the company is confident of reaching the No. 2 spot by 2010 and nail the No. 1 spot on 2014.

"We aim to be the number one in the next four years. Our difference is Cyberoam's UTM. We're the only company that offers identity-based UTM solutions in the world," Popat said, claiming that Cyberoam's price of UTM products is even more competitive.

Popat said Cyberoam targets a wide variety of users in the Philippines particularly the government and the corporate market.

"We've launched Cyberoam UTM in the Philippines last January 2008 and it has been a wonderful year for us," he said. "Some of our clients now in the Philippines are Banco De Oro (BDO), CDO Foodsphere, Inc., and the Philippine Daily Inquirer (PDI)."

He said among the Cyberoam features include Stateful Inspection Firewall, Virtual Private Network (VPN), Gateway Anti-Virus and Anti-Spyware, Gateway Anti-Spam, Intrusion Prevention System (IPS), Content and Application Filtering, Bandwidth Management, Multiple Link Management, and On-Appliance Reporting.

Cyberoam recently partnered with Inter-Island Information Systems, Inc. (Tri I) to be its local IT distributor in the Philippines.

Scott Gonzalo, CIO of Tri I, explains that Cyberoam's second generation UTM product refers to layered technology. He considers cyber bandwidth management as one of the most important capabilities of Cyberoam's UTM.

"You can control which of the users need more and those users who need less bandwith. You're also able to know what they are surfing, downloading. Everything," Gonzalo said. "You save a lot from this. You don't get more than what you need from bandwidth Internet providers. But the best thing is you can be sure of employee-efficiency."