Cyberoam Unified Threat Management appliances provide security, connectivity and productivity -- assurance -- to SMEs by allowing user identity-based policy controls and introducing Layer-8.
Cyberoam’s Layer 8 Technology considers "user-identity" as a new 8th Layer in the protocol stack, by considering a 7-Layer basic OSI Model. The layer is also defined with a name "HUMAN layer". The Layer is defined such that there will be a mapping from IP address and user name corresponds to Layer-8, which actually increases security, by taking organizations a step ahead of conventional security solutions of considering IP-address based security.
The new concept provides efficiency with increasing speed to an security services by offering instant visibility to the source by username and not by conventional IP address methods. The Layer 8 technology allows creation of identity-based security policies. Cyberoam’s Extensible Security Architecture (ESA) offers an extensible platform without degrading system performance. The supporting feature enhancements to ESA, can be developed rapidly and deployed with minimum efforts.
No comments:
Post a Comment