Cyberoam
Cyberoam Technologies, a Sophos subsidiary,[1][2] is a global network security appliances provider, with presence in more than 125 countries. Business fieldThe company offers user identity-based network security in its firewalls and Unified Threat Management appliances, allowing visibility and granular control of users' activities in business networks.[3] For SOHO, SMB and large enterprise networks, this ensures security built around the user for protection against APTs, insider threats, malware, hackers, and other sophisticated network attacks. Cyberoam has sales offices in North America, EMEA and APAC. The company has customer support and development centers in India with 550+ employees around the globe. It has a channel-centric approach for its sales[4] with a global network of 4500+ partners. The company also conducts training programs for its customers and partners. Product overviewCyberoam's product range offers network security (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView), and Cyberoam NetGenie for home and small office networks. Cyberoam network security appliances include multiple features like a Firewall – VPN (SSL VPN and IPSec), Gateway Anti-Virus, Anti-Spyware and Anti-Spam, Intrusion Prevention System (IPS), Content and Application Filtering, Web Application Firewall, Application Visibility and Control, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover,[5] over a single platform. Cyberoam security training academyCyberoam has affiliations with NESCOT (North East Surrey College of Technology) – its first Master UK Training Academy. NESCOT offers Cyberoam certified security courses which include an entry-level class named 'CCNSP' (Cyberoam Certified Security Professional)[6] and an advanced-level course named 'CCNSE' (Cyberoam Certified Security Expert).[7] Security flaw in HTTPS traffic inspectionA Tor Project researcher and a Google software security engineer revealed in July 2012 that all Cyberoam appliances with SSL traffic inspection capabilities had been using the same self-generated CA certificate by default.[8] This made it possible to intercept traffic from any owner of a Cyberoam device using another Cyberoam device – or even to extract the key from the device and import it into other DPI devices, and use those for interception.[9] In response, Cyberoam issued an over-the-air update for its unified threat management (UTM) appliances[10] in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks.[11] After the hotfix was applied,[12] each individual appliance was required to have a unique CA certificate. References
External links |
Portal di Ensiklopedia Dunia