Data Leakage Prevention
Around 85% of organizations polled in a recent survey admitted that they did face a major security breach at some point of time which could have led to negative publicity, loss of customers and potential litigation and fines
Applications such as P2P file sharing, IM, webmails, etc., malware such as Trojans, phishing, spyware etc. and removable devices such as USB flash drives are among the most potent tools to steal sensitive information from within the network. As data loss keeps growing as a corporate concern, organizations must establish strict controls in place to prevent illegal transfer of confidential data.
Cyberoam Unified Threat Management
Cyberoam Unified Threat Management appliances provide timely and well-coordinated defense to organizations from threats of data leakage due to Internet-based IT environments. Cyberoam UTM’s data loss prevention functionality disallows intentional or accidental exposure of sensitive information, while ensuring steady compliance with regulations such as Sarbanes-Oxley, HIPAA, CIPA, PCI-DSS and GLBA.
Cyberoam’s identity-based Layer 8 security offers instant visibility and proactive controls over insider threats by capturing the user identity of actual users. Administrators can find out “who is doing what” in the network and gain visibility on violation of access privileges over HTTP, HTTPS, FTP, email, IM and P2P protocols irrespective of location and across static, DHCP and Wi-Fi Internet environments. Also, entry of malware can be traced to individual users.
Instant Messaging Logging and Control
Freeware IM applications which are nowadays commonly used for business, have also become a major conduit of data leakage. This is due to lack of audit trail on chat conversations and file uploads, insecure password management and susceptibility to eavesdropping and account spoofing by outsiders. Also, IM applications routinely spread worms, spyware and blended threats to steal data from end user.
Cyberoam UTM’s Instant Messaging Control enables the administrator to manage granular restrictions on IM usage within the organization. It logs all chat messages on Yahoo and Windows Live Messengers, whether internal or on public networks. It also controls who can chat with whom in the organization and blocks file uploads and audio/video/webcam chat access.
Moreover, the IM content filtering feature allows administrators to ban pre-defined keywords from being displayed in the chat window. With Anti-virus and Anti-Spyware scanning, it prevents malware from sneaking in the network during chat conversations.
Transparent Email Archiving
Through the transparent email archiving facility, Cyberoam UTM acts as an interceptor agent to arrest any incident of corporate information being leaked through email. All inbound and outbound email traffic is captured in real time for the review of the administrator.
Cyberoam Endpoint Data Protection
In addition to Cyberoam UTM, Cyberoam Endpoint Data Protection software prevents data leakage from the endpoints through encryption and document control over removable devices like USB drives, CD / DVDs as well as applications like email, chat applications like Skype, Yahoo, MSN, GTalk and more, network sharing and printing.