Cyberoam
Encyclopedia
Cyberoam, a division of Elitecore Technologies, is a vendor of identity-based network security
Network security
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources...

 products including UTM
Unified threat management
Unified Threat Management is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations...

 security, logging and reporting and secure remote connectivity appliances and data loss prevention software. With over 25000 deployments in 110+ countries, its customer base includes small, mid-sized and large corporations in different verticals including manufacturing
Manufacturing
Manufacturing is the use of machines, tools and labor to produce goods for use or sale. The term may refer to a range of human activity, from handicraft to high tech, but is most commonly applied to industrial production, in which raw materials are transformed into finished goods on a large scale...

, healthcare, finance
Finance
"Finance" is often defined simply as the management of money or “funds” management Modern finance, however, is a family of business activity that includes the origination, marketing, and management of cash and money surrogates through a variety of capital accounts, instruments, and markets created...

, retail
Retail
Retail consists of the sale of physical goods or merchandise from a fixed location, such as a department store, boutique or kiosk, or by mail, in small or individual lots for direct consumption by the purchaser. Retailing may include subordinated services, such as delivery. Purchasers may be...

, IT sectors
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...

, MSSPs, educational institutions, public sector
PSU
The initialism PSU often refers to a Power supply unit, or specifically a computer's Power supply unit .The PSU powers all the computer's main components. There are many different PSUs that can come with anywhere up to 1500 watts for a standard desktop computer. The PSU is also sometimes referred...

 and large government organizations.

Corporate Overview

Cyberoam’s parent company, Elitecore Technologies was founded in 1999 by entrepreneurs Hemal Patel and Ben Casado. The company has offices in NewJersey, Ahmedabad
Ahmedabad
Ahmedabad also known as Karnavati is the largest city in Gujarat, India. It is the former capital of Gujarat and is also the judicial capital of Gujarat as the Gujarat High Court has its seat in Ahmedabad...

, India
India
India , officially the Republic of India , is a country in South Asia. It is the seventh-largest country by geographical area, the second-most populous country with over 1.2 billion people, and the most populous democracy in the world...

, Dubai
Dubai
Dubai is a city and emirate in the United Arab Emirates . The emirate is located south of the Persian Gulf on the Arabian Peninsula and has the largest population with the second-largest land territory by area of all the emirates, after Abu Dhabi...

, UAE, the Kingdom of Bahrain
Bahrain
' , officially the Kingdom of Bahrain , is a small island state near the western shores of the Persian Gulf. It is ruled by the Al Khalifa royal family. The population in 2010 stood at 1,214,705, including 235,108 non-nationals. Formerly an emirate, Bahrain was declared a kingdom in 2002.Bahrain is...

 and Johannesburg
Johannesburg
Johannesburg also known as Jozi, Jo'burg or Egoli, is the largest city in South Africa, by population. Johannesburg is the provincial capital of Gauteng, the wealthiest province in South Africa, having the largest economy of any metropolitan region in Sub-Saharan Africa...

, South Africa
South Africa
The Republic of South Africa is a country in southern Africa. Located at the southern tip of Africa, it is divided into nine provinces, with of coastline on the Atlantic and Indian oceans...

. A global private equity firm – The Carlyle Group – has invested in Elitecore Technologies in 2007 for ongoing product development, R&D, working capital, new products and infrastructure
Infrastructure
Infrastructure is basic physical and organizational structures needed for the operation of a society or enterprise, or the services and facilities necessary for an economy to function...

 build-up.

Cyberoam security solutions are sold through a global partner
Business partner
Business partner is a term used to denote a commercial entity with which another commercial entity has some form of alliance. This relationship may be a highly contractual, exclusive bond in which both entities commit not to ally with third parties...

 base comprising national distributors, Value Added Resellers (VARs)
Value-added reseller
A value-added reseller is a company that adds features or services to an existing product, then resells it as an integrated product or complete "turn-key" solution...

 and system integrators (SIs)
System integrator
A systems integrator is a person or company that specializes in bringing together component subsystems into a whole and ensuring that those subsystems function together, a practice known as System Integration...

.

Product Overview

Cyberoam has the following products under its network security portfolio:
  • Cyberoam Unified Threat Management (UTM) appliances: Stateful Inspection Firewall
    Stateful firewall
    In computing, a stateful firewall is a firewall that keeps track of the state of network connections traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections...

    , IPS, anti-virus, anti-spyware, anti-spam, content filtering
    Content filtering
    Content filtering is the technique whereby content is blocked or allowed based on analysis of its content, rather than its source or other criteria. It is most widely used on the internet to filter email and web access.- Content filtering of email :...

    , VPN, 3G
    3G
    3G or 3rd generation mobile telecommunications is a generation of standards for mobile phones and mobile telecommunication services fulfilling the International Mobile Telecommunications-2000 specifications by the International Telecommunication Union...

     and WiMax
    WiMAX
    WiMAX is a communication technology for wirelessly delivering high-speed Internet service to large geographical areas. The 2005 WiMAX revision provided bit rates up to 40 Mbit/s with the 2011 update up to 1 Gbit/s for fixed stations...

     connectivity support, IM monitoring and control
    Instant messaging
    Instant Messaging is a form of real-time direct text-based chatting communication in push mode between two or more people using personal computers or other devices, along with shared clients. The user's text is conveyed over a network, such as the Internet...

    , IPv6 Ready
    IPv6
    Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...

    , Bandwidth Management
    Bandwidth management
    Bandwidth management is the process of measuring and controlling the communications on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network.- Management :Bandwidth management mechanisms may be...

    , Layer 7 Management, and data leakage prevention, in-built logging and reporting, multiple link manager, High Availability
    High availability
    High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be met during a contractual measurement period....

     and more.
  • Cyberoam Endpoint Data Protection: It takes care of vulnerabilities
    Vulnerability (computing)
    In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw...

     due to extensive use of removable storage devices
    Removable media
    In computer storage, removable media refers to storage media which is designed to be removed from the computer without powering the computer off.Some types of removable media are designed to be read by removable readers and drives...

     and file sharing applications
    File sharing
    File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia , documents, or electronic books. It may be implemented through a variety of ways...

    , delivering identity and group-based policy controls over corporate endpoints.
  • Cyberoam iView appliance (comprehensive reporting and logging solution)
  • Cyberoam SSL VPN (Secure, Remote Access)
  • Cyberoam Central Console (CCC)


According to global research firm IDC’s
IDC
-Businesses and organizations:* Industrial Development Corporation, also known as Castle Grande, an Arkansas company involved in the Whitewater political controversy* Interactive Data Corporation , a financial services company...

 European Quarterly Security Appliances Tracker for 16 Western European countries, UTM
Unified threat management
Unified Threat Management is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations...

 appliances are currently having a significant impact on the overall security market as a result of the benefits they offer, such as ease of use and management, performance, and cost benefits. Cyberoam UTM was a pioneer in firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

-UTM appliance industry with its identity-based firewall rule matching criteria which does away with IP addresses as the intermediate component to identify and control the end user. This offers instant visibility and proactive controls over security breaches.

Architecture

Cyberoam runs on an Extensible Security Architecture
Network architecture
Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation.In...

 which ensures the firmware
Firmware
In electronic systems and computing, firmware is a term often used to denote the fixed, usually rather small, programs and/or data structures that internally control various electronic devices...

 isn’t hardcoded but can be quickly upgraded as threats evolve over time. This is in contrast to dedicated ASIC (application-specific integrated circuit)
ASIC
ASIC may refer to:* Application-specific integrated circuit, an integrated circuit developed for a particular use, as opposed to a customised general-purpose device.* ASIC programming language, a dialect of BASIC...

 based appliances. It also reportedly balances security and speed using a multi-core aware architecture ensuring parallel processing
Parallel processing
Parallel processing is the ability to carry out multiple operations or tasks simultaneously. The term is used in the contexts of both human cognition, particularly in the ability of the brain to simultaneously process incoming stimuli, and in parallel computing by machines.-Parallel processing by...

 of multiple network sessions. This possibly allows the appliance to maintain a predictable degree of performance
Performance
A performance, in performing arts, generally comprises an event in which a performer or group of performers behave in a particular way for another group of people, the audience. Choral music and ballet are examples. Usually the performers participate in rehearsals beforehand. Afterwards audience...

 while dealing with unknown future threats.

Credentials

For its UTM appliance range, Cyberoam was positioned as a ‘Visionary’ by Gartner
Gartner
Gartner, Inc. is an information technology research and advisory firm headquartered in Stamford, Connecticut, United States. It was known as GartnerGroup until 2001....

 in its July 2009 Magic Quadrant for SMB Multifunction Firewalls. The Magic Quadrant evaluated twelve vendors based on their ability to execute and completeness of vision.

Other security certifications include ICSA certification for Active-Active High Availability certified firewall, Checkmark, “IPv6 Ready”
IPv6
Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...

 and VPNC certifications.

Cyberoam GSMC

Cyberoam offers after-sales support through a Global Support Management Center (GSMC) at its corporate headquarters in Ahmedabad. Support is available through toll-free call lines, online chat and e-mail.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK