Cyberoam

Cyberoam
Cyberoam
Industry Network security, Internet security, Security appliances
Founded 1999
Headquarters New Jersey
Key people Hemal Patel
Products Unified Threat Management, Firewalls, VPN, Antivirus, Antispyware, Antispam, Intrusion-prevention system, Content filtering, Central Console, Data loss prevention software
Employees 600+ (Jan. 2010)
Website Official Site

Cyberoam, a division of Elitecore Technologies, is a vendor of identity-based network security products including UTM security, logging and reporting and secure remote connectivity appliances and data loss prevention software. With over 25000 deployments in 110+ countries, its customer base includes small, mid-sized and large corporations in different verticals including manufacturing, healthcare, finance, retail, IT sectors, MSSPs, educational institutions, public sector and large government organizations.[1]

Contents

Corporate Overview

Cyberoam’s parent company, Elitecore Technologies was founded in 1999 by entrepreneurs Hemal Patel and Ben Casado.[2] The company has offices in NewJersey, Ahmedabad, India, Dubai, UAE, the Kingdom of Bahrain and Johannesburg, South Africa. A global private equity firm – The Carlyle Group – has invested in Elitecore Technologies in 2007 for ongoing product development, R&D, working capital, new products and infrastructure build-up.[3]

Cyberoam security solutions are sold through a global partner base comprising national distributors, Value Added Resellers (VARs) and system integrators (SIs).[4]

Product Overview

Cyberoam has the following products under its network security portfolio:[5][6][7]

According to global research firm IDC’s European Quarterly Security Appliances Tracker for 16 Western European countries, UTM appliances are currently having a significant impact on the overall security market as a result of the benefits they offer, such as ease of use and management, performance, and cost benefits.[11] Cyberoam UTM was a pioneer in firewall-UTM appliance industry with its identity-based firewall rule matching criteria which does away with IP addresses as the intermediate component to identify and control the end user.[10] This offers instant visibility and proactive controls over security breaches.

Architecture

Cyberoam runs on an Extensible Security Architecture which ensures the firmware isn’t hardcoded but can be quickly upgraded as threats evolve over time. This is in contrast to dedicated ASIC (application-specific integrated circuit) based appliances.[12] It also reportedly balances security and speed using a multi-core aware architecture ensuring parallel processing of multiple network sessions. This possibly allows the appliance to maintain a predictable degree of performance while dealing with unknown future threats.[13]

Credentials

For its UTM appliance range, Cyberoam was positioned as a ‘Visionary’ by Gartner in its July 2009 Magic Quadrant for SMB Multifunction Firewalls.[14] The Magic Quadrant evaluated twelve vendors based on their ability to execute and completeness of vision.[14]

Other security certifications include ICSA certification for Active-Active High Availability certified firewall, Checkmark, “IPv6 Ready” and VPNC certifications. [12]

Cyberoam GSMC

Cyberoam offers after-sales support through a Global Support Management Center (GSMC) at its corporate headquarters in Ahmedabad. Support is available through toll-free call lines, online chat and e-mail.[15]

References

  1. ^ http://www.data-edge.com/major_business_alliances_text.htm
  2. ^ http://www.communicationstoday.co.in/oct2007/elitecore-technologies-1394-41.html
  3. ^ http://www.thehindubusinessline.com/2007/10/03/stories/2007100351480400.htm
  4. ^ http://www.ameinfo.com/128554.html
  5. ^ http://www.channelworld.in/interviews/cyberoam-emerges-holistic-security-vendor
  6. ^ http://www.crn.in/Security-018Aug010-Cyberoam-Courts-The-Mid-Market.aspx
  7. ^ http://www.cyberoam.com/productoverview.html
  8. ^ http://www.crn.com.au/Feature/220600,review-cyberoam-50ia.aspx
  9. ^ http://pcquest.ciol.com/content/pcshootout/2009/109100601.asp
  10. ^ a b http://blogs.computerworld.com/16126/real_world_dlp_people_are_a_problem
  11. ^ http://www.idc.com/getdoc.jsp?containerId=IDC_P19705
  12. ^ a b http://www.prodata.co.za/products/cyberoam/
  13. ^ http://www.channelworld.in/news/cyberoam-introduces-future-ready-utm-protection-mid-enterprise-networks-32312010
  14. ^ a b http://www.prosecurityzone.com/Customisation/News/IT_Security/Network_Security_Routers_and_Data_Centres/Gartner_recognition_for_Cyberoam.asp
  15. ^ http://www.channeltimes.com/channeltimes/jsp/article.jsp?print=1&article_id=90060&cat_id=1098

External Links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Cyberoam — Logo de Cyberoam Création 1999 Fondateurs Hemal Patel …   Wikipédia en Français

  • Professional certification (computer technology) — Professional certifications in computer technology are non degree awards made to those who have achieved qualifications specified by a certifying authority. Depending on the particular certification, qualifications may include completing a course …   Wikipedia

  • Application firewall — An application firewall is a form of firewall which controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet… …   Wikipedia

  • Security appliance — Security appliances protect computer networks from unwanted data traffic, intruders, e mail spam, enforce policies, and may also be used to create and manage VPNs. There are a number of types of security appliances. The most common of which is a… …   Wikipedia

  • WAN-Optimierung — Dieser Artikel wurde aufgrund von inhaltlichen Mängeln auf der Qualitätssicherungsseite der Redaktion Informatik eingetragen. Dies geschieht, um die Qualität der Artikel aus dem Themengebiet Informatik auf ein akzeptables Niveau zu bringen. Hilf… …   Deutsch Wikipedia

  • Anti-pourriel — Anti spam L anti spam (anti spamming, antipollupostage ou antipourriel) est un ensemble de systèmes et moyens techniques et juridiques de lutte contre le pourriel (courriers électroniques publicitaires non sollicités). Sommaire 1 La pertinence de …   Wikipédia en Français

  • Anti-pourriels — Anti spam L anti spam (anti spamming, antipollupostage ou antipourriel) est un ensemble de systèmes et moyens techniques et juridiques de lutte contre le pourriel (courriers électroniques publicitaires non sollicités). Sommaire 1 La pertinence de …   Wikipédia en Français

  • Anti spam — L anti spam (anti spamming, antipollupostage ou antipourriel) est un ensemble de systèmes et moyens techniques et juridiques de lutte contre le pourriel (courriers électroniques publicitaires non sollicités). Sommaire 1 La pertinence de solutions …   Wikipédia en Français

  • Antipollupostage — Anti spam L anti spam (anti spamming, antipollupostage ou antipourriel) est un ensemble de systèmes et moyens techniques et juridiques de lutte contre le pourriel (courriers électroniques publicitaires non sollicités). Sommaire 1 La pertinence de …   Wikipédia en Français

  • Antipourriel — Anti spam L anti spam (anti spamming, antipollupostage ou antipourriel) est un ensemble de systèmes et moyens techniques et juridiques de lutte contre le pourriel (courriers électroniques publicitaires non sollicités). Sommaire 1 La pertinence de …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”