Cyberoam Intrusion Prevention System
Cyberoam Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.
Cyberoam’s signature-based Intrusion Prevention System carries thousands of automatically updated signatures, enabling protection against the latest vulnerabilities.
Feature |
Feature Description |
Benefit |
Multiple Protocol Support |
- HTTP, FTP, SMTP, POP3, IMAP, P2P, IM support
- Automatically detects, blocks, drops suspicious traffic
|
- Security against network, application and human layer attacks
|
IPS Policy Tuner |
- Layer 8 Identity-based Intrusion Prevention System (IPS) policies customizable to identity and work profile
- Identity-based alerts
|
- Role-based access to users and groups
- Minimizes noise related to false positive alerts, traffic latency and improved performance
|
Signature Updation |
- Regular updates by the Cyberoam Internet Threat Response Team
- Customized signatures by organizations
- HTTP Proxy signatures
|
- Protection against latest vulnerabilities
- Zero-hour protection during an outbreak prevents user masking through anonymous proxies
|
Centralized Security |
- Centralized custom signature creation and implementation at remote offices with CCC
|
- Zero-hour protection for distributed networks
- Simplified security with lower cost of operations
|
Logging & Reporting |
- Human Layer-8 Identity-based logging and reporting with username, source, destination, period of activity
- Dashboard, Top alerts, attackers and victims with severity of attacks
- Centralized logging reporting with Cyberoam iView and CCC
|
- Meets compliance requirements for CIPA, HIPAA, PCI DSS
- Meets requirements of forensic analysis
- Rapid corrective action with high security
|
Cost-Effective |
- Offers single, per-appliance subscription as opposed to per-user subscription
|
- Comprehensive yet cost-effective security
|