กลับไปกิจกรรมและข่าวทั้งหมด

CYBEROAM CR 100IA WINS SC MAGAZINE RECOMMENDED AWARD IN UTM GROUP TEST

This product has all the functionality of a UTM. Its strength is in its flexibility and configurability when it comes to application management and security - SC magazine

Ahmedabad, India. 06 May, 2011

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls.

Cyberoam's User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization's security by offering instant visibility into the source of attacks by username rather than IP address - allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

ติดต่อศูนย์ข่าวไซเบอร์โรมในประเทศไทย
Cyberoam Press contact
Thailand: E-rong Consultants Co., Ltd
Contact person: Thitima Manitporn
Website: www.e-rong.co.th
E-mail: marketing@e-rong.co.th Tel: 02-089-010-9634