CYBEROAM CR 100IA WINS SC MAGAZINE RECOMMENDED AWARD IN UTM GROUP TEST
Ahmedabad, India. 06 May, 2011
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls.
Cyberoam's User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization's security by offering instant visibility into the source of attacks by username rather than IP address - allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
ติดต่อศูนย์ข่าวไซเบอร์โรมในประเทศไทย
Cyberoam Press contact
Thailand: E-rong Consultants Co., Ltd
Contact person: Thitima Manitporn
Website: www.e-rong.co.th
E-mail: marketing@e-rong.co.th Tel: 02-089-010-9634