Safe SOHO surfing

March 2012 Information Security

Being online is an extreme sport these days as hackers, malware and all sorts of unsavoury characters try to exploit (with success much of the time) unsuspecting users, even those not doing anything untoward on the Internet. For home and small businesses, the threat of all these dangers is all the more serious as the cost of effective protection is often too high for these environments.

Cyberoam has a solution to this problem in its NetGenie range of UTM (unified threat management) devices aimed at the home and small office. NetGenie is a small device, about the size of an ADSL router that sits between the people you want to give Internet access to and your ADSL router (or modem). It monitors all Internet traffic and automatically protects you via its firewall, antivirus and intrusion prevention system. In other words, it does enterprise-level protection for the small office or home, including offering VPN access.

As a bonus to those who use 3G services to access the Internet, you are able to plug a 3G modem into the NetGenie and have the same level of protection – although we had some trouble setting it up. The antivirus updates itself automatically, although we recommend you run a manual update when the system is first installed.

The NetGenie creates its own wireless network for others to log into, ensuring all Internet access is protected.

Of course, simply preventing malware is only one aspect of keeping yourself safe on the Net today. The NetGenie also offers an easy-to-use browser interface from which administrators can control the Websites and applications their users use. For example, if a company wants to limit access to social networks, the administrator can block access to these sites by choosing the list of social sites that comes with the system, or by choosing specific sites that the company wants banned.

This blocking can be done on a universal basis, preventing everyone from accessing social media (or sexually explicit, political or a host of other categories pre-programmed into the system), or on a per user basis. For example, you may allow your marketing manager to access YouTube, Twitter and Facebook, but nobody else.

Alternatively, the administrator can allow access to these sites only at specific times. If you do not want to set the surfing limits according to NetGenie’s categories, you can also manually enter specific sites that are blocked or have limited access.

The simplest setup will see the administrator simply choosing a level of protection, from a whitelist through to minimal restrictions at the click of a mouse.

With NetGenie in place, users will be presented with a login screen each time they open their browser. Their login name will automatically assign them rights and manage the process, which includes access to applications.

The system allows you to draw reports on usage, including measuring each user’s bandwidth consumption in a set period.

The default settings ensure your network is secure as soon as you plug it in, also asking the administrator to choose a new password.

For more information contact Lynton Lubbe, Cyberoam, South Africa, lynton.lubbe@cyberoam.com, www.cyberoam.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.