Terabyte network overview

March 2010 Cyber Security

Cyberoam delivers a comprehensive view of all network devices, data redundancy.

Cyberoam iView, the open source logging and reporting solution is now available in appliance form, delivering a cost-effective solution to SMBs. The launch brings to customers a series of three appliances to begin with, catering to the logging-reporting requirements of SMBs and enterprises having up to 200 branch offices.

The Cyberoam iView appliances offer single point logging-reporting of all network devices, delivering a comprehensive view of network activity across geographical locations. With a cost-effective, pre-loaded hardware device that holds terabyte-storage drive, the appliances are quick-to-deploy and easy-to-manage. Using RAID technology, these appliances offer redundancy and high levels of storage reliability, ensuring the safety of logs-reports in case of hard disk failure.

Says Abhilash Sonwane, VP, product management, Cyberoam, “Until recently, SMBs had to struggle with individual logs and reports of multiple devices to view their combined network activity. This significantly slowed down their response time, raising security and data risks, while increasing technical manpower costs. With the Cyberoam-iView appliance launch, we are addressing three critical requirements of SMBs – cost-effectiveness, single point network visibility and an easy-to-manage solution.”

The launch of the Cyberoam iView appliance comes on the heels of growing SMB-enterprise demand for dedicated logging-reporting solutions that offer visibility into user activity across distributed networks while meeting regulatory compliance requirements. The market for this segment, popularly known as Security Information and Event Management (SIEM) is estimated to be worth US$1,3 billion, growing annually at over 25%.

The Cyberoam iView appliance enables organisations to gain complete visibility into network activity with realtime security and access reports related to top virus attacks, spam recipients, Web users and more, reinforcing organisation-wide network security and data confidentiality. The appliance also offers archiving to meet forensic requirements.

Adds Sonwane, “With Cyberoam iView appliances, our channel partners can look forward to meeting the logging-reporting requirements of customers for a range of network devices that most often include UTM appliances, firewalls and Web proxies. With the involvement of the open source community, we will continue to add logging-reporting of a growing number of network devices, servers, databases and operating systems to Cyberoam-iView.”

For more information contact Cyberoam, +91 79 66065606, jitendra.bulani@elitecore.com, www.cyberoam.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Exploiting the global pandemic
Issue 7 2020 , Cyber Security
Cyber criminals targeting remote work to gain access to enterprise networks and critical data reports FortiGuard Labs.

Read more...
Integrated security is key to Huawei Mobile Services
Issue 7 2020 , Cyber Security
To ensure sufficient mobile device security, the technology giant incorporates security into its chip, device and cloud capabilities.

Read more...
Cybersecurity becomes key enabler of sustainable business growth
Issue 7 2020 , Cyber Security
The adoption of rushed digital transformation strategies has left many facing unintended complexities and challenges.

Read more...
Challenges healthcare is facing
Issue 6 2020 , Cyber Security
The healthcare industry has been forever changed by digital transformation, but cybercriminals are targeting the healthcare sector now more than ever.

Read more...
Secure IoT devices and networks
Issue 6 2020, Technews Publishing , Cyber Security
Check Point Software’s IoT Protect solution secures IoT devices and networks against the most advanced cyber-attacks.

Read more...
SentinelOne Protects the AA
Issue 6 2020 , Cyber Security
National provider of 24-hour motorist assistance stays on the road thanks to accelerated, AI-powered threat prevention, detection and response.

Read more...
Protecting database information
Issue 6 2020 , Cyber Security
SearchInform has officially released Database Monitor, a solution for the protection of information stored in databases.

Read more...
Work from home securely
Issue 5 2020 , Cyber Security
First Consulting provides enterprise-level IT security to working-from-home employees at more than 40 South African organisations.

Read more...
Agility, meticulous alignment and testing
Issue 5 2020 , Cyber Security
Data loss can put the nails in the coffin for unprepared businesses. Investing in cyber resilience is key to succeed in the age of digital transformation.

Read more...
Cybersecurity comment: A holistic approach to threat vulnerability
Issue 5 2020 , Cyber Security
Any organisation, whether large or small, public or private, should follow an established framework in order to protect itself against cyber threats.

Read more...