NAIROBI, KENYA: With a shift of vital organisation processes, the concept of security has changed with how they access data and process transactions over the Internet.
For instance business systems in small offices continuously put their IT estate at risk to malware threats.
Since no one wants to think about threats and costs associated with recovery after a security breach, Cyberoam offers a peace of mind to users by coming up with a Unified Threat Management appliance that helps small offices manage security threats.
Since most of the time standard users might not be aware of security threats, Cyberoam bases the effectiveness of this appliance on performance behind the scenes. At a cost of USD 400 in East Africa, the CRI0iNG combines the intelligence of Cyberoam’s new operating system and hardware to offer a speedy and responsive signal on attacks to by addressing all cases from risk management to threat detection using firewalls.
Since firewalls are the first line of defence against external intrusions while also connecting the network with the external world, the appliance does not record any slow down when firewall security is fully enabled on it.
“Traffic continued to pass through the device with minimum impact and it stood up to its claim of Firewall throughput close to 400 Mbps and UTM throughput of 60 Mbps, even when conditions were not optimum”, says Philip Obondy, Cyberoam Channel Manager, Kenya.
Since it is notoriously difficult to predict anything in IT, leave alone security threats, Cyberoam appliance provides small offices with Stateful Inspection Firewall, Intrusion Prevention System, Gateway Anti-Virus and Anti-Spyware, Gateway Anti-Spam, Web Filtering, among others to take care of what security breaches will look like in the next five, to ten years.
At the base of all its security features is the Layer 8 Technology - Cyberoam's USP. This technology treats User-Identity as the 8th Layer or the HUMAN layer in the protocol stack, the appliance presence is felt as each and every individual user on the networks is seamlessly tracked. This adds speed to an organization’s security by offering instant visibility into the source of attacks by user name rather than only IP address.
According to Obondy, the easy-on-eyes set up wizard makes it easy to configure and add features. The user interface is browser enabled and comes with complete graphical display. The basic zone-to-zone firewall rules are reconfigured and can be easily customized for deeper security.
The Web filtering policies can be set up to its full potential in a powerful ways. It enables Internet usage policies by limiting/blocking access to sites and applications that aren't crucial to business and it completely eliminates malwares/spywares from the network. Thus it is easy to block or allow access to social media sites during specified hours. For example employee access to social media such as as Facebook/Instagram only during lunch hours, ensures productivity and unnecessary wastage of work hours.
The problem for small business is that on one hand most security aren’t powerful enough to protect their networks or fight the evolving threats. On the other hand, high powered enterprise class securities are too costly and resource intensive in terms of dedicated IT expertise. CR10iNG fills this gap effectively.