Welcome!

@CloudExpo Authors: Pat Romanski, Zakia Bouachraoui, Elizabeth White, Yeshim Deniz, William Schmarzo

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Blog Post

Product Review: Cyberoam CR10iNG

Unified Threat Management appliance in an age of SaaS

Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations?

Unfortunately an increasing number of smaller companies find themselves at risk of infiltration, antivirus corruption, and data theft. Hackers are catching on that smaller offices are a softer target. Security in these organizations is generally looser as they often lack the financial resources for a comprehensive security system.

As we've seen with the data breach at Target, cybercriminals are eyeing branch offices of large organizations as potential entry points to larger prey. This is particularly true in highly distributed organizations in retail, hospitality, financial services, government agencies and healthcare. These branch offices are prime candidates for attack and there is a need to tighten their network security to prevent criminals from burrowing in to sensitive information contained in corporate HQ.

Fortunately several security providers are stepping in to fill the void, among them Cyberoam, with the introduction of its CR10iNG designed to bring small branch / home office security on par with corporate HQ.

Called "the fastest and most affordable UTM (Unified Threat Management)" solution for small and branch offices, the $299 appliance features firewall throughput of 400 Mbps and UTM throughput of 60 Mbps, providing more than enough bandwidth for the small office. The product provides several layers of security: network security with a firewall and intrusion prevention system; Content security with anti-virus, anti-spyware, anti-spam, and HTTPS/SSL; and administrative security with a next-generation user interface.

The product protects remote workers logging into the network, a common path for cybercriminal access and something becoming more frequent as the work-from-home culture gains acceptance. With support for up to 15 users, the Cyberoam CR10iNG enables secure VPN access for remote and mobile workers, letting them access business apps and servers securely.  The ability to centrally manage these deployments via a common platform should make a difference to IT admins working remotely.

A key feature is the addition of an eighth layer to the traditional seven-layer ISO network protocol stack, user identity. By uniquely identifying users, administrators can more effectively control the network, monitor internet activity and enable policy-setting and reporting based on the username. These user-based controls enhance worker productivity as policies can be enacted to prevent users from surfing, doing downloads, and performing other non-work related tasks during work hours.

Completing the package are methods for virus, worm, trojan detection and removal and protection against spyware, malware and phishing attempts. Using the CR10iNG IT professionals can protect users from distraction by redirecting spam mails to a dedicated email address.

Cyberoam Technologies was acquired by Sophos earlier this year and it will be interesting to see what shakes out from this new relationship. More on the company can be found by visiting www.cyberoam.com.

More Stories By Dave Greten

Dave Greten was most recently Senior Web Producer at Kaspersky Lab. An early employee of Yahoo!, he worked with Paul Graham of Y Combinator at his first start-up and as a writer for Bob Vila, the TV celebrity. He can be reached at [email protected]

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, Alex Lovell-Troy, Director of Solutions Engineering at Pythian, presented a roadmap that can be leveraged by any organization to plan, analyze, evaluate, and execute on moving from configuration management tools to cloud orchestration tools. He also addressed the three major cloud vendors as well as some tools that will work with any cloud.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is being used on IBM Cloud, Amazon, and Microsoft Azure and how to gain access to these resources in the cloud... for FREE!
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. In this session, learn how today's business leaders are managing finance in the cloud and the essential steps required to get on the right path to creating an agile, efficient and future-ready business.
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure.