Welcome!

@CloudExpo Authors: Liz McMillan, Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Elizabeth White

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Blog Post

Product Review: Cyberoam CR10iNG

Unified Threat Management appliance in an age of SaaS

Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations?

Unfortunately an increasing number of smaller companies find themselves at risk of infiltration, antivirus corruption, and data theft. Hackers are catching on that smaller offices are a softer target. Security in these organizations is generally looser as they often lack the financial resources for a comprehensive security system.

As we've seen with the data breach at Target, cybercriminals are eyeing branch offices of large organizations as potential entry points to larger prey. This is particularly true in highly distributed organizations in retail, hospitality, financial services, government agencies and healthcare. These branch offices are prime candidates for attack and there is a need to tighten their network security to prevent criminals from burrowing in to sensitive information contained in corporate HQ.

Fortunately several security providers are stepping in to fill the void, among them Cyberoam, with the introduction of its CR10iNG designed to bring small branch / home office security on par with corporate HQ.

Called "the fastest and most affordable UTM (Unified Threat Management)" solution for small and branch offices, the $299 appliance features firewall throughput of 400 Mbps and UTM throughput of 60 Mbps, providing more than enough bandwidth for the small office. The product provides several layers of security: network security with a firewall and intrusion prevention system; Content security with anti-virus, anti-spyware, anti-spam, and HTTPS/SSL; and administrative security with a next-generation user interface.

The product protects remote workers logging into the network, a common path for cybercriminal access and something becoming more frequent as the work-from-home culture gains acceptance. With support for up to 15 users, the Cyberoam CR10iNG enables secure VPN access for remote and mobile workers, letting them access business apps and servers securely.  The ability to centrally manage these deployments via a common platform should make a difference to IT admins working remotely.

A key feature is the addition of an eighth layer to the traditional seven-layer ISO network protocol stack, user identity. By uniquely identifying users, administrators can more effectively control the network, monitor internet activity and enable policy-setting and reporting based on the username. These user-based controls enhance worker productivity as policies can be enacted to prevent users from surfing, doing downloads, and performing other non-work related tasks during work hours.

Completing the package are methods for virus, worm, trojan detection and removal and protection against spyware, malware and phishing attempts. Using the CR10iNG IT professionals can protect users from distraction by redirecting spam mails to a dedicated email address.

Cyberoam Technologies was acquired by Sophos earlier this year and it will be interesting to see what shakes out from this new relationship. More on the company can be found by visiting www.cyberoam.com.

More Stories By Dave Greten

Dave Greten was most recently Senior Web Producer at Kaspersky Lab. An early employee of Yahoo!, he worked with Paul Graham of Y Combinator at his first start-up and as a writer for Bob Vila, the TV celebrity. He can be reached at [email protected]

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
There's no doubt that blockchain technology is a powerful tool for the enterprise, but bringing it mainstream has not been without challenges. As VP of Technology at 8base, Andrei is working to make developing a blockchain application accessible to anyone. With better tools, entrepreneurs and developers can work together to quickly and effectively launch applications that integrate smart contracts and blockchain technology. This will ultimately accelerate blockchain adoption on a global scale.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also received the prestigious Outstanding Technical Achievement Award three times - an accomplishment befitting only the most innovative thinkers. Shankar Kalyana is among the most respected strategists in the global technology industry. As CTO, with over 32 years of IT experience, Mr. Kalyana has architected, designed, developed, and implemented custom and packaged software solutions across a vast spectrum o...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
SAP is the world leader in enterprise applications in terms of software and software-related service revenue. Based on market capitalization, we are the world's third largest independent software manufacturer. Harness the power of your data and accelerate trusted outcome-driven innovation by developing intelligent and live solutions for real-time decisions and actions on a single data copy. Support next-generation transactional and analytical processing with a broad set of advanced analytics - run securely across hybrid and multicloud environments.
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.” Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by: Detecting and preventing network threats, intrusions and disruptions Equipping you with the information, tools, training and resources you need to effectively manage IT risk Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.