Cyberoam awarded patent for user ID-based security management
New solution will allow firewall management based on user identity rather than IP criteria
Cyberoam has been awarded a US patent for for identity and policy-based network security and management.
The patent was issued by the US Patent Office, for technology created by Cyberoam to connect end user identity with network security policy, allowing IT security managers to more effectively manage activity and access based on individual needs.
Traditional firewall security measures are designed to scan network traffic based on source and destination IP criteria, to allow or deny request for Internet or network access. Cyberoam says that its new system and method can apply rules and policies specific to the user, between the source and the destination. This ‘Layer 8' Technology allows user-specific policies, enabling granular security controls for firewall decisions. Network administrators and IT security managers gain the ability to grant network, bandwidth and application access based on user-identity, time-of-day and other Layer-7 (application layer) controls.
With the additional level of control and visibility provided by Cyberoam Layer 8 Technology, organizations are better enabled to meet regulatory compliance requirements such as HIPAA, CIPA, PCI-DSS, GLBA, etc.
By including the user's human identity as part of the firewall rule matching criteria, administrators are able to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.
Administrators are also able to identify attackers or victims with username; gain instant visibility for administrators into the source of attacks; control who is doing what in the network; create identity-based policies and issue reporting based on identity to show usage, problems, intrusions and so forth.
Hemal Patel- CEO of Cyberoam Technologies commented: "This patent grant validates Cyberoam's continued leadership in providing identity-based network security to address two of the primary security challenges: helping network administrators manage the weakest link in the security chain with user-defined security and network access policies, and strengthening compliance and reporting based on complete visibility of user activity in the network."