Cyberoam promotes identity-based security software

23.12.2008
The traditional approach of deploying just firewalls and anti-virus solutions is no longer sufficient in protecting the corporate network and, thus, enterprises need multiple security solutions to combat blended network threats.

Kunal Popat, Cyberoam's manager for business development, said that network threats are becoming increasingly sophisticated as attackers launch targeted attacks using blended forms. A combination of external threats like viruses, worms, spyware, Trojans, phishing, pharming and cross-site scripting haunt enterprise networks today.

On the data front, enterprise users pose the single largest threat to enterprise security as they have easy access to sensitive corporate information, applications and resources on the network and may compromise security out of ignorance or malicious intent.

"This is why an identity-based security solution that offers information on user identity and activity within the network is crucial for enterprises," Popat said, adding Cyberoam's patent pending identiy-based UTM offers IT security with business flexibility.

Cyberoam seeks to be the number one UTM player in the market as it offers to secure enterprises with its UTM appliance range. Popat announced the company is confident of reaching the No. 2 spot by 2010 and nail the No. 1 spot on 2014.

"We aim to be the number one in the next four years. Our difference is Cyberoam's UTM. We're the only company that offers identity-based UTM solutions in the world," Popat said, claiming that Cyberoam's price of UTM products is even more competitive.

Zur Startseite