Contact Information: Press Contact: Victor Cruz Principal, MediaPR.net, Inc. (401) 349-3369 vcruz@mediapr.net
Cyberoam Launches Endpoint Data Protection Security Software
Extends Security Coverage From Gateway to Desktop; Offers Comprehensive IT Security
| Source: Cyberoam
WOBURN, MA--(Marketwire - November 23, 2009) - Cyberoam, a vendor of identity-based Unified
Threat Management solutions (UTM), today announced the launch of its
Endpoint Data Protection suite to secure corporate data and manage IT
assets. This suite extends Cyberoam's security protection from the gateway
to the endpoint, reinforcing its presence as a provider of comprehensive
security solutions.
Founded in 1999, Cyberoam is owned by Elitecore Technologies Limited, an
Indo-US corporation with 400+ employees. Cyberoam's family of
identity-based UTM appliances offers complete protection against existing
and emerging Internet threats, including malware, viruses, worms, Trojans,
spyware, phishing, pharming and other attack vectors.
Cyberoam's Endpoint Data Protection suite consists of four modules: Data
Protection and Encryption; Device Management; Application Control; and
Asset Management.
With its policy-driven data protection and asset management, the suite
delivers identity and group-based policy control as well as activity
logging to provide comprehensive control and visibility of data transfers
over removable devices; applications; chat applications such as Skype, MSN
and more; network sharing and printers.
Cyberoam's Endpoint Data Protection suite fills the gap for a dedicated
endpoint security solution for small to mid-size businesses (SMB/SME) with
existing solutions considered too highly priced and targeted at
enterprises. Supporting up to 3000 users, Cyberoam meets the data
protection requirements of both SMB and enterprise segments.
"Blended threats do not distinguish between the gateway and the endpoint to
gain entry," said Harish Chib, Cyberoam Vice President, New Business
Development. "With the launch of our Endpoint Data Protection suite,
Cyberoam will secure organizations both at the gateway and desktop,
offering a single, complete security cover for organizations."
Even as Cyberoam offers comprehensive control with role-based access to
removable devices and applications, its real benefits come in the form of
high granularity in defining customizable whitelists and blacklists. User
identity-based control over file handling; granular controls over data
transfer based on user, group, time, file name, type, size, location; and
extending its controls outside the network in addition to creating shadow
copies ensures that Cyberoam delivers effective data security. Encryption
and decryption controls of the file or removable device prevent data
leakage either through loss of device or malicious transfer of data to
unauthorized endpoints.
The Asset Management module for Windows enables organizations to take
automated hardware and software inventory in addition to automating patch
management, handling bug fixes across the network irrespective of the
geographic location, and allowing organizations to meet security compliance
requirements.
Pricing & Availability
Available today, prices start at US$75 per license for the Cyberoam Data
Protection Management Suite, which includes device control, application
control, asset protection and data protection and encryption.
About Cyberoam
Cyberoam identity-based UTM appliances offer comprehensive protection
against existing and emerging Internet threats, including viruses, worms,
Trojans, spyware, phishing, pharming and more. Cyberoam UTM delivers the
complete range of security features such as stateful inspection firewall,
VPN, gateway anti-virus, gateway anti-malware, gateway anti-spam, intrusion
prevention system, content filtering in addition to bandwidth management
and multiple link management over a single platform. The Cyberoam solution
portfolio includes Cyberoam iView, an open-source logging and reporting
solution, and Cyberoam Endpoint Data Protection suite to protect data and
manage assets over end points in organizations. Cyberoam is certified with
CheckMark UTM Level 5 Certification, ICSA Labs, and is a member of the
Virtual Private Network Consortium. Cyberoam was positioned as a
"Visionary" in the Magic Quadrant for SMB Multi-function Firewalls by
Gartner. Cyberoam has also received SC Magazine's 5 Star Rating
continuously. Cyberoam has offices in Woburn, MA and India. For more
information, please visit www.cyberoam.com.