Kathy Gibson reports from the Cyberoam Partner Summit in Sun City – Networks and user requirements are constantly evolving – and products need to evolve to address these needs.
Cyberoam has previewed a number of new products that will soon be launched into the South African market, says Cyberoam’s Graeme McMillan.
With cloud computing rapidly becoming a challenge for organisations, the company has announced Amazon Web Services (AWS), where users can rent computing capacity or infrastructure on the cloud.
This means users can protect their Web servers hosted on the Amazon infrastructure. The product will offer features like WAF for AWS hosted sites, full security for the Amazon cloud infrastructure, VPN connectivity, full traffic visibility and control.
Importantly, this service will be available on a usage fee.
Another new feature that will soon be available is on-demand delegation of Internet access management for dynamic groups, including those in education institutions. Educator-controlled Internet access lets educators define web
access policies for the group they are teaching, giving the institution a safe and flexible solution.
One of the major headaches that security administrators face every day is the infiltration of apps into the corporate network.
The new Cyberoam Micro App Control on HTTPS lets them block games as well as to control the user of other apps.
Arguably one of the most useful features that administrators will appreciate from the upcoming line-up is the ability to proactively identify risky users – before they pose a threat to the organisation either as attack vectors or threat actors.
With 80% of threats within an organisation generated by 20% of the users, it would be hugely beneficial to be able to pinpoint potential weak points upfront.
Currently, the solutions available to companies include an expensive investment in either continuous event management or in human intelligence.
In either case, collating data from various reports takes time and skills, with the chance of human oversight.
To address the risk, Cyberoam has introduced the User Threat Quotient (UTQ), which lets administrators spot the risky users by assigning a UTQ to users.
This is not only useful in being proactive about user risks, but also helps to identify vulnerabilities during forensic examinations if an attack has occurred.

