Monday, December 21, 2009

Cyberoam Launches Endpoint Data Protection

Cyberoam, the bell-ringer of Identity-based Unified Threat Management Solutions, appear the barrage of its End Point Data Protection apartment to defended accumulated abstracts and administer IT assets. This apartment extends Cyberoam’s aegis aegis from the aperture to the endpoint, reinforcing its attendance as a complete aegis provider.

The all-encompassing use of disposable accumulator accessories and book administration applications makes end credibility the a lot of accessible areas with analysis statistics assuming added than 50% abstracts accident incidents basic at end points. The boilerplate absolute amount of a accumulated abstracts aperture stands at $6.3 actor and absent business accounts for 65% of aperture costs, according to a abstraction by the Ponemon Institute. End point abstracts aegis is appropriately added accepting accustomed as the analytical actual footfall in acid abstracts losses and carrying actual ROI.

Cyberoam’s End Point Data Protection apartment fills the gap for a committed end point aegis band-aid with accessible solutions accepting awful priced and targeted at the action segment. Supporting up to 3000 users, Cyberoam meets the abstracts aegis requirements of SMB and action segments.

Says Harish Chib, Vice-President – New Business Development, Cyberoam, “Blended threats do not analyze amid the aperture and the end point to accretion entry. With the barrage of the end point abstracts aegis suite, Cyberoam will defended organizations at the aperture and the desktop, alms a single, complete aegis awning for organizations.”

Cyberoam’s End Point Data Protection apartment consists of four modules - Data Protection and Encryption, Device Management, Application Control and Asset Management. With its policy-driven abstracts aegis and asset management, the apartment delivers Identity and group-based action ascendancy as able-bodied as action logging to accommodate absolute ascendancy and afterimage of abstracts alteration over disposable devices; applications; babble applications such as Skype, MSN and more; arrangement administration and printers.

Speaking about aperture of new opportunities for approach partners, Chib says, “Cyberoam is one of the few companies alms Data Protection and Asset Management in a individual band-aid globally, affair chump appeal for a comprehensive, easy-to-manage solution. Our end point band-aid opens a accomplished new befalling for approach ally for acquirement bearing and accretion the chump base. In fact, a poll of our all-around ally appear that 59% capital end point abstracts aegis including asset administration from Cyberoam in their portfolio.”

Even as Cyberoam offers absolute ascendancy with role-based acceptance to disposable accessories and applications, its absolute allowances appear in the anatomy of top granularity in defining customizable whitelists and blacklists. User identity-based ascendancy over book handling, diminutive controls over abstracts alteration based on user, group, time, book name, type, size, location, extending its controls alfresco the arrangement in accession to conception of adumbration copies ensures that Cyberoam delivers able abstracts security. Encryption and decryption controls of the book or disposable accessory anticipate abstracts arising either through accident of accessory or awful alteration of abstracts to crooked end points.

The Asset Management bore for Windows enables organizations to crop automated accouterments and software account in accession to automating application management, administration bug fixes above the arrangement irrespective of the geographic location, acceptance organizations to accommodated aegis acquiescence requirements.

About Cyberoam
Cyberoam Identity-based UTM accessories action absolute aegis adjoin absolute and arising Internet threats, including viruses, worms, Trojans, spyware, phishing, pharming and more. Cyberoam UTM delivers the complete ambit of aegis appearance such as stateful analysis firewall, VPN, aperture anti-virus, aperture anti-malware, aperture anti-spam, advance blockage system, agreeable clarification in accession to bandwidth administration and assorted hotlink administration over a individual platform. The Cyberoam band-aid portfolio includes Cyberoam iView, an open-source logging and advertisement solution, and Cyberoam End Point Data Protection apartment to assure abstracts and administer assets over end credibility in organizations. Cyberoam is certified with CheckMark UTM Level 5 Certification, ICSA Labs, and is a affiliate of the Virtual Private Network Consortium. Cyberoam was positioned as a “Visionary” in the Magic Quadrant for SMB Multi-function Firewalls by Gartner. Cyberoam has aswell accustomed SC Magazine’s 5 Star Rating continuously. Cyberoam has offices in Woburn, MA and India. For added information, amuse appointment www.cyberoam.com.

About Elitecore Technologies Limited
Elitecore Technologies Limited is the all-around provider of Cyberoam UTM appliances. Elitecore’s added capacity cover CRESTEL Convergent Billing Solution that meets the voice, data, video announcement and chump affliction requirements of Tier-1 account providers and 24online Billing and Bandwidth Management Solution for hotels, hotspots and Internet account providers. Elitecore has a able R&D abject and abutment centermost in India. It has abiding a advantageous advance amount of over 75 % back inception. For added information, amuse appointment www.elitecore.com.

Press Contact
L K Pathak
Chief Manager, Corporate Communications
Elitecore Technologies Limited
Tel: +91-79-66065606
Mobile: +91-9925012059
Email: l.k.pathak@elitecore.com

No comments:

Post a Comment