Human Layer 8 Identity-based Security |
 |
User identity-based reports in dynamic Wi-Fi and shared endpoint environments in healthcare, educational institutions, retail stores and call centers |
|
|
 |
Visibility into who is doing what |
 |
Visibility into who is accessing which application |
|
 |
Instant identification of the source or destination endpoint under attack or perpetuating an attack |
|
|
 |
Helps prevent data leakage |
 |
Supports regulatory compliance requirements of CIPA, HIPAA, PCI DSS, GLBA |
|
|
 |
Shorter audit cycles |
|
Security Reporting |
 |
Firewall & Internet activity |
 |
VPN activity |
 |
Intrusion Prevention reports |
 |
Spam reports |
 |
Virus reports |
 |
Web activity |
 |
Search Engine Query reports |
 |
Mail activity |
 |
IM activity |
 |
FTP activity |
|
 |
Real-time view of network activity |
 |
Supports instant security action |
|
Compliance Reporting |
 |
HIPAA |
 |
GLBA |
 |
SOX |
 |
PCI DSS |
 |
FISMA |
|
 |
Supports compliance to regulatory requirements |
|
|
Personalized View |
 |
Create custom dashboard |
 |
Bookmark important reports |
 |
View custom trends |
 |
Create custom reports |
|
 |
High flexibility to meet organizational requirements |
|
|
Report Formats |
 |
View Formats – Tabular, Graphical |
 |
Print Formats – CSV, PDF |
|
 |
High flexibility to meet organizational requirements |
|
 |
Report sharing with the relevant departments and management |
|
|
On-Appliance Reporting |
 |
Free reporting module over Cyberoam UTM appliances |
|
|
 |
Eliminates need for separate reporting solution |
|
 |
Minimizes security investment and operational expense involved in maintenance |
|