Human Layer 8 Identity-based Security |
|
User identity-based reports in dynamic Wi-Fi and shared endpoint environments in healthcare, educational institutions, retail stores and call centers |
|
|
|
Visibility into who is doing what |
|
Visibility into who is accessing which application |
|
|
Instant identification of the source or destination endpoint under attack or perpetuating an attack |
|
|
|
Helps prevent data leakage |
|
Supports regulatory compliance requirements of CIPA, HIPAA, PCI DSS, GLBA |
|
|
|
Shorter audit cycles |
|
Security Reporting |
|
Firewall & Internet activity |
|
VPN activity |
|
Intrusion Prevention reports |
|
Spam reports |
|
Virus reports |
|
Web activity |
|
Search Engine Query reports |
|
Mail activity |
|
IM activity |
|
FTP activity |
|
|
Real-time view of network activity |
|
Supports instant security action |
|
Compliance Reporting |
|
HIPAA |
|
GLBA |
|
SOX |
|
PCI DSS |
|
FISMA |
|
|
Supports compliance to regulatory requirements |
|
|
Personalized View |
|
Create custom dashboard |
|
Bookmark important reports |
|
View custom trends |
|
Create custom reports |
|
|
High flexibility to meet organizational requirements |
|
|
Report Formats |
|
View Formats – Tabular, Graphical |
|
Print Formats – CSV, PDF |
|
|
High flexibility to meet organizational requirements |
|
|
Report sharing with the relevant departments and management |
|
|
On-Appliance Reporting |
|
Free reporting module over Cyberoam UTM appliances |
|
|
|
Eliminates need for separate reporting solution |
|
|
Minimizes security investment and operational expense involved in maintenance |
|