Cyberoam, a Sophos Company, today announced that it has been awarded a patent for identity and policy-based network security and management by the US Patent Office. The technology, which was created and developed by the Cyberoam team in India, offers a unique capability to connect end user identity with network security policy, allowing IT security managers to more effectively manage activity and access based on individual needs.
Traditional firewall security measures are designed to scan network traffic based on sourceand destination IP criteria, to allow or deny request for Internet or network access. Cyberoam’s innovative system and methodcan apply rules and policies specific to the user,between the source and the destination.This ‘Layer 8’ Technology allows user-specific policies, enabling granular security controls for firewall decisions. Network administrators and IT security managers gain the ability to grant network, bandwidth and application access based on user-identity, time-of-day and other Layer-7 (application layer) controls.
With the additional level of control and visibility provided by Cyberoam Layer 8 Technology, organizations are better enabled to meet regulatory compliance requirements such as HIPAA, CIPA, PCI-DSS, GLBA, etc.
Hemal Patel, CEO of Cyberoam Technologies and senior vice president of IT & operations at Sophos added, “This patent grant validates Cyberoam’s continued leadership in providing identity-based network security to address two of the primary security challenges: helping network administrators manage the weakest link in the security chain with user-defined security and network access policies, and strengthening compliance and reporting based on complete visibility of user activity in the network,” he added.
This patent awarded technology is at the heart of Cyberoam’s extensive portfolio of next-generation firewall (NGFW) and unified threat management (UTM) network security appliances.
About US 8,984,620 B2
Identity and Policy-based Network Security and Management System and Method
The patent describes a system and method that provide a security and management system between the source and the destination which is configured to apply rules and policies which are specific to the user to the connection between the source and the destination. The user-specific policies are used to govern the security and management of each packet transmitted and received via the connection.