Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Cloud Security Authors: Elizabeth White, John Katrick, Mamoon Yunus, Ravi Rajamiyer, Liz McMillan

Related Topics: Cloud Computing, Security Journal, Cloud Security Journal

Blog Post

Product Review: Cyberoam CR10iNG

Unified Threat Management appliance in an age of SaaS

Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations?

Unfortunately an increasing number of smaller companies find themselves at risk of infiltration, antivirus corruption, and data theft. Hackers are catching on that smaller offices are a softer target. Security in these organizations is generally looser as they often lack the financial resources for a comprehensive security system.

As we've seen with the data breach at Target, cybercriminals are eyeing branch offices of large organizations as potential entry points to larger prey. This is particularly true in highly distributed organizations in retail, hospitality, financial services, government agencies and healthcare. These branch offices are prime candidates for attack and there is a need to tighten their network security to prevent criminals from burrowing in to sensitive information contained in corporate HQ.

Fortunately several security providers are stepping in to fill the void, among them Cyberoam, with the introduction of its CR10iNG designed to bring small branch / home office security on par with corporate HQ.

Called "the fastest and most affordable UTM (Unified Threat Management)" solution for small and branch offices, the $299 appliance features firewall throughput of 400 Mbps and UTM throughput of 60 Mbps, providing more than enough bandwidth for the small office. The product provides several layers of security: network security with a firewall and intrusion prevention system; Content security with anti-virus, anti-spyware, anti-spam, and HTTPS/SSL; and administrative security with a next-generation user interface.

The product protects remote workers logging into the network, a common path for cybercriminal access and something becoming more frequent as the work-from-home culture gains acceptance. With support for up to 15 users, the Cyberoam CR10iNG enables secure VPN access for remote and mobile workers, letting them access business apps and servers securely.  The ability to centrally manage these deployments via a common platform should make a difference to IT admins working remotely.

A key feature is the addition of an eighth layer to the traditional seven-layer ISO network protocol stack, user identity. By uniquely identifying users, administrators can more effectively control the network, monitor internet activity and enable policy-setting and reporting based on the username. These user-based controls enhance worker productivity as policies can be enacted to prevent users from surfing, doing downloads, and performing other non-work related tasks during work hours.

Completing the package are methods for virus, worm, trojan detection and removal and protection against spyware, malware and phishing attempts. Using the CR10iNG IT professionals can protect users from distraction by redirecting spam mails to a dedicated email address.

Cyberoam Technologies was acquired by Sophos earlier this year and it will be interesting to see what shakes out from this new relationship. More on the company can be found by visiting

More Stories By Dave Greten

Dave Greten was most recently Senior Web Producer at Kaspersky Lab. An early employee of Yahoo!, he worked with Paul Graham of Y Combinator at his first start-up and as a writer for Bob Vila, the TV celebrity. He can be reached at [email protected]

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.