Cyberoam - Identity Based Security- Layer 8 Technology

Identity Based Security- Layer 8 Technology

Cyberoam's Layer 8 Technology also known as Identity based Security, adds an 8th Layer (HUMAN layer) in the network protocol stack, thereby considering user’s identity as part of the firewall rule matching criteria. Cyberoam attaches user identity to security while authenticating, authorizing & auditing (AAA), the network allowing a network administrator to see and control the ‘user’ on a network instead of just an IP address. This enables the administrators to identify users, control Internet activity of users in the network, set user based policies and reporting by username.

Read more about this topic:  Cyberoam

Famous quotes containing the words identity, based, layer and/or technology:

    There is a terrible blindness in the love that wants only to accommodate. It’s not only to do with omissions and half-truths. It implants a lack of being in the speaker and robs the self of an identity without which it is impossible for one to grow close to another.
    Alexander Theroux (b. 1940)

    A marriage based on full confidence, based on complete and unqualified frankness on both sides; they are not keeping anything back; there’s no deception underneath it all. If I might so put it, it’s an agreement for the mutual forgiveness of sin.
    Henrik Ibsen (1828–1906)

    A revolution is not the overturning of a cart, a reshuffling in the cards of state. It is a process, a swelling, a new growth in the race. If it is real, not simply a trauma, it is another ring in the tree of history, layer upon layer of invisible tissue composing the evidence of a circle.
    Kate Millett (b. 1934)

    One can prove or refute anything at all with words. Soon people will perfect language technology to such an extent that they’ll be proving with mathematical precision that twice two is seven.
    Anton Pavlovich Chekhov (1860–1904)