Connect with us

Hi, what are you looking for?

COMPUTERS

Cyberoam’s security appliances profile suspicious Web behavior of users

Amar Mehta (right), Head of Cyberoam Asia Pacific, discusses the User Threat Quotient capability of Cyberoam firewall and unified threat management (UTM) appliances, which aims to help IT managers detect high-risk users that pose threat to the business network. With Mehta in photo is Jitendra Bulani, marketing manager for Cyberoam Asia Pacific.

“Security is always changing,” stated Amar Mehta, Head of Cyberoam Asia Pacific, when asked to describe the security landscape in the Philippines. In a meeting with the press recently, Mehta also stressed the need for, and importance of, security in the enterprise especially now that security risks and cyber attacks are of increasing concerns.

He also emphasized that businesses, including government organizations, which implement the latest technology trends like BYOD (bring-your-own-device), and Internet broadband, must be prepared for emerging security risks in their networks. This situation, which demands for a rapid network connection, leads to an increased need for higher performance security solutions.

Amar Mehta (right), Head of Cyberoam Asia Pacific, discusses the User Threat Quotient capability of Cyberoam firewall and unified threat management (UTM) appliances, which aims to help IT managers detect high-risk users that pose threat to the business network. With Mehta in photo is Jitendra Bulani, marketing manager for Cyberoam Asia Pacific.

Amar Mehta (right), Head of Cyberoam Asia Pacific, discusses the User Threat Quotient capability of Cyberoam firewall and unified threat management (UTM) appliances, which aims to help IT managers detect high-risk users that pose threat to the business network. With Mehta in photo is Jitendra Bulani, marketing manager for Cyberoam Asia Pacific.

In response to this requirement, network security appliance provider Cyberoam has launched the User Threat Quotient (UTQ), a unique capability of its products to help IT security managers determine risky user’s behavior that pose security risks in the network with ease.

UTQ, which is available on Cyberoam’s next-generation firewall and UTM (unified threat management) appliances, studies the Web behavior of users by analyzing massive data of allowed and denied Web traffic for Web categories like IP Address, P2P, phishing and fraud, porn, spam URL, spyware, URL translation sites and more that pose security and legal risks.

“With the evolution of IT and network security, organizations must be able to adapt and keep pace with cyber defense strategies. Else, they will suffer from the expensive impact of losing controls over their network security. Cyberoam’s UTQ technology eliminates the need for enterprises, particularly in the SMB sector, to invest in separate security tools just to address this concern,” said Mehta.

It was proven that network users are the weakest link in the security chain and patterns of human behavior can be used to predict and prevent attacks. Besides, enterprises and security managers are using big data analytics tools to capture early signs of specific user actions or network event patterns that may hint at a possible ongoing attacks or anomaly.

Advertisement. Scroll to continue reading.

“With the lack of actionable security data, enterprise security teams find it hard to detect risk-prone user behavior on time. Our new UTQ feature will help security officers to effortlessly profile the suspicious Web behavior of network users,” Mehta said.

UTQ extends Cyberoam’s innovation of Layer-8 technology in user-identity focused security to continue bridging the gaps where many security paradigms fall short in combating insider threats and user-triggered risks.

UTQ helps Chief Security Officers (CSOs)/ IT Security Managers through the following: (1) spotting risky users based on their Web behavior at a glance without manual efforts; (2) removing complexity in analyzing terabytes of logs to identify suspicious or risk-prone user behavior; (3) eliminating the need for SMBs to invest in separate SIEM tools to spot risky users; (4) enabling investigation into the spread of risk within the network; and (5) facilitating corrective actions to fine-tune user policies.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Organizations must implement a risk assessment methodology that is aligned with their operational realities – by establishing a clear asset baseline, organizations can engage...

APPS

Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in the Philippines...

White Papers

Nearly 50% of companies paid the ransom to get their data back – the second highest rate of ransom payment for ransom demands in...

GAMING

To help players stay safe, Kaspersky is launching “Case 404” — an interactive cybersecurity game that teaches Gen Z how to recognize threats and protect their...

HEADLINES

A zero-trust secure connection has many applications beyond automotive. It’s really for any industry that cares about security, and managing that security at scale.

HEADLINES

Organisations across the Asia-Pacific and Japan region are putting their security posture first, and many are now detecting intrusions early in the attack lifecycle,...

HEADLINES

Agentic AI Assistants—such as Apple Siri, Google Gemini, Microsoft Copilot, OpenAI ChatGPT, and others—are increasingly available to mobile users in consumer and enterprise environments. However, the same...

HEADLINES

Based on breach-tracking research conducted for over two decades, over 124 million Filipino user accounts have been compromised since 2004. This puts the Philippines...

Advertisement