IT company gets patent

Tuesday April 21 2015

By The Citizen Reporter

Dar es Salaam. A cyber security firm has been awarded a patent for identity and policy-based network security and management by the US Patent Office.

The technology, which was created and developed by the Cyberoam team in India, offers a capability to connect end user identity with network security policy, allowing IT security managers to more effectively manage activity and access based on individual needs.

Reacting to the development, Cyberoam Technologies Chief Executive Officer Hemal Patel said the patent grant validates the firm’s continued leadership in providing identity-based network security to address two of the primary security challenges.

He said these include helping network administrators manage the weakest link in the security chain with user-defined security and network access policies, and strengthening compliance and reporting based on complete visibility of user activity in the network.

He said traditional firewall security measures are designed to scan network traffic based on source and destination IP criteria, to allow or deny request for Internet or network access.

Mr Patel said the firm’s innovative system and methodcan apply rules and policies specific to the user, between the source and the destination.

The ‘Layer 8’ Technology allows user-specific policies, enabling granular security controls for firewall decisions.

Network administrators and IT security managers gain the ability to grant network, bandwidth and application access based on user-identity, time-of-day and other Layer-7 (application layer) controls.

With the additional level of control and visibility provided by Cyberoam Layer 8 Technology, organizations are better enabled to meet regulatory compliance requirements such as HIPAA, CIPA, PCI-DSS, GLBA, etc.

He noted that the patent awarded technology is at the heart of Cyberoam’s extensive portfolio of next-generation firewall (NGFW) and unified threat management (UTM) network security appliances.

According to him, it describes a system and method that provide a security and management system between the source and the destination which is configured to apply rules and policies which are specific to the user to the connection between the source and the destination.

The user-specific policies are used to govern the security and management of each packet transmitted and received via the connection.