Application Security

Take security beyond ports and protocolsApplication Security

Cyberoam delivers comprehensive Application Security against, malware, intrusions, data leakage and attempts to exploit web application vulnerabilities. It controls unauthorized application usage while supporting business-critical applications, secure collaboration, Cloud and SaaS adoption.

Key Highlights

Application Visibility & Control – Cyberoam’s Layer 7 capabilities identify and control applications which use standard Port 80, 443, non-standard ports, port hopping or tunnel through encrypted SSL traffic. The feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Applications can be classified based on their risk level, characteristics and technology, offering more granular controls. Cyberoam implements application-based Bandwidth Management, accelerating critical applications while blocking malware-laden sites through Web Filtering. Organizations can group applications as per their requirements into business-critical, entertainment, communication, collaboration and control access through Firewall policies. Moreover, Cyberoam offers visibility and control over Micro-Apps. Eg. Facebook (games, chat, posts, photo and video upload, etc.) and Google (Gmail, Google docs upload/download, Google Hangout, Gmail Android App, and more).

Applications QoS – Cyberoam allows the creation of Firewall rules based on Application-User-Time-Bandwidth, ensuring assured bandwidth for business-critical applications and minimizing the peaks and troughs of bandwidth consumption.

Web Application Firewall – Cyberoam offers on-appliance WAF to protect websites and Web applications against exploitation of Web application vulnerabilities like SQL Injection, cross-site scripting, and other OWASP attacks.

Instant Messaging Controls – Cyberoam scans, logs and controls access to Instant Messaging applications like Yahoo Messenger and Windows Live Messenger. Organizations can implement Layer 8 Identity-based controls by username or IM address over:

  • Access to IM applications
  • Audio-video chat
  • Conversations based on keywords
  • File transfer

Data Leakage Prevention – Cyberoam’s Application Visibility & Control can block file transfer over webmails like Gmail and Yahoo, file sharing via P2P applications in addition to the above IM controls, preventing data leakage and helping organizations meet the requirements of regulatory compliance.

Application Security – Cyberoam Firewall blocks games and tunneling software that result in malware entry. Cyberoam scans FTP and encrypted HTTPS / SSL traffic in addition to guarding against web application vulnerabilities which are exploited to launch backdoor, zero-hour attacks. It blocks anomalous traffic through its extensive and constantly updated database of IPS signatures.