On-Appliance Reporting

Real-time visibility into network activitiesOn-Appliance Reporting

Cyberoam’s on-appliance reporting delivers Layer 8 Identity-based visibility into user and network activity, offering real-time information regarding who is doing what across central and remote locations.

Cyberoam network security appliances (Next-Generation Firewalls/UTMs) deliver in-depth reporting over the appliance, eliminating the need for an independent reporting solution and minimizing the resultant security investment and operational expense. Over 1200 in-depth reports offer real-time visibility into user and network activities over dual dashboards – Security dashboard and Traffic dashboard. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps, allowing organizations to manage security, display compliance and forensic analysis.

Feature Feature Description Benefit
Human Layer 8 Identity-based Security
  • User identity-based reports in dynamic Wi-Fi and shared endpoint environments in healthcare, educational institutions, retail stores and call centers
  • Visibility into who is doing what
  • Visibility into who is accessing which application
  • Instant identification of the source or destination endpoint under attack or perpetuating an attack
  • Helps prevent data leakage
  • Supports regulatory compliance requirements of CIPA, HIPAA, PCI DSS, GLBA
  • Shorter audit cycles
User Threat Quotient (UTQ) Reports
  • Spot risky users posing security and legal risks
  • Gives details on activities contributing to users’ threat quotient:
  • Intrusion Prevention reports
    • – Websites visited
    • – Number of attempts
      • – Website categories
  • Actionable security intelligence to spot risky users at a glance
  • Eliminates risk of error in dealing with massive logs and reports
  • Facilitates corrective actions
  • Allows IT security managers to identify, educate risky users
Security Reporting
  • Firewall & Internet activity
  • VPN activity
  • Intrusion Prevention reports
  • Spam reports
  • Virus reports
  • Web activity
  • Search Engine Query reports
  • Mail activity
  • IM activity
  • FTP activity
  • Real-time view of network activity
  • Supports instant security action
Compliance Reporting
  • GLBA
  • SOX
  • Supports compliance to regulatory requirements
Personalized View
  • Create custom dashboard
  • Bookmark important reports
  • View custom trends
  • Create custom reports
  • High flexibility to meet organizational requirements
Report Formats
  • View Formats – Tabular, Graphical
  • Print Formats – CSV, PDF
  • High flexibility to meet organizational requirements
  • Report sharing with the relevant departments and management
On-Appliance Reporting and Next Generation Firewalls
  • Free reporting module over Cyberoam UTM appliances
  • Eliminates need for separate reporting solution
  • Minimizes security investment and operational expense involved in maintenance