Plug leaky networks and endpoints
Data Leakage Prevention
Cyberoam offers gateway and endpoint Data Leakage Prevention, protecting organizations from data leakage and loss occurring with data transfer over applications and removable storage devices.

Cyberoam Data Leakage Prevention Solutions

Cyberoam data leakage prevention solutions offer Layer 8 Identity-based policies based on username and work requirement to help protect sensitive corporate data, preserve customer data privacy and meet regulatory compliance and security requirements while retaining work flexibility.
  • Cyberoam UTM offers gateway data leakage prevention controlling data transfer over email, web mail, file upload and file transfer applications.
  • Cyberoam Endpoint Protection offers endpoint data leakage prevention, controlling data transfer from users’ endpoints.
Key Highlights

Email Leakage Prevention – Cyberoam UTM enables organizations to implement Identity-based policies to block attachments and forward email copies of departing and pre-specified employees to their managers and IT security. The result is quick preventive action against data leakage. Email archiving prevents destruction of critical data.

Web Leakage Prevention – Cyberoam UTM prevents file upload over HTTP, Web mail, FTP, P2P and other file sharing applications based on username and work profile.

Instant Messenger Leakage Prevention – Cyberoam UTM blocks chat conversations based on pre-specified keywords and file transfer over IM in accordance with Human Layer 8 Identity-based policies.

Encrypted HTTPS/SSL Protocol Leakage Prevention – Cyberoam UTM controls file upload over HTTPS/SSL websites, preventing misuse of this encrypted medium in the form of unauthorized transfer of sensitive data.

Endpoint Leakage Prevention – Cyberoam Endpoint Data Protection Solution offers control of file transfers over removable devices like USB, MP3, DVD, CDs in addition to IM, email and file-sharing applications. It encrypts and decrypts files over removable devices to limit file access to authorized users. Creation of shadow copies when files are created, modified, transferred or printed ensures that Cyberoam prevents destruction of critical business data. Layer 8 Identity-based visibility and control limits the use of these devices and applications while offering logging, reporting and archiving of user activity over endpoints.

Logging and Reporting – Cyberoam’s Human Layer 8 Identity-based logging and reporting includes chat logs which help in monitoring and taking corrective action. The extensive logs and reports support CIPA, HIPAA, PCI DSS regulatory compliance. Cyberoam offers on-appliance reporting over UTM in addition to centralized reporting over CCC appliances and Cyberoam iView.

Identity Based Security with Cyberoam's Layer 8 Technology
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
By Verticals
Government & Defense
Banking & Finance
ISPs & Email Service Providers
Unified Threat Management
Anti-Virus / Anti-Spyware
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
Cyberoam iView
Open Source
Cyberoam Central Console (CCC)
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Techsheet & Datasheets
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
ROI Calculator
Find a Partner
Become a Partner
Partner Login
Training & Events
Training Portal
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
Cyberoam Clients
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam