Making the public IM private
Cyberoam’s IM Archiving and Control limits communication and file transfer over IM, preventing data leakage, phishing, malware, viruses, Trojans, worms, botnets and other malicious attacks.

Cyberoam’s Instant Messaging Controls implement Layer 8 Identity-based policies to control access to IM applications like Yahoo Messenger and Windows Live Messenger. It offers granular logs and reports, providing visibility and archiving facility that meet regulatory compliance requirements.

Feature Feature Description Benefit
Layer 8 Identity-based Policies
Controls who chats with whom through whitelists and blacklists
 
 
Blocks chat conversations
 
Sets rules to prevent users from chatting with specific users or domains
 
Enhances security and productivity
 
Converts unsecured public IM akin to secure private IM
 
Controls File Transfer, Voice, Video Chat
Identity- and group-based policies to control:
  - File transfer
  - Voice chat
  - Video chat
Prevents malware entry, viruses, worms
 
Filters Conversations
Keyword-based chat filtering, Eg. Social Security and Credit Card Numbers, etc.
 
Data Leakage Prevention
 
Ensures safe chatting in schools and libraries, meeting CIPA requirements
 
 
Application Security
Enables virus scanning over IM
Enhances Application Security
IM Archiving and Reporting
Archives IM activity
 
Layer 8 Identity-based logs and reports for audit and forensics
 
 
Reports based on time, users, keywords used in chat
 
 
Custom alerts
 
Choice of report availability with on-appliance reporting, centralized reporting over CCC and Cyberoam iView
 
 
Helps meet regulatory compliance requirements
 
Identity Based Security with Cyberoam's Layer 8 Technology
   
Solutions
 
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
 
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
 
By Verticals
MSSP
Government & Defense
Education
Healthcare
Banking & Finance
Retail
ISPs & Email Service Providers
   
Products
 
Overview
Unified Threat Management
Firewall
VPN
IPS
Anti-Virus / Anti-Spyware
Anti-Spam
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
 
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
 
Cyberoam iView
Open Source
Appliances
 
Cyberoam Central Console (CCC)
 
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
 
   
Resources
 
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Brochures
Techsheet & Datasheets
Whitepapers
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
Testimonials
ROI Calculator
Blog
   
Partners
 
Find a Partner
Become a Partner
Partner Login
 
Training & Events
 
Training Portal
Events
   
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
 
   
Support
 
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
RMA
Download
Cyberoam Clients
Upgrades
 
Company
 
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam