Flexibility of on-appliance and dedicated reporting
Cyberoam offers real-time visibility into network and user activity with the Human Layer 8 Identity-based reporting, source and destination of attacks, Internet access and bandwidth usage, providing high security, optimal network performance and helping organizations meet regulatory compliance requirements.

Flexible Reporting Options

With real-time logging and reporting capability, Cyberoam manages and archives terabytes of log information and thousands of network reports, offering flexible purchase options to organizations

  • Extensive On-Appliance Reporting over Cyberoam UTM eliminates the need for additional investment. Capturing activity through Cyberoam’s Standard and Subscription features, it offers comprehensive visibility into user and system activity.
  • Open Source Logging & Reporting : Cyberoam iView is available over open source for organizations to extend its centralized log management and reporting to meet their unique requirements while minimizing investment.
  • Dedicated Appliances : Cyberoam iView appliances offer centralized log management and reporting of remote, multi-vendor security appliances with comprehensive visibility into user and system activity across global locations.
Key Highlights

Granular Reporting – Cyberoam offers real-time graphical reporting with dashboards and drill-down reports to the third level with identity-based information related to network events and user activity. Organizations can easily assess security risks, network resource consumption, employee productivity and more.

Cause-Effect Correlation – Organizations can readily discover disguised threats and correlate them with the cause, maintaining high levels of security.

Layer 8 Identity-based Reporting – Cyberoam offers the Human Layer 8 identity-based reporting, ensuring quick identification and forensics while meeting the requirements of regulatory compliance.

Regulatory Compliance – Cyberoam facilitates compliance with CIPA, PCI DSS, HIPAA, GLBA and SOX regulations, reduces cost of compliance and enables easy demonstration of compliance capability with audit logs and visibility into who accessed what and when.

Forensic Analysis – Cyberoam logging and reporting offers forensic analysis with historic user and system activity, reducing the cost of investigation and minimizing network downtime and future incidents.

Multiple Report Schedules and Formats – Organizations can get on-demand and daily, weekly scheduled reports in PDF, Microsoft Excel, HTML formats.

Web & Email Access – Organizations gain web-based interface for real-time comprehensive view of their network activity across distributed networks as well as reports that can be shared via email with the leadership team.


Identity Based Security with Cyberoam's Layer 8 Technology
   
Solutions
 
By Business Needs
Network Security
Web & Content Security
Email Security
Application Security
Secure Remote Access
Logging & Reporting
WAN Connectivity
Data Leakage Prevention
Managing Bandwidth
Centralized Management
 
By Network Size
Small Office - Branch Office
Small & Medium Enterprises
Large Enterprises
 
By Verticals
MSSP
Government & Defense
Education
Healthcare
Banking & Finance
Retail
ISPs & Email Service Providers
   
Products
 
Overview
Unified Threat Management
Firewall
VPN
IPS
Anti-Virus / Anti-Spyware
Anti-Spam
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility and Control
Web Application Firewall
3G / WiMAX Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances
 
Cyberoam NetGenie
Wireless Router for Home
UTM for Small & Home Offices
 
Cyberoam iView
Open Source
Appliances
 
Cyberoam Central Console (CCC)
 
Endpoint Data Protection
Data Protection & Encryption
Device Management
Application Control
Asset Management
 
   
Resources
 
UTM Product Demo
Register for a Free Evaluation
Beta Testing
Brochures
Techsheet & Datasheets
Whitepapers
Case Studies
Internet Threats Trend Report
Video Library
Awards & Certifications
Testimonials
ROI Calculator
Blog
   
Partners
 
Find a Partner
Become a Partner
Partner Login
 
Training & Events
 
Training Portal
Events
   
Connect with us
Facebook Facebook
Twitter Twitter
Blog Blog
LinkedIn Linked in
 
   
Support
 
Customer Login
Contact Support
Technical Documentation
Knowledge Base
Cyberoam Security Center
Maintenance Contracts
RMA
Download
Cyberoam Clients
Upgrades
 
Company
 
About Cyberoam
Awards, Reviews & Certifications
Press Center
Media Coverage
Press Releases
Press Kit
Media Contacts
Contact Cyberoam