Cyberoam extends its unique Layer-8 technology advantage to bolster security in wireless networks through CR15wi

July 10, 2010 – Bulwark Distribution LLC, value added distributor for IT Security Solutions and Cyberoam products is please to announce the launch of CR15wi UTM appliance which brings the entire set of UTM security features over WLAN to protect home offices, remote offices and public Internet access outlets.

Currently, corporate Wi-Fi environments are at huge risk from information theft and cyber-terrorism attacks due to their inability to trace end users, especially the guest users. CR15wi overcomes this by a unique Layer 8 technology, treating user-identity as the 8th Layer or the “human” layer in the protocol stack. This allows administrators to apply identity-based security policies to gain visibility over user activity in the network.

“Organizations with dynamic IP environments lack the ability to trace end users, especially the guest users, which poses a huge risk of information theft.Guest users are usually authenticated using a common pre-shared key. This greatly increases the risk of network abuse by guest users over an extended period of time when they are outside the corporate network. But by using Cyberoam we can Time-bound Wi-Fi access controls for all users, including guests, reduce cost of managing WLAN by replacing separate routers and firewall and Cyberoam’s Layer 8 technology gives complete trace of guest user activity” says Mr. Avinash Chanchalani, Product Manager, Bulwark Distribution LLC

For secure authentication, CR15wi supports multiple virtual access points that create independent, segregated networks in the same physical area of the organization (sales, marketing, guest users etc.). This prevents rogue clients from connecting to networks where they don’t belong.

The usage of MIMO technology improves throughput and range values, thus, enabling faster handling of video streaming and high bandwidth downloads. Cyberoam’s Layer 8 Technology and Application Layer 7 Management over WLAN also allows user-specific bandwidth allocation for non-critical, semi-critical and critical business applications.

Cyberoam’s Identity-based Security over Wi-Fi Networks

• Identity-based policies in dynamic IP environment

• Time-bound Wi-Fi access controls for all users, including guests

• Identification of traffic based on User-Identity – complete trace of user activities

• Support for IP-address Pool that enhances security

• Reduced cost of managing WLAN by replacing separate routers and firewall

• Support for IP-address Pool that enhances security