NEWS
Cyberoam introduces UTQ to identify security risks with ease
By VARINDIA - 2015-02-10
Cyberoam has introduced a unique capability – User Threat Quotient (UTQ) – to help IT security managers identify users posing security risks with ease. With UTQ, Cyberoam extends its own innovation of Layer-8 technology and turns over a new leaf in user-identity focussed security. Available on Cyberoam’s Next-Generation Firewall and UTM appliances, UTQ harnesses information derived out of user’s web traffic to determine risky users that pose security and/or legal risks.
Abhilash Sonwane, SVP, Products and Technology, Cyberoam, said, “Enterprise networks generate lots of data with ample clues into user-triggered events, but the information remains incomprehensible and correlating data from various logs and reports takes time and special skills, and is subject to the risk of human oversight. Most security teams struggle with timely detection of risk-prone user behaviour since they remain devoid of required actionable security data. User Threat Quotient (UTQ) from Cyberoam effortlessly profiles suspicious web behavior of network users, helping security teams with actionable inputs and relieving them from having to go through a labyrinth of massive logs.” The User Threat Quotient (UTQ) studies the web behaviour of users by analyzing massive data of allowed and denied web traffic for web categories like IP Address, P2P, Phishing and Fraud, Porn, Spam URL, Spyware, URL Translation Sites and more that pose security and legal risks. Winds of change in IT and network security clearly indicate a growing need to focus on internal threats or risks from users. As a result, many CXOs now identify analytics and actionable security as a key investment area besides cloud, virtualization and mobility, to leverage security analysis that enable faster decision making. Extending its own innovation of Layer-8 identity-security with UTQ, Cyberoam continues to bridge the gaps where many security paradigms fall short in combating insider threats and user-triggered risks.See What’s Next in Tech With the Fast Forward Newsletter
SOFTWARE
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.