Cyber security firm introduces service for IT managers

Posted on

THE Cyberoam security firm has introduced a new capability facility that helps IT Managers identify threats with more ease.

The service, known as – User Threat Quotient (UTQ) is intended to help IT security managers identify users posing security risks with ease.

The firm’s Senior Vice- President for Products and Technology, Mr Abhilash Sonwane, said yesterday that with the new product, Cyberoam extends its own innovation of Layer-8 technology and turns over a new leaf in user-identity focused security.

He noted that available on Cyberoam’s Next-Generation Firewall and UTM appliances, UTQ harnesses information derived out of user’s web traffic to determine risky users that pose security and /or legal risks.

Studies have proved that users are the weakest link in the security chain and patterns of human behaviour can be used to predict and prevent attacks Mr Sonwane pointed out that , “Enterprise networks generate lots of data with ample clues into user-triggered events, but the information remains incomprehensible and correlating data from various logs and reports takes time and special skills and is subject to the risk of human oversight.”

Given this scenario, a security manager wishing for a science fiction-like capability to preempt and mitigate threats shouldn’t come as a surprise.

The ongoing paradigm shift towards pre-emptive security shares some signs of such capabilities. Many organisations and security managers are leveraging big data analytics tools to capture early signs of specific user actions or network event patterns that may hint at a possible ongoing attack or anomaly.

Commenting further, Mr Sonwane added, “Most security teams struggle with timely detection of risk-prone user behaviour since they remain devoid of required actionable security data.

User Threat Quotient (UTQ) from Cyberoam effortlessly profiles suspicious web behaviour of network users, helping security teams with actionable inputs and relieving them from having to go through a labyrinth of massive logs.”


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s